WorldWideScience

Sample records for technology defense daily

  1. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  2. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  3. Defense Technology Plan

    Science.gov (United States)

    1994-09-01

    implementation of the services necessary to support transparent "information pull " operation of decision support systems. This infrastructure will be implemented...technology. Some aspects of this area such as user- pull , mobile and highly distributed operation, bandwidth needs and degree of securihy are Dol)-driven...by a variety of statutory requirements. R&D will provide enhanced mission effectiveness and maintenance of fragile ecosystems. The goalis to develop

  4. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  5. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  6. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  7. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  8. NATO Technology: From Gap to Divergence? (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Daniel, Donald

    2004-01-01

    .... Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence a condition...

  9. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  10. Daily allergic multimorbidity in rhinitis using mobile technology

    DEFF Research Database (Denmark)

    Bousquet, J.; Devillier, P.; Anto, J. M.

    2018-01-01

    impact on work productivity using a mobile technology, the Allergy Diary. Methods: We undertook a 1-year prospective observational study in which 4 210 users and 32 585 days were monitored in 19 countries. Five visual analogue scales (VAS) assessed the daily burden of the disease (i.e., global evaluation...... approach examining daily symptoms with mobile technology, we found considerable intra-individual variability of allergic multimorbidity including a previously unrecognized extreme pattern of uncontrolled multimorbidity....

  11. Changing Manufacturing Technology and Jobs in Defense Industries.

    Science.gov (United States)

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  12. Defense Technology Opportunities for First Responders

    National Research Council Canada - National Science Library

    White, Rodney; Bedard, Louis; Derrah, Scott; Boucher, Robert

    2004-01-01

    For this study, the US and Canadian governments assessed the potential for technology transfer of five technologies, which were developed to meet military requirements, to civilian first responders...

  13. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  14. Civilian applications for superconducting magnet technology developed for defense

    International Nuclear Information System (INIS)

    Johnson, R.A.; Klein, S.W.; Gurol, H.

    1986-01-01

    Seventy years after its discovery, superconducting technology is beginning to play an important role in the civilian sector. Strategic defense initiative (SDI)-related research in space- and ground-based strategic defense weapons, particularly research efforts utilizing superconducting magnet energy storage, magnetohydrodynamics (MHD), and superconducting pulsed-power devices, have direct applications in the civilian sector as well and are discussed in the paper. Other applications of superconducting magnets, which will be indirectly enhanced by the overall advancement in superconducting technology, include high-energy physics accelerators, magnetic resonance imaging, materials purifying, water purifying, superconducting generators, electric power transmission, magnetically levitated trains, magnetic-fusion power plants, and superconducting computers

  15. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  16. Science and Technology of Nanostructures in the Department of Defense

    International Nuclear Information System (INIS)

    Murday, James S.

    1999-01-01

    The United States Department of Defense maintains a research and development program in nanostructures with special attention to miniaturization of information technology devices, nanostructured materials, and nanobiotechnology for detection of biological agents. This article provides a brief guide to those DoD funding officers and research scientists actively interested in nanostructures

  17. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... regional innovation clusters, as well as experience fostering small business development and growth... from existing regional innovation clusters specializing in defense technologies to provide counseling... cluster areas and industries. SBA intends to make awards to multiple regional innovation clusters that can...

  18. NATO Technology: From Gap to Divergence? (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Daniel, Donald

    2004-01-01

    .... With only slight modifications (not additions) to current total defense expenditures, and using funds that will be available as they restructure their forces, European members could not only double their current investment but take significant strides to ensure that they are not left behind in a world dominated by technology.

  19. Analyzing Department of Defense's Use of Other Transactions as a Method for Accessing Non-Traditional Technology

    National Research Council Canada - National Science Library

    Gilliland, John

    2001-01-01

    ... technological superiority To attract advanced technology companies that normally do not participate in defense business to the defense market, Congress provided a new contracting authority, Section 845...

  20. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  1. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  2. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    Science.gov (United States)

    2017-12-01

    CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL BASE GOING FORWARD? by Daniel J. Shipman December 2017 Thesis Advisor: Mie...2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HOW MIGHT CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL...the competitive business environment of Department of Defense (DOD) vendors and whether the market is favorable for non-traditional, technology

  3. New technologies and defense policy for the European theater

    International Nuclear Information System (INIS)

    Tsipis, K.

    1992-01-01

    This paper reports that in what should be a reassuring phenomenon for America's European allies, US military planners think of applications of new technologies in new conventional weapons systems almost exclusively in the context of defending Western Europe. Given the global interests of the United States and the nature and location of emerging threats (as the Gulf war has so dramatically emphasized) this is a rather narrow base for US conventional weapons modernization planning. As recent events in Eastern Europe make clear, the cogency of America's defense policy may be dramatically undermined by the reduction of the Soviet threat. As yet, it is unclear to what extent the development of future conventional forces will be conducted with reference to America's participation in NATO

  4. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  5. Application of quality function deployment in defense technology development

    Science.gov (United States)

    Cornejo, Estrella De Maria Forster

    1998-12-01

    program management concerns. The Q-PMM provided an improvement in defining the MOPs that would best describe the overall system MOEs. Both, MOP-MOE associations and a basis of comparison between the two ensembles were elucidated. Conclusion. The findings demonstrated QFD to be an effective approach to defense technology development.

  6. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  7. DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management

    Science.gov (United States)

    2017-06-01

    Defense Technology Development: Technology Transition Programs Support Military Users, but Opportunities Exist to Improve Measurement of Outcomes, GAO-13... LTE ), for cellular wireless communication applications. They also develop and commercialize numerous technologies used in handsets and tablets. They...17-499 Note: Technology Readiness Levels (TRL) are a tool that DOD, among others, uses to assess technology maturity. TRLs are measured on a scale

  8. Capturing daily urban rhythms: the use of location aware technologies

    CSIR Research Space (South Africa)

    Krygsman, S

    2007-07-01

    Full Text Available Daily activities and travel often follow a natural rhythm or flow that is structured by the fixed spatial and temporal constraints. The work and home location act as pegs that define individual’s activity space and it is within these spaces...

  9. Defense Technology Objectives for the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan

    National Research Council Canada - National Science Library

    1998-01-01

    .... Technologies such as radar, jet engines, nuclear weapons, night vision, smart weapons, stealth, the Global Positioning System, and vastly more capable information management systems have changed warfare dramatically...

  10. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  11. Developing defensive aids suite technology on a virtual battlefield

    Science.gov (United States)

    Rapanotti, John L.; DeMontigny-Leboeuf, Annie; Palmarini, Marc; Cantin, Andre

    2002-07-01

    Modern anti-tank missiles and the requirement of rapid deployment are limiting the use of passive armour in protecting land vehicles. Vehicle survivability is becoming more dependent on sensors, computers and countermeasures to detect and avoid threats. The integration of various technologies into a Defensive Aids Suite (DAS) can be designed and analyzed by combining field trials and laboratory data with modeling and simulation. MATLAB is used as a quick prototyping tool to model DAS systems and facilitate transfer to other researchers. The DAS model can be transferred from MATLAB or programmed directly in ModSAF (Modular Semi-Automated Forces), which is used to construct the virtual battlefield. Through scripted input files, a fixed battle approach ensures implementation and analysis meeting the requirements of three different interests. These three communities include the scientists and engineers, military and operations research. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. A system can be modelled phenomenologically until more information is available. Further processing of the simulation can be used to optimize the vehicle for a specific mission. ModSAF will be used to analyze and plan trials and develop DAS technology for future vehicles. Survivability of a DAS-equipped vehicle can be assessed relative to a basic vehicle without a DAS. In later stages, more complete DAS systems will be analyzed to determine the optimum configuration of the DAS components and the effectiveness of a DAS-equipped vehicle for specific missions. These concepts and approach will be discussed in the paper.

  12. Defense Technology Journal, Vol. 16, No. 2, February 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    ;Contents: VERTIGO Simulation; Education Reform of National Defense Academy; Artilleries and Ammunitions (4); Newly developed encryption algorithm (MISTY) that surpasses DES; CAS EXPO`95 in California USA; Underwater Weapons; Phaser Gun; and Japanese Missile.

  13. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    Science.gov (United States)

    1996-01-01

    security of the nation. The unicorn is the obvious symbol for this box. Even with a two percent of GDP or less defense budget, we will maintain our nuclear...systems is not going away. There are some unicorns in the defense herd and this would be a time to claim to be one. ACTIVITIES AND PERSONNEL Looking...macroeconomics and public finance is advisable. The subjects in the Forces and Force Analysis section will provide sufficient review of the technical

  14. Transitions in the wrong direction? Digital technologies and daily life

    DEFF Research Database (Denmark)

    Røpke, Inge; Christensen, Toke Haunstrup

    2013-01-01

    The environmental implications of information and communication technology (ICT) have been the subject of study since the early 1990s. Although previous research covers energy issues quite extensively, the treatment of the energy impacts of ICT integration in everyday life is still inadequate. Th...

  15. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  16. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  17. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  18. Assessing the Effectiveness of Defensive Aid Suite Technology Using a Field Trial and Modelling and Simulation

    National Research Council Canada - National Science Library

    Fournier, Pierre

    2002-01-01

    ...) community that Defensive Aid Suite (DAS) technologies can improve the protection of LAVs. A prototype DAS system was developed by DRDC Valcartier and tested in field trials held in 1995 and 1999...

  19. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  20. Defense Contractors SBIR/STTR Partnering Manual: A Primer on Technology Risk Management and Partnering Strategies

    National Research Council Canada - National Science Library

    Williams, John R

    2008-01-01

    As the world looks increasingly to technology innovation to meet the challenges of defense, security, disaster relief and increased health, many in industry have come to identify this nation's SBIR...

  1. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  2. Defensive technology and welfare analysis of environmental quality change with uncertain consumer health impacts

    International Nuclear Information System (INIS)

    Lee, L.K.; Moffitt, L.J.

    1993-01-01

    Measuring the ex post losses from environmental quality change is an important issue when environmental contamination creates health risks, liability is assigned, and private compensation efforts are required. This paper proposes a methodology for measuring the ex post welfare impact of environmental quality change using market behavior from defensive expenditures. Conditions under which a defensive technology can provide a bound on welfare estimates are identified

  3. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  4. Holding the Edge: Maintaining the Defense Technology Base

    Science.gov (United States)

    1989-04-01

    psychological , with the shedding of isolationist technology that is close or equal to that of the United attitudes and inhibitions. Reaction by European States...are directed toward aleveling could work against what should be a good common set of enabling technologies, with applica- leeida carld work aanst

  5. Intranet Technology: Considerations for Implementation within the Department of Defense

    National Research Council Canada - National Science Library

    Rich, Oliver

    1997-01-01

    Intranets, internal networks based on the same technology and protocol as the World Wide Web, have emerged in the past two years as a very popular medium for communication and information exchange within organizations...

  6. Emerging electro-optical technologies for defense applications

    Science.gov (United States)

    Venkateswarlu, Ronda; Ser, W.; Er, Meng H.; Chan, Philip

    1999-11-01

    Technological breakthroughs in the field of imaging and non- imaging sensor sand the related signal processors helped the military users to achieve 'force multiplication'. Present day 'smart-weapon systems' are being converted to 'brilliant-weapon systems' to bridge the gap until the most potent new 'fourth generation systems' come on line based on nanotechnology. The recent military tactics have evolved to take advantage of ever improving technologies to improve the quality and performance over time. The drive behind these technologies is to get a first-pass-mission-success against the target with negligible collateral damage, protecting property and the lives of non-combatants. These technologies revolve around getting target information, detection, designation, guidance, aim-point selection, and mission accomplishment. The effectiveness of these technologies is amply demonstrated during recent wars. This paper brings out the emerging trends in visible/IR/radar smart-sensors and the related signal processing technologies that lead to brilliant guided weapon systems. The purpose of this paper is to give an overview to the readers about futuristic systems. This paper also addresses various system configurations including sensor-fusion.

  7. Potential of Exoskeleton Technology to Assist Older Adults with Daily Living

    NARCIS (Netherlands)

    Jung, Merel Madeleine; Ludden, Geke D.S.

    Mobility impairments can prevent older adults from performing their daily activities which highly impacts a person's quality of life. Exoskeleton technology can assist older adults by providing additional support to compensate for age-related decline in muscle strength. To date little is known about

  8. Introducing Electronic Textbooks as Daily-Use Technology in Schools: A Top-Down Adoption Process

    Science.gov (United States)

    Chiu, Thomas K. F.

    2017-01-01

    This study took frequency of use and the adoption process into account to define the participants and external variables of the research model. School electronic textbooks are a daily-use technology and they are adopted in a compulsory, top-down way. Their introduction can evoke feelings of anxiety among teachers because of a possible increase in…

  9. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  10. Advanced Optical Technologies for Defense Trauma and Critical Care

    National Research Council Canada - National Science Library

    Berns, Michael W

    2008-01-01

    ...: High Resolution F-OCT and MPM/SHG Imaging of the Oral-Nasal Cavity Diffuse Optical Spectroscopy in Critical Patient Medicine, Optical Therapeutics in Cartilage for the Treatment of Traumatic Injuries and Degenerative Disease, Advanced Optical Technologies for Orthopedic Applications.

  11. The Relationship Between Digital Technology Experience, Daily Media Exposure and Working Memory Capacity

    Directory of Open Access Journals (Sweden)

    Muhterem DİNDAR

    2016-06-01

    Full Text Available Today’s youngsters interact with digital technologies to a great extent which leads scholars to question the influence of this exposure on human cognitive structure. Through resorting to digital nativity assumptions, it is presumed that cognitive architecture of the youth may change in accordance with digital technology use. In this regard, the current study investigated the relationship between digital technology experience, daily media exposure and working memory capacity of so-called digital native participants. A total of 572 undergraduate students responded to self-report measures, which addressed years of experience for 7 different digital devices and the daily time spent for 14 different digital activities. Participants’ working memory capacity was measured through the Computation Span and the Dot Matrix Test. While the former was used to measure the phonological loop capacity, the latter was used to address the visuo-spatial sketchpad capacity. Correlational analyses revealed that neither the phonological loop capacity nor the visuo-spatial sketchpad capacity was related to digital technology experience and daily media exposure. Thus, the transformative contribution of digital technology experience to human cognitive architecture could not be observed through the current measures

  12. Views of Students about Technology, Effects of Technology on Daily Living and Their Professional Preferences

    Science.gov (United States)

    Daghan, Gökhan

    2017-01-01

    The aim of this study is to examine the views of students about technology and their professional preferences and put forth the correlation between professional preferences and views about technology. For this purpose, in a private school in Ankara, 109 students from 6th and 7th grades were asked about their views on what technology is, the…

  13. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  14. Impact of Hearing Aid Technology on Outcomes in Daily Life II: Speech Understanding and Listening Effort.

    Science.gov (United States)

    Johnson, Jani A; Xu, Jingjing; Cox, Robyn M

    2016-01-01

    Modern hearing aid (HA) devices include a collection of acoustic signal-processing features designed to improve listening outcomes in a variety of daily auditory environments. Manufacturers market these features at successive levels of technological sophistication. The features included in costlier premium hearing devices are designed to result in further improvements to daily listening outcomes compared with the features included in basic hearing devices. However, independent research has not substantiated such improvements. This research was designed to explore differences in speech-understanding and listening-effort outcomes for older adults using premium-feature and basic-feature HAs in their daily lives. For this participant-blinded, repeated, crossover trial 45 older adults (mean age 70.3 years) with mild-to-moderate sensorineural hearing loss wore each of four pairs of bilaterally fitted HAs for 1 month. HAs were premium- and basic-feature devices from two major brands. After each 1-month trial, participants' speech-understanding and listening-effort outcomes were evaluated in the laboratory and in daily life. Three types of speech-understanding and listening-effort data were collected: measures of laboratory performance, responses to standardized self-report questionnaires, and participant diary entries about daily communication. The only statistically significant superiority for the premium-feature HAs occurred for listening effort in the loud laboratory condition and was demonstrated for only one of the tested brands. The predominant complaint of older adults with mild-to-moderate hearing impairment is difficulty understanding speech in various settings. The combined results of all the outcome measures used in this research suggest that, when fitted using scientifically based practices, both premium- and basic-feature HAs are capable of providing considerable, but essentially equivalent, improvements to speech understanding and listening effort in daily

  15. TOOLS OF KNOWLEDGE DISSEMINATION WITHIN A NATIONAL DEFENSE INSTITUTION FOR INNOVATION, TECHNOLOGY AND SCIENCE

    Directory of Open Access Journals (Sweden)

    Edson Aparecida de Araújo Querido Oliveira

    2006-11-01

    Full Text Available This paper describes and analyzes in a National Defense Institution for Innovation, Technology and Science its tools of knowledge dissemination. The methodology contemplates the period of 2004 and 2005. Qualitative and quantitative information orientate the research in order to understand focal aspects on knowledge dissemination, in comparison with theoretical references of renowned authors and other elaborated research searching for elements to perform an organizational diagnosis, focused on the knowledge dissemination as well as on the forces which promote or obstruct the organizational development. Conclusions are that the tools of knowledge dissemination must suitable to spread the tacit knowledge in such a way as the explicit ones and that, in a National Defense Institution, other important aspects must be considered, a time that, being the spread knowledge of wrong form can, besides bringing damages for the organization, to compromise the national sovereignty.

  16. Roadmap Modeling and Assessment Approach for Defense Technology System of Systems

    Directory of Open Access Journals (Sweden)

    Hui Lu

    2018-06-01

    Full Text Available Advanced defense technology plays a crucial role in safeguarding national safety and development interests. Aiming to handle the problems of current research and development (R&D management approaches faced with the rocketing complexities of system of systems, the authors propose a novel roadmap modeling and assessment methodology through studying the driving forces of general technology development and analyzing realistic requirements of defense technology management in this article. First, a requirement decomposition framework is designed based on multi-view theories and text-mining tools are used to construct a multi-layer knowledge-flow network model. Second, the contribution rates of requirement elements at different levels are evaluated using a multi-criteria decision-making approach and the node importance is assessed based on the topological structure of multi-layer network. Third, it is utilized to demonstrate the effectiveness of the proposed approaches that illustrative examples of the technology requirements in maritime security strategy investigating and a dual-layer knowledge-flow network consists of patents that belong to the “Coherent Light Generator (CLC” classification from the United States Patent and Trademark Office (USPTO database and the related academic papers from Web of Science. Finally, the contributions, potential applications, and drawbacks of this work are discussed and research outlooks are provided.

  17. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  18. Gaze-based assistive technology used in daily life by children with severe physical impairments - parents' experiences

    OpenAIRE

    Borgestig, Maria; Rytterstrom, Patrik; Hemmingsson, Helena

    2017-01-01

    Objective: To describe and explore parents' experiences when their children with severe physical impairments receive gaze-based assistive technology (gaze-based assistive technology (AT)) for use in daily life. Methods: Semi-structured interviews were conducted twice, with one year in between, with parents of eight children with cerebral palsy that used gaze-based AT in their daily activities. To understand the parents' experiences, hermeneutical interpretations were used during data analysis...

  19. Participation after acquired brain injury: Associations with everyday technology and activities in daily life.

    Science.gov (United States)

    Fallahpour, Mandana; Kottorp, Anders; Nygård, Louise; Lund, Maria Larsson

    2015-01-01

    The development of the information society has led to increased use of everyday technology and changed the conditions for participation. Enabling participation in everyday life situations is an important rehabilitation goal after acquired brain injury (ABI). Identifying factors associated with individuals' experienced participation and problems therein is therefore essential. This study aimed at exploring the relationship between perceived difficulty in everyday technology use, perceived ability in the activities of daily living (ADL), and perceived participation, and participation problems in persons with ABI. Eighty-one persons with ABI participated in the study and were assessed by the Impact on Participation and Autonomy questionnaire, the Everyday Technology Use Questionnaire, and the ADL taxonomy. Findings showed that the combined model of difficulty in everyday technology (ET) use, ADL ability, and the interaction between them explained both participation in various domains of everyday life, and also overall level of perceived participation and the perceived problems. The findings underscore the importance of evaluating individuals' ability in both ET use and ADL after ABI to increase the probability of explaining these persons' participation in desired everyday life situations and, also, for rehabilitation design.

  20. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    Full text: Recent technological innovations have changed the landscape of traditional scientific research. Advances in the nano- and bio-sciences, and materials and information processing are driving innovations at a phenomenal rate, resulting in greater interest yet uncertainty in the chemical-biological threat environment, research and development and other fields of policy, and overall preparedness. Conversely, the synergy arising from the convergence of nanotechnology, biotechnology, information processing and cognitive sciences (NBIC) offers great potential for transformational, revolutionary opportunities with many technological applications. Employing a new initiative termed 'Technology Foresight, Assessment, and Road-Mapping' (Tech-FARM TM ) - a multi dimensional futures-oriented approach for identification and management of emerging and/or disruptive science and technology. In literature similar initiative termed as GRAIN and BANG appear with similarity to NBIC - however Tech-FARM is comprehensive and an exhaustive method. Trans-disciplinary principles underlying NBIC convergence facilitates the development of visions and projections of future possible scientific and technological advances, environments, and productive collaborations for integrated, novel and/or unconventional solutions for 21 st century chem. -bio defense challenges. Incorporation of cognitive sciences refers to human performance enhancement in battlefield theatre. The dynamic relationship between contextual influence (socio-economical factors) and technological development is of critical consideration for S and T futures analyses. The Tech-FARM approach comprises three over-lapping practices of futures studies, including: foresight, the identification of future S and T development and their interaction with society and environment with the purpose of guiding actions to produce a more favorable future; assessment, which is concerned with the unintended, indirect, and delayed impacts of

  1. Dressing in elderly’s daily lives: contributions from ergonomics and assistive technologies

    Directory of Open Access Journals (Sweden)

    Crislaine Gruber

    2016-12-01

    Full Text Available Ergonomics aims to adapt products, services and strategies to make them compatible with the needs, abilities and limitations of people. Assistive technologies (AT are devices, services, strategies and practices that reduce problems caused by functional limitations of individuals. They can help elderly to accomplish activities of daily living like dressing. Considering the aging of world population, this paper presents a research on interaction between the elderly and an assistive dressing aid to verify their perceptions about the use of the AT device. Five participants used the AT device to put a pair of socks, and evaluated this experience. We found that the main difficulty for elderly in using the device was understanding the manual. Participants could not dress the pair of socks completely. Completing the tests, we evaluated the instruments and highlighted the participant’s opinions regarding advantages and disadvantages of the product.

  2. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  3. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  4. International technology exchange in support of the Defense Waste Processing Facility wasteform production

    International Nuclear Information System (INIS)

    Kitchen, B.G.

    1989-01-01

    The nearly completed Defense Waste Processing Facility (DWPF) is a Department of Energy (DOE) facility at the Savannah River Site that is designed to immobilize defense high level radioactive waste (HLW) by vitrification in borosilicate glass and containment in stainless steel canisters suitable for storage in the future DOE HLW repository. The DWPF is expected to start cold operation later this year (1990), and will be the first full scale vitrification facility operating in the United States, and the largest in the world. The DOE has been coordinating technology transfer and exchange on issues relating to HLW treatment and disposal through bi-lateral agreements with several nations. For the nearly fifteen years of the vitrification program at Savannah River Laboratory, over two hundred exchanges have been conducted with a dozen international agencies involving about five-hundred foreign national specialists. These international exchanges have been beneficial to the DOE's waste management efforts through confirmation of the choice of the waste form, enhanced understanding of melter operating phenomena, support for paths forward in political/regulatory arenas, confirmation of costs for waste form compliance programs, and establishing the need for enhancements of melter facility designs. This paper will compare designs and schedules of the international vitrification programs, and will discuss technical areas where the exchanges have provided data that have confirmed and aided US research and development efforts, impacted the design of the DWPF and guided the planning for regulatory interaction and product acceptance

  5. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  6. Technology-Aided Verbal Instructions to Help Persons with Mild or Moderate Alzheimer's Disease Perform Daily Activities

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Tatulli, Emanuela; Rigante, Valeria; Zonno, Nadia; Perilli, Viviana; Pinto, Katia; Minervini, Mauro G.

    2010-01-01

    These two studies extended previous research on the use of verbal instructions and support technology for helping persons with mild or moderate Alzheimer's disease perform daily activities. Study I included seven participants who were to carry out one of two previously targeted activities (i.e., either coffee preparation or table setting). Study…

  7. Self-defense or undermining the self? Exploring the possibilities and limitations of a novel anti-rape technology.

    Science.gov (United States)

    White, Deborah; Rees, Gethin

    2014-03-01

    Despite decades of feminist-inspired law reforms, rape remains highly prevalent. While many continue to fight for broad cultural and institutional changes, some argue that more immediate interventions are required. Self-defense techniques represent a key strategy of resistance to rape, and empirical evidence suggests that women's active resistance may hold a number of positive benefits. In this essay, we compare the aims and objectives of a novel anti-rape technology, known as the Rape-aXe, with traditional self-defense techniques, focusing upon the potential for both to resist individual acts of sexual aggression and, more broadly, end gendered sexual violence.

  8. Defense Science Board 1988 Summer Study on the Defense Industrial and Technology Base. Volume 2. Subgroup Appendices

    Science.gov (United States)

    1988-12-01

    XMZ.r :LOM "Wmum SZU2 (3) : e IMCO GMM * WM &an rymflf 55 AALI a" Of~ ~ mvaum 08AU MOUmr (7) WO uuK m.2a ACM MOM VAP = SPC UM (2) MN * 5 .~zC (2...Japan’s industrial and technology progress is impressive and persuasive in suggesting that nations with aspirations for economic and industrial

  9. Technology for the long-term management of defense HLW at the Idaho Chemical Processing Plant

    International Nuclear Information System (INIS)

    Staples, B.A.; Berreth, J.R.; Knecht, D.A.

    1986-01-01

    The Defense Waste Management Plan of June 1983 includes a reference plan for the long-term management of Idaho Chemical Processing Plant (ICPP) high-level waste (HLW), with a goal of disposing of the annual output in 500 canisters a year by FY-2008. Based on the current vitrification technology, the ICPP base-glass case would produce 1700 canisters per year after FY-2007. Thus, to meet the DWMP goal processing steps including fuel dissolution, waste treatment, and waste immobilization are being studied as areas where potential modifications could result in HLW volume reductions for repository disposal. It has been demonstrated that ICPP calcined wastes can be densified by hot isostatic pressing to multiphase ceramic forms of high loading and density. Conversion of waste by hot isostatic pressing to these forms has the potential of reducing the annual ICPP waste production to volumes near those of the goal of the DWMP. This report summarizes the laboratory-scale information currently available on the development of these forms

  10. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  11. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  12. Gaze-based assistive technology used in daily life by children with severe physical impairments - parents' experiences.

    Science.gov (United States)

    Borgestig, Maria; Rytterström, Patrik; Hemmingsson, Helena

    2017-07-01

    To describe and explore parents' experiences when their children with severe physical impairments receive gaze-based assistive technology (gaze-based assistive technology (AT)) for use in daily life. Semi-structured interviews were conducted twice, with one year in between, with parents of eight children with cerebral palsy that used gaze-based AT in their daily activities. To understand the parents' experiences, hermeneutical interpretations were used during data analysis. The findings demonstrate that for parents, children's gaze-based AT usage meant that children demonstrated agency, provided them with opportunities to show personality and competencies, and gave children possibilities to develop. Overall, children's gaze-based AT provides hope for a better future for their children with severe physical impairments; a future in which the children can develop and gain influence in life. Gaze-based AT provides children with new opportunities to perform activities and take initiatives to communicate, giving parents hope about the children's future.

  13. An Initial Look at Technology and Institutions on Defense Industry Consolidation

    National Research Council Canada - National Science Library

    Driessnack, John

    2004-01-01

    .... We take an initial look at the industry, and highlight how these changes influenced transaction costs in the defense industry, more fully explain the forces driving consolidation, and provide greater...

  14. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  15. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  16. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  17. Food as a Theme in Social Studies Classes: Connecting Daily Life to Technology, Economy, and Culture

    Science.gov (United States)

    Resor, Cynthia Williams

    2010-01-01

    Connecting wider economic, technological, or cultural trends to the everyday life of students can be a challenge. Food can serve as a course-long theme that helps students comprehend the essential connection between personal actions and national or international trends and develop skills of critical analysis. The author describes four activities…

  18. Extended outlook: description, utilization, and daily applications of cloud technology in radiology.

    Science.gov (United States)

    Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.

  19. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    Science.gov (United States)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  20. The Effect of Defense R&D Expenditures on Military Capability and Technological Spillover

    Science.gov (United States)

    2013-03-01

    as France, divide the expenditure between the civilian (power plants ) and the defense (weapons) sectors (Brzoska, 2005). Finally, enterprise...0.007092 0.008992092 114 Cuba 0.00617 0.007823069 115 Montenegro 0.005834 0.007397048 116 Rwanda 0.005678 0.007199252 117 Jamaica 0.005405 0.00685311...0.0001794 126 1043716034 121 Gabon 0.0001527 127 9138902194 81 Brunei Darussalam 0.0001447 128 14141361533 75 Montenegro 0.0001332 129 1292862098

  1. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  2. Feasibility of a dynamic web guidance approach for personalized physical activity prescription based on daily information from wearable technology.

    Science.gov (United States)

    Coolbaugh, Crystal L; Raymond, Stephen C; Hawkins, David A

    2015-06-04

    participants enabled evaluation of administrative features of the app including the generation of automated email reminders, participation surveys, and daily AM file upload logs. This study describes the development of the PPAP app, a closed-loop technology framework that enables personalized physical activity prescription and remote monitoring of an individual's compliance and health response to the intervention. Data obtained during a 12-week feasibility study demonstrated the ability of the PPAP app to use objective AM data to create daily, personalized physical activity guidance, provide interactive feedback to users, and enable remote administrative monitoring of data quality and subject compliance. Using this approach, public health professionals, clinicians, and researchers can adapt the PPAP app to facilitate a range of personalized physical activity interventions to improve health outcomes, assess injury risk, and achieve fitness performance goals in diverse populations.

  3. Gaze-based assistive technology in daily activities in children with severe physical impairments-An intervention study.

    Science.gov (United States)

    Borgestig, Maria; Sandqvist, Jan; Ahlsten, Gunnar; Falkmer, Torbjörn; Hemmingsson, Helena

    2017-04-01

    To establish the impact of a gaze-based assistive technology (AT) intervention on activity repertoire, autonomous use, and goal attainment in children with severe physical impairments, and to examine parents' satisfaction with the gaze-based AT and with services related to the gaze-based AT intervention. Non-experimental multiple case study with before, after, and follow-up design. Ten children with severe physical impairments without speaking ability (aged 1-15 years) participated in gaze-based AT intervention for 9-10 months, during which period the gaze-based AT was implemented in daily activities. Repertoire of computer activities increased for seven children. All children had sustained usage of gaze-based AT in daily activities at follow-up, all had attained goals, and parents' satisfaction with the AT and with services was high. The gaze-based AT intervention was effective in guiding parents and teachers to continue supporting the children to perform activities with the AT after the intervention program.

  4. Process technology for vitrification of defense high-level waste at the Savannah River Plant

    International Nuclear Information System (INIS)

    Boersma, M.D.

    1984-01-01

    Vitrification in borosilicate glass is now the leading worldwide process for immobilizing high-level radioactive waste. Each vitrification project, however, has its unique mission and technical challenges. The Defense Waste Vitrification Facility (DWPF) now under construction at the Savannah River Plant will concentrate and vitrify a large amount of relatively low-power alkaline waste. Process research and development for the DWPF have produced significant advances in remote chemical operations, glass melting, off-gas treatment, slurry handling, decontamination, and welding. 6 references, 1 figure, 5 tables

  5. Which indicators for measuring the daily physical activity? An overview on the challenges and technology limits for Telehealth applications.

    Science.gov (United States)

    Tagliente, Irene; Solvoll, Terje; Trieste, Leopoldo; De Cecco, Carlo N; Murgia, Fabrizio; Bella, Sergio

    2016-09-14

    Obesity is one of the biggest drivers of preventable chronic diseases and healthcare costs in Worldwide. Different prevention activities are suggested. By monitoring daily energy expenditure (EE) could be possible make personalized diets and programming physical activity. In this, physical inactivity is one of the most important public health problems. Some studies refer the effort of the international community in promoting physical activities. Physical activity can be promoted only by increasing citizens' empowerment on taking care of their health, and it passes from the improving of individual information. Technology can offer solutions and metrics for monitoring and measuring daily activity by interacting with individuals, sharing information and feedbacks. In this study we review indicators of total energy expenditure and weaknesses of available devices in assessing these parameters. Literature review and technology testing EuNetHta core model. For the clinical aspects, it is fundamental to take into account all the factor that can influence the personal energy expenditure as: heart rate, blood pressure and thermoregulation (influenced by the body temperature). In this study we focused the attention on the importance of tools to encourage the physical activity. We made an analysis of the factor that can influence the right analysis of energy expenditure and at the same time the energy regime. A punctual monitoring of the exercise regime could be helpful in Telemedicine application as Telemonitorig. More study are needed to value the impact of physical activity tracker in Telemonitorig protocols. On the assessment of the energy expenditure, critical issues are related to the physiological data acquisition. Sensors connected with mobile devices could be important tools for disease prevention and interventions affecting health behaviors. New devices applications are potential useful for telemedicine assistance, but security of data and the related communication

  6. The development of coal-based technologies for Department of Defense facilities: Phase 1 final report. Volume 1: Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Pisupati, S.V. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1997-01-31

    The first phase of a three-phase project investigating the development of coal-based technologies for Department of Defense facilities has been completed. The objectives of the project are to: decrease DOD`s dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase 1 activities were focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. The specific objective in Phase 1 was to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWM or DMC. This was achieved through a project consisting of fundamental, pilot-sale, and demonstration-scale activities investigating coal beneficiation and preparation, and MCWM and DMC combustion performance. In addition, detailed engineering designs and an economic analysis were conducted for a boiler located at the Naval Surface Warfare Center, near Crane, Indiana. Results are reported on MCWM and DMC combustion performance evaluation; engineering design; and cost/economic analysis.

  7. Survey of the Diversity and Defense-in-Depth Technologies for Application to NPP Digital I and C Systems

    International Nuclear Information System (INIS)

    Cheon, S. W.; Kim, J. Y.; Choi, J. G.

    2011-09-01

    This report reviews the nature of common-cause failures (CCFs) of the digital I and C (instrumentation and control) systems, diversity and defense-in-depth (D3) technologies and those practices in nuclear power plants. The report presents the diversity strategies, which consist of combinations of diversity attributes and their associated criteria. The report also presents assessment of the nature of CCFs and compensating diversity attributes. The diversity usage classification scheme involves three families of strategies: (1) different technologies (Strategies A), (2) different approaches within the same technology (Strategies B), and (3) different architectures within the same technology (Strategies C). The grouping of diversity criteria combinations establishes baseline diversity usage and facilitates a systematic organization of strategic approaches for coping with CCF vulnerabilities. Effectively, these baseline sets of diversity criteria constitute appropriate CCF mitigating strategies for digital safety systems. The strategies represent guidance on acceptable diversity usage and can be applied directly to ensure that CCF vulnerabilities identified through a D3 assessment have been adequately resolved. Additionally, the report presents the framework of diversity usage tables are presented for capturing practices regarding diversity usage

  8. Management of Information Technology Equipment, Office of the Secretary of Defense

    National Research Council Canada - National Science Library

    2001-01-01

    ...) inventory records for information technology equipment, such as personal computers. In addition, the investigation identified security issues concerning the disposal of personal computer hard drives...

  9. Planetary Defense is More Than Science and Technology: Policy, People, and Disaster Management

    Science.gov (United States)

    Harrison, A. A.

    2009-12-01

    Physical scientists and engineers who work to identify and then deflect or destroy threatening Near Earth Objects deserve the support of colleagues who have a thorough understanding of human psychology, society and culture. Behavioral and social scientists can help build governmental and public support for vigorous and comprehensive programs of planetary defense as well as apply their work to minimize the human cost of NEO threats and impacts. Tasks include preparing the public for a succession of possible threats of differing levels; developing effective warning and evacuation strategies; and supporting residents of affected areas during the impact and recovery phases. Although much can be learned from the pre-existing disaster literature, it is important to remain mindful of differences between asteroid or comet impacts and other natural disasters such as hurricanes and earthquakes. After identifying widespread but erroneous stereotypes that exaggerate human weakness and interfere with effective disaster planning, we turn to models whereby international, national, and regional organizations help local communities and citizens develop the skills, attitudes and resources that they need to help protect their own welfare. These models view residents of disaster areas as part of the solution as well as part of the problem, acknowledge dangers and disruptions outside of the immediate impact area, and demand high sensitivity to political and cultural issues. We conclude with a brief discussion of strategies for preserving the human legacy under worst-case scenarios including the construction and administration of survival communities and sending time capsules into space. Anthropology, political science, psychology and sociology are already contributing to astrobiology and SETI, and it is time for researchers and practitioners in these areas to become conspicuous partners in the pursuit of planetary defense.

  10. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  11. In Defense of Engineering Sciences: On the Epistemological Relations Between Science and Technology

    NARCIS (Netherlands)

    Boon, Mieke

    2011-01-01

    This article presents an overview of discussions in the philosophy of technology on epistemological relations between science and technology, illustrating that often several mutually entangled issues are at stake. The focus is on conceptual and ideological issues concerning the relationship between

  12. Detection of activities of daily living impairment in Alzheimer's disease and mild cognitive impairment using information and communication technology

    Directory of Open Access Journals (Sweden)

    Sacco G

    2012-12-01

    Full Text Available Guillaume Sacco,1–3 Véronique Joumier,1,4 Nelly Darmon,1 Arnaud Dechamps,1,5 Alexandre Derreumaux,1,3 Ji-Hyun Lee,2 Julie Piano,2 Nathalie Bordone,2 Alexandra Konig,1,6 Bernard Teboul,3 Renaud David,1,2 Olivier Guerin,1,3 François Bremond,1,4 Philippe Robert1,21EA CoBTeK, Université de Nice Sophia-Antipolis, 2Centre Mémoire de Ressource et de Recherche, CHU de Nice, 3Plateforme Patient du Centre d'Innovation et d'Usage en Santé, CHU de Nice, 4Equipe Stars, Institut National de Recherche en Informatique et en Automatique (INRIA, Sophia-Antipolis, France; 5University of Pancasila, Department of Psychology, Jakarta, Indonesia; 6University of Maastricht, Faculty of Psychology and Neuropsychology, Department of Psychiatry and Neuropsychology, Maastricht, The NetherlandsBackground: One of the key clinical features of Alzheimer's disease (AD is impairment in daily functioning. Patients with mild cognitive impairment (MCI also commonly have mild problems performing complex tasks. Information and communication technology (ICT, particularly techniques involving imaging and video processing, is of interest in order to improve assessment. The overall aim of this study is to demonstrate that it is possible using a video monitoring system to obtain a quantifiable assessment of instrumental activities of daily living (IADLs in AD and in MCI.Methods: The aim of the study is to propose a daily activity scenario (DAS score that detects functional impairment using ICTs in AD and MCI compared with normal control group (NC. Sixty-four participants over 65 years old were included: 16 AD matched with 10 NC for protocol 1 (P1 and 19 MCI matched with 19 NC for protocol 2 (P2. Each participant was asked to undertake a set of daily tasks in the setting of a “smart home” equipped with two video cameras and everyday objects for use in activities of daily living (8 IADLs for P1 and 11 for P2, plus 4 temporal execution constraints. The DAS score was then computed

  13. Overview of the Defense Programs Research and Technology Development Program for Fiscal Year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This documents presents a programmatic overview and program element plan summaries for conceptual design and assessment; physics; computation and modeling; system engineering science and technology; electronics, photonics, sensors, and mechanical components; chemistry and materials; special nuclear materials, tritium, and explosives.

  14. A Methodology for Assessing and Ranking Ballistic Missile Defense Technologies Using a System Performance Index

    Science.gov (United States)

    2002-07-29

    suggestions, and guidance concerning the technology assessment process. References 1. Using ACEIT for Total Ownership Cost Modeling and Analysis...2001 World Population Data Sheet, Population Reference Bureau, Washington, DC List of Acronyms ACEIT – Automated Cost Estimating Integrated

  15. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  16. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    Affairs Staffs Group General Motors Corporation Detroit, Michigan Director JOHN H. GIBBONS The Technology Assessment Board approves the release...Chairman & CEO Technology, Strategies & Alliances Donald W Putnam Corporate Director of Contracts General Dynamics Corp. Jack Ruina Professor of...parts. This strategy allowed Mazda to bring a new product to market quickly and make a profit despite low volume sales. (Peter F. Drucker, "The Big Three

  17. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  18. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  19. The Department of Defense Critical Technologies Plan for the Committees on Armed Services United States Congress

    Science.gov (United States)

    1991-05-01

    Early focus is on investigag advanced simulation technology for engine controls ( ASTEC ) to expl1oit increases in computational power, and on... ASTEC (FY 1992). 0 1 A * F electronics (FY 1992). * Fiber optics sensors/integration (FY 1994). * lightweight nozzle actuator (1FY 1995). 14-10

  20. Defense Technology and Trade Initiative: Ashton Carter’s Strategy in India

    Science.gov (United States)

    2016-03-01

    member and president of the Foundation for Emerging Solutions, which was established to strengthen the capacity of people throughout the world to...the winning combination for India. Table 3. Audit Matrix Transfer Mechanisms Documentation Training Seminars Learning, Visits, and Exchanges...warranted. A Total Technology System built in the form of an audit matrix is shown in Table 3 on page 31. To fully enhance the concept of evaluating stages

  1. Analysis of Expedited Defense Contracting Methods in the Acquisition of Emerging Technology

    Science.gov (United States)

    2016-12-01

    the need for the DOD to maintain technological advantage, they must also maximize their market opportunities and potential for returns on investment ...dynamics behind innovation, its funding and return on investment influence industry behavior and interaction with the government. The extent of... investment . One avenue DARPA considers is giving the job to a company, but delaying government claim to data rights. Part of market research and

  2. Review: Waste-Pretreatment Technologies for Remediation of Legacy Defense Nuclear Wastes

    Energy Technology Data Exchange (ETDEWEB)

    Wilmarth, William R.; Lumetta, Gregg J.; Johnson, Michael E.; Poirier, Micheal R.; Thompson, Major C.; Suggs, Patricia C.; Machara, N.

    2011-01-13

    The U.S. Department of Energy (DOE) is responsible for retrieving, immobilizing, and disposing of radioactive waste that has been generated during the production of nuclear weapons in the United States. The vast bulk of this waste material is stored in underground tanks at the Savannah River Site in South Carolina and the Hanford Site in Washington State. The general strategy for treating the radioactive tank waste consists of first separating the waste into high-level and low-activity fractions. This initial partitioning of the waste is referred to as pretreatment. Following pretreatment, the high-level fraction will be immobilized in a glass form suitable for disposal in a geologic repository. The low-activity waste will be immobilized in a waste form suitable for disposal at the respective site. This paper provides a review of recent developments in the application of pretreatment technologies to the processing of the Hanford and Savannah River radioactive tank wastes. Included in the review are discussions of 1) solid/liquid separations methods, 2) cesium separation technologies, and 3) other separations critical to the success of the DOE tank waste remediation effort. Also included is a brief discussion of the different requirements and circumstances at the two DOE sites that have in some cases led to different choices in pretreatment technologies.

  3. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  4. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  5. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  6. Special Technology Area Review on Spintronics. Report of Department of Defense Advisory Group on Electron Devices Working Group B (Microelectronics)

    National Research Council Canada - National Science Library

    Dunbridge, Barry; Palkuti, Les; Wolf, Stuart

    2004-01-01

    ...) as it applies to nonvolatile memories and quantum-based logic and computing. In addition, the information provided at the STAR is expected to be of use to the Services and Department of Defense (DoD...

  7. Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    Concepts for aircraft interior decon • Concepts for wide area/fixed site decon • Supercritical fluid-based decon for sensitive equipment; •Demo enzymatic ...and special purpose clothing; improved closure systems for ensembles; microencapsulated phase change materials for special purpose applications, and...development of microencapsulated phase change materials for heating and cooling in response to extreme temperature changes. Participants in this work are

  8. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  9. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

  10. Concurrent and Subsequent Associations between Daily Digital Technology Use and High-Risk Adolescents' Mental Health Symptoms

    Science.gov (United States)

    George, Madeleine J.; Russell, Michael A.; Piontak, Joy R.; Odgers, Candice L.

    2018-01-01

    Adolescents are spending an unprecedented amount of time using digital technologies (especially mobile technologies), and there are concerns that adolescents' constant connectivity is associated with poor mental health, particularly among at-risk adolescents. Participants included 151 adolescents at risk for mental health problems (M[subscript…

  11. Possible use of a computer for processing technological information of daily reports on drilling in order to optimize the drilling regimes

    Energy Technology Data Exchange (ETDEWEB)

    Sukhanov, V B; Kovalev, A A; Rezchikov, A V; Sukhanova, L G; Vyazenkin, S N; Zakolyuzhnyy, V D

    1982-01-01

    It is suggested that a computer be used for processing technological information of data reports on drilling. This will permit solution in the future to the task of monitoring the observation of the assigned regime-technological parameters of drilling wells by compiling planning recommendations and factual information about their fulfillment. Comprehensive analysis of the factual data regarding the regimes of making wells based on the information of daily reports on drilling using a computer in the OAIS system of drilling of the Ministry of the Gas Industry at the existing stage of technical support of the associations with a computer will permit in the near future production of exhaustive regime-technological information regarding the operation of bits in each well and development of RTK for drilling future wells by intervals of the same drillability.

  12. Cross-sectional associations between daily rest periods during weekdays and psychological distress, non-restorative sleep, fatigue, and work performance among information technology workers.

    Science.gov (United States)

    Tsuchiya, Masao; Takahashi, Masaya; Miki, Keiichi; Kubo, Tomohide; Izawa, Shuhei

    2017-04-07

    A daily rest period (DRP; rest taken from daily work during a 24 h period), is essential to work recovery. This study examined DRPs' distribution and association with health outcomes among information technology workers recruited from an internet panel (N=1,811). Participants completed a web questionnaire examining psychological distress as a primary outcome, along with non-restorative sleep, fatigue (stress reaction), and work performance. Logistic regression analysis showed elevated psychological distress when DRP was working and commuting hours. After the above adjustment, similar associations were found with non-restorative sleep and fatigue, but not work performance, when DRP was <12 h. These findings constitute the first analysis of a dose-response relationship between DRP and subjective health outcomes among white-collar workers.

  13. Technology-Aided Pictorial Cues to Support the Performance of Daily Activities by Persons with Moderate Alzheimer's Disease

    Science.gov (United States)

    Lancioni, Giulio E.; Perilli, Viviana; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Cassano, Germana; Pinto, Katia; Minervini, Mauro G.; Oliva, Doretta

    2012-01-01

    We developed a technology-aided intervention strategy relying on pictorial cues alone or in combination with verbal instructions and assessed these two versions of the strategy with three persons with moderate Alzheimer's disease. In Section I of the study, the strategy version with pictorial cues plus verbal instructions was compared with an…

  14. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1994--September 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Morrison, J.L. [and others

    1995-04-14

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. Activities this reporting period included performing coal beneficiation/preparation studies, conducting combustion performance evaluations, preparing retrofit engineering designs, determining retrofit economics, and installing a micronized coal-water mixture (MCWM) circuit.

  15. The bond as a soft technology in the daily routine of the Family Health Strategy: perception of the user.

    Science.gov (United States)

    Pozza Dos Santos, Bianca; Nizoli Nunes, Fernanda; Tuerlinckx Noguez, Patrícia; Roese, Adriana

    2016-04-01

    This study aimed to analyze the production of a bond between users and health care professionals in a Family Health Unit (FHU). This was a qualitative, descriptive study, with 33 hypertensive and/or diabetic users. Interviews were transcribed, analyzed and data were compared to the literature. The users who have been accessing the FHU for years stated that the bond with professionals has grown weak, it is a fragile bond. When it does exist, it is directed toward some professionals in the team. A disruption in the bond was also mentioned in some situations, owing to individual issues. Establishment of a bond between the user and the health care professionals in the reference FHU consists of a soft technology. Therefore, it impacts quality of health care and the prevention and management of chronic diseases. Establishment of a bond is essential for health care professionals to become references for the users of health care services.

  16. The bond as a soft technology in the daily routine of the Family Health Strategy: perception of the user

    Directory of Open Access Journals (Sweden)

    Bianca Pozza dos Santos

    Full Text Available Objective.This study aimed to analyze the production of a bond between users and health care professionals in a Family Health Unit (FHU. Methods. This was a qualitative, descriptive study, with 33 hypertensive and/or diabetic users. Interviews were transcribed, analyzed and data were compared to the literature. Results. The users who have been accessing the FHU for years stated that the bond with professionals has grown weak, it is a fragile bond. When it does exist, it is directed toward some professionals in the team. A disruption in the bond was also mentioned in some situations, owing to individual issues. Establishment of a bond between the user and the health care professionals in the reference FHU consists of a soft technology. Therefore, it impacts quality of health care and the prevention and management of chronic diseases. Conclusion. Establishment of a bond is essential for health care professionals to become references for the users of health care services.

  17. Object/Shape Recognition Technology: An Assessment of the Feasibility of Implementation at Defense Logistics Agency Disposition Services

    Science.gov (United States)

    2015-02-25

    provide efficiency and effectively manufacture or inventory items. The industries that benefit from Cognex technology are automotive, food and beverage ...recognition tedmology, Tedmology Readiness Level, PAGES Cost Benefit Analysis, Tedmology Commercialization, Technology Transition 139 16. PRICE CODE 17...Technology Development & Transition Strategy Guidebook xvii UD Ultimate Disposal U.S. United States USAF United States Air Force xviii THIS

  18. Application of accident progression event tree technology to the Savannah River Site Defense Waste Processing Facility SAR analysis

    International Nuclear Information System (INIS)

    Brandyberry, M.D.; Baker, W.H.; Wittman, R.S.; Amos, C.N.

    1993-01-01

    The Accident Analysis in the Safety Analysis Report (SAR) for the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) has recently undergone an upgrade. Non-reactor SARs at SRS (and other Department of Energy (DOE) sites) use probabilistic techniques to assess the frequency of accidents at their facilities. This paper describes the application of an extension of the Accident Progression Event Tree (APET) approach to accidents at the SRS DWPF. The APET technique allows an integrated model of the facility risk to be developed, where previous probabilistic accident analyses have been limited to the quantification of the frequency and consequences of individual accident scenarios treated independently. Use of an APET allows a more structured approach, incorporating both the treatment of initiators that are common to more than one accident, and of accident progression at the facility

  19. Implementation of the Gamma Monitor Calibration Laboratory (LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (IDQBRN) of the Technology Center of the Brazilian Army (CTEx)

    Energy Technology Data Exchange (ETDEWEB)

    Balthar, Mario Cesar V.; Amorim, Aneuri de; Santos, Avelino dos and others, E-mail: mariobalthar@gmail.com [Centro Tecnológico do Exército (IDQBRN/CTEx), Rio de Janeiro, RJ (Brazil). Instituto de Defesa Química, Biológica, Radiológica e Nuclear

    2017-07-01

    The objective of this work is to describe the implementation and adaptation stages of the Gamma Monitor Calibration Laboratory (Laboratório de Calibração de Monitores Gama - LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (Instituto de Defesa Química, Biológica, Radiológica e Nuclear - IDQBRN) of the Technology Center of the Brazilian Army (Centro Tecnológico do Exército - CTEx). Calibration of the radiation monitors used by the Brazilian Army will be performed by quantitatively measuring the ambient dose equivalent, in compliance with national legislation. LABCAL still seeks licensing from CNEN and INMETRO. The laboratory in intended to supply the total demand for calibration of ionizing radiation devices from the Brazilian Army. (author)

  20. Implementation of the Gamma Monitor Calibration Laboratory (LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (IDQBRN) of the Technology Center of the Brazilian Army (CTEx)

    International Nuclear Information System (INIS)

    Balthar, Mario Cesar V.; Amorim, Aneuri de; Santos, Avelino dos and others

    2017-01-01

    The objective of this work is to describe the implementation and adaptation stages of the Gamma Monitor Calibration Laboratory (Laboratório de Calibração de Monitores Gama - LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (Instituto de Defesa Química, Biológica, Radiológica e Nuclear - IDQBRN) of the Technology Center of the Brazilian Army (Centro Tecnológico do Exército - CTEx). Calibration of the radiation monitors used by the Brazilian Army will be performed by quantitatively measuring the ambient dose equivalent, in compliance with national legislation. LABCAL still seeks licensing from CNEN and INMETRO. The laboratory in intended to supply the total demand for calibration of ionizing radiation devices from the Brazilian Army. (author)

  1. Development of a Proxy-Free Objective Assessment Tool of Instrumental Activities of Daily Living in Mild Cognitive Impairment Using Smart Home Technologies.

    Science.gov (United States)

    Jekel, Katrin; Damian, Marinella; Storf, Holger; Hausner, Lucrezia; Frölich, Lutz

    2016-01-01

    The assessment of activities of daily living (ADL) is essential for dementia diagnostics. Even in mild cognitive impairment (MCI), subtle deficits in instrumental ADL (IADL) may occur and signal a higher risk of conversion to dementia. Thus, sensitive and reliable ADL assessment tools are important. Smart homes equipped with sensor technology and video cameras may provide a proxy-free assessment tool for the detection of IADL deficits. The aim of this paper is to investigate the potential of a smart home environment for the assessment of IADL in MCI. The smart home consisted of a two-room flat equipped with activity sensors and video cameras. Participants with either MCI or healthy controls (HC) had to solve a standardized set of six tasks, e.g., meal preparation, telephone use, and finding objects in the flat. MCI participants needed more time (1384 versus 938 seconds, p smart home technologies offer the chance for an objective and ecologically valid assessment of IADL. It can be analyzed not only whether a task is successfully completed but also how it is completed. Future studies should concentrate on the development of automated detection of IADL deficits.

  2. Immobilization of defense high-level waste: an assessment of technological strategies and potential regulatory goals. Volume I

    International Nuclear Information System (INIS)

    1979-06-01

    An investigation was made of the high-level radioactive waste immobilization technology programs in the U.S. and Europe, and of the associated regulatory programs and waste management perspectives in the countries studied. Purpose was to assess the ability of those programs to satisfy DOE waste management needs and U.S. regulatory requirements. This volume includes: introduction, immobilization strategies in the context of waste isolation program needs, high-level waste management as an integrated system, regulatory goals, engineered-barrier characteristics, barrier technology, high-level waste disposal programs, analysis of HLW immobilization technology in the context of policy and regulatory requirements, and waste immobilization program option

  3. An Analysis of Second-Tier Arms Producing Countries' Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    National Research Council Canada - National Science Library

    Confer, Brian S

    2008-01-01

    The purpose of this thesis is to determine if offsets are an effective means of second-tier countries acquiring technology and if offsets enhance their ability to establish and maintain an industrial...

  4. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, March 28, 1997--September 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Morrison, J.L. [and others

    1998-01-06

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Phase I was completed on November 1, 1995. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included performing pilot-scale air toxics (i.e., trace elements and volatile organic compounds) testing and evaluating a ceramic filtering device on the demonstration boiler. Also, a sodium bicarbonate duct injection system was installed on the demonstration boiler. An economic analysis was conducted which investigated the benefits of decreased dependence on imported oil by using new coal combustion technologies. Work related to coal preparation and utilization was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, and surface-based separation processes. The evaluation of deeply-cleaned coal as boiler fuel included receiving three cleaned coals from Cyprus-Amax.

  5. An Analysis of Second-Tier Arms Producing Countries’ Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    Science.gov (United States)

    2008-03-01

    stment, technology transfer, and countertrade , which entails barter, counter-purchase, and buyback. : those that ar ended. During the Cold War...overseas investment, technology transfer, and countertrade . Each of these areas is briefly described in the remainder of this section. 18 Co...and a foreign entity. 19 Countertrade . In addition to the types of offset defined above, various types of commercial countertrade arrangements

  6. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Husler, R.O.; Weir, T.J.

    1991-01-01

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I ampersand C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility

  7. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  8. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  9. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, September 28, 1993--March 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R.; Shepard, J.F.; Scaroni, A.W.; Hogg, R.; Chander, S.; Cho, H.; Ityokumbul, M.T.; Klima, M.S. [and others

    1994-11-30

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. To achieve the objectives of the program, a team of researchers was assembled. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFS) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phases I and II are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  10. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1995--September 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Hatcher, P.; Knicker, H. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-21

    The U.S. Department of Defense (DOD), through the Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Mixture Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, preparation of the Phase I final report continued. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included initiating a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work started on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filter device will be used to demonstrate a more compact and efficient filtering device for retrofit applications. Coal preparation and utilization activities, and the economic analysis were completed and work focused on preparing the final report. Work on Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on selecting incentives for commercialization of coal using technologies, community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  11. The development of coal-based technologies for Department of Defense facilities. Semi-annual report, March 28, 1996--September 27, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scarone, A.W. [and others

    1996-12-13

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. Phase I was completed on November 1, 1995. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included continuing bench-scale tests to identify an NO{sub x} reduction catalyst which is appropriate for industrial boiler applications. In addition, installation of a ceramic filtering device on the demonstration boiler started. Also, a sodium bicarbonate duct injection system was procured for installation on the demonstration boiler. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations,surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  12. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  13. Measurements of Daily Energy Intake and Total Energy Expenditure in People with Dementia in Care Homes: The Use of Wearable Technology.

    Science.gov (United States)

    Murphy, J; Holmes, J; Brooks, C

    2017-01-01

    To estimate daily total energy expenditure (TEE) using a physical activity monitor, combined with dietary assessment of energy intake to assess the relationship between daily energy expenditure and patterns of activity with energy intake in people with dementia living in care homes. A cross-sectional study in care homes in the UK. Twenty residents with confirmed dementia diagnosis were recruited from two care homes that specialised in dementia care. A physical activity monitor (SensewearTM Armband, Body Media, Pittsburgh, PA) was employed to objectively determine total energy expenditure, sleep duration and physical activity. The armband was placed around the left upper triceps for up to 7 days. Energy intake was determined by weighing all food and drink items over 4 days (3 weekdays and 1 weekend day) including measurements of food wastage. The mean age was 78.7 (SD ± 11.8) years, Body Mass Index (BMI) 23.0 (SD ± 4.2) kg/m2; 50% were women. Energy intake (mean 7.4; SD ± 2.6) MJ/d) was correlated with TEE (mean 7.6; SD ± 1.8 MJ/d; r=0.49, p<0.05). Duration of sleeping ranged from 0.4-12.5 (mean 6.1) hrs/d and time spent lying down was 1.3-16.0 (8.3) hrs/d. On average residents spent 17.9 (6.3-23.4) hrs/d undertaking sedentary activity. TEE was correlated with BMI (r=0.52, p<0.05) and body weight (r=0.81, p<0.001) but inversely related to sleep duration (r=-0.59, p<0.01) and time lying down (r=-0.62, p<0.01). Multiple linear regression analysis revealed that after taking BMI, sleep duration and time spent lying down into account, TEE was no longer correlated with energy intake. The results show the extent to which body mass, variable activity and sleep patterns may be contributing to TEE and together with reduced energy intake, energy requirements were not satisfied. Thus wearable technology has the potential to offer real-time monitoring to provide appropriate nutrition management that is more person-centred to prevent weight loss in dementia.

  14. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  15. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, September 28, 1996--March 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Pisupati, S.V. [and others

    1997-07-22

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. Preliminary pilot-scale NO{sub x} reduction catalyst tests were conducted when firing natural gas in Penn State`s down-fired combustor. This is the first step in the scale-up of bench-scale results obtained in Phase II to the demonstration boiler scale when firing coal. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio. The evaluation of deeply-cleaned coal as boiler fuel included installing a ribbon mixer into Penn State`s micronized coal-water mixture circuit for reentraining filter cake. In addition, three cleaned coals were received from CQ Inc. and three cleaned coals were received from Cyprus-Amax.

  16. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  17. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  18. DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations

    Data.gov (United States)

    National Aeronautics and Space Administration — DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations in polar stereographic projection currently include Defense Meteorological Satellite...

  19. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  20. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  1. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  2. The Use of Music Technologies in Field Education Courses and Daily Lives of Music Education Department Students (Sample of Atatürk University)

    Science.gov (United States)

    Parasiz, Gökalp

    2018-01-01

    Technology-oriented tools/devices have long been an indispensable part of music as well as music education for many years. It is of great importance in music education for students and teachers and the future of music to follow closely and use the technological developments in the present age in which technology directs the future. The aim of this…

  3. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  4. Teaching Science in the early years of primary education from the perspective STS: a work proposal facing the technological artifacts that guide the daily lives of students

    Directory of Open Access Journals (Sweden)

    Fabiane Fabri

    2013-05-01

    Full Text Available This article presents the results of a study with sixteen students of 2nd year 2nd cycle of the early years of the School Municipal Network of the city of Ponta Grossa in relation to the technological artifacts of everyday life. The study objective was to provide students with a scientific and technological literacy, an approach STS (Science, Technology and Society, starting from the main theme proposed by Resources Technology proposed by the National Curriculum in Sciences. The methodological approach was qualitative interpretative with participant observation. Among the organized activities can be mentioned: a visit to a recycling cooperative, interview with a scientist, presentations, mini-lessons for students, making folders, written productions, as well as a Technology Fair where students made presentations to the community school and parents. At the end of the study, it was noticed that students already could make reflections on social issues of scientific and technological development, but we emphasize the need to continue these discussions taking place during their school life, since it is believed that only this way the reflective stance on Science and Technology will be internalized. Please note that these are data of a dissertation in the Graduate Program in Teaching Science and Technology of the Technological Federal University of Paraná, Campus Ponta Grossa (UTFPR, Brazil.

  5. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  6. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  7. The Department of Defense Statement on the Science and Technology Program by Mr. H. Mark Grove, Assistant Deputy Under Secretary of Defense for Research and Advanced Technology Before the Defense Subcommittee of the Committee on Appropriations of the United States House of Representatives, 97th Congress, Second Session,

    Science.gov (United States)

    1982-06-16

    Technology Intergration (AFTI) Pro- gram, (2) a nonmetallic composite helicopter fuselage, and (3) a new initiative to develop Short Take-Off and...range of passive sonobuoys is being extended and the performance of a high gain extended life deployed horizontal line array is being investigated

  8. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  9. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  10. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  11. Managing Daily Life

    Science.gov (United States)

    ... Duchenne / Managing Daily Life Print Email Managing Daily Life Environmental accessibility As the person with Duchenne starts ... such as wider doorways and ramps, can make life easier once the person with Duchenne cannot climb ...

  12. Daily Weather Records

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These daily weather records were compiled from a subset of stations in the Global Historical Climatological Network (GHCN)-Daily dataset. A weather record is...

  13. Evaluation of the Transfer of International Traffic in Arms Regulations-Controlled Missile Defense Technology to the National Aeronautics and Space Administration (NASA)

    Science.gov (United States)

    2015-07-13

    120.19) occurs. He said even where an export does occur, in many cases transfers between U.S. Government agencies are exempted under ITAR 126.4 from...services is not an export under the ITAR and, to the extent it is, that any exemptions to license requirements are properly applied. Importantly, the...National Defense Authorization Act for Fiscal Year 2015,” we conducted an evaluation of the transfer of specific International Traffic in Arms

  14. Efficacy of a Micro-Prompting Technology in Reducing Support Needed by People With Severe Acquired Brain Injury in Activities of Daily Living: A Randomized Control Trial.

    Science.gov (United States)

    OʼNeill, Brian; Best, Catherine; OʼNeill, Lauren; Ramos, Sara D S; Gillespie, Alex

    2017-11-29

    To evaluate the effectiveness of an automated interactive prompting technology in supporting the morning routine of persons with acquired brain injury. The morning routine included maintaining personal hygiene and dressing. An inpatient neurorehabilitation hospital. Persons with acquired brain injury who required prompting when following their morning routine (n = 24), but were not limited by physical disability or dysphasia, took part in the study. Participants (67% with traumatic brain injury) had impairment on indices of memory and executive function. A randomized control trial evaluated the effect of an automated interactive micro-prompting device on the number of prompts by trained staff required for successful completion of the morning routine. Study-specific checklists assessed sequence performance, errors, and verbal prompts required over baseline, rehabilitation as usual, intervention, and return to baseline conditions. The intervention significantly reduced the support required to complete the task compared with usual rehabilitation. Micro-prompting technology is an effective assistive technology for cognition, which reduces support needs in people with significant cognitive impairments.

  15. The use of assistive technology for cognition to support the performance of daily activities for individuals with cognitive disabilities due to traumatic brain injury: The current state of the research.

    Science.gov (United States)

    Leopold, Anne; Lourie, Anna; Petras, Hanno; Elias, Eileen

    2015-01-01

    Many individuals with traumatic brain injury (TBI) are young and could have many years of productivity ahead of them. However, cognitive impairments may hinder individuals' ability to perform daily tasks. Assistive technology for cognition (ATC) can be effective in helping compensate for cognitive impairments. This study examined the current state of the research on using ATCs to support daily activities for individuals with cognitive disabilities that are due to TBI. A comprehensive systematic literature search was performed to identify peer-reviewed articles published between 2000 and 2015. To evaluate the nature of the research, qualitative data were extracted pertaining to recruitment, participant characteristics, intervention design, type of ATCs and their functions, matching individuals with ATCs, training for using the ATC, and outcomes. Research examining the effectiveness of ATCs as everyday compensatory tools for cognitive impairments that are due to TBI is limited. The majority of studies were case studies or quasi-experimental studies with small sample sizes. Studies showed positive associations between use of ATCs and individuals' abilities to perform tasks regardless of age, TBI severity, and time since injury. Future research should assess the match between the individual and the technology, study the impact of training on using ATCs, and analyze the usability of ATCs.

  16. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  17. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  18. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  19. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  1. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... and what emerging science and technology would have the greatest intelligence potential in this type... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Counter... Defense (DoD). ACTION: Notice of advisory committee meetings. SUMMARY: The Defense Science Board Task...

  2. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  3. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  4. April 25, 2003, FY2003 Progress Summary and FY2002 Program Plan, Statement of Work and Deliverables for Development of High Average Power Diode-Pumped Solid State Lasers,and Complementary Technologies, for Applications in Energy and Defense

    International Nuclear Information System (INIS)

    Meier, W; Bibeau, C

    2005-01-01

    The High Average Power Laser Program (HAPL) is a multi-institutional, synergistic effort to develop inertial fusion energy (IFE). This program is building a physics and technology base to complement the laser-fusion science being pursued by DOE Defense programs in support of Stockpile Stewardship. The primary institutions responsible for overseeing and coordinating the research activities are the Naval Research Laboratory (NRL) and Lawrence Livermore National Laboratory (LLNL). The current LLNL proposal is a companion document to the one submitted by NRL, for which the driver development element is focused on the krypton fluoride excimer laser option. The NRL and LLNL proposals also jointly pursue complementary activities with the associated rep-rated laser technologies relating to target fabrication, target injection, final optics, fusion chamber, target physics, materials and power plant economics. This proposal requests continued funding in FY03 to support LLNL in its program to build a 1 kW, 100 J, diode-pumped, crystalline laser, as well as research into high gain fusion target design, fusion chamber issues, and survivability of the final optic element. These technologies are crucial to the feasibility of inertial fusion energy power plants and also have relevance in rep-rated stewardship experiments. The HAPL Program pursues technologies needed for laser-driven IFE. System level considerations indicate that a rep-rated laser technology will be needed, operating at 5-10 Hz. Since a total energy of ∼2 MJ will ultimately be required to achieve suitable target gain with direct drive targets, the architecture must be scaleable. The Mercury Laser is intended to offer such an architecture. Mercury is a solid state laser that incorporates diodes, crystals and gas cooling technologies

  5. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  6. Lightship Daily Observations

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations taken on board lightships along the United States coasts from 1936 - 1983. Generally 4-6 observations daily. Also includes deck logs, which give...

  7. DailyMed

    Data.gov (United States)

    U.S. Department of Health & Human Services — DailyMed provides high quality information about marketed drugs. This information includes FDA labels (package inserts). This Web site provides health information...

  8. Daily Weather Maps

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Several different government offices have published the Daily weather maps over its history. The publication has also gone by different names over time. The U.S....

  9. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. Science and technology needs: Integrated research and development, the path to gaining a defensible understanding on ''watch list'' tank risk and interim stabilization needs

    International Nuclear Information System (INIS)

    Johnson, B.M.; Mellinger, G.; Strachan, D.; Hallen, R.

    1991-09-01

    The ''watch list'' waste tanks at the Hanford Site in Washington state are those that the Secretary of the Department of Energy reports upon to the Congress because of the unresolved safety question. As such, they are subject to intense surveillance and an enhanced list of controls and safety procedures. The objective of the Waste Tank Safety Program is to mitigate the safety concerns with respect to these tanks, thereby removing them from the ''watch list.'' The essential step in this process is the development of a defensible position that reduce the risk of these tanks to an acceptable level. An integrated research and development (R ampersand D) program is believed to be the most cost-effective means of achieving the information required to mitigate the safety concern and to resolve the safety issues. This program uses chemical and physical modeling studies of synthetic waste, is substantiated with limited field data and radioactive samples from a tank, and uses numerical modeling to extrapolate results to actual tank-scale operations. 3 refs., 4 figs

  11. Technology insertion of a COTS RAID server as an image buffer in the image chain of the Defense Mapping Agency's Digital Production System

    Science.gov (United States)

    Mehring, James W.; Thomas, Scott D.

    1995-11-01

    The Data Services Segment of the Defense Mapping Agency's Digital Production System provides a digital archive of imagery source data for use by DMA's cartographic user's. This system was developed in the mid-1980's and is currently undergoing modernization. This paper addresses the modernization of the imagery buffer function that was performed by custom hardware in the baseline system and is being replaced by a RAID Server based on commercial off the shelf (COTS) hardware. The paper briefly describes the baseline DMA image system and the modernization program, that is currently under way. Throughput benchmark measurements were made to make design configuration decisions for a commercial off the shelf (COTS) RAID Server to perform as system image buffer. The test program began with performance measurements of the RAID read and write operations between the RAID arrays and the server CPU for RAID levels 0, 5 and 0+1. Interface throughput measurements were made for the HiPPI interface between the RAID Server and the image archive and processing system as well as the client side interface between a custom interface board that provides the interface between the internal bus of the RAID Server and the Input- Output Processor (IOP) external wideband network currently in place in the DMA system to service client workstations. End to end measurements were taken from the HiPPI interface through the RAID write and read operations to the IOP output interface.

  12. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  13. Chronic daily headaches

    Directory of Open Access Journals (Sweden)

    Fayyaz Ahmed

    2012-01-01

    Full Text Available Chronic Daily Headache is a descriptive term that includes disorders with headaches on more days than not and affects 4% of the general population. The condition has a debilitating effect on individuals and society through direct cost to healthcare and indirectly to the economy in general. To successfully manage chronic daily headache syndromes it is important to exclude secondary causes with comprehensive history and relevant investigations; identify risk factors that predict its development and recognise its sub-types to appropriately manage the condition. Chronic migraine, chronic tension-type headache, new daily persistent headache and medication overuse headache accounts for the vast majority of chronic daily headaches. The scope of this article is to review the primary headache disorders. Secondary headaches are not discussed except medication overuse headache that often accompanies primary headache disorders. The article critically reviews the literature on the current understanding of daily headache disorders focusing in particular on recent developments in the treatment of frequent headaches.

  14. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

  15. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    antigens and protein toxins (further information can be found in the Appendix on Identity Testing of Agents in the full FAS report, 1992). The...express their surprise over these "living dinosaurs " because the United States had abandoned this enrichment technology in the late 1940s as more

  16. Global Historical Climatology Network - Daily (GHCN-Daily), Version 3

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Global Historical Climatology Network - Daily (GHCN-Daily) dataset integrates daily climate observations from approximately 30 different data sources. Version 3...

  17. Artificial Intelligence: The Bumpy Path Through Defense Acquisition

    Science.gov (United States)

    2017-12-01

    we must prepare for. 2. AI Industry Leaders Throughout history many technological breakthroughs have occurred due to the guidance and curation of... technology demonstrations, and exercises that aim to capture technology -based lessons learned. Failure to address AI essentials causes problems in...defense acquisition: system requirements are impossible to define; transition of AI technology fails; testing cannot be evaluated with confidence; and

  18. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program. Annex B. Department of the Navy Domestic Technology Transfer

    Science.gov (United States)

    1993-10-01

    overseas laboratories. Dental capabilities include oral microbiology, manufacturing technology for unique (dental prosthetic ) items, dental materials...with the National Center of Excellence in Metalworking to rectify production problems in manufacturing low loss, high pressure valves used in...34 Proceedings of the ASTE Fifth Symposium on Composite Materials: Fatigue and Fracture , May 1993. Chen, J. S. J., T. J. Praisner, L. A. Fields, R. T. Norhold and

  19. Laboratory for Calibration of Gamma Radiation Measurement Instruments (LabCal) of Institute of Chemical, Biological, Radiological and Nuclear Defense (IDQBRN) from Brazilian Army Technology Center (CTEx)

    International Nuclear Information System (INIS)

    Amorim, Aneuri de; Balthar, Mario Cesar V.; Santos, Avelino; Vilela, Paulo Ricardo T. de; Oliveira, Luciano Santa Rita; Penha, Paulo Eduardo C. de Oliveira; Gonzaga, Roberto Neves; Andrade, Edson Ramos de; Oliveira, Celio Jorge Vasques de; Fagundes, Luiz Cesar S.

    2016-01-01

    This paper describes the calibration laboratory deployment steps (LABCAL) gamma ionizing radiation measuring instruments in the Army Technology Center, CTEx. Initially the calibration of radiation monitors will be held in the dosimetric quantity air kerma and operational quantity ambient dose equivalent H*(d). The LABCAL / CTEx has not yet authorized by CASEC / CNEN. This laboratory aims to calibrate the ionizing radiation instruments used by the Brazilian Army. (author)

  20. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program. Annex A. Department of the Army Domestic Technology Transfer

    Science.gov (United States)

    1993-11-01

    infrared Collective Protection Systems - based on pressure swing adsorption, reactive bed plasma , catalytic oxidation, and improved sorbents. Chemical...commercialized A waterproofbre able, solvent-phobic menbrane technology developed under cotMAct with Tempo-Shain, is planned to be commercialized by Tempo-Shain...epitaxy systems, an elect=on-cyclatron resonance plasma -etched chemical vapor deposition and etching system, a magnetron-enhanced reactive-ion etching

  1. 76 FR 5236 - 60-Day Notice of Proposed Information Collection: Form DS-4071, Export Declaration of Defense...

    Science.gov (United States)

    2011-01-28

    ... Information Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405... of technology. Abstract of proposed collection: Actual export of defense technical data and defense... DS-4071, Export Declaration of Defense Technical Data or Services; OMB Control Number 1405-0157...

  2. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  3. The development of coal-based technologies for Department of Defense facilities. Volume 1, Technical report. Semiannual technical progress report, September 28, 1994--March 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Hatcher, P. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-15

    This program is being conducted as a cooperative agreement between the Consortium for Coal Water Mixture Technology and the U.S. Department of Energy. Activities this reporting period are summarized by phase. Phase I is nearly completed. During this reporting period, coal beneficiation/preparation studies, engineering designs and economics for retrofitting the Crane, Indiana boiler to fire coal-based fuels, and a 1,000-hour demonstration of dry, micronized coal were completed. In addition, a demonstration-scale micronized-coal water mixture (MCWM) preparation circuit was constructed and a 1,000-hour demonstration firing MCWM began. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations involved literature surveys of NO{sub x}, SO{sub 2}, trace metals, volatile organic compounds, and fine particulate matter capture. In addition, vendors and engineering firms were contacted to identify the appropriate emissions technologies for the installation of commercial NO{sub x} and SO{sub 2} removal systems on the demonstration boiler. Information from the literature surveys and engineering firms will be used to identify, design, and install a control system(s). Work continued on the refinement and optimization of coal grinding and MCWM preparation procedures, and on the development of advanced processes for beneficiating high ash, high sulfur coals. Work also continued on determining the basic cost estimation of boiler retrofits, and evaluating environmental, regulatory, and regional economic impacts. In addition, the feasibility of technology adoption, and the public`s perception of the benefits and costs of coal usage was studied. A coal market analysis was completed. Work in Phase III focused on coal preparation studies, emissions reductions and economic analyses of coal use.

  4. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  5. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  6. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  7. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  8. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  9. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  10. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  11. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  12. Recreating Daily life in Pompeii

    Directory of Open Access Journals (Sweden)

    Nadia Magnenat-Thalmann

    2010-05-01

    Full Text Available We propose an integrated Mixed Reality methodology for recreating ancient daily life that features realistic simulations of animated virtual human actors (clothes, body, skin, face who augment real environments and re-enact staged storytelling dramas. We aim to go further from traditional concepts of static cultural artifacts or rigid geometrical and 2D textual augmentations and allow for 3D, interactive, augmented historical character-based event representations in a mobile and wearable setup. This is the main contribution of the described work as well as the proposed extensions to AR Enabling technologies: a VR/AR character simulation kernel framework with real-time, clothed virtual humans that are dynamically superimposed on live camera input, animated and acting based on a predefined, historically correct scenario. We demonstrate such a real-time case study on the actual site of ancient Pompeii.

  13. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  14. Superior Rhythm Discrimination With the SmartShock Technology Algorithm - Results of the Implantable Defibrillator With Enhanced Features and Settings for Reduction of Inaccurate Detection (DEFENSE) Trial.

    Science.gov (United States)

    Oginosawa, Yasushi; Kohno, Ritsuko; Honda, Toshihiro; Kikuchi, Kan; Nozoe, Masatsugu; Uchida, Takayuki; Minamiguchi, Hitoshi; Sonoda, Koichiro; Ogawa, Masahiro; Ideguchi, Takeshi; Kizaki, Yoshihisa; Nakamura, Toshihiro; Oba, Kageyuki; Higa, Satoshi; Yoshida, Keiki; Tsunoda, Soichi; Fujino, Yoshihisa; Abe, Haruhiko

    2017-08-25

    Shocks delivered by implanted anti-tachyarrhythmia devices, even when appropriate, lower the quality of life and survival. The new SmartShock Technology ® (SST) discrimination algorithm was developed to prevent the delivery of inappropriate shock. This prospective, multicenter, observational study compared the rate of inaccurate detection of ventricular tachyarrhythmia using the SST vs. a conventional discrimination algorithm.Methods and Results:Recipients of implantable cardioverter defibrillators (ICD) or cardiac resynchronization therapy defibrillators (CRT-D) equipped with the SST algorithm were enrolled and followed up every 6 months. The tachycardia detection rate was set at ≥150 beats/min with the SST algorithm. The primary endpoint was the time to first inaccurate detection of ventricular tachycardia (VT) with conventional vs. the SST discrimination algorithm, up to 2 years of follow-up. Between March 2012 and September 2013, 185 patients (mean age, 64.0±14.9 years; men, 74%; secondary prevention indication, 49.5%) were enrolled at 14 Japanese medical centers. Inaccurate detection was observed in 32 patients (17.6%) with the conventional, vs. in 19 patients (10.4%) with the SST algorithm. SST significantly lowered the rate of inaccurate detection by dual chamber devices (HR, 0.50; 95% CI: 0.263-0.950; P=0.034). Compared with previous algorithms, the SST discrimination algorithm significantly lowered the rate of inaccurate detection of VT in recipients of dual-chamber ICD or CRT-D.

  15. The Daily Selection

    DEFF Research Database (Denmark)

    Skjold, Else

    2015-01-01

    In this PhD thesis, The Daily Selection, I will be addressing the overall question of how research on wardrobes can contribute to a more effective connection between the production and the consumption of dress objects. The thesis builds on exemplary studies of people in their wardrobes....... As such, the parts, when taken as a whole, represent an evolving process through which my overall research questions are being filtered and reflected. My scholarly approach builds on the fusing of fashion and dress research and design research, in this way closing a gap between dress practice as...

  16. Radiation in daily life

    International Nuclear Information System (INIS)

    Mora Rodriguez, P.

    1999-01-01

    The medical community benefits on a daily basis from the ionizing radiations used in the diagnosis and treatment of disease. The doses received in the medical field are only a small fraction of the total radiation received in a year. This bibliographic review has several objectives. The first one is to present the different components of natural radiation (background radiation). Secondly, it will introduce many consumer products that contain radioactive sources and expose our bodies. Third, arguments to diminish the radiation phobia will be presented and finally an easy to understand dosimetric magnitude will be introduced for the physician, the technologist and the patient. (author) [es

  17. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  18. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    utilizing these agent impermeable membranes. By FY98, develop and conduct physiological testing of a series of microencapsulated phase change materials...bases and depots, as well as civilian areas. By the end of FY02, demonstrate efficacy of enzymatic decontamination system for G and V-type nerve agents

  19. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  20. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  1. New daily persistent headache

    Directory of Open Access Journals (Sweden)

    Alok Tyagi

    2012-01-01

    Full Text Available New daily persistent headache (NDPH is a chronic headache developing in a person who does not have a past history of headaches. The headache begins acutely and reaches its peak within 3 days. It is important to exclude secondary causes, particularly headaches due to alterations in cerebrospinal fluid (CSF pressure and volume. A significant proportion of NDPH sufferers may have intractable headaches that are refractory to treatment. The condition is best viewed as a syndrome rather than a diagnosis. The headache can mimic chronic migraine and chronic tension-type headache, and it is also important to exclude secondary causes, particularly headaches due to alterations in CSF pressure and volume. A large proportion of NDPH sufferers have migrainous features to their headache and should be managed with treatments used for treating migraine. A small group of NDPH sufferers may have intractable headaches that are refractory to treatment.

  2. Making Daily Mobility

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Wind, Simon

    elucidate aspects of urban everyday mobility that can be utilized in policy and planning perspectives. This knowledge can aid construction of generalized qualitative scenarios that together with quantitative transport models can serve as wider knowledge foundation in decision making process.......In 2012 the average daily transportation distance for every Dane were 40 km (TU Data). Realising how much of life is spend thinking about, planning and performing mobility practices it becomes evident that it is much more than an instrumental physical phenomenon – it has great repercussions on life......, social networks, understanding of places and ultimately ourselves and others. To successfully accomplish everyday life, households have to cope with large number of different activities and mobility in relation to their children, work, social life, obligations, expectations, needs and wishes. Drawing...

  3. Physics in daily life

    CERN Document Server

    Hermans, Jo

    2012-01-01

    This book provides answers to everyday questions that any curious mind would ask, like : Why is water blue ? What makes ice so slippery ? How do we localize sound ? How do we keep our body temperature so nice and constant ? How do we survive the sauna at 90 C ? Why do large raindrops fall faster than small ones, and what exactly is their speed ? The answers are given in an accessible and playful way, and are illustrated with funny cartoons. In this book forty "Physics in Daily Life" columns, which appeared earlier in Europhysics News, are brought together in one inspiring volume. As well as being a source of enjoyment and satisfying insights for anyone with some physics background, it also serves as a very good teaching tool for science students. This booklet is a feast of erudition and humour.

  4. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  5. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  6. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  7. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  8. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  9. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  10. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  11. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  12. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  13. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  14. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  15. Edificio Daily Mirror

    Directory of Open Access Journals (Sweden)

    Williams, Owen

    1963-07-01

    Full Text Available The building has 18 levels. The Press occupies the 4 basement floors. The ground floor is taken up with the entrance hall, and an indoor carriage way. A snack bar and the telephone operators are situated on the second floor. The production department and the medical services are located on the third storey, whilst the fourth is occupied by the offices and library. The fifth floor is the beginning of the higher section of the building. This floor and up to including the 11th floor are devoted to office space, except for the 10th storey, which contains the office apartments of the directors and the Council Chamber. Equipment related to various services of the building is housed on the 12th storey. Finally, this tall building constitutes a fine landmark in the London skyline. The Daily Mirror building is outstanding for the appropriate nature, the completeness and the quality of its installations, which thus provide the most widely read paper in the world with outstandingly efficient offices.Este edificio consta de 18 plantas. El cuerpo de Prensa se aloja en los cuatro sótanos; los vestíbulos de entrada y una calzada interior para vehículos se hallan en la planta baja; la primera alberga un snack-bar y centralita telefónica; la segunda, el departamento de producción y centro de asistencia médica, y la tercera, las oficinas y biblioteca principales. La cuarta planta señala el comienzo del bloque alto; esta planta, junto con las quinta, sexta, séptima, octava y décima, están dedicadas a oficinas. La novena contiene las oficinas-apartamentos de los directores y salas de Consejo, y la undécima, la maquinaria para las diversas instalaciones del edificio. La elevada torre constituye un grandioso hito de referencia en esta zona de Londres. El «Daily Mirror» se distingue por el acierto, número y perfección de sus instalaciones, que proporcionan, al periódico de mayor actualidad mundial, las más adecuadas y amplias oficinas modernas.

  16. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  17. Progrès de la médecine, progrès technologiques et pratiques cliniques : les soignants se racontent Medical progress, technology and clinical practice: caregivers share their daily challenges

    Directory of Open Access Journals (Sweden)

    Sylvie Fortin

    2012-11-01

    Full Text Available À partir d’une étude anthropologique des pratiques cliniques en milieux de soins tertiaires, cet article s’intéresse aux défis posés par les progrès médicaux et technologiques en unités de soins intensifs (aigus et en unités d’oncologie pédiatrique (chroniques. Ces progrès interpellent quotidiennement médecins et personnel infirmier, posant des défis pour lesquels peu de réponses existent. Normes et valeurs s’actualisent en ces lieux où des enjeux entourant la vie, la “qualité” de vie, et la mort sont quotidiens. L’hôpital pédiatrique est certes un endroit où tous les espoirs sont permis. C’est aussi un lieu où la mort est à apprivoiser ; elle devient un choix, s’imposant rarement d’elle-même. Sur la base des témoignages des soignants et de nos propres observations, nous proposons une réflexion sur la ‘fin de vie’, objet d’un choix difficile, en dialogue avec la technologie qui la rend possible. Ces différentes voix témoigneront de rationalités parfois parallèles, convergentes ou divergentes, et des normes et valeurs qui s’affrontent, se rencontrent et se négocient dans l’espace social de la clinique.Stemming from an anthropological study of clinical practices in tertiary health care institutions, our paper focuses on challenges brought by medical and technological progress in paediatric intensive care units (acute and oncology units (chronic. This progress affects clinicians and nurses daily, posing challenges for which there are no ‘easy’ solutions. Norms and values surface in these clinical settings where issues regarding life, quality of life and death are part of everyday practice. A paediatric hospital is certainly a place where all hopes are warranted, but it is also a place where death must be acknowledged. Death is in fact often a question of choice as it almost always avoidable. Through the testimonies of health care professionals and our own field observations, we offer a

  18. Technology.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    Focuses on technology, on advances in such areas as aeronautics, electronics, physics, the space sciences, as well as computers and the attendant progress in medicine, robotics, and artificial intelligence. Describes educational resources for elementary and middle school students, including Web sites, CD-ROMs and software, videotapes, books,…

  19. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  20. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  1. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  2. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  3. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  4. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  5. Modulation of defensive reflex conditioning in snails by serotonin

    Science.gov (United States)

    Andrianov, Vyatcheslav V.; Bogodvid, Tatiana K.; Deryabina, Irina B.; Golovchenko, Aleksandra N.; Muranova, Lyudmila N.; Tagirova, Roza R.; Vinarskaya, Aliya K.; Gainutdinov, Khalil L.

    2015-01-01

    Highlights Daily injection of serotonin before a training session accelerated defensive reflex conditioning in snails.Daily injection of 5-hydroxytryptophan before a training session in snails with a deficiency of serotonin induced by the “neurotoxic” analog of serotonin 5,7-dihydroxytryptamine, restored the ability of snails to learn.After injection of the “neurotoxic” analogs of serotonin 5,6- and 5,7-dihydroxytryptamine as well as serotonin, depolarization of the membrane and decrease of the threshold potential of premotor interneurons was observed. We studied the role of serotonin in the mechanisms of learning in terrestrial snails. To produce a serotonin deficit, the “neurotoxic” analogs of serotonin, 5,6- or 5,7-dihydroxytryptamine (5,6/5,7-DHT) were used. Injection of 5,6/5,7-DHT was found to disrupt defensive reflex conditioning. Within 2 weeks of neurotoxin application, the ability to learn had recovered. Daily injection of serotonin before a training session accelerated defensive reflex conditioning and daily injections of 5-HTP in snails with a deficiency of serotonin induced by 5,7-DHT restored the snail's ability to learn. We discovered that injections of the neurotoxins 5,6/5,7-DHT as well as serotonin, caused a decrease in the resting and threshold potentials of the premotor interneurons LPa3 and RPa3. PMID:26557063

  6. Daily transactional and transformational leadership and daily employee engament

    NARCIS (Netherlands)

    Breevaart, K.; Bakker, A.B.; Hetland, Jorn; Demerouti, E.; Olsen, O.K.; Espevik, R.

    2014-01-01

    This diary study adds to the leadership literature by examining the daily influence of transformational leadership, contingent reward, and active management-by-exception (MBE active) on followers' daily work engagement. We compare the unique contribution of these leadership behaviours and focus on

  7. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  8. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  9. Logistiline Daily Service / Paavo Kangur

    Index Scriptorium Estoniae

    Kangur, Paavo, 1966-

    2005-01-01

    Sügisel ostis Leedu endise majandusministri Valetntinas Milaknise firma Daily Service ära kõik bürootarvetemüüja Reval Impexi aktsiad. 300 miljoni kroonise aastakäibega firma Eesti tütarettevõte prognoosib oma tänavuseks käibeks 31,2 miljonit krooni. Lisa: Daily Service'i struktuur

  10. The Feasibility and Acceptability of Using Technology-Based Daily Diaries with HIV-Infected Young Men Who have Sex with Men: A Comparison of Internet and Voice Modalities.

    Science.gov (United States)

    Cherenack, Emily M; Wilson, Patrick A; Kreuzman, Andrew M; Price, Georgine N

    2016-08-01

    This study delivered a daily diary to 67 HIV-infected men who have sex with men (MSM) between 16 and 24 years old for 66 days to measure HIV-risk behaviors and other psychosocial variables via two diary modalities: internet (accessible via any web-enabled device) and voice (accessible via telephone). Participants were randomized to complete one diary modality for 33 days before switching to the second modality for 33 days. The study was implemented in three urban HIV health care centers in the United States where participants were receiving services. Through diary data and qualitative interview data, we examined the feasibility and acceptability of the dairies and identified barriers and facilitators of dairy compliance. Results show high participant retention in the daily diary (93.4 %) and high compliance for the number of dairies completed (72.4 %). Internet diaries were preferred by 92 % of participants and completed at a significantly higher rate (77.5 %) than voice diaries (67.7 %). Facilitators included opportunities for self-reflection and cathartic sharing, monetary compensation, relationships with study staff, and daily reminders. Barriers included being busy or not having privacy at the time of reminders, forgetting, and falling asleep. Participants also described barriers and facilitators unique to each modality. Overall, both modalities were feasible and acceptable for use with our sample of HIV-infected MSM.

  11. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  12. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  13. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  14. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  15. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  16. Outgoing Longwave Radiation Daily Climate Data Record (OLR Daily CDR)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The product contains the 1-degree by 1-degree daily mean outgoing longwave radiation flux at the top of the atmosphere derived from HIRS radiance observations...

  17. Daily and Sub-daily Precipitation for the Former USSR

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset is a compilation of in situ daily and hourly meteorological observations for the former USSR initially obtained within the framework of several joint...

  18. Defensive medicine among obstetricians and gynecologists in tertiary hospitals.

    Directory of Open Access Journals (Sweden)

    Elad Asher

    Full Text Available OBJECTIVE: To describe the daily work practice under the threat of defensive medicine among obstetricians and gynecologists. STUDY DESIGN: A prospective cross-sectional survey of obstetricians and gynecologists working at tertiary medical centers in Israel. RESULTS: Among the 117 obstetricians and gynecologists who participated in the survey, representing 10% of the obstetricians and gynecologists registered by the Israel Medical Association, 113 (97% felt that their daily work practice is influenced by concern about being sued for medical negligence and not only by genuine medical considerations. As a result, 102 (87% physicians are more likely to offer the cesarean section option, even in the absence of a clear medical indication, 70 (60% follow court rulings concerning medical practices, and 85 (73% physicians mentioned that discussions about medical negligence court rulings are included in their departments' meetings. CONCLUSIONS: Defensive medicine is a well-embedded phenomenon affecting the medical decision process of obstetricians and gynecologists.

  19. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  20. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  1. Using wireless technology in clinical practice: does feedback of daily walking activity improve walking outcomes of individuals receiving rehabilitation post-stroke? Study protocol for a randomized controlled trial

    Science.gov (United States)

    2013-01-01

    Background Regaining independent ambulation is the top priority for individuals recovering from stroke. Thus, physical rehabilitation post-stroke should focus on improving walking function and endurance. However, the amount of walking completed by individuals with stroke attending rehabilitation is far below that required for independent community ambulation. There has been increased interest in accelerometer-based monitoring of walking post-stroke. Walking monitoring could be integrated within the goal-setting process for those with ambulation goals in rehabilitation. The feedback from these devices can be downloaded to a computer to produce reports. The purpose of this study is to determine the effect of accelerometer-based feedback of daily walking activity during rehabilitation on the frequency and duration of walking post-stroke. Methods Participants will be randomly assigned to one of two groups: feedback or no feedback. Participants will wear accelerometers daily during in- and out-patient rehabilitation and, for participants in the feedback group, the participants’ treating physiotherapist will receive regular reports of walking activity. The primary outcome measures are the amount of daily walking completed, as measured using the accelerometers, and spatio-temporal characteristics of walking (e.g. walking speed). We will also examine goal attainment, satisfaction with progress towards goals, stroke self-efficacy, and community-integration. Discussion Increased walking activity during rehabilitation is expected to improve walking function and community re-integration following discharge. In addition, a focus on altering walking behaviour within the rehabilitation setting may lead to altered behaviour and increased activity patterns after discharge. Trial registration ClinicalTrials.gov NCT01521234 PMID:23865593

  2. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  3. Defense Intelligence Strategy

    National Research Council Canada - National Science Library

    Clapper, James R

    2008-01-01

    ... developed. The emergence of a highly interconnected global economy is reshaping international alliances, speeding the adoption of technologies, and giving rise to the development of new economic centers...

  4. Lightship Daily Observations - NARA Collection

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations taken on board lightships along the United States coasts from 1893 - 1943. Generally 4-6 observations daily. Also includes deck logs, which give...

  5. Allegheny County Jail Daily Census

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — A daily census of the inmates at the Allegheny County Jail (ACJ). Includes gender, race, age at booking, and current age. The records for each month contain a...

  6. Technology Commercialization Program 1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-11-01

    This reference compilation describes the Technology Commercialization Program of the Department of Energy, Defense Programs. The compilation consists of two sections. Section 1, Plans and Procedures, describes the plans and procedures of the Defense Programs Technology Commercialization Program. The second section, Legislation and Policy, identifies legislation and policy related to the Program. The procedures for implementing statutory and regulatory requirements are evolving with time. This document will be periodically updated to reflect changes and new material.

  7. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  8. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  9. Relationships Among Nightly Sleep Quality, Daily Stress, and Daily Affect.

    Science.gov (United States)

    Blaxton, Jessica M; Bergeman, Cindy S; Whitehead, Brenda R; Braun, Marcia E; Payne, Jessic D

    2017-05-01

    We explored the prospective, microlevel relationship between nightly sleep quality (SQ) and the subsequent day's stress on positive (PA) and negative affect (NA) as well as the moderating relationships between nightly SQ, subsequent stress, and subsequent PA on NA. We investigated whether age moderated these relationships. We collected 56 days of sleep, stress, and affect data using daily diary questionnaires (N = 552). We used multilevel modeling to assess relationships at the between- and within-person levels. Daily increases in SQ and decreases in stress interacted to predict higher daily PA and lower daily NA. Better SQ in older adults enhanced the benefits of PA on the stress-NA relationship more during times of low stress, whereas better sleep in younger adults enhanced the benefits of PA more during times of high stress. Between-person effects were stronger predictors of well-being outcomes than within-person variability. The combination of good SQ and higher PA buffered the impact of stress on NA. The moderating impact of age suggests that sleep and stress play different roles across adulthood. Targeting intervention and prevention strategies to improve SQ and enhance PA could disrupt the detrimental relationship between daily stress and NA. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  11. Defense Waste Processing Facility prototypic analytical laboratory

    International Nuclear Information System (INIS)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-01-01

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R ampersand D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R ampersand D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy

  12. Defense Logistics: DOD Needs to Take Additional Actions to Address Challenges in Supply Chain Management

    Science.gov (United States)

    2011-07-01

    Jack E. Edwa appendix III. t rds Director, Defense Capabilities and Managemen Page 36 GAO-11-569 Defense Logistics List of Committees...Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302... operations . DOD faces asset visibility challenges due, in part, to a lack of interoperability among information technology

  13. Problems and Mitigation Strategies for Developing and Validating Statistical Cyber Defenses

    Science.gov (United States)

    2014-04-01

    such as Firewalls , HTTP proxies, and application-level Attribute Based Ac- cess Control [1] to provide a layered defense in depth. The spe- cific...research and technology develop- ment in several areas including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum

  14. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  15. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  16. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  17. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  18. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  19. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  20. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  1. On polar daily geomagnetic variation

    Directory of Open Access Journals (Sweden)

    Paola De Michelis

    2015-11-01

    Full Text Available The aim of this work is to investigate the nature of the daily magnetic field perturbations produced by ionospheric and magnetospheric currents at high latitudes. We analyse the hourly means of the X and Y geomagnetic field components recorded by a meridian chain of permanent geomagnetic observatories in the polar region of the Northern Hemisphere during a period of four years (1995-1998 around the solar minimum. We apply a mathematical method, known as natural orthogonal component (NOC, which is capable of characterizing the dominant modes of the geomagnetic field daily variability through a set of empirical orthogonal functions (EOFs. Using the first two modes we reconstruct a two-dimensional equivalent current representation of the ionospheric electric currents, which contribute substantially to the geomagnetic daily variations. The obtained current structures resemble the equivalent current patterns of DP2 and DP1. We characterize these currents by studying their evolution with the geomagnetic activity level and by analysing their dependence on the interplanetary magnetic field. The obtained results support the idea of a coexistence of two main processes during all analysed period although one of them, the directly driven process, represents the dominant component of the geomagnetic daily variation.

  2. Daily Physical Activity Survey Report

    Science.gov (United States)

    Alberta Education, 2008

    2008-01-01

    The intent of the Daily Physical Activity (DPA) Survey was to gather school-level information from teachers and principals regarding their perceptions of DPA, thus providing a greater understanding of DPA implementation in grades 1 to 9. This study aimed to help identify the many variables that influence the attainment of the DPA outcomes and…

  3. The defense waste processing facility: A status report

    International Nuclear Information System (INIS)

    Cowan, S.P.; Fulmer, D.C.

    1987-01-01

    The Defense Waste Processing Fascility (DWPF) will be the nation's first production scale facility for immobilizing high-level waste for disposal. It will also be the largest facility of its kind in the world. The technology, design, and construction efforts are on schedule for ''hot'' operation in fiscal year 1990. This paper provides a status report on the DWPF technology, design, and construction, and describes some of the challenges that have arisen during design and construction

  4. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  5. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  6. Defense Intelligence Agency

    Science.gov (United States)

    Management Office Management and Infrastructure Security Science and Technology Pre-Employment Forms Intelligence Community Wounded Warrior Internship Program News Articles Videos Contact DIA DIA in the News observed the legacy of Dr. Martin Luther King, Jr. in an event Jan. 26, at the DIA headquarters. Story DIA

  7. 75 FR 71647 - Defense Federal Acquisition Regulation Supplement; Discussions Prior to Contract Award (DFARS...

    Science.gov (United States)

    2010-11-24

    ... Deputy Under Secretary of Defense (Acquisition, Technology, and Logistics) to revise the DoD source... misunderstood requirements. DoD notes the potential disadvantages of this proposed change in increased time to...

  8. 77 FR 782 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-01-06

    ... private or public sector corporations or organizations; and (b) a wealth of top-level, global business..., economics, technology and healthcare. Board members shall be appointed by the Secretary of Defense, with...

  9. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  10. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  11. Radionuclide separations and processing for defense water management

    International Nuclear Information System (INIS)

    Fryberger, T.B.

    1993-01-01

    An overview is given of the Department of Energy's Efficient Separations and Processing Integrated Program (ESPIP). This program sponsors research in advanced chemical separations for removal of radionuclides and hazardous components from radioactive defense wastes. Separations processing will reduce the volume of high-level waste that must be disposed of in a deep geological repository and will improve the quality of low-level wastes acceptable for near-surface disposal. DOE defense complex processing needs as well as technologies that are currently under development in the program are discussed

  12. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  13. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  14. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  15. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  16. Observability of market daily volatility

    Science.gov (United States)

    Petroni, Filippo; Serva, Maurizio

    2016-02-01

    We study the price dynamics of 65 stocks from the Dow Jones Composite Average from 1973 to 2014. We show that it is possible to define a Daily Market Volatility σ(t) which is directly observable from data. This quantity is usually indirectly defined by r(t) = σ(t) ω(t) where the r(t) are the daily returns of the market index and the ω(t) are i.i.d. random variables with vanishing average and unitary variance. The relation r(t) = σ(t) ω(t) alone is unable to give an operative definition of the index volatility, which remains unobservable. On the contrary, we show that using the whole information available in the market, the index volatility can be operatively defined and detected.

  17. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    should be anonymized and shared within the Lab community so individual labs can see how they compare to their peers.  Overall Customer Satisfaction ...anonymization and sharing of these metrics within the lab community as well as the Services and other stakeholders: ‒ Overall customer satisfaction with...behalf of the warfighter. The Labs’ traditional missions are defined as “high quality science, technology transition, and smart acquisition.” While

  18. An observational study of defensible space in the neighbourhood park

    Science.gov (United States)

    Marzukhi, M. A.; Afiq, M. A.; Zaki, S. Ahmad; Ling, O. H. L.

    2018-02-01

    The planning of neighborhood park is important to provide space for interaction, leisure, and recreation among residents in any neighbourhood area. However, on an almost daily basis, newspapers report inappropriate incidents such as snatch theft, robbery and street attack that occurred in the neighborhood park. These cases reflect the significance of physical planning and design of neighborhood park that directly affect the safety and comfort of the users. Thus, this study attempts to engage with the defensible space concept in ensuring the security elements be applied in the planning of the recreational area. This study adopts a qualitative method form of research that is retrofitted to an observational study. The observational study is significant for revealing the condition of a neighbourhood park in the ‘real-world,’ in which direct observation is conducted on Taman Tasik Puchong Perdana. The observer focused on four elements or variables of defensible space concept including the provision of facilities in the neighborhood park, territoriality, surveillance, image and milieu. The findings revealed that the planning of Taman Tasik Puchong Perdana does not deliberate the defensible space elements, which may contribute to the crime activities in the park. In these circumstances, the planning of neighbourhood park needs to include proposals for the implementation of defensible space in response to the challenges underpinned by crime problems. Besides, the awareness among the residents needs to be emphasized with the support from local authorities and other organizations to manage and sustain the safety environment in the neighborhood park.

  19. Dayak and Their Daily Life

    Directory of Open Access Journals (Sweden)

    Hamid Darmadi

    2017-03-01

    Full Text Available This article titled "Dayak and Daily Life" This paper aims to reveal the Dayak and in their daily life. Dayak is a native of Borneo has its own characteristics. Dayak, divided into 405 sub-sub clans [1]. Each sub Dayak both Indonesia and Malaysia are identical. Dayak customs and culture comes from the word "Power" which means upstream, to refer to people who live in inland areas or in the interior of Borneo. In the arsenal of art and culture, Dayak has many similarities such as; saber, chopsticks, beliong, betang, cupai, renjung, empajang and others. Dayak indigenous religion is Kaharingan which is the original religion born of the cultural ancestors of the Dayaks. Most of the Dayak people still adhere to the belief of the existence of unseen objects in certain places such as rocks, large trees, planting gardens in the forest, lakes, pools, and others are believed to have "magical powers". Daily life of the Dayaks in general farming, farming. When will open farming land, farming they held ritual.

  20. Tracking the daily availability of burn beds for national emergencies.

    Science.gov (United States)

    Barillo, David J; Jordan, Marion H; Jocz, Richard J; Nye, Donna; Cancio, Leopoldo C; Holcomb, John B

    2005-01-01

    Medical planning for Operation Iraqi Freedom included predictive models of expected number of burn casualties. In all but the best-case scenario, casualty estimates exceeded the capacity of the only Department of Defense burn center. Examination of existing federal-civilian disaster plans for military hospital augmentation revealed that bed availability data were neither timely nor accurate. Recognizing the need for accurate knowledge of burn bed availability, the Department of Defense requested assistance from the American Burn Association (ABA). Directors of burn centers in the United States were queried for interest in participation in a mass casualty plan to provide overflow burn bed capacity. A list of 70 participating burn centers was devised based upon proximity to planned military embarkation points. A computer tracking program was developed. Daily automated e-mail messages requesting bed status were sent to burn center directors at 6 am Central time with responses requested before 11 am. The collated list of national overflow burn bed capacity was e-mailed each day to the ABA Central Office and to federal and military agencies involved with burn patient triage and transportation. Once automated, this task required only 1-2 hours a day. Available burn-bed lists were generated daily between March 17 and May 2, 2003 and then every other day until May 9, 2003. A total of 2151 responses were received (mean, 43 burn centers per day). A system to track daily nationwide burn bed availability was successfully implemented. Although intended for military conflict, this system is equally applicable to civilian mass casualty situations. We advocate adoption of this or a similar bed tracking system by the ABA for use during burn mass casualty incidents.

  1. Augmented Reality: Daily Prayers for Preschooler Student

    Directory of Open Access Journals (Sweden)

    Hendra Pradibta

    2018-01-01

    Full Text Available Education is one of the aspects that many synthesized with technology. Yet, this is contrary to the fact that where most of the learning materials are still based on text. This research aims to develop an alternative learning media by implementing Augmented Reality Technology for Preschooler students. Augmented Reality (AR is an application that can combine the virtual object as text, pictures and animation into the real world. Development of Augmented Reality application uses Web Aurasma Based Studio, with learning materials of daily prayer for preschool student. The development of the characters and the animations were using Adobe Illustrator and Adobe After Effects. The results of the study showed that technology Augmented Reality can be used as an alternative learning media especially in the learning process in Preschool Al Furqon. This is because the content Augmented Reality in the form of animation can gives more understanding and attention for preschool student to follow the learning process

  2. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  3. The impact of common metal allergens in daily devices

    DEFF Research Database (Denmark)

    Hamann, Dathan; Hamann, Carsten R; Thyssen, Jacob P

    2013-01-01

    We are widely exposed to metal allergens in our daily doings. As exposures constantly changes because of fashion trends and technological developments, there is a need for a continuous update of patch testers. An overview of consumer metal exposure studies that have been published in 2012 and 2013...

  4. Reflections on Daily Runs and Material Flows

    DEFF Research Database (Denmark)

    Gommesen, Niels Jørgen

    2014-01-01

    This essay reflects on the material flows and intensive states that surround us in our everyday lives, to provide an understanding of the ways in which they permeate and affect our bodies and cause a change in them, when we are moving through a landscape alongside various materialities, rhythms...... and movements. Based on my felt experiences during daily runs, it analyzes these vibrant land-scapes as heterogeneous assemblages, as collectives co-constituted between human-nonhuman actors, to study the material flows that move our bodies and expose them to new organizations. It sums up, that technologies......, milieus and human-nonhuman beings that lives alongside each other, have an immediate impact on each other caused by the circulating intensities within the heterogeneous collectives. We discover that changes in one context interface with changes in another, rhythms resonate and create new movements...

  5. The Framework for an Information Technology Strategic Roadmap for the United States Marine Corps: How Current Acquisitions Align to the Current Strategic Direction of the Department of Defense, Department of the Navy, and United States Marine Corps

    National Research Council Canada - National Science Library

    Garcia, Richard D; Sloan, Joshua K

    2008-01-01

    ... (IT) roadmap may comprise a "tipping point" for future warfighting effectiveness. This thesis begins the basis for a framework for an information technology strategic roadmap for the United States Marine Corps...

  6. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  7. The Framework for an Information Technology Strategic Roadmap for the United States Marine Corps: How Current Acquisitions Align to the Current Strategic Direction of the Department of Defense, Department of the Navy, and United States Marine Corps

    Science.gov (United States)

    2008-06-01

    PAGE INTENTIONALLY LEFT BLANK xv ACKNOWLEDGMENTS We would like to thank Mr. Clint Swett (Director, Technology Services Organization, DFAS- KC ) and...Major Jeffrey Thiry (Deputy Director, Technology Services Organization, DFAS- KC ) for their help and support. Their guidance proved invaluable in... Teo (1996) define alignment as the “coordination between the business and IS planning functions and activities”. Luftman, Papp and Brier (1999

  8. Chronic and Daily Stressors Along With Negative Affect Interact to Predict Daily Tiredness.

    Science.gov (United States)

    Hartsell, Elizabeth N; Neupert, Shevaun D

    2017-11-01

    The present study examines the within-person relationship of daily stressors and tiredness and whether this depends on daily negative affect and individual differences in chronic stress. One hundred sixteen older adult participants were recruited via Amazon's Mechanical Turk for a 9-day daily diary study. Daily tiredness, daily stressors, and negative affect were measured each day, and chronic stress was measured at baseline. Daily stressors, daily negative affect, and chronic stress interacted to predict daily tiredness. People with high chronic stress who experienced an increase in daily negative affect were the most reactive to daily stressors in terms of experiencing an increase in daily tiredness. We also found that people with low levels of chronic stress were the most reactive to daily stressors when they experienced low levels of daily negative affect. Our results highlight the need for individualized and contextualized approaches to combating daily tiredness in older adults.

  9. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  10. Digital daily cycles of individuals

    DEFF Research Database (Denmark)

    Aledavood, Talayeh; Jørgensen, Sune Lehmann; Saramäki, Jari

    2015-01-01

    Humans, like almost all animals, are phase-locked to the diurnal cycle. Most of us sleep at night and are active through the day. Because we have evolved to function with this cycle, the circadian rhythm is deeply ingrained and even detectable at the biochemical level. However, within the broader...... day-night pattern, there are individual differences: e.g., some of us are intrinsically morning-active, while others prefer evenings. In this article, we look at digital daily cycles: circadian patterns of activity viewed through the lens of auto-recorded data of communication and online activity. We...

  11. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  12. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  13. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  14. Process arrangement options for Defense waste immobilization

    International Nuclear Information System (INIS)

    1980-02-01

    Current plans are to immobilize the SRP high-level liquid wastes in a high integrity form. Borosilicate glass was selected in 1977 as the reference waste form and a mjaor effort is currently underway to develop the required technology. A large new facility, referred to as the Defense Waste Processing Facility (DWPF) is being designed to carry out this mission, with project authorization targeted for 1982 and plant startup in 1989. However, a number of other process arrangements or manufacturing strategies, including staging the major elements of the project or using existing SRP facilities for some functions, have been suggested in lieu of building the reference DWPF. This study assesses these various options and compares them on a technical and cost basis with the DWPF. Eleven different manufacturing options for SRP defense waste solidification were examined in detail. These cases are: (1) vitrification of acid waste at current generation rate; (2) vitrification of current rate acid waste and caustic sludge; (3 and 4) vitrification of the sludge portion of neutralized waste; (5) decontamination of salt cake and storage of concentrated cesium and strontium for later immobilization; (6) processing waste in a facility with lower capacity than the DWPF; (7) processing waste in a combination of existing and new facilities; (8) waste immobilization in H Canyon; (9) vitrification of both sludge and salt; (10) DWPF with onsite storage; (11) deferred authorization of DWPF

  15. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  16. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  17. The benefit of daily photoprotection.

    Science.gov (United States)

    Seité, Sophie; Fourtanier, Anny M A

    2008-05-01

    It is now recognized that both ultraviolet (UV)-A and UVB wavelengths participate in the generation of photodamaged human skin during sun exposure. During usual daily activities, an appropriate protection against solar UV exposure should prevent clinical, cellular, and molecular changes potentially leading to photoaging. This study was designed to evaluate in human beings the protection afforded by a day cream containing a photostable combination of UVB and UVA filters and thus protect against the UV-induced skin alterations. In solar-simulated radiation exposed and unprotected skin sites we observed melanization. The epidermis revealed a significant increase in stratum corneum and stratum granulosum thickness. In the dermis, an enhanced expression of tenascin and a reduced expression of type I procollagen were evidenced just below the dermoepidermal junction. Although no change in elastic fibers in exposed buttock skin was seen, a slightly increased deposit of lysozyme and alpha-1 antitrypsin on elastin fibers was observed using immunofluorescence techniques. A day cream with photoprotection properties was shown to prevent all of the above-described alterations. This study was performed on a limited number of patients (n = 12) with specific characteristics (20-35 years old and skin type II and III). Two dermal alterations were evaluated by visual assessment and not by computer-assisted image analysis quantification. Our in vivo results demonstrate the benefits of daily photoprotection using a day cream containing appropriate broad-spectrum sunscreens, which prevent solar UV-induced skin damages.

  18. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  19. Examining daily activity routines of older adults using workflow.

    Science.gov (United States)

    Chung, Jane; Ozkaynak, Mustafa; Demiris, George

    2017-07-01

    We evaluated the value of workflow analysis supported by a novel visualization technique to better understand the daily routines of older adults and highlight their patterns of daily activities and normal variability in physical functions. We used a self-reported activity diary to obtain data from six community-dwelling older adults for 14 consecutive days. Workflow for daily routine was analyzed using the EventFlow tool, which aggregates workflow information to highlight patterns and variabilities. A total of 1453 events were included in the data analysis. To demonstrate the patterns and variability of each individual's daily activities, participant activity workflows were visualized and compared. The workflow analysis revealed great variability in activity types, regularity, frequency, duration, and timing of performing certain activities across individuals. Also, when workflow approach was applied to spatial information of activities, the analysis revealed the ability to provide meaningful data on individuals' mobility in different levels of life spaces from home to community. Results suggest that using workflows to characterize the daily activities of older adults will be helpful for clinicians and researchers in understanding their daily routines and preparing education and prevention strategies tailored to each individual's activity level. This tool also has the potential to be integrated into consumer informatics technologies, such as patient portals or personal health records, so that consumers may be encouraged to become actively involved in monitoring and managing their health. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Overview - Defense Waste Processing Facility Operating Experience

    International Nuclear Information System (INIS)

    Norton, M.R.

    2002-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the world's largest radioactive waste vitrification facility. Radioactive operations began in March 1996 and over 1,000 canisters have been produced. This paper presents an overview of the DWPF process and a summary of recent facility operations and process improvements. These process improvements include efforts to extend the life of the DWPF melter, projects to increase facility throughput, initiatives to reduce the quantity of wastewater generated, improved remote decontamination capabilities, and improvements to remote canyon equipment to extend equipment life span. This paper also includes a review of a melt rate improvement program conducted by Savannah River Technology Center personnel. This program involved identifying the factors that impacted melt rate, conducting small scale testing of proposed process changes and developing a cost effective implementation plan

  1. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  2. The topological defense in SIS epidemic models

    International Nuclear Information System (INIS)

    Arbore, Andrea; Fioriti, Vincenzo; Chinnici, Marta

    2016-01-01

    The spreading of dangerous malware or faults in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding software details, in order to generalize to the maximum extent the defensive strategies. For example, it has been suggested that the maximum eigenvalue of the network adjacency matrix could act as a threshold for the malware’s spreading. This leads naturally to use the spectral graph theory to identify the most critical and influential nodes in technological networks. Many well-known graph parameters have been studied in the past years to accomplish the task. In this work, we test our AV11 algorithm showing that outperforms degree, closeness, betweenness centrality and the dynamical importance.

  3. Intent to Quit among Daily and Non-Daily College Student Smokers

    Science.gov (United States)

    Pinsker, E. A.; Berg, C. J.; Nehl, E. J.; Prokhorov, A. V.; Buchanan, T. S.; Ahluwalia, J. S.

    2013-01-01

    Given the high prevalence of young adult smoking, we examined (i) psychosocial factors and substance use among college students representing five smoking patterns and histories [non-smokers, quitters, native non-daily smokers (i.e. never daily smokers), converted non-daily smokers (i.e. former daily smokers) and daily smokers] and (ii) smoking…

  4. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  5. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  6. 32 CFR Appendix A to Part 37 - What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment Agreements? A Appendix A to Part 37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY...

  7. Microbial Monitoring from the Frontlines to Space: A Successful Validation of a Department of Defense (DoD) Funded Small Business Innovation Research (SBIR) Technology on Board the International Space Station (ISS)

    Science.gov (United States)

    Oubre, Cherie; Khodadad, Christina; Castro, Victoria; Ott, Mark; Pollack, Lawrence; Roman, Monsi

    2017-01-01

    The RAZOR EX (Registered Trademark) PCR unit was initially developed by the DoD as part of an SBIR project to detect and identify biothreats during field deployment. The system was evaluated by NASA as a commercial technology for future microbial monitoring requirements and has been successfully demonstrated in microgravity on-board the International Space Station.

  8. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  9. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  10. Research on moving target defense based on SDN

    Science.gov (United States)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  11. CDC WONDER: Daily Fine Particulate Matter

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Daily Fine Particulate Matter data available on CDC WONDER are geographically aggregated daily measures of fine particulate matter in the outdoor air, spanning...

  12. Global Daily Climatology Network: Kazakhstan subset

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset is a compilation of in situ daily meteorological observations for Kazakhstan within the framework of joint efforts to create Global Daily Climatology...

  13. NOAA Daily Optimum Interpolation Sea Surface Temperature

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The NOAA 1/4° daily Optimum Interpolation Sea Surface Temperature (or daily OISST) is an analysis constructed by combining observations from different platforms...

  14. Awareness of Daily Life Activities

    NARCIS (Netherlands)

    Metaxas, G.; Metin, B.; Schneider, J.M.; Markopoulos, P.; de Ruyter, B.; Markopoulos, P.

    2009-01-01

    The well-publicized aging of Western societies has prompted a growing interest into technologies that support awareness in cross-generational families. The idea of supporting continual and partly automated flow of information between seniors living alone and their social intimates has been gaining

  15. Daily Report, Supplement, East Europe.

    Science.gov (United States)

    1993-07-28

    science, technological strategic research, and humanistic , regional, innovative research for the needs of the Federal Assembly and federal...histories (Swedish, Danish, Nor- wegian...), but through certain " existential " characteris- tics. For example, how time was determined, what the family

  16. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  17. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  18. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  19. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  20. Defense Coastal/Estuarine Research Program 2 (DCERP2)

    Science.gov (United States)

    2013-05-01

    Assessing TMDL effectiveness using flow-adjusted concentrations:  A case study of the Neuse River , North Carolina. Environmental Science & Technology 37...activities, and data collection in the NRE Basin and New River by local stakeholder groups. Defense Coastal/Estuarine Research Program (DCERP) Monitoring...relationships between light penetration and solids/chl a levels. ArcGIS and spatial statistics will be used to estimate average bathymetric areas

  1. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  2. Defense AT&L. Volume 44, Number 4

    Science.gov (United States)

    2015-08-01

    integrated web applications. These apps will share the same map engine, chat function, and secure underlying data, decreasing training time for soldiers...security challenges. Revital - izing technology innovation must be at the forefront of this strategy in order to answer President Obama’s call to action...workforce will have available a num- ber of tools on business. defense.gov/ apps —a man- agement system to track performance and goaling. Buying

  3. UNIPOLAR, BIPOLAR OR MULTIPOLAR INTERNATIONAL SYSTEM? THE DEFENSE INDUSTRY FACTOR

    OpenAIRE

    ÖZKAN, Gökhan

    2008-01-01

    International system can be defined as a complex system of systems that is comprised of economic, political, scientific, technological and military systems. It is hard to analyze this complex system. It is even harder to forecast its future. Nonetheless, there are factors such as the defense industry and military power that affect the dynamics of the international system much more than other factors. After the Revolution in Military Affairs, which transformed the military paradigm, significa...

  4. Inherently Offensive: Airpower and the Dialectic with Defense

    Science.gov (United States)

    2017-06-01

    detailed definition up front. Ted Hopf, writing in The American Political Science Review, argues, “the offense-defense balance consists of three elements...technology contributed to air power’s ability to maintain overwhelming offensive 12 Hopf, Ted . "Polarity...fighters and surface-to-air missile systems. John Patterson explains why this is true, “most fighter aircraft operate in the X - and Ku-bands because

  5. Defense AT and L. Volume 41, Number 6

    Science.gov (United States)

    2012-12-01

    own specialty. To paraphrase Abraham Maslow : If all you have is a hammer, everything looks like a nail. Systems engineers are supposed to take a...technology, and logistics face in the austere times we have entered. We will have to provide the ser- vices and products our warfighters need and...understanding of: (1) the constraints we must live within; (2) a willingness to prioritize our needs and accept less than we Defense AT&L: November–December

  6. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  7. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  8. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  9. Analisis Teori Offense-Defense Pada Reformasi Kebijakan Pertahanan Jepang Dalam Dinamika Keamanan Di Asia Timur

    Directory of Open Access Journals (Sweden)

    Fadhil Alghifari

    2016-05-01

    Full Text Available This paper will seek to demonstrate how the use of Offense-Defense Theory can best explain the Japan’s new defense reform legislation that enables the country to play a more comprehensive global security role commensurate with its capabilities, resources, national interests, and international responsibilities. Through this offense-defense lens, it will be argued that Japan’s new defense reform legislation is a response to the growing dominance of ‘offensive’ behaviour by the neighbouring countries in East Asia. This paper will then elaborate more about the elements that are used in the offense-defense theory to analyze the ‘offense’ dominance that prompts East Asian states behave aggressively and defensively including Japan. Furthermore, this paper will explain why Japan is currently playing the ‘defensive’ role to counter the growing dominance of ‘offense’ in East Asia through the four variables of offense-defense balance; military doctrine and technology, geographical considerations, social and political order, and diplomatic arrangements. Thus, we will see that Japan holds the key to the offense-defense and security balance in the increasingly hostile environment in East Asia.

  10. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  11. Will technology make shelters obsolete

    International Nuclear Information System (INIS)

    Haaland, C.M.; Chester, C.V.

    1981-01-01

    The fears and hopes that shelters for civil defense might be made obsolete by technology fall along diametrically opposed paths. Along the pessimistic direction is the fear that strategic offensive weapons have become so numerous and terrible that no shelter program is worthwhile. This fear has been nurtured by the US deterrence policy of Mutual Assured Destruction (MAD), about which we will say more in the first part of this article. In the opposite direction along the optimistic path is the hope that active defensive technology will become so good that shelters will be unnecessary. Very few hold this viewpoint today, although there was a time during the development of antiballistic missiles (ABM) when such a hope was common. The recent emphasis on research and development of laser- and particle-beam weapons has again raised some hopes that defense against strategic missiles may become effective. Researchers will discuss the impact of defensive technology on shelters in Part II of this article

  12. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  13. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  14. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  15. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    Science.gov (United States)

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  16. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  17. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  18. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  20. Daily mineral intakes for Japanese

    International Nuclear Information System (INIS)

    Shiraishi, Kunio

    1990-01-01

    Recently it became necessary to assess the dietary intake of both stable and radioactive elements for non-radiation workers. But data of mineral intake in the literature are not good enough for this assessment. ICRP Pub. 23 in 'Reference Man' is one of the best references in this field. ICRP Reference Man was selected as the standard for Caucasian by using values reported during early 1970s or before. Moreover it seems not to be suitable for Japanese (Mongolian). In this report, analytical methods of minerals in total diet samples for Japanese were described. Furthermore, daily intakes for Japanese (Reference Japanese Man) and ICRP Reference Man were compared. After collected by a duplicate portion study and a model diet study, diet samples were dry-ashed followed by wet-digestion with a mixture of HNO 3 and HClO 4 . Diet sample solutions thus prepared were analysed by using atomic absorption spectrometry (AAS), inductively-coupled plasma atomic-emission spectrometry (ICP-AES), and inductively-coupled plasma mass spectrometry (ICP-MS). Matrix effects of major elements (Na, K, P, Ca and Mg) in diet samples were compensated by a matrix-matching method. About 20 elements were simultaneously determined by ICP-AES and ICP-MS, more easily than by AAS. Most of dietary mineral intakes, except for Na, Mn, and Sr, for Japanese were lower than those of ICRP Reference Man. But, dietary intakes were found to be different depending on countries, even among European and American countries. New representative data for as many elements as possible are necessary now. (author)

  1. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  2. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  3. European Diversification and Defense Market Assessment, 2nd Edition: A Comprehensive Guide for Entry into Overseas Markets

    National Research Council Canada - National Science Library

    1997-01-01

    .... The region possesses a number of well diversified economies that exhibit growing demand for high technology products in commercial and defense sectors and, thus, provides a wide variety of trade opportunities for U.S. firms...

  4. Encouraging environmentally strategic technologies

    International Nuclear Information System (INIS)

    Heaton, G.R.

    1994-01-01

    Having moved beyond its initial absorption with controlling new technology, environmental policy today must focus more strongly on promoting the development and adoption of new technologies. World Resource Institute's (WRI) ongoing study of 'environmentally strategic technology' is addressed to this fundamental policy issue. The study proposes criteria for identifying such technology, offers a specific list, suggests the kinds of public policy changes necessary to encourage their development and finally presents a comparison of critical technology lists (from the White House, the European Community, Japan and the US Department of Defense). (TEC)

  5. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  6. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  7. Options for Department of Defense Total Workforce Supply and Demand Analysis: Potential Approaches and Available Data Sources

    Science.gov (United States)

    2014-01-01

    publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at...in Workforce Planning and Potential Modeling of Military Training, Land Defense Science and Technology Organisation , Australian Government Department...Technology Organisation , Australian Government Department of Defense, DSTO-TR-2037, 2007. Ward, D., “Workforce Demand Forecasting Techniques,” Human

  8. Nuclear Technology applications

    International Nuclear Information System (INIS)

    Cibils Machado, W. E- mail: wrcibils@adinet.com.uy

    2002-01-01

    The present work tries on the applications of the nuclear technology in the life daily, such as agriculture and feeding, human health, industry, non destructive essays, isotopic hydrology, and the nuclear power stations for electricity production and radioisotopes production

  9. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  10. Daily Water Requirements when Wearing Body Armor

    National Research Council Canada - National Science Library

    Montain, Scott

    2000-01-01

    .... This report presents the results of model simulations predicting the individual daily water requirements under a broad range of energy expenditures and weather conditions when wearing battle dress...

  11. Daily Public Assistance Grants Award Activity

    Data.gov (United States)

    Department of Homeland Security — Daily activity of Public Assistance Grant Awards, including FEMA Region, State, Disaster Declaration Number, Event description, Mission Assigned agency, Assistance...

  12. Daily Medicine Record for Your Child

    Science.gov (United States)

    ... Age: ____ 2 years old___ Weight: ___ 30 pounds ___ Daily Medicine Record Child’s name: ___________________ Today’s date: _________________ Age: ____________ Weight: ________________ (pounds) Time Problem ...

  13. Technology makes life better

    Institute of Scientific and Technical Information of China (English)

    李红

    2015-01-01

    There are many theories about the relationship between technology and society.With the development of world economy,technology has made great progress.However,many changes were taken place in our daily life,especially the appearance of computer.Sending emails,chatting with others online,search for information which is what we need to learn and many other demands in people’s daily life,computers make all of it into possibility.

  14. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  15. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  16. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  17. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  18. Strategic Defense Initiative Organization adaptive structures program overview

    Science.gov (United States)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  19. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  20. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  1. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  2. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  3. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  4. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  5. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  6. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  7. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  8. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  9. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  10. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  11. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  12. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  13. Russia and NATO Missile Defense: The European Phased Adaptive Approach Experience, 2009-2017

    Science.gov (United States)

    2018-03-01

    Volume I, 1945-1955. Ft. McNair, Washington, DC: US Army Center of Military History , 2009. Defense Science Board. Science and Technology Issues of...but were not the only contributing factors. Budgetary constraints, technological issues, and reassessments of threats also led to modifications in the...design for adaptability to benefit from technological innovations and to meet the evolving needs for Alliance protection in the international security

  14. The Chinese Defense Economy’s Long March from Imitation to Innovation

    OpenAIRE

    Cheung, Tai Ming

    2010-01-01

    Since the beginning of the twenty-first century, China’s defense science, technology, and innovation (DSTI) system has been vigorously developing a comprehensive set of innovation capabilities that will eventually allow it to join the world’s top tier of military technological powers. Ample access to financial, human, and research resources; strong political support; inflows of foreign technologies and know-how; and the introduction of advanced modes of governance, market competition, and...

  15. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  16. 1 CFR 5.6 - Daily publication.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Daily publication. 5.6 Section 5.6 General Provisions ADMINISTRATIVE COMMITTEE OF THE FEDERAL REGISTER THE FEDERAL REGISTER GENERAL § 5.6 Daily publication. There shall be an edition of the Federal Register published for each official Federal working day...

  17. Stochastic modelling of daily rainfall sequences

    NARCIS (Netherlands)

    Buishand, T.A.

    1977-01-01

    Rainfall series of different climatic regions were analysed with the aim of generating daily rainfall sequences. A survey of the data is given in I, 1. When analysing daily rainfall sequences one must be aware of the following points:
    a. Seasonality. Because of seasonal variation

  18. Daily Stressors in Primary Education Students

    Science.gov (United States)

    Fernández-Baena, F. Javier; Trianes, María V.; Escobar, Milagros; Blanca, María J.; Muñoz, Ángela M.

    2015-01-01

    Daily stress can have a bearing on children's emotional and academic development. This study aimed to assess daily stressors and to determine their prevalence among primary education students, taking into account their gender, academic year, social adaptation, and the school location. A sample of 7,354 Spanish schoolchildren aged between 6 and 13…

  19. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  20. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  1. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  2. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  3. Sanitization and Disposal of Excess Information Technology Equipment

    Science.gov (United States)

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  4. Ecological Interface Design for Computer Network Defense.

    Science.gov (United States)

    Bennett, Kevin B; Bryant, Adam; Sushereba, Christen

    2018-05-01

    A prototype ecological interface for computer network defense (CND) was developed. Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. The cognitive systems engineering (CSE)/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. Direct application in supporting cyber analysts.

  5. Daily medication routine of adolescents with HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Cristiane Cardoso de Paula

    2013-12-01

    Full Text Available The objective of this study was to describe the sociodemographic, clinical, and behavioral characteristics of the daily medication routine of adolescents with HIV/AIDS of ages 13 to 19 years, followed at a reference service. This descriptive cross-sectional study was performed with 23 adolescents, using a quantitative approach. Data were collected using a form during appointments at the outpatient clinic. Univariate analysis revealed: females, in the initial phase of adolescence, and vertical transmission. The highlights were: lack of assiduity to appointments; unprotected sex; and consumption of alcohol. Regarding the daily medication routine, subjects depend on their parents or guardians, use strategies to remember to take the medications, and are unaware about the laboratory test for disease management and treatment. There is a need for educative intervention using information and communication technology, such as the Internet, to promote health and autonomy among adolescents. Descriptors: Acquired Immunodeficiency Syndrome; Adolescent Health; Antiretroviral Therapy, Highly Active; Nursing.

  6. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  7. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  8. Daily Aspirin Therapy: Understand the Benefits and Risks

    Science.gov (United States)

    Daily aspirin therapy: Understand the benefits and risks Daily aspirin therapy can be a lifesaving option, but it's not ... everyone. Get the facts before considering a daily aspirin. By Mayo Clinic Staff Daily aspirin therapy may ...

  9. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  10. Vehicle-network defensive aids suite

    Science.gov (United States)

    Rapanotti, John

    2005-05-01

    Defensive Aids Suites (DAS) developed for vehicles can be extended to the vehicle network level. The vehicle network, typically comprising four platoon vehicles, will benefit from improved communications and automation based on low latency response to threats from a flexible, dynamic, self-healing network environment. Improved DAS performance and reliability relies on four complementary sensor technologies including: acoustics, visible and infrared optics, laser detection and radar. Long-range passive threat detection and avoidance is based on dual-purpose optics, primarily designed for manoeuvring, targeting and surveillance, combined with dazzling, obscuration and countermanoeuvres. Short-range active armour is based on search and track radar and intercepting grenades to defeat the threat. Acoustic threat detection increases the overall robustness of the DAS and extends the detection range to include small calibers. Finally, detection of active targeting systems is carried out with laser and radar warning receivers. Synthetic scene generation will provide the integrated environment needed to investigate, develop and validate these new capabilities. Computer generated imagery, based on validated models and an acceptable set of benchmark vignettes, can be used to investigate and develop fieldable sensors driven by real-time algorithms and countermeasure strategies. The synthetic scene environment will be suitable for sensor and countermeasure development in hardware-in-the-loop simulation. The research effort focuses on two key technical areas: a) computing aspects of the synthetic scene generation and b) and development of adapted models and databases. OneSAF is being developed for research and development, in addition to the original requirement of Simulation and Modelling for Acquisition, Rehearsal, Requirements and Training (SMARRT), and is becoming useful as a means for transferring technology to other users, researchers and contractors. This procedure

  11. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  12. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  13. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  14. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  15. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  16. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  17. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  18. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  19. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  20. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  1. Intent to quit among daily and non-daily college student smokers

    OpenAIRE

    Pinsker, E. A.; Berg, C. J.; Nehl, E. J.; Prokhorov, A. V.; Buchanan, T. S.; Ahluwalia, J. S.

    2012-01-01

    Given the high prevalence of young adult smoking, we examined (i) psychosocial factors and substance use among college students representing five smoking patterns and histories [non-smokers, quitters, native non-daily smokers (i.e. never daily smokers), converted non-daily smokers (i.e. former daily smokers) and daily smokers] and (ii) smoking category as it relates to readiness to quit among current smokers. Of the 4438 students at six Southeast colleges who completed an online survey, 69.7%...

  2. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  3. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  4. Percent Daily Value: What Does It Mean?

    Science.gov (United States)

    Healthy Lifestyle Nutrition and healthy eating What do the Daily Value numbers mean on food labels? Answers from ... 15, 2016 Original article: http://www.mayoclinic.org/healthy-lifestyle/nutrition-and-healthy-eating/expert-answers/food-and- ...

  5. Reporter Turnover on Texas Daily Newspapers.

    Science.gov (United States)

    Moss, Marquita

    1978-01-01

    A survey of Texas daily newspapers yielded a picture of newspaper reporters as relatively young men who do not stay in one place very long, suggesting that the stereotype of the itinerant reporter may have its basis in fact. (GW)

  6. Professional ideals and daily practice in journalism

    DEFF Research Database (Denmark)

    Pihl-Thingvad, Signe

    2015-01-01

    Professional ideals are crucial in terms of guiding and committing journalists in modern media organizations. But what happens if there are discrepancies between the journalists’ professional ideals and their daily working practice? Research suggests negative consequences, such as withdrawal...

  7. Daily Tips for Good Oral Hygiene

    Science.gov (United States)

    ... this article Daily Tips for Good Oral Hygiene Bacteria can live in your mouth in the form of plaque, causing cavities and gingivitis, which can lead to periodontal (gum) disease. In order to keep your mouth ...

  8. Impact of intestinal stoma of daily activities

    OpenAIRE

    Kougl, Jiří

    2016-01-01

    In the theoretical part I am devoted to the history, anatomy, types of stoma, concept of stoma, indications for an establishment of stoma, pre and postoperative care, treatment of stoma, instruments and the influence on daily activities of a client while having a stoma. In the practical part I am following my own research of the impact of stoma on daily life's activities of klients with a stoma.

  9. Technological Literacy for Teachers

    Science.gov (United States)

    Hasse, Cathrine

    2017-01-01

    Ongoing developments in educational technologies place increasing demands on teachers who have to make decisions on a daily basis concerning how, when, and where to make use of technologies in classrooms. Building on results from the Danish project Technucation, this paper argues that there is a marked need for a teacher-specific version of the…

  10. Teaching with Technology

    Science.gov (United States)

    Martineau, Pamela

    2009-01-01

    In an era when technology seems to be changing almost daily, school boards, administrators, and teachers need to revisit their technology policies almost as rapidly, education experts advise. Internet chat rooms, online video games, and other electronic features that once seemed inappropriate for the classroom are proving useful for meeting many…

  11. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  12. Technology Assessment for Powertrain Components Final Report CRADA No. TC-1124-95

    Energy Technology Data Exchange (ETDEWEB)

    Tokarz, F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gough, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-19

    LLNL utilized its defense technology assessment methodologies in combination with its capabilities in the energy; manufacturing, and transportation technologies to demonstrate a methodology that synthesized available but incomplete information on advanced automotive technologies into a comprehensive framework.

  13. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  14. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  15. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  16. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  17. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  18. Institute for Non-Lethal Defense Technologies Report: Ballistic Gelatin

    National Research Council Canada - National Science Library

    Nicholas, N. C; Welsch, J. R

    2004-01-01

    Ballistic gelatin is designed to simulate living soft tissue. It is the standard for evaluating the effectiveness of firearms against humans because of its convenience and acceptability over animal or cadaver testing...

  19. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2014-02-04

    Imaging and quantifying Brownian motion of micro- and nanoparticles using phase resolved Doppler variance optical coherence tomography,” J. of...Optical traps can stop movements of Mesostoma spermatocyte kinetochores. Am. Soc. Cell Biol. Mtg., Denver, CO, December 3-7, 2011. 22 8. Gioux, S

  20. Forecasting Science and Technology for the Department of Defense

    Science.gov (United States)

    2009-12-01

    Watson and Francis Crick announced that they had elucidated the structure of DNA and had therefore “discovered the secret of life.” While this was a...an organic chemist, figured out a process by which very small quantities of DNA could be amplified with high fidelity. This process, known as...polymerase chain reaction (PCR), for the first time, allowed scientists to produce DNA in large quantities. Roughly during this period, Leroy Hood and

  1. Hypermedia Laboratory, Defense Applied Information Technology Center; Review for 1988

    Science.gov (United States)

    1988-12-01

    self-repair, self-guidance, and reproduction, in following the rules of biological systems; this barely exists in the most sophisticated artificial...Quelques exemples de ces changements peuvent etre cites: cf. J. Naisbitt - Megatrends . ten new directions transforming our lives, entre autres...Naisbitt. among others, in his Megatrends ; Ten New Directions Transforming Our Lives, as follows. Digitization: Today more and more, documents are created

  2. Cyber-Defense Return on Investment for NAVFAC Energy Technologies

    Science.gov (United States)

    2017-12-01

    restaurants to eat lunch due to proximity, even though you are willing to drive further if there were a better option. In the future, you will tend to decide...lunch options between only those three restaurant menus. Keeney addresses this issue by having the stakeholder identify the values, or “what they...values led you to find four more restaurants in reasonable proximity that meet these preferred nutritional values. You would then have better, but

  3. Technological Illusions and the Entropy of American Defense

    Science.gov (United States)

    2014-04-11

    25 David R. Segal and Mady Wechsler Segal, "Change in Military Organization," Annual Review of Sociology 9 (1983), 151-70. http... David R. and Mady Wechsler Segal. "Change in Military Organization." Annual Review of Sociology 9 (1983): 151-70, http://www.jstor.org/stable/2946061...as the gravitation towards increasingly joint warfare in the late 20 th Century. As David Christian observes in Maps of Time, all species adapt to

  4. High Endoatmospheric Defense Interceptor (HEDI) Technology Testing Program Environmental Assessment

    Science.gov (United States)

    1989-05-31

    50 U) 0 00 c, co 00C 0ECD -5 0o -j (U v -- E ~ u mm t C CD _ z; l E = 0( EC -JL.O (6 (U 0) VC .~~~~~~~C C 5 o( 0(l -U LO * C W CO - - - 0 EL . 0Co...plant species are known to be present in the area, although it is possible that the dune unicorn plant (Proboscidea sabulosa) and the sand prickly pear...storm-wave events. Analysis of adjacent areas suggests that the site was a previously disturbed, intertidal, rubble beach and back beach area. As

  5. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2017-03-12

    and characterizing full upper airway of obstructive sleep apnea patients supported by NIH grants. Student Theses: None Project 5: Fiberoptic...technique permits unprecedented non-disruptive evaluation of wound biofilm behavior including tissue invasion. Student Theses: Towards in vivo...signaling on factor assemblies at DNA damage sites. Nucleic Acids Research, 2015 1 doi: 10.1093/nar/gkv976 5. Ferraro-Gideon, J., Sheykhani, R., Zhu

  6. Terahertz Technology for Defense and Security-Related Applications

    OpenAIRE

    Iwaszczuk, Krzysztof; Jepsen, Peter Uhd; Heiselberg, Henning

    2012-01-01

    Denne afhandling omhandler udvalgte aspekter af terahertz (THz) teknologi med potentiale i forsvars- og sikkerheds-relaterede applikationer. En ny metode til samtidig dataopsamling i tidsopløst THz spektroskopi eksperimenter er blevet udviklet. Denne teknik demonstreres ved bestemmelse af fladekonduktiviteten af fotogenererede ladningsbrere i semiisolerende gallium arsenid. En sammenligning med resultater opnået ved hjælp af en standard dataopsamlingsprocedure viser at den nye metode minimere...

  7. Semantic Web and Inferencing Technologies for Department of Defense Systems

    Science.gov (United States)

    2014-10-01

    components: data model, semantics, serialization, and query language. The data model defines a collection of datatypes suitable for composing abstract...views of web content. Available datatypes might include strings, integers, single- and double-precision floating point numbers, URLs, and hyperlinks...In addition to atomic datatypes , data models typically provide rules and mechanisms for defining complex data types or restrictions on existing

  8. Disruptive and Sustaining Technology Development Approaches in Defense Acquisition

    Science.gov (United States)

    2014-04-30

    altering the nature of the photofinishing process (Lucas Jr. & Goh, 2009; Utterback, 1995). George Eastman replaced the emulsion -covered glass plates of...randomly selected from the sampling frame to participate in the study. Organizations signaling interest were sent an information package detailing the

  9. Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples

    Science.gov (United States)

    2010-04-01

    are never Software CTE candidates 19 Algorithm Example: Filters • Definitions – Filters in Signal Processing • A filter is a mathematical algorithm...Segment Segment • SOA as a CTE? – Google produced 40 million (!) hits in 0.2 sec for “SOA”. Even if we discount hits on the Society of Actuaries and

  10. Subject Categorization Guide for Defense Science and Technology

    Science.gov (United States)

    1986-10-01

    Anchors(Structural) 08/06 Amazon River 06/03 Ancylostoma 20/01 Ambient noise 06/01 Androgens 24/02 14/02 Anechoic chambers 13/06 Ambulances 06/05... Peru 07/03 Pentadiones 06/106 Pest control 07/02 Pentafluorides 02/01 Pesticides 07/03 Pentanes 24/05 07/03 Pentanols 06/06 Posts 07/03 Pentanones 07/03...Rodenticides 08/07 Rutile 06/03 Rodents 08/06 Ryukyu Islands 14/02 Rodme"ers 20/14 S band 05/08 Roles(Behavior) 12/01 S matrix 11/06/02 Roll bonding 20/10 13/08

  11. Terahertz Technology for Defense and Security-Related Applications

    DEFF Research Database (Denmark)

    Iwaszczuk, Krzysztof

    :4 MV/cm are reached. A good agreement between two independent methods of eld measurement and a numerical time-domain simulation is shown. Finally, and extensive study of THz radar cross sections (RCS) of scale models of airplanes is carried out. Angle- and frequency-resolved RCS of aircraft ghters F-16...... and F-35 are measured. The scaling law allows for translating THz RCS results to the microwave regime. 2D cross section images of the airplanes are reconstructed. Range resolution of 0.27 mm and cross range resolution of 0.19 mm is reached. Properties of exible absorbing metamaterials for the THz...

  12. Department of Defense Space Science and Technology Strategy 2015

    Science.gov (United States)

    2015-01-01

    foundations for GPS; 2. The initial discovery and follow-on research on the operational impacts of solar coronal mass ejections and space experimental...based x-ray pulsar navigation and timing capability A-11 Table 4 Intelligence, Surveillance, and Reconnaissance Short Term S&T Goals

  13. Department of Defense Technology Transfer (T2) Program

    Science.gov (United States)

    2014-04-08

    January February (1st Monday) Disposal System Performance Spec Production Representative Articles CARD – Cost Analysis Requirements Description CCE...Supportability Objectives Exit Criteria Met APB MTA FMECA FTA LORA RCM MS B Threshold/objective tradeoffs – Revised Performance Attributes MS C MS A...Evaluation FTA – Failure Tree Analysis IOT&E – Initial Operational Test & Evaluation ISR – In-Service Review ISP – Information Support Plan ITR – Initial

  14. Transforming Defense Basic Research Strategy

    National Research Council Canada - National Science Library

    Fountain, Augustus W

    2004-01-01

    ... technologies for development. With a basic research budget less than half that of the National Science Foundation and a mere fraction that of the NIH the DoD can no longer afford to pursue lofty science education goals...

  15. Technology as a Craft of Deceit.

    Science.gov (United States)

    Thompson, Mark E.

    This essay briefly presents the evolution of technology and the resulting warnings that many prominent writers have offered in defense of an analytic inquiry into man's interaction with technology. Various ways in which technology has been used to manipulate people are described, e.g., Vietnam, Watergate, the CIA, the Tuskegee Study, Subliminal…

  16. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  17. Associations among daily stressors and salivary cortisol: findings from the National Study of Daily Experiences.

    Science.gov (United States)

    Stawski, Robert S; Cichy, Kelly E; Piazza, Jennifer R; Almeida, David M

    2013-11-01

    While much research has focused on linking stressful experiences to emotional and biological reactions in laboratory settings, there is an emerging interest in extending these examinations to field studies of daily life. The current study examined day-to-day associations among naturally occurring daily stressors and salivary cortisol in a national sample of adults from the second wave of the National Study of Daily Experiences (NSDE). A sample of 1694 adults (age=57, range=33-84; 44% male) completed telephone interviews detailing their stressors and emotions on eight consecutive evenings. Participants also provided saliva samples upon waking, 30min post-waking, before lunch and before bed, on four consecutive interview days resulting in 5995 days of interview/cortisol data. Analyses revealed three main findings. First, cortisol AUC was significantly higher on stressor days compared to stressor-free days, particularly for arguments and overloads at home, suggesting that daily stressors are associated with increased cortisol output, but that not all daily stressors have such an influence. Second, individuals reporting a greater frequency of stressor days also exhibited a steeper diurnal cortisol slope. Finally, daily stressor-cortisol associations were unaltered after adjustment for daily negative affect and physical symptoms. Our discussion focuses on the influence of naturally occurring daily stressors on daily cortisol and the role of daily diary approaches for studying healthy cortisol responses to psychosocial stressors outside of traditional laboratory settings. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Associations among Daily Stressors and Salivary Cortisol: Findings from the National Study of Daily Experiences

    Science.gov (United States)

    Stawski, Robert S.; Cichy, Kelly E.; Piazza, Jennifer R.; Almeida, David M.

    2013-01-01

    While much research has focused on linking stressful experiences to emotional and biological reactions in laboratory settings, there is an emerging interest in extending these examinations to field studies of daily life. The current study examined day-to-day associations among naturally-occurring daily stressors and salivary cortisol in a national sample of adults from the second wave of the National Study of Daily Experiences (NSDE). A sample of 1,694 adults (Age=57, Range=33–84; 44% male) completed telephone interviews detailing their stressors and emotions on eight consecutive evenings. Participants also provided saliva samples upon waking, 30 minutes post-waking, before lunch and before bed, on four consecutive interview days resulting in 5,995 days of interview/cortisol data. Analyses revealed three main findings. First, cortisol AUC was significantly higher on stressor days compared to stressor-free days, particularly for arguments and overloads at home, suggesting that daily stressors are associated with increased cortisol output, but that not all daily stressors have such an influence. Second, individuals reporting a greater frequency of stressor days also exhibited a steeper diurnal cortisol slope. Finally, daily stressor-cortisol associations were unaltered after adjustment for daily negative affect and physical symptoms. Our discussion focuses on the influence of naturally-occurring daily stressors on daily cortisol and the role of daily diary approaches for studying healthy cortisol responses to psychosocial stressors outside of traditional laboratory settings. PMID:23856186

  19. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  20. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  1. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  2. 32 CFR Appendix A to Part 555 - Director of Defense Research and Engineering

    Science.gov (United States)

    2010-07-01

    ... be limited to 3% of the professional man-years at that laboratory unless expressed approval of the... function at the National Science Foundation shall not exceed two man-years per year through FY 76, subject... definition where existing Defense technology offers a unique potential solution. ...

  3. Status of GAO Recommendations to the Department of Defense (Fiscal Years 2001-2007)

    Science.gov (United States)

    2008-12-11

    Name-Brand, Fast - Food Restaurants 5 GAO-01-943 Defense Manufacturing Technology Program: More Joint Projects and Tracking of Results Could...Oversight of Contractors under Foreign Influence Is Sufficient 6 2 GAO-05-456 Interagency Contracting: Franchise Funds Provide Convenience, but Value to

  4. 78 FR 69267 - Defense Federal Acquisition Regulation Supplement: Requirements Relating to Supply Chain Risk...

    Science.gov (United States)

    2013-11-18

    ... payroll, finance, logistics, and personnel management applications; or (2) Is protected at all times by... recommendation from the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and the... assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to...

  5. 78 FR 15935 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-03-13

    ... automated collection techniques or other forms of information technology. The Office of Management and... construction contract in Spain has adequate insurance coverage. Affected Public: Businesses or other for profit... construction contract in Spain. Kortnee Stewart, Editor, Defense Acquisition Regulations System. [FR Doc. 2013...

  6. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  7. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  8. In defense of the stethoscope.

    Science.gov (United States)

    Murphy, Raymond Lh

    2008-03-01

    The stethoscope is widely considered to be an unreliable instrument. Many studies document the significant observer variability in its use. Numerous other diagnostic tools are available that are generally regarded to provide more reliable diagnostic information. Some even argue that teaching of the ancient art should be de-emphasized in medical schools. Yet auscultation with an acoustic stethoscope can provide important, even life-saving, information. The purpose of this article is to present evidence that supports the use of the stethoscope in clinical medicine. The argument for the stethoscope will be made by presenting relevant investigations, including clinical studies acknowledged to meet the criteria of evidence-based medicine. It will focus on studies that have employed computerized acoustic technology to correlate lung sounds with disease states. This technology has advanced in recent years, which has stimulated a resurgence of interest in auscultation. Numerous studies have been done that utilized objective methods that circumvented the problem of observer variability. There is now a good deal of scientific evidence to support the hypothesis that lung sounds contain information that is clinically useful. This technology also allows this information to be collected more efficiently than previously possible. Advances in educational technology have made it possible to impart information on auscultation much more easily than was possible in the past. Contrary to predictions, the stethoscope is not likely to be relegated to the museum shelf in the near future. Computer technology is making it an even more useful clinical instrument.

  9. In defense of posthuman dignity.

    Science.gov (United States)

    Bostrom, Nick

    2005-06-01

    Positions on the ethics of human enhancement technologies can be (crudely) characterized as ranging from transhumanism to bioconservatism. Transhumanists believe that human enhancement technologies should be made widely available, that individuals should have broad discretion over which of these technologies to apply to themselves, and that parents should normally have the right to choose enhancements for their children-to-be. Bioconservatives (whose ranks include such diverse writers as Leon Kass, Francis Fukuyama, George Annas, Wesley Smith, Jeremy Rifkin, and Bill McKibben) are generally opposed to the use of technology to modify human nature. A central idea in bioconservativism is that human enhancement technologies will undermine our human dignity. To forestall a slide down the slippery slope towards an ultimately debased 'posthuman' state, bioconservatives often argue for broad bans on otherwise promising human enhancements. This paper distinguishes two common fears about the posthuman and argues for the importance of a concept of dignity that is inclusive enough to also apply to many possible posthuman beings. Recognizing the possibility of posthuman dignity undercuts an important objection against human enhancement and removes a distortive double standard from our field of moral vision.

  10. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  11. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... day-long workshop on the pros and cons of the defense-in-depth strategy for cyber security. The... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. Background...

  12. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... the pros and cons of the Defense-in-Depth strategy for cyber security. The workshop will be held March... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... notice is issued by the National Coordination Office for the Networking and Information Technology...

  13. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  14. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  15. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  16. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  17. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  18. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  19. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  20. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  1. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  2. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  3. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  4. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  5. Defense AT&L. Volume 40, Number 3, May-June 2011

    Science.gov (United States)

    2011-05-01

    of Defense Technology and the Lessons of History IGA Robert Ranquet, IHEDN, Paris The United States has long relied on tech-nology to secure...Gen. Vincent Desportes, latest commandant of the French National War College, puts it in his recent book, La Guerre Probable ( Paris , 2008: Economica...engineering, he served as manager of the nuclear propul- sion department of the French navy’s pri- mary shipbuilding unit, the Brest division of the

  6. Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs

    Science.gov (United States)

    2016-07-07

    and compare the operational effectiveness and life cycle costs of potential solutions. This testimony is based on a report GAO issued in March...Technology, House of Representatives For Release on Delivery Expected at 10 a.m. ET Thursday, July 7, 2016 GAO-16-769T United States...Environment, Committee on Science, Space, and Technology, House of Representatives July 2016 DEFENSE WEATHER SATELLITES DOD Faces Acquisition

  7. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  8. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  9. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  10. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  11. Effects of daily food processing on allergenicity.

    Science.gov (United States)

    Cabanillas, Beatriz; Novak, Natalija

    2017-08-11

    Daily food processing has the potential to alter the allergenicity of foods due to modification of the physico-chemical properties of proteins. The degree of such modifications depends on factors such as processing conditions, type of food considered, allergenic content, etc. The impact of daily food processing like boiling, roasting, frying or baking on food allergenicity have been extensively studied. The influence of other thermal treatments such as microwave heating or pressure cooking on allergenicity has also been analyzed. Non-thermal treatment such as peeling impacts on the allergenic content of certain foods such as fruits. In this review, we give an updated overview of the effects of daily processing treatments on the allergenicity of a wide variety of foods. The different variables that contribute to the modification of food allergenicity due to processing are also reviewed and discussed.

  12. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  13. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  14. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  15. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  16. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  18. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  19. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  20. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  1. Legal review on PTSD defense of adolescent patients in criminal cases

    Directory of Open Access Journals (Sweden)

    Xiaofu Li

    2017-02-01

    Full Text Available Post-Traumatic Stress Disorder is nothing new for Chinese society; however, Chinese courts are hesitated to accept the PTSD as a mental defense for adolescent patients. PTSD defense might be popular in future and court shall give proper weight to relevant factors. It is a big problem that there are no procedures or instructions for the connection between diagnosis and judgment. The paper illustrates the origination of PTSD and its development in USA with some relevant cases. Even the American courts consider PTSD as a problem. And there should be detailed regulations in China to keep pace with the development of science technology.

  2. Implementing Solar Technologies at Airports

    Energy Technology Data Exchange (ETDEWEB)

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  3. The growing impact of satellite data in daily life

    Science.gov (United States)

    Stramondo, Salvatore

    2015-04-01

    Satellite images have a growing role in our daily life. Weather previsions, telecommunications, environmental planning, disaster mitigation and monitoring: these are only some of the fieldworks where space remote sensing data, and related processing techniques, provide extremely useful information to policy/decision makers, scientists, or to the "simple" citizen. The demonstration of the level of attention provided by the International Community to the impact of new technologies and satellite Earth Observation, in particular, onto everyday life is testified by the recent and forthcoming project calls. Horizon 2020, for instance, identified "Societal challenges" and "Science with and for Society" among the main pillars. In sub-themes we may read references to the "Environment", "Secure societies", "Climate changes", and many others, most of which soliciting the use of remote sensing technologies. In such scenario the scientists should be conscious about the capabilities and the implications in applying new technologies. Recent examples might be explanatory. Satellite data properly managed can be used to measure millimetric and/or centimetric movements of buildings and infrastructures. It has been demonstrated how long term monitoring of urban areas detecting pre-collapse deformations might provide useful hints to prevent such dramatic events. Or, in different frameworks, satellite data can be an advanced instrument for intelligence and military purposes. With such premises, ethic issues assume a key role to properly address the use of satellite technologies.

  4. Using Daily Horoscopes To Demonstrate Expectancy Confirmation.

    Science.gov (United States)

    Munro, Geoffrey D.; Munro, James E.

    2000-01-01

    Describes a classroom demonstration that uses daily horoscopes to show the effect that expectation can have on judgment. Addresses the preparation, procedure, and results of the demonstration, and student evaluations. States that the demonstration appears to be effective for teaching students about expectancy confirmation. (CMK)

  5. Do Daily Retail Gasoline Prices adjust Asymmetrically?

    NARCIS (Netherlands)

    L.J.H. Bettendorf (Leon); S.A. van der Geest (Stéphanie); G. Kuper

    2005-01-01

    textabstractThis paper analyzes adjustments in the Dutch retail gasoline prices. We estimate an error correction model on changes in the daily retail price for gasoline (taxes excluded) for the period 1996-2004 taking care of volatility clustering by estimating an EGARCH model. It turns out the

  6. Do daily retail gasoline prices adjust asymmetrically?

    NARCIS (Netherlands)

    Bettendorf, L.; van der Geest, S. A.; Kuper, G. H.

    2009-01-01

    This paper analyses adjustments in the Dutch retail gasoline prices. We estimate an error correction model on changes in the daily retail price for gasoline (taxes excluded) for the period 1996-2004, taking care of volatility clustering by estimating an EGARCH model. It turns out that the volatility

  7. Daily precipitation statistics in regional climate models

    DEFF Research Database (Denmark)

    Frei, Christoph; Christensen, Jens Hesselbjerg; Déqué, Michel

    2003-01-01

    An evaluation is undertaken of the statistics of daily precipitation as simulated by five regional climate models using comprehensive observations in the region of the European Alps. Four limited area models and one variable-resolution global model are considered, all with a grid spacing of 50 km...

  8. Global daily dynamics of the pineal transcriptome

    DEFF Research Database (Denmark)

    Bustos, Diego M; Bailey, Michael J; Sugden, David

    2011-01-01

    Transcriptome profiling of the pineal gland has revealed night/day differences in the expression of a major fraction of the genes active in this tissue, with two-thirds of these being nocturnal increases. A set of over 600 transcripts exhibit two-fold to >100-fold daily differences in abundance...

  9. Daily storage management of hydroelectric facilities

    NARCIS (Netherlands)

    Chappin, E.J.L.; Ferrero, M.; Lazzeroni, P.; Lukszo, Z.; Olivero, M.; Repetto, M.

    2012-01-01

    This work presents a management procedure for hydroelectric facilities with daily storage. The water storage gives an additional degree of freedom allowing to shift in time power production when it is more convenient and to work at the maximum efficiency of hydraulic turbine. The management is

  10. Daily self-management and work engagement

    NARCIS (Netherlands)

    Breevaart, K.; Bakker, A.B.; Demerouti, E.

    2014-01-01

    The present study adopts a bottom-up approach to work engagement by examining how self-management is related to employees' work engagement on a daily basis. Specifically, we hypothesized that on days that employees use more self-management strategies, they report higher resources at work and in

  11. The daily life of urban ethnic minorities

    NARCIS (Netherlands)

    Andries van den Broek; Saskia Keuzenkamp

    2008-01-01

    Original title: Het dagelijks leven van allochtone stedelingen. The integration of ethnic minorities in Dutch society is not an easy process. The present emphasis on the problems means there is little room for attention for the daily lives of people within the various ethnic groups. This

  12. Big Ideas behind Daily 5 and CAFE

    Science.gov (United States)

    Boushey, Gail; Moser, Joan

    2012-01-01

    The Daily 5 and CAFE were born out of The Sister's research and observations of instructional mentors, their intense desire to be able to deliver highly intentional, focused instruction to small groups and individuals while the rest of the class was engaged in truly authentic reading and writing, and their understanding that a one size fits all…

  13. 27 CFR 19.829 - Daily records.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Daily records. 19.829 Section 19.829 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Production of Vinegar by the Vaporizing Process...

  14. Technology Proliferation: Acquisition Strategies and Opportunities for an Uncertain Future

    Science.gov (United States)

    2018-04-20

    COVERED (From - To) 07/31/17 to 04/09/18 Technology Proliferation: Acquisition Strategies and Opportunities for an Uncertain Future Colonel Heather A...efficient and expeditious fielding of technologically superior capabilities. In today’s environment, it is commonplace for private industry to be the...first to develop and deploy technologies that can be adopted for defense systems. The result is that the Department of Defense (DoD) is largely a

  15. Nuclear industry technology boomerang

    International Nuclear Information System (INIS)

    Scholler, R.W.

    1987-01-01

    The benefits to the medical, pharmaceutical, semiconductor, computer, video, bioscience, laser, defense, and numerous high-tech industries from nuclear technology development fallout are indeed numerous and increase every day. Now those industries have made further progress and improvements that, in return, benefit the nuclear industry. The clean-air and particle-free devices and enclosures needed for protection and decontamination are excellent examples

  16. Energy and technology review

    International Nuclear Information System (INIS)

    Brown, P.S.

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base

  17. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Brown, P.S. (ed.)

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base. (GHT)

  18. Accelerator requirments for strategic defense

    International Nuclear Information System (INIS)

    Gullickson, R.L.

    1987-01-01

    The authors discuss how directed energy applications require accelerators with high brightness and large gradients to minimize size and weight for space systems. Several major directed energy applications are based upon accelerator technology. The radio-frequency linear accelerator is the basis for both space-based neutral particle beam (NPB) and free electron laser (FEL) devices. The high peak current of the induction linac has made it a leading candidate for ground based free electron laser applications

  19. An outline of military technological dynamics as restraints for acquisition, international cooperation and domestic technological development

    Directory of Open Access Journals (Sweden)

    Édison Renato Silva

    2014-12-01

    Full Text Available The expectation that technological returns from defense expenditure through acquisition, international cooperation and domestic research would further national development underappreciates the different technological dynamic of the armed services. This paper outlines the technological dynamic the stems from fighting in the air, at sea and on land, exemplifying consequences for the case of acquisition.

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.