WorldWideScience

Sample records for understanding eu-us defense

  1. Echoes Across the Pond: Understanding EU-US Defense Industrial Relationships

    Science.gov (United States)

    2009-08-05

    U.K.Officials try to settle trade-treaty differences. DefenseNews, 26 November 2007. Coase, Ronald H. The Nature of the Firm, Economica , Vol 4 (1937), pp...de la Defensa (Spain), Politica de armamento y material (Armaments and materiel policy), http//:www.mde.es/dgam/politicaaym.htm, retrieved 9 November

  2. Understanding Defense Mechanisms.

    Science.gov (United States)

    Cramer, Phebe

    2015-12-01

    Understanding defense mechanisms is an important part of psychotherapy. In this article, we trace the history of the concept of defense, from its origin with Freud to current views. The issue of defense as an unconscious mechanism is examined. The question of whether defenses are pathological, as well as their relation to pathology, is discussed. The effect of psychotherapy on the use of defenses, and their relation to a therapeutic alliance is explored. A series of empirical research studies that demonstrate the functioning of defense mechanisms and that support the theory is presented. Research also shows that as part of normal development, different defenses emerge at different developmental periods, and that gender differences in defense use occur.

  3. EU-US ABWG AgENCODE Workshop

    Science.gov (United States)

    As considerable progress has been made on producing draft quality genomic sequence for many food animal species, the next goal for genomics research is a greater understanding of gene regulation and expression. The EU-US Animal Biotechnology Working Group (ABWG), established by the EU-US Biotechnolo...

  4. Report of an EU-US symposium on understanding nutrition-related consumer behavior: strategies to promote a lifetime of healthy food choices.

    Science.gov (United States)

    Friedl, Karl E; Rowe, Sylvia; Bellows, Laura L; Johnson, Susan L; Hetherington, Marion M; de Froidmont-Görtz, Isabelle; Lammens, Veerle; Hubbard, Van S

    2014-01-01

    This report summarizes an EU-US Task Force on Biotechnology Research symposium on healthy food choices and nutrition-related purchasing behaviors. This meeting was unique in its transdisciplinary approach to obesity and in bringing together scientists from academia, government, and industry. Discussion relevant to funders and researchers centered on (1) increased use of public-private partnerships, (2) the complexity of food behaviors and obesity risk and multilevel aspects that must be considered, and (3) the importance of transatlantic cooperation and collaboration that could accelerate advances in this field. A call to action stressed these points along with a commitment to enhanced communication strategies. Copyright © 2014 Society for Nutrition Education and Behavior. All rights reserved.

  5. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  7. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  8. Quarrelsome Committees in U.S. Defense Acquisition: The KC-X Case

    Science.gov (United States)

    2014-04-30

    existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this...U.S. Air Force for many decades. Although debatable as a financial move, it was clearly part of Boeing’s image of itself, and integral to the...May 20). Echoes across the pond: Understanding EU-US defense industrial relationships (NPS-AM-08-002). Retrived from http

  9. 13th EU-US Transport Task Force Workshop on transport in fusion plasmas

    DEFF Research Database (Denmark)

    Connor, J.W.; Fasoli, A.; Hidalgo, C.

    2009-01-01

    This report summarizes the contributions presented at the 13th EU-US Transport Task Force Workshop on transport in fusion plasmas, held in Copenhagen, Denmark, 1-4 September 2008. There were sessions on core heat and particle transport; core and edge momentum transport; edge and scrape-off-layer ...

  10. EU-US standards harmonization task group report : status of ITS security standards.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  11. EU-US standards harmonization task group report : testing for ITS communications.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  12. EU-US standards harmonization task group report : testing for ITS security.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  13. EU-US standards harmonization task group report : feedback to standards development organizations - security

    Science.gov (United States)

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  14. EU-US standards harmonization task group report : feedback to ITS standards development organizations communications.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  15. EU-US standards harmonization task group report : stakeholder engagement and comment resolution.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  16. Reviewing High Politics. A Methodology for the Justiciability of EU-US Legal Relations

    NARCIS (Netherlands)

    Fahey, E.

    2012-01-01

    Despite the waning political importance of the European Union (EU) to the US, transatlantic legal relations are increasing in number in recent times. The Court of Justice has had limited opportunities to review this ‘high politics’. The case of EU-US relations potentially raises an extraordinary

  17. Summary of the 19th Joint EU-US Transport Task Force Workshop

    DEFF Research Database (Denmark)

    Angioni, C.; Mantica, P.; Naulin, Volker

    2015-01-01

    This conference report summarizes the contributions to, and discussions at, the 19th Joint EU-US Transport Task Force workshop, held in Culham, UK, during 8-11 September 2014. The workshop was organized under six topics: momentum transport, energetic particles, challenges in modelling transport i...

  18. EU-US standards harmonization task group report : status of ITS communication standards.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  19. Summary of 21st joint EU-US transport task force workshop.

    Czech Academy of Sciences Publication Activity Database

    Mantica, P.; Bourdelle, C.; Camenen, Y.; Dejarnac, Renaud; Evans, T.; Görler, T.; Hillesheim, J.; Idomura, Y.; Jakubowski, M.; Ricci, P.; White, A.

    2017-01-01

    Roč. 57, č. 8 (2017), č. článku 087001. ISSN 0029-5515. [Joint EU-US Transport Task Force workshop/21./. Leysin, 05.09.2016-08.09.2016] EU Projects: European Commission(XE) 633053 - EUROfusion Institutional support: RVO:61389021 Keywords : transport * confinement * turbulence Subject RIV: BL - Plasma and Gas Discharge Physics OBOR OECD: Fluids and plasma physics (including surface physics) Impact factor: 3.307, year: 2016 http://iopscience.iop.org/article/10.1088/1741-4326/aa753f/meta

  20. The impact of the EU-US Open Skies Agreement on international travel and carbon dioxide emissions

    NARCIS (Netherlands)

    Mayor, K.; Tol, R.S.J.

    2008-01-01

    We use a model of domestic and international tourist numbers and flows to estimate the impact of the EU-US Open Skies agreement that is to take effect in March 2008. The Open Aviation Area will result in increased competition between transatlantic carriers and consequently falls in the cost of

  1. Proteomic approaches to understanding the role of the cytoskeleton in host-defense mechanisms

    Science.gov (United States)

    Radulovic, Marko; Godovac-Zimmermann, Jasminka

    2014-01-01

    The cytoskeleton is a cellular scaffolding system whose functions include maintenance of cellular shape, enabling cellular migration, division, intracellular transport, signaling and membrane organization. In addition, in immune cells, the cytoskeleton is essential for phagocytosis. Following the advances in proteomics technology over the past two decades, cytoskeleton proteome analysis in resting and activated immune cells has emerged as a possible powerful approach to expand our understanding of cytoskeletal composition and function. However, so far there have only been a handful of studies of the cytoskeleton proteome in immune cells. This article considers promising proteomics strategies that could augment our understanding of the role of the cytoskeleton in host-defense mechanisms. PMID:21329431

  2. Arabidopsis thaliana - Myzus persicae interaction: shaping the understanding of plant defense against phloem-feeding aphids

    Directory of Open Access Journals (Sweden)

    Joe eLouis

    2013-07-01

    Full Text Available The phloem provides a unique niche for several organisms. Aphids are a large group of Hemipteran insects that utilize stylets present in their mouthparts to pierce sieve elements and drink large volumes of phloem sap. In addition, many aphids also vector viral diseases. Myzus persicae, commonly known as the green peach aphid (GPA, is an important pest of a large variety of plants that includes Arabidopsis thaliana. This review summarizes recent studies that have exploited the compatible interaction between Arabidopsis and GPA to understand the molecular and physiological mechanisms utilized by plants to control aphid infestation, as well as genes and mechanisms that contribute to susceptibility. In addition, recent efforts to identify aphid-delivered elicitors of plant defenses and novel aphid salivary components that facilitate infestation are also discussed.

  3. The European strategy on endocrine disrupters: progress to date and EU/US cooperation.

    Science.gov (United States)

    Bontoux, L

    2001-01-01

    The European Commission has been active in the field of endocrine disrupters since 1995. Its first actions were to fund research projects through the Fourth Framework Programme for Research and Development covering various aspects of the issue (identification of endocrine disrupters, environmental and human health impacts). This involvement in research has continued through the Fifth Framework Programme and increased to this day. The publication of a specific call for proposals on endocrine disrupters on May 31, 2001 bears witness to these efforts. In parallel, the policy profile of the issue quickly rose and led to the adoption of the Community Strategy on Endocrine Disrupters (COM (1999)706 final) in 1999. This strategy identifies actions short, medium and long term and is supported by the European Parliament and the European Council. Its short-term actions focus on the establishment of a list of substances for further evaluation of their role in endocrine disruption and on the use of existing legislation to control the risk; the medium-term actions focus on the identification and assessment of endocrine disrupters as well as on further research to better understand the ED phenomenon, and the long-term actions focus on legislative actions to protect human health and the environment. These European developments have gone hand in hand with international cooperation with the USA on research (in the frame of the EC/US S&T cooperation agreement), with the WHO on health issues and with the OECD on screening and testing issues.

  4. Alzheimer's disease therapeutic trials: EU/US Task Force report on recruitment, retention, and methodology.

    Science.gov (United States)

    Vellas, B; Hampel, H; Rougé-Bugat, M E; Grundman, M; Andrieu, S; Abu-Shakra, S; Bateman, R; Berman, R; Black, R; Carrillo, M; Donohue, M; Mintun, M; Morris, J; Petersen, R; Thomas, R G; Suhy, J; Schneider, L; Seely, L; Tariot, P; Touchon, J; Weiner, M; Sampaio, C; Aisen, P

    2012-04-01

    While we may not be able to find a cure for Alzheimer's disease (AD) in the near future, several drugs presently in trials have shown promise as possible modifiers of disease progression. However, we may not be able to demonstrate efficacy due to issues of recruitment, retention, site-to-site variability, and other methodological issues. It is thus incumbent on the scientific community to find solutions to these problems, particularly as the field moves toward preventing illness or treating the disease in its prodromal stages, where these methodological issues will become even more critical. We need to better understand why participants agree or refuse to enter drug trials, and why both primary care physicians and Alzheimer's specialists agree or refuse to involve their patients. We also need to quantify the impact of requiring imaging studies, extensive questionnaires, cognitive testing, and lumbar punctures on recruitment and retention. With these concerns in mind, an international task force meeting of experts from academia and industry in the United States, European Union, and Japan in San Diego, California on November 2, 2011 to focus on recruitment, retention and other methodological issues related to clinical trials for AD. Based on the recommendations of this Task force meeting, this Perspectives article critically reflects on the most critical and timely methodological issues related to recruitment and retention in prevention and therapeutic trials in AD, which are paralleled by a paradigm shift in the diagnostic conceptualization of this disease, as reflected by recently new proposed diagnostic criteria involving preclinical stages of the disease.

  5. A cause-defense approach to the understanding and analysis of common cause failures

    International Nuclear Information System (INIS)

    Paula, Henrique M.; Campbell, David J.; Parry, Gareth W.; Mitchell, Donald B.; Rasmuson, Dale M.

    1990-03-01

    For improved reliability and safety, nuclear power plants are designed with redundant safety systems, many of which also have redundant trains of equipment within the system. However, the very high reliability theoretically achievable through the use of redundancy is often compromised by single events that can individually render redundant components unavailable (common cause failure [CCF] events). As evidenced by the results of probabilistic risk assessments (PRAs) and by historical experience with nuclear power plant operations, CCF events are usually major contributors to the risk posed by nuclear power plant operation. Thus, it is important that PRAs recognize the potential for CCF events and realistically account for CCF contributions to system unavailability and plant risk. Much progress has been made over the years in the area of CCF analysis, including the development of both qualitative and quantitative analysis methods. Until now, however, CCF methodologies have not explicitly and systematically accounted for the impact of plant-specific defenses, such as design features and operational and maintenance policies, in place to reduce the likelihood of failure occurrences at nuclear power plants. Recognizing the importance of this issue, the NRC has funded a research effort that has focused on developing the cause-defense methodology for CCF analysis and prevention. This report presents the results of this research. Specifically, this report discusses the development of (1) procedures for identifying the potential for CCF events at individual nuclear power plants and (2) cause-defense matrices for analysis of CCF events. Also, new concepts and more precise definitions are introduced to enhance CCF terminology and interpretation of historical event data. (author)

  6. Coherences and Differences among EU, US and PRC Approaches for Rural Urban Development: Interscalar and Interdisciplinary Analysis

    Directory of Open Access Journals (Sweden)

    Roberto De Lotto

    2017-03-01

    Full Text Available The main goal of this paper is to translate the indexing of a projects’ Data Base, based on EU vocabulary on rural urban development, into different lexicons. Built on the groundwork laid in previous researches, the authors want to enlarge the methodology applied in European Union (EU territory and defined with Rural Architectural Intensification (RAI and Rural Architectural Urbanism (RAU to other contexts, in particular People’s Republic of China (PRC and United States (US, keeping, however, this research at theoretical and methodological definition level. The study of coherences and differences between EU, US and China for rural urban development implies an interscalar and interdisciplinary analysis approach. It must be in complete adherence with national and specific directives and objectives in all the different selected countries. The analysis of main literature and national and federal laws of Europe, United States and China allows the definition of the Strategic Objectives and Main Goals for Rural Development identifying indicators and criteria. They permit to measure intensification’s outcomes in a qualitative way through the description and interpretation of operative tools for architecture and landscape design. Finally, the organized database and the territorial results can be considered as guidelines to support decision makers in rural-urban context. In addition, the whole procedure presented along with the projects’ database is a significant research package for further interdisciplinary applications.

  7. Twenty-Two Years of Inflation Assessment and Forecasting Experience at the Bulletin of EU & US Inflation and Macroeconomic Analysis

    Directory of Open Access Journals (Sweden)

    Antoni Espasa

    2017-10-01

    Full Text Available The Bulletin of EU & US Inflation and Macroeconomic Analysis (BIAM is a monthly publication that has been reporting real time analysis and forecasts for inflation and other macroeconomic aggregates for the Euro Area, the US and Spain since 1994. The BIAM inflation forecasting methodology stands on working with useful disaggregation schemes, using leading indicators when possible and applying outlier correction. The paper relates this methodology to corresponding topics in the literature and discusses the design of disaggregation schemes. It concludes that those schemes would be useful if they were formulated according to economic, institutional and statistical criteria aiming to end up with a set of components with very different statistical properties for which valid single-equation models could be built. The BIAM assessment, which derives from a new observation, is based on (a an evaluation of the forecasting errors (innovations at the components’ level. It provides information on which sectors they come from and allows, when required, for the appropriate correction in the specific models. (b In updating the path forecast with its corresponding fan chart. Finally, we show that BIAM real time Euro Area inflation forecasts compare successfully with the consensus from the ECB Survey of Professional Forecasters, one and two years ahead.

  8. Getting carbon out: tougher than It looks. An assessment of EU, US and Chinese pledges

    Energy Technology Data Exchange (ETDEWEB)

    Jaureguy-Naudin, M.

    2010-07-01

    Copenhagen was viewed as a 'fiasco' in Europe, as 'lacking ambition' in US newspapers and as 'significant and positive' in China. These various perceptions reflect the vastly different expectations of delegations but also the weight that NGOs and the climate movement have gained in the media and public opinion. NGOs continue to play a valuable role in raising the awareness of global warming, but most pre-Copenhagen analysis and reports focussed too much on NGO calls for strong political commitments without exploring the economic reality of whether these targets would be achievable. Understanding what happened in Copenhagen requires the review of three dates: 1990, 2005 and 2020. 1990 is the reference year set by the Kyoto protocol for future emissions reduction. 2005 is used as a reference year by several countries, including the US and China, as part of the international climate negotiations that would lead to a new climate agreement after 2012, the Kyoto protocol running from 2008 to 2012. 2005 is also halfway through 1990-2020. According to the IPCC, global emissions should peak by 2020 in order to limit the rise of Earth temperature below 2 deg. C. New emissions reductions commitments target 2020. At the world level, CO{sub 2} emissions represented 73% of total Greenhouse Gas (GHG) emissions in 2005. CO{sub 2} emissions trajectories between 1990 and 2005 give some indication of what to expect by 2020. This paper focuses on CO{sub 2} emissions from fuel use which constitute the core of total CO{sub 2} emissions: 96% of global CO{sub 2} emissions indeed arise from energy use. The measures of how an economy uses energy that this paper will discuss are the amount of energy needed to produce one unit of GDP, the carbon intensity of energy use - the amount of CO{sub 2} emissions produced by one unit of energy used - and the carbon intensity of the economy, the amount of CO{sub 2} emissions produced by one unit of GDP - in fewer words

  9. Getting carbon out: tougher than It looks. An assessment of EU, US and Chinese pledges

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2010-01-01

    Copenhagen was viewed as a 'fiasco' in Europe, as 'lacking ambition' in US newspapers and as 'significant and positive' in China. These various perceptions reflect the vastly different expectations of delegations but also the weight that NGOs and the climate movement have gained in the media and public opinion. NGOs continue to play a valuable role in raising the awareness of global warming, but most pre-Copenhagen analysis and reports focussed too much on NGO calls for strong political commitments without exploring the economic reality of whether these targets would be achievable. Understanding what happened in Copenhagen requires the review of three dates: 1990, 2005 and 2020. 1990 is the reference year set by the Kyoto protocol for future emissions reduction. 2005 is used as a reference year by several countries, including the US and China, as part of the international climate negotiations that would lead to a new climate agreement after 2012, the Kyoto protocol running from 2008 to 2012. 2005 is also halfway through 1990-2020. According to the IPCC, global emissions should peak by 2020 in order to limit the rise of Earth temperature below 2 deg. C. New emissions reductions commitments target 2020. At the world level, CO 2 emissions represented 73% of total Greenhouse Gas (GHG) emissions in 2005. CO 2 emissions trajectories between 1990 and 2005 give some indication of what to expect by 2020. This paper focuses on CO 2 emissions from fuel use which constitute the core of total CO 2 emissions: 96% of global CO 2 emissions indeed arise from energy use. The measures of how an economy uses energy that this paper will discuss are the amount of energy needed to produce one unit of GDP, the carbon intensity of energy use - the amount of CO 2 emissions produced by one unit of energy used - and the carbon intensity of the economy, the amount of CO 2 emissions produced by one unit of GDP - in fewer words: Units of Energy/Unit of GDP Value; Units of CO 2 /Unit of Energy

  10. Pulling back the curtain on 'behind the border' trade costs: The case of EU-US agri-food trade

    Directory of Open Access Journals (Sweden)

    Ana I. Sanjuán

    2017-07-01

    Full Text Available With the rise of anti-free-trade sentiment on both sides of the Atlantic, there is a growing urgency by trade negotiators to conclude the Trans-Atlantic Trade and Investment Partnership (TTIP negotiations. The harmonisation of non-tariff restrictions is a key component of the talks, whilst global modelling databases typically lack a price compatible representation of these measures, which lends a degree of bias to ex-ante modelling assessments. In the gravity literature, there is (limited evidence of non-tariff ad-valorem equivalent (AVE estimates of agriculture and food, although disaggregated agri-food activities and/or bilateral EU-US route specific estimates are still in relatively short supply. Using panel data, this study consolidates both of these issues, whilst also proposing an ‘indirect’ gravity method as a basis upon which to provide econometric non-tariff AVE estimates compatible with the degree of sectoral concordance typically found in global modelling databases. On a general note, the results revealed the presence of significant behind the border trade costs on both sides of the Atlantic, which exceed their tariff counterparts. Using simple aggregated averages, our estimates are comparable with ‘direct’ gravity method studies. Furthermore, rigorous qualitative and quantitative comparisons on a sector-by-sector basis showed that a number of bilateral non-tariff AVEs are also found to be plausible, although in some cases, with recourse to relevant policy documents and expert opinion, it is debatable whether the EU or the US is more restrictive. Further work could focus on refining the sector specificity of each gravity equation to improve the model's predictive capacity.

  11. Arabidopsis thaliana-Myzus persicae interaction: shaping the understanding of plant defense against phloem-feeding aphids.

    Science.gov (United States)

    Louis, Joe; Shah, Jyoti

    2013-01-01

    The phloem provides a unique niche for several organisms. Aphids are a large group of Hemipteran insects that utilize stylets present in their mouthparts to pierce sieve elements and drink large volumes of phloem sap. In addition, many aphids also vector viral diseases. Myzus persicae, commonly known as the green peach aphid (GPA), is an important pest of a large variety of plants that includes Arabidopsis thaliana. This review summarizes recent studies that have exploited the compatible interaction between Arabidopsis and GPA to understand the molecular and physiological mechanisms utilized by plants to control aphid infestation, as well as genes and mechanisms that contribute to susceptibility. In addition, recent efforts to identify aphid-delivered elicitors of plant defenses and novel aphid salivary components that facilitate infestation are also discussed.

  12. Overcoming Information Aesthetics: In Defense of a Non-Quantitative Informational Understanding of Artworks

    Directory of Open Access Journals (Sweden)

    Rodrigo Hernández-Ramírez

    2016-11-01

    Full Text Available Attempts to describe aesthetic artefacts through informational models have existed at least since the late 1950s; but they have not been as successful as their proponents expected nor are they popular among art scholars because of their (mostly quantitative nature. However, given how information technology has deeply shifted every aspect of our world, it is fair to ask whether aesthetic value continues to be immune to informational interpretations. This paper discusses the ideas of the late Russian biophysicist, Mikhail Volkenstein concerning art and aesthetic value. It contrasts them with Max Bense’s ‘information aesthetics’, and with contemporary philosophical understandings of information. Overall, this paper shows that an informational but not necessarily quantitative approach serves not only as an effective means to describe our interaction with artworks, but also contributes to explain why purely quantitative models struggle to formalise aesthetic value. Finally, it makes the case that adopting an informational outlook helps overcome the ‘analogue vs digital’ dichotomy by arguing the distinction is epistemological rather than ontological, and therefore the two notions need not be incompatible.

  13. Current understanding of pattern-triggered immunity and hormone-mediated defense in rice (Oryza sativa) in response to Magnaporthe oryzae infection.

    Science.gov (United States)

    Nasir, Fahad; Tian, Lei; Chang, Chunling; Li, Xiujun; Gao, Yingzhi; Tran, Lam-Son Phan; Tian, Chunjie

    2017-11-02

    Plant pathogens represent a huge threat to world food security, affecting both crop production and quality. Although significant progress has been made in improving plant immunity by expressing key, defense-related genes and proteins from different species in transgenic crops, a challenge remains for molecular breeders and biotechnologists to successfully engineer elite, transgenic crop varieties with improved resistance against critical plant pathogens. Upon pathogen attack, including infection of rice (Oryza sativa) by Magnaporthe oryzae, host plants initiate a complex defense response at molecular, biochemical and physiological levels. Plants perceive the presence of pathogens by detecting microbe-associated molecular patterns via pattern recognition receptors, and initiate a first line of innate immunity, the so-called pattern-triggered immunity (PTI). This results in a series of downstream defense responses, including the production of hormones, which collectively function to fend off pathogen attacks. A variety of studies have demonstrated that many genes are involved in the defense response of rice to M. oryzae. In this review, the current understanding of mechanisms that improve rice defense response to M. oryzae will be discussed, with special focus on PTI and the phytohormones ethylene, jasmonic acid, salicylic acid, and abscisic acid; as well as on the mediation of defense signaling mechanisms by PTI and these hormones. Potential target genes that may serve as promising candidates for improving rice immunity against M. oryzae will also be discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  15. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  16. Host-pathogen interactions between the human innate immune system and Candida albicans—understanding and modeling defense and evasion strategies

    Science.gov (United States)

    Dühring, Sybille; Germerodt, Sebastian; Skerka, Christine; Zipfel, Peter F.; Dandekar, Thomas; Schuster, Stefan

    2015-01-01

    The diploid, polymorphic yeast Candida albicans is one of the most important human pathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within the human host for a long time. However, alterations in the host environment can render C. albicans virulent. In this review, we describe the immunological cross-talk between C. albicans and the human innate immune system. We give an overview in form of pairs of human defense strategies including immunological mechanisms as well as general stressors such as nutrient limitation, pH, fever etc. and the corresponding fungal response and evasion mechanisms. Furthermore, Computational Systems Biology approaches to model and investigate these complex interactions are highlighted with a special focus on game-theoretical methods and agent-based models. An outlook on interesting questions to be tackled by Systems Biology regarding entangled defense and evasion mechanisms is given. PMID:26175718

  17. Science and technology needs: Integrated research and development, the path to gaining a defensible understanding on ''watch list'' tank risk and interim stabilization needs

    International Nuclear Information System (INIS)

    Johnson, B.M.; Mellinger, G.; Strachan, D.; Hallen, R.

    1991-09-01

    The ''watch list'' waste tanks at the Hanford Site in Washington state are those that the Secretary of the Department of Energy reports upon to the Congress because of the unresolved safety question. As such, they are subject to intense surveillance and an enhanced list of controls and safety procedures. The objective of the Waste Tank Safety Program is to mitigate the safety concerns with respect to these tanks, thereby removing them from the ''watch list.'' The essential step in this process is the development of a defensible position that reduce the risk of these tanks to an acceptable level. An integrated research and development (R ampersand D) program is believed to be the most cost-effective means of achieving the information required to mitigate the safety concern and to resolve the safety issues. This program uses chemical and physical modeling studies of synthetic waste, is substantiated with limited field data and radioactive samples from a tank, and uses numerical modeling to extrapolate results to actual tank-scale operations. 3 refs., 4 figs

  18. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  19. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense.

    Science.gov (United States)

    Liu, Sheng-Rui; Zhou, Jing-Jing; Hu, Chun-Gen; Wei, Chao-Ling; Zhang, Jin-Zhi

    2017-01-01

    MicroRNAs (miRNAs) are non-coding RNAs of approximately 20-24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant-pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  20. Defense mechanisms in ethics consultation.

    Science.gov (United States)

    Agich, George J

    2011-12-01

    While there is no denying the relevance of ethical knowledge and analytical and cognitive skills in ethics consultation, such knowledge and skills can be overemphasized. They can be effectively put into practice only by an ethics consultant, who has a broad range of other skills, including interpretive and communicative capacities as well as the capacity effectively to address the psychosocial needs of patients, family members, and healthcare professionals in the context of an ethics consultation case. In this paper, I discuss how emotion can play an important interpretive role in clinical ethics consultation and why attention to the role of defense mechanisms can be helpful. I concentrate on defense mechanisms, arguing first, that the presence of these mechanisms is understandable given the emotional stresses and communicative occlusions that occur between the families of patients and critical care professionals in the circumstances of critical care; second, that identifying these mechanisms is essential for interpreting and managing how these factors influence the way that the "facts" of the case are understood by family members; and, third, that effectively addressing these mechanisms is an important component for effectively doing ethics consultation. Recognizing defense mechanisms, understanding how and why they operate, and knowing how to deal with these defense mechanisms when they pose problems for communication or decision making are thus essential prerequisites for effective ethics consultation, especially in critical care.

  1. Toward developing a scale to empirically measure psychotic defense mechanisms.

    Science.gov (United States)

    Constantinides, Prometheas; Beck, Stephen M

    2010-12-01

    In recent years, research on psychological processes has greatly advanced our understanding of various psychopathologies. Defense mechanisms, for example, have been described as observable phenomena, and studies have shown meaningful relationships among these processes and other measurable dimensions of health and illness. Despite some notable exceptions, one area that has been overlooked is the empirical study of defenses in psychotic disorders. This is in part due to the lack of valid instruments measuring psychotic-level defenses. Propadeutic to creating an empirical scale for measuring psychotic defenses, the psychoanalytic and empirical literature on psychotic defenses is reviewed, after which the concept of psychotic defenses as measured by the P-DMRS (Psychotic-Defense Mechanism Rating Scales)--which can be used independently or in combination with the current DMRS (Defense Mechanism Rating Scales)--is operationalized. Finally, current research directions applying the P-DMRS to the clinical setting are presented, as well as its implications for guiding current clinical practice.

  2. Defense Co-Production: Collaborative National Defense

    National Research Council Canada - National Science Library

    Richardson, Robert R

    2005-01-01

    ...) and the defense industry at large. The aim of the study will be to examine the evolution of the procurement and contracting process since World War II with a qualitative and quantitative evaluation of the increasingly symbiotic...

  3. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  4. Can the Factor Structure of Defense Style Questionnaire (DSQ-40) Contribute to Our Understanding of Parental Acceptance/Rejection, Bullying, Victimization and Perceived Well-Being in Greek Early Adolescents?

    Science.gov (United States)

    Giovazolias, Theodoros; Karagiannopoulou, Evangelia; Mitsopoulou, Effrosyni

    2017-05-01

    Defense Style Questionnaire (DSQ) is a self-report instrument designed to measure defense mechanisms. Although commonly used, the DSQ-40 has not been validated in early adolescent populations. The present study sought to determine the factor validity of the DSQ-40 in a sample of Greek primary school students (N = 265). Further, it aimed to investigate the relationship between defense mechanisms and perceived parental acceptance/rejection, the participation in bullying (either as bully or victim) as well as self-reported well being. Participants completed the Greek version of DSQ-40, adapted for use by this particular age group as well as measures in order to examine its convergent and discriminant validity. The findings support a four-factor solution as the most adequate for our data. Further, it was found that defense mechanisms are related to perceived parental acceptance and rejection. Finally, the results showed that the DSQ-40 can effectively discriminate participants with high/low bullying/victimization and perceived well-being. Our results indicate that the DSQ-40 is appropriate for use in late childhood. Implications for clinical practice and future studies that would confirm the appropriateness of the scale's use in younger populations are also discussed.

  5. Penitentiary integral defense

    OpenAIRE

    Francisco Javier Rodríguez Román

    2012-01-01

    Penitentiary integral defense is a set of techniques designed to solve the breach of the peace that may appear in the penitentiary world. This paper studies the scope and legal framework of penitentiary self-defense. This kind of self-defense is defined by the particular characteristics of a confinement context and a very specific regulation aimed at preserving the integrity of prisoners and penitentiary staff as well as prison facilities. A technical section illustrating the main penitentiar...

  6. Chemical defense lowers plant competitiveness.

    Science.gov (United States)

    Ballhorn, Daniel J; Godschalx, Adrienne L; Smart, Savannah M; Kautz, Stefanie; Schädler, Martin

    2014-11-01

    Both plant competition and plant defense affect biodiversity and food web dynamics and are central themes in ecology research. The evolutionary pressures determining plant allocation toward defense or competition are not well understood. According to the growth-differentiation balance hypothesis (GDB), the relative importance of herbivory and competition have led to the evolution of plant allocation patterns, with herbivore pressure leading to increased differentiated tissues (defensive traits), and competition pressure leading to resource investment towards cellular division and elongation (growth-related traits). Here, we tested the GDB hypothesis by assessing the competitive response of lima bean (Phaseolus lunatus) plants with quantitatively different levels of cyanogenesis-a constitutive direct, nitrogen-based defense against herbivores. We used high (HC) and low cyanogenic (LC) genotypes in different competition treatments (intra-genotypic, inter-genotypic, interspecific), and in the presence or absence of insect herbivores (Mexican bean beetle, Epilachna varivestis) to quantify vegetative and generative plant parameters (above and belowground biomass as well as seed production). Highly defended HC-plants had significantly lower aboveground biomass and seed production than LC-plants when grown in the absence of herbivores implying significant intrinsic costs of plant cyanogenesis. However, the reduced performance of HC- compared to LC-plants was mitigated in the presence of herbivores. The two plant genotypes exhibited fundamentally different responses to various stresses (competition, herbivory). Our study supports the GDB hypothesis by demonstrating that competition and herbivory affect different plant genotypes differentially and contributes to understanding the causes of variation in defense within a single plant species.

  7. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  8. Mechanisms of plant defense against insect herbivores

    Science.gov (United States)

    War, Abdul Rashid; Paulraj, Michael Gabriel; Ahmad, Tariq; Buhroo, Abdul Ahad; Hussain, Barkat; Ignacimuthu, Savarimuthu; Sharma, Hari Chand

    2012-01-01

    Plants respond to herbivory through various morphological, biochemicals, and molecular mechanisms to counter/offset the effects of herbivore attack. The biochemical mechanisms of defense against the herbivores are wide-ranging, highly dynamic, and are mediated both by direct and indirect defenses. The defensive compounds are either produced constitutively or in response to plant damage, and affect feeding, growth, and survival of herbivores. In addition, plants also release volatile organic compounds that attract the natural enemies of the herbivores. These strategies either act independently or in conjunction with each other. However, our understanding of these defensive mechanisms is still limited. Induced resistance could be exploited as an important tool for the pest management to minimize the amounts of insecticides used for pest control. Host plant resistance to insects, particularly, induced resistance, can also be manipulated with the use of chemical elicitors of secondary metabolites, which confer resistance to insects. By understanding the mechanisms of induced resistance, we can predict the herbivores that are likely to be affected by induced responses. The elicitors of induced responses can be sprayed on crop plants to build up the natural defense system against damage caused by herbivores. The induced responses can also be engineered genetically, so that the defensive compounds are constitutively produced in plants against are challenged by the herbivory. Induced resistance can be exploited for developing crop cultivars, which readily produce the inducible response upon mild infestation, and can act as one of components of integrated pest management for sustainable crop production. PMID:22895106

  9. Forgiveness and Defense Style

    Science.gov (United States)

    Maltby, John; Day, Liz

    2004-01-01

    Within the literature on the psychology of forgiveness, researchers have hypothesized that the 1st stage in the process of being able to forgive is the role of psychological defense. To examine such a hypothesis, the authors explored the relationship between forgiveness and defense style. The 304 respondents (151 men, 153 women) completed measures…

  10. Defense Signaling in Plants

    Indian Academy of Sciences (India)

    Self defense is the basic response of every living organism. This response is readily observed in animals because of their physical movements typically involved in that pro- cess. Being immobile, plants have evolved highly complex defense mechanisms that differ from those commonly seen in animals. Plants are able to ...

  11. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  12. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel......In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  13. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar......, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce...

  14. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    OpenAIRE

    Liu, Sheng-Rui; Zhou, Jing-Jing; Hu, Chun-Gen; Wei, Chao-Ling; Zhang, Jin-Zhi

    2017-01-01

    MicroRNAs (miRNAs) are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense ...

  15. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  16. Antiviral Defense Mechanisms in Honey Bees.

    Science.gov (United States)

    Brutscher, Laura M; Daughenbaugh, Katie F; Flenniken, Michelle L

    2015-08-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation.

  17. Defense Mechanisms in Adolescence.

    Science.gov (United States)

    Cramer, Phebe

    1979-01-01

    Results showed that by ninth or tenth grade, males begin to externalize conflict while females tend to deal with conflict internally. This differentiation of defense choice by sex is clearly established by the last two years of high school. (JMB)

  18. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  19. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  20. Error management in plant allocation to herbivore defense.

    Science.gov (United States)

    Orrock, John L; Sih, Andy; Ferrari, Maud C O; Karban, Richard; Preisser, Evan L; Sheriff, Michael J; Thaler, Jennifer S

    2015-08-01

    Herbivores can greatly reduce plant fitness. Error management theory (EMT) predicts the evolution of adaptive plant defensive strategies that err towards making less-costly errors so as to avoid making rare, costly errors. EMT provides a common framework for understanding observed levels of variation in plant defense among and within species. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Gastrointestinal defense mechanisms.

    Science.gov (United States)

    Said, Hyder; Kaunitz, Jonathan D

    2016-11-01

    To summarize and illuminate the recent findings regarding gastroduodenal mucosal defense mechanisms and the specific biomolecules involved in regulating this process, such as glucagon-like peptides (GLPs). There has been a growing interest in luminal nutrient chemosensing and its physiological effects throughout the digestive system. From the ingestion of food in the oral cavity to the processing and absorption of nutrients in the intestines, nutrient chemosensing receptors signal the production and release of numerous bioactive peptides from enteroendocrine cells, such as the proglucagon-derived peptides. There has been a major emphasis on two proglucagon-derived peptides, namely GLP-1 and GLP-2, due to their apparent beneficial effect on gut structure, function, and on metabolic processes. As an incretin, GLP-1 not only enhances the effect and release of insulin on pancreatic βcells but also has been implicated in having trophic effects on the intestinal epithelium. In addition, GLP-2, the other major proglucagon-derived peptide, has potent intestinotrophic effects, such as increasing the rate of mucosal stem cell proliferation, mucosal blood flow, and fluid absorption, as well as augmenting the rate of duodenal bicarbonate secretion to improve gastric mucosal health and longevity. Understanding the mechanisms underlying nutrient chemosensing and how it relates to GLP release can further elucidate how the gut functions in response to cellular changes and disturbances. Furthermore, a more in-depth comprehension of GLP release and its tissue-specific effects will help improve the utility of GLP-1 and GLP-2 receptor agonists in clinical settings. This, in turn, should help patients suffering from intestinal failure, malabsorption, and mucosal injury.

  2. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  3. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  4. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  5. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  6. The Transatlantic Defense Industrial Base: Restructuring Scenarios and Their Implications

    National Research Council Canada - National Science Library

    Guay, Terrence R

    2005-01-01

    This monograph compares the post-Cold War restructuring of the defense industries in the United States and Europe with the aim of understanding the implications for the transatlantic industrial base...

  7. Teaching Teaching & Understanding Understanding

    DEFF Research Database (Denmark)

    2006-01-01

    "Teaching Teaching & Understanding Understanding" is a 19-minute award-winning short-film about teaching at university and higher-level educational institutions. It is based on the "Constructive Alignment" theory developed by Prof. John Biggs. The film delivers a foundation for understanding what...

  8. SDI (Strategic Defense Initiative) and the US defense posture

    Energy Technology Data Exchange (ETDEWEB)

    May, M.M.

    1986-07-01

    Issues surrounding the Strategic Defense Initiative are discussed. Comments are made on the research and development program and the effect of this program on the defensive posture of the United States.

  9. Defense strategies used by two sympatric vineyard moth pests.

    Science.gov (United States)

    Vogelweith, Fanny; Thiéry, Denis; Moret, Yannick; Colin, Eloïse; Motreuil, Sébastien; Moreau, Jérôme

    2014-05-01

    Natural enemies including parasitoids are the major biological cause of mortality among phytophagous insects. In response to parasitism, these insects have evolved a set of defenses to protect themselves, including behavioral, morphological, physiological and immunological barriers. According to life history theory, resources are partitioned to various functions including defense, implying trade-offs among defense mechanisms. In this study we characterized the relative investment in behavioral, physical and immunological defense systems in two sympatric species of Tortricidae (Eupoecilia ambiguella, Lobesia botrana) which are important grapevine moth pests. We also estimated the parasitism by parasitoids in natural populations of both species, to infer the relative success of the investment strategies used by each moth. We demonstrated that larvae invest differently in defense systems according to the species. Relative to L. botrana, E. ambiguella larvae invested more into morphological defenses and less into behavioral defenses, and exhibited lower basal levels of immune defense but strongly responded to immune challenge. L. botrana larvae in a natural population were more heavily parasitized by various parasitoid species than E. ambiguella, suggesting that the efficacy of defense strategies against parasitoids is not equal among species. These results have implications for understanding of regulation in communities, and in the development of biological control strategies for these two grapevine pests. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    evacuation , missile defense, reconnaissance and surveillance, sea lane control, search and rescue, special operations, strategic and theater airlift...decontamination technology advances. Recently, novel types of polymeric support termed “ starburst ” dendrimer polymers have been developed. The ability to...threats • Optimize military performance; survival and stabilization of combat casualties • Provide the world’s best casualty evacuation and medical

  11. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  12. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  13. Ministries of Defense: Driving Force in Defense Restructuring

    OpenAIRE

    2003-01-01

    Introduction. For more effective democratic civilian control (and better defense decisions), Ministries of Defense bridge the gap between political institutions and the armed forces. These institutions translate political objectives into military capabilities. MODs, staffed with enough civilian defense experts, provide the continuity and stability needed in a democratic system.

  14. Sexual Responsivity and Ego Defenses

    Science.gov (United States)

    Schill, Thomas; Bekker, Demoyne

    1976-01-01

    The present study sought to determine whether high- and low-sexual responders on a double-entendre word association test differed in defensive preference on Gleser and Ihilevich's Defense Mechanism Inventory. (Author)

  15. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  16. Joint stabilizing projects in defense

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.; Browne, J.C.; Joseph, R.J.

    1992-06-01

    Joint defensive projects could increase stability and decrease the alert rates of strategic forces. Areas include the defense of the US, Commonwealth of Independent States (CIS), and their allies against third world threats; protection against each other`s accidental or unauthorized launches; and defense against intentional attacks. The most promising area appears to be defining interfaces for the handover of satellite warning and trajectory information, which applies to most phases of theater defense and mutual protection. 19 refs.

  17. Joint stabilizing projects in defense

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.; Browne, J.C.; Joseph, R.J.

    1992-06-01

    Joint defensive projects could increase stability and decrease the alert rates of strategic forces. Areas include the defense of the US, Commonwealth of Independent States (CIS), and their allies against third world threats; protection against each other's accidental or unauthorized launches; and defense against intentional attacks. The most promising area appears to be defining interfaces for the handover of satellite warning and trajectory information, which applies to most phases of theater defense and mutual protection. 19 refs.

  18. Belowground herbivory and plant defenses

    NARCIS (Netherlands)

    Van Dam, N.M.

    2009-01-01

    Belowground-feeding herbivores may be very destructive to plants. Roots are known to produce various defense compounds to protect themselves against these herbivores, both with direct and indirect—inducible—defense compounds. Recent literature reviews reveal no overall pattern for root-shoot defense

  19. Cross talk in defense signaling

    NARCIS (Netherlands)

    Koornneef, A.; Pieterse, C.M.J.

    2008-01-01

    Plants are equipped with an array of defense mechanisms to protect themselves against attack by herbivorous insects and microbial pathogens. Some of these defense mechanisms are preexisting, whereas others are only activated upon insect or pathogen invasion. Induced defense responses entail fitness

  20. Defense Mechanisms in Group Counseling.

    Science.gov (United States)

    Clark, Arthur J.

    1992-01-01

    Presents considerations and strategies for conceptualizing, recognizing, and modifying defense mechanisms through the group counseling process. Provides awareness of defense mechanisms in planning for and implementation of group counseling, describes interaction patterns for identifying defenses among group participants, and clarifies modification…

  1. 11. EU-US Transport Task Force Workshop - Proceedings

    International Nuclear Information System (INIS)

    2006-01-01

    This document gives the program of the workshop and gathers only the slides of some of the papers presented. The presentations have been organized around 5 topics: 1) multi-scale physics, 2) momentum transport, 3) electron transport, 4) particle and impurity transport, and 5) plasma scrape-off layer transport

  2. Defense on the Move: Ant-Based Cyber Defense

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  3. Transport of defense compounds from source to sink

    DEFF Research Database (Denmark)

    Jørgensen, Morten Egevang; Nour-Eldin, Hussam Hassan; Halkier, Barbara Ann

    2015-01-01

    Plants synthesize a plethora of defense compounds crucial for their survival in a challenging and changing environment. Transport processes are important for shaping the distribution pattern of defense compounds, albeit focus hitherto has been mostly on their biosynthetic pathways. A recent...... identification of two glucosinolate transporters represents a breakthrough in our understanding of glucosinolate transport in Arabidopsis and has advanced knowledge in transport of defense compounds. In this review, we discuss the role of the glucosinolate transporters in establishing dynamic glucosinolate...... distribution patterns and source-sink relations. We focus on lessons learned from glucosinolate transport that may apply to transport of other defense compounds and discuss future avenues in the emerging field of defense compound transport....

  4. Defensive medicine in Israel - a nationwide survey.

    Directory of Open Access Journals (Sweden)

    Elad Asher

    Full Text Available BACKGROUND: Defensive medicine is the practice of diagnostic or therapeutic measures conducted primarily as a safeguard against possible malpractice liability. We studied the extent, reasons, and characteristics of defensive medicine in the Israeli health care system. METHODS AND FINDINGS: Cross-sectional study performed in the Israeli health care system between April and July 2008 in a sample (7% of board certified physicians from eight medical disciplines (internal medicine, pediatrics, general surgery, family medicine, obstetrics and gynecology, orthopedic surgery, cardiology, and neurosurgery. A total of 889 physicians (7% of all Israeli board certified specialists completed the survey. The majority [60%, (95%CI 0.57-0.63] reported practicing defensive medicine; 40% (95%CI 0.37-0.43 consider every patient as a potential threat for a medical lawsuit; 25% (95%CI 0.22-0.28 have previously been sued at least once during their career. Independent predictors for practicing defensive medicine were surgical specialty [OR=1.6 (95%CI 1.2-2.2, p=0.0004], not performing a fellowship abroad [OR=1.5 (95%CI 1.1-2, p=0.027], and previous exposure to lawsuits [OR=2.4 (95%CI 1.7-3.4, p<0.0001]. Independent predictors for the risk of being sued during a physician's career were male gender [OR=1.6 (95%CI 1.1-2.2, p=0.012] and surgery specialty [OR=3.2 (95%CI 2.4-4.3, p<0.0001] (general surgery, obstetrics and gynecology, orthopedic surgery, and neurosurgery. CONCLUSIONS: Defensive medicine is very prevalent in daily physician practice in all medical disciplines. It exposes patients to complications due to unnecessary tests and procedures, affects quality of care and costs, and undermines doctor-patient relationships. Further studies are needed to understand how to minimize defensive medicine resulting from an increased malpractice liability market.

  5. Boomeranging in structural defense

    Science.gov (United States)

    Marler, Thomas E.

    2012-01-01

    Plant defensive behaviors that resist arthropod herbivory include trichome-mediated defenses, and variation in plant trichome morphology and abundance provides examples of the mechanistic complexities of insect-plant interactions. Trichomes were removed from Cycas revoluta cataphylls on the island of Guam to reveal Aulacaspis yasumatsui scale infestation, and predation of the newly exposed insects by pre-existing Rhyzobius lophanthae beetles commenced within one day. The quotient of predated/total scale insects was 0.5 by day 4 and stabilized at that found on adjacent glabrous leaves in about one week. The trichome phenotype covering the C. revoluta cataphyll complex offers the invasive A. yasumatsui armored scale effectual enemy-free space in this system. This pest and predator share no known evolutionary history with C. revoluta, therefore, the adaptive significance of this plant behavior in natural habitat is not yet known. PMID:22990448

  6. Defense against Space Weapons,

    Science.gov (United States)

    1983-02-24

    which can be used at present are space defense missiles, killer satellites, high energy laser weapons and particle beam weapons. In 1962, the U.S... laser weapons and particle beam weapons have the ad- 4vantages of high power, concentrated energy, hit accuracy, and conven- ience of use. They have... weapons development amounts to 5 US$200,000,000. At present, irradiation by a laser weapon operating on the earth’s surface can cause optical and infrared

  7. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    capital assets, such as an F-35 Joint Strike Fighter or a Virginia-class submarine. Investment costs are distinguished from expenses, which are...procurement funds before a formal Milestone C approval. How else does DOD purchase goods and services? How does DOD procurement relate to defense...purchase services (e.g., research, architectural design, or cleaning services) and smaller goods (e.g., gauze or light bulbs) because such purchases

  8. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  9. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  10. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  11. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    provides a framework for examining spending patterns of the federal government by category of activity, rather than by agency or type of financing ...federal spending. Since federal agencies often have diverse, overlapping responsibilities , it is not uncommon for them to be associated with multiple...agency responsible for approximately 96% of spending within the National Defense Budget (050). Defense Primer: The National Defense Budget Function

  12. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  13. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  14. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  15. Antipredator defenses predict diversification rates

    OpenAIRE

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    Prey use a variety of mechanisms to avoid the risk of predation, including chemical defense, camouflage, and conspicuous coloration. Here we show that variation in these forms of protection can have profound effects on macroevolutionary patterns in amphibians. Chemical defense and conspicuous coloration both increase speciation rates, in line with the “escape-and-radiate” hypothesis. However, chemical defense also increases extinction rates, lowering net diversification. We therefore show tha...

  16. Teaching Psychological Defense Mechanisms: "The Defense Mechanisms Game."

    Science.gov (United States)

    Waugh, Charles G.

    1980-01-01

    Presents the rules for an educational game in which students reinforce psychology lecture material by creating and dramatizing defense mechanisms such as reaction formation, displacement, and fantasy. Provides definitions and examples of the various defense mechanisms that can be portrayed. (JP)

  17. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    These results suggest that enhancing defensive enzymes' activities and inducing new isozymes may be related to mitigating pathogen-induced oxidative damage which result in the decrease of calli decay, and this implies that antioxidant defense response may be involved in the mechanisms of plant against fungal ...

  18. Indirect plant defense against insect herbivores: a review.

    Science.gov (United States)

    Aljbory, Zainab; Chen, Ming-Shun

    2018-02-01

    Plants respond to herbivore attack by launching 2 types of defenses: direct defense and indirect defense. Direct defense includes all plant traits that increase the resistance of host plants to insect herbivores by affecting the physiology and/or behavior of the attackers. Indirect defense includes all traits that by themselves do not have significant direct impact on the attacking herbivores, but can attract natural enemies of the herbivores and thus reduce plant loss. When plants recognize herbivore-associated elicitors, they produce and release a blend of volatiles that can attract predators, parasites, and other natural enemies. Known herbivore-associated elicitors include fatty acid-amino acid conjugates, sulfur-containing fatty acids, fragments of cell walls, peptides, esters, and enzymes. Identified plant volatiles include terpenes, nitrogenous compounds, and indoles. In addition, constitive traits including extrafloral nectars, food bodies, and domatia can be further induced to higher levels and attract natural enemies as well as provide food and shelter to carnivores. A better understanding of indirect plant defense at global and componential levels via advanced high throughput technologies may lead to utilization of indirect defense in suppression of herbivore damage to plants. © 2016 Institute of Zoology, Chinese Academy of Sciences.

  19. Defense Styles in Suicide Attempters

    Science.gov (United States)

    Scholz, James A.

    1973-01-01

    Thirty-five serious suicide attempters, paired to neuropsychiatric controls on relevant variables, were tested within two weeks of their attempt with the Defense Mechanisms Inventory. Attempters revealed more turning-against-self defenses as hypothesized but showed no differences from controls in use of fantasized hostility. Implications for…

  20. Assertion and Defense Mechanism Preference.

    Science.gov (United States)

    Massong, Stefan R.; And Others

    1982-01-01

    Investigated whether assertive and nonassertive individuals differ in defense mechanisms they most typically rely on when confronted with interpersonal stress and conflict. Results indicated assertive males and females both endorsed the most adaptive defense mechanism cluster, whereas nonassertive males and females endorsed more primitive defense…

  1. Understanding and Mitigating Protests of Department of Defense Acquisition Contracts

    Science.gov (United States)

    2010-08-01

    win, you can’t perform. Number 2 is to perform with excellence. When you bid you commit money and people. ‘Take the hill.’ The compulsion to win is...suppliers and many buyers : no technical evaluations. Multiple contractors could redeploy instantly to their highest valued uses the resources required...information. Projects could be split into small pieces with readily available substitutes so no supplier has bargaining power. For that matter, no buyer

  2. How to understand requirements of nuclear and defense welding contracts

    International Nuclear Information System (INIS)

    Dickinson, O.D.

    1986-01-01

    This paper presents a basic requirements control plan for contract documentation and software validation and maintenance for nuclear operation. The objective is designing an integrated configuration control plan of both old, new, large or small, critical and noncritical software programs. There are positive advantages to managing a planned requirements program for product delivery or business operations. A requirements baseline like this is preferable to many iterations of design effort in the maintenance of nonbaselined programs, documentation and software. The plan that applies program requirements needs to address different levels of criticality and define matching program requirements for those levels. The plan needs to describe old vs. new requirements and define scope/responsibility that is needed to support the design, development and completion of these program requirements. Presented are management goals, relative costs, quality assurance goals, and program assessment plans. Outlined is a set of program QA requirements and document/software functional requirements for planning of program; also presented are some criteria for criticality assessment to establish levels of contract documentation or software activity. The paper shows two examples of planning work on this configuration control plan. The integrated configuration control requirements plan can be computer based or paper based for activity. It is designed to cover existing or new requirements and to cover either no documentation or all documentation

  3. Wormuth: Work on Security, Defense 'Holistically'

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, PRESS RELEASES Concepts spawned at the Center for Homeland Defense and Security could be very valuable to government entities such as the Department of Defense as that agency expands its focus in...

  4. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  5. Defense Logistics Agency Family Housing Requirements

    National Research Council Canada - National Science Library

    Granetto, Paul

    1999-01-01

    The Director, Defense Logistics Agency (Installation Support Group) requested the audit to review the process the Defense Logistics Agency installations use to determine family housing requirements...

  6. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  7. Defensive sexualization: a neurobiologically informed explanatory model.

    Science.gov (United States)

    Ruggiero, Matthew E

    2011-09-01

    Sexualization is a defense mechanism frequently referred to in clinical psychoanalytic literature. Despite this, there is no research linking the theoretical nature of this observed phenomenon to social or neurobiological theory. This discussion paper proposes an interaction between social learning and neural maturation in the development of sexualized tendencies. When anxiety within peer interactions is alleviated repeatedly through sexualized behavior, learned associations develop. This explanation allows understanding and empathy for individuals demonstrating a broad spectrum of sexualized responses since such learning is argued to be functional within their historic social climate.

  8. Defense Globalization: Impacts on the United States Defense Acquisition System

    Science.gov (United States)

    2007-12-01

    sources. Taking advantage of global competition could also result in benefits to the U.S. military such as better technological innovation, reduction... globalization of the DoD acquisition process and proves the U.S. defense industry is not the end-all answer to achieving technological superiority on...dominance, and even more so now that the defense industry is moving towards globalization . Numerous means of technology transfer exist, including

  9. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  10. Criminal defense in Chinese courtrooms: an empirical inquiry.

    Science.gov (United States)

    Liang, Bin; He, Ni Phil

    2014-10-01

    Scholars in the field of Chinese criminal procedure law study have long decried the meager legal protection afforded to criminal defendants on trial and the hapless status of Chinese criminal defense attorneys in the courtroom. Unfortunately, very little empirical evidence was available to shed light on how criminal defense was carried out in Chinese courtrooms. Based on observations of 325 actual criminal trials from 55 District People's Courts in J province, this study provides an opportunity to understand the mundane work performed by Chinese criminal defense attorneys. In particular, this study describes how criminal defense attorneys prepare and present their cases (as measured in terms of bail request, overall trial preparation, examination of defendants and witnesses, presentation of evidence, and overall defense strategy), and analyzes the outcomes of their performance. In addition, this study examines the discernible impact of criminal defense work due to types of legal representation utilized (legal aid vs. privately retained attorneys), numbers of attorneys representing the client, and the gender composition of the attorneys. © The Author(s) 2013.

  11. Understanding Iran

    Science.gov (United States)

    2009-01-01

    array of subsidiary companies that have penetrated virtually every sector of the Iranian market—from construction and real estate to laser eye surgery ...construction, technology, and defense sectors of the economy. From laser eye surgery , to cell phone technology, to the illicit import of luxury goods through...openness, cultural renaissance , and more interaction with the outside world. Mem- bers of this cluster were inspired by such Iranian thinkers as Ali

  12. European defense industrial policy and the United Kingdom's defense industrial base

    OpenAIRE

    Keith Hartley

    2008-01-01

    This article addresses the relationship between European and U.K. defense industrial policy. It considers recent initiatives to create a European Defense Equipment Market and the U.K.’s Defense Industrial Strategy. The European and U.K. defense industries are evaluated and some of the future policy choices are assessed. The future defense firm will be different and there will be conflicts between efforts to open up national defense markets and the desire to maintain national defense industrie...

  13. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  14. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  15. Defense Security Assistance Management System

    National Research Council Canada - National Science Library

    1998-01-01

    ... $10 billion Foreign Military Sales Program. As envisioned, it will replace 13 automated information systems used by the Military Departments and Defense Security Assistance Agency and will provide standardized and improved security assistance...

  16. The MAP kinase substrate MKS1 is a regulator of plant defense responses

    DEFF Research Database (Denmark)

    Andreasson, E.; Jenkins, T.; Brodersen, P.

    2005-01-01

    Arabidopsis MAP kinase 4 (MPK4) functions as a regulator of pathogen defense responses, because it is required for both repression of salicylic acid (SA)-dependent resistance and for activation of jasmonate (JA)-dependent defense gene expression. To understand MPK4 signaling mechanisms, we used...

  17. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  18. Defense economics: Achievements and challenges

    OpenAIRE

    Keith Hartley

    2007-01-01

    Defense economics is now an established part of economics. This article reviews its achievements as represented by papers published in the research journal Defense and Peace Economics. The range of topics in the journal is reviewed, especially since 2000, and major gaps in coverage are identified. A changing research agenda reflects new developments such as terrorism and international peacekeeping. Gaps remain such as the need for good quality case studies of conflict (e.g., Iraq) and of majo...

  19. Antimicrobial defense of the earthworm

    Czech Academy of Sciences Publication Activity Database

    Bilej, Martin; De Baetselier, P.; Beschin, A.

    2000-01-01

    Roč. 45, č. 4 (2000), s. 283-300 ISSN 0015-5632 R&D Projects: GA ČR GA310/99/1385; GA ČR GA310/00/1372 Institutional research plan: CEZ:AV0Z5020903 Keywords : cellular defense mechanisms * humoral defense mechanisms Subject RIV: EE - Microbiology, Virology Impact factor: 0.752, year: 2000

  20. A Hierarchal System of Defense Mechanisms.

    Science.gov (United States)

    Lee, Gerald

    1979-01-01

    Constructs a hierarchy of defense mechanisms through the addition of the concepts of secondary and tertiary defenses to the already existing psychoanalytic defenses and increases the explanatory power of the concept of defense. Research generated from this theoretical model is presented. (Author/BEF)

  1. Humanizing the Dissertation Defense: One Woman of Color's Experience

    Science.gov (United States)

    Nixon-Cobb, Elisha J.

    2005-01-01

    This essay reflects the author's understanding of the doctoral experience, including the candidacy or qualifying exam, the role of the advisor, and the dissertation defense. In theory this process is the same for all students, but in practice the process may vary from department to department and university to university. She also includes a few…

  2. Communicating with homeowners in the interface about defensible space

    Science.gov (United States)

    Martha C. Monroe; Michelle Payton

    2006-01-01

    Although resource managers encourage residents to create defensible space, many report that homeowners still live in risky landscapes. This study explores the perceptions and attitudes of Minnesota and Florida interface homeowners toward their local landscape. By using in-depth interviews, we gained a better understanding of landscape values, preferences, and...

  3. Failure of respiratory defenses in the pathogenesis of bacterial pneumonia of cattle.

    Science.gov (United States)

    Caswell, J L

    2014-03-01

    The respiratory system is well defended against inhaled bacteria by a dynamic system of interacting layers, including mucociliary clearance, host defense factors including antimicrobial peptides in the epithelial lining fluid, proinflammatory responses of the respiratory epithelium, resident alveolar macrophages, and recruited neutrophils and monocytes. Nevertheless, these manifold defenses are susceptible to failure as a result of stress, glucocorticoids, viral infections, abrupt exposure to cold air, and poor air quality. When some of these defenses fail, the lung can be colonized by bacterial pathogens that are equipped to evade the remaining defenses, resulting in the development of pneumonia. This review considers the mechanisms by which these predisposing factors compromise the defenses of the lung, with a focus on the development of bacterial pneumonia in cattle and supplemented with advances based on mouse models and the study of human disease. Deepening our understanding of how the respiratory defenses fail is expected to lead to interventions that restore these dynamic immune responses and prevent disease.

  4. [Defense mechanisms and perceived adverse effects in a population of 70 HIV infected adults].

    Science.gov (United States)

    Gouvernet, B; Combaluzier, S; Viaux, J-L

    2011-02-01

    We assessed the relations between defense mechanisms and perceived adverse effects of ART in a population of 70 HIV positive patients. The Bond Defense Style questionnaire was used to evaluate defense mechanisms. We used Justice's questionnaire to assess adverse effects and their psychological impact. We carried out multiple regression and mediation analyses to define the relations between the number of adverse effects, defensive styles, and the impact of adverse effects. The global model accounts for nearly 40 % of the score variance. Mature and immature defense styles bring significant contribution to understanding the impact of adverse effects, even when their number is controlled. Working on defense mechanisms should lower the psychological impact of adverse effects, therefore, improving the patient's quality of life and compliance. Copyright © 2010 Elsevier Masson SAS. All rights reserved.

  5. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  6. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  7. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  8. Quadrennial Defense Review 2014

    Science.gov (United States)

    2014-01-01

    and the world at large. As greenhouse gas emissions increase, sea levels are rising, average global temperatures are increasing, and severe weather...as India and Indonesia , are taking on additional leadership roles to foster increased communication and shared understanding. As many Asia...commerce globally. Shale gas discoveries and new technologies allowing access to hydrocarbon deposits appear likely to enable the United States to

  9. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  10. Understanding Carbohydrates

    Science.gov (United States)

    ... Size: A A A Listen En Español Understanding Carbohydrates How much and what type of carbohydrate foods ... glucose levels in your target range. Explore: Understanding Carbohydrates Glycemic Index and Diabetes Learn about the glycemic ...

  11. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  12. Eliciting maize defense pathways aboveground attracts belowground biocontrol agents

    Science.gov (United States)

    Filgueiras, Camila Cramer; Willett, Denis S.; Pereira, Ramom Vasconcelos; Moino Junior, Alcides; Pareja, Martin; Duncan, Larry W.

    2016-01-01

    Plant defense pathways mediate multitrophic interactions above and belowground. Understanding the effects of these pathways on pests and natural enemies above and belowground holds great potential for designing effective control strategies. Here we investigate the effects of aboveground stimulation of plant defense pathways on the interactions between corn, the aboveground herbivore adult Diabrotica speciosa, the belowground herbivore larval D. speciosa, and the subterranean ento-mopathogenic nematode natural enemy Heterorhabditis amazonensis. We show that adult D. speciosa recruit to aboveground herbivory and methyl salicylate treatment, that larval D. speciosa are relatively indiscriminate, and that H. amazonensis en-tomopathogenic nematodes recruit to corn fed upon by adult D. speciosa. These results suggest that entomopathogenicnematodes belowground can be highly attuned to changes in the aboveground parts of plants and that biological control can be enhanced with induced plant defense in this and similar systems. PMID:27811992

  13. Plants versus fungi and oomycetes: pathogenesis, defense and counter-defense in the proteomics era.

    Science.gov (United States)

    El Hadrami, Abdelbasset; El-Bebany, Ahmed F; Yao, Zhen; Adam, Lorne R; El Hadrami, Ismailx; Daayf, Fouad

    2012-01-01

    Plant-fungi and plant-oomycete interactions have been studied at the proteomic level for many decades. However, it is only in the last few years, with the development of new approaches, combined with bioinformatics data mining tools, gel staining, and analytical instruments, such as 2D-PAGE/nanoflow-LC-MS/MS, that proteomic approaches thrived. They allow screening and analysis, at the sub-cellular level, of peptides and proteins resulting from plants, pathogens, and their interactions. They also highlight post-translational modifications to proteins, e.g., glycosylation, phosphorylation or cleavage. However, many challenges are encountered during in planta studies aimed at stressing details of host defenses and fungal and oomycete pathogenicity determinants during interactions. Dissecting the mechanisms of such host-pathogen systems, including pathogen counter-defenses, will ensure a step ahead towards understanding current outcomes of interactions from a co-evolutionary point of view, and eventually move a step forward in building more durable strategies for management of diseases caused by fungi and oomycetes. Unraveling intricacies of more complex proteomic interactions that involve additional microbes, i.e., PGPRs and symbiotic fungi, which strengthen plant defenses will generate valuable information on how pathosystems actually function in nature, and thereby provide clues to solving disease problems that engender major losses in crops every year.

  14. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  15. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  16. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... induced oxidative damage which result in the decrease of calli decay, and this implies that antioxidant defense response may be ... fungal diseases occurring in pear plants and fruits. Periodic application of .... Changes in SOD activity and isozyme in pear calli infected with MFH and BBP. Lanes 1-10: After ...

  17. In Defense of Shame

    DEFF Research Database (Denmark)

    Deonna, Julien; Rodogno, Raffaele; Teroni, Fabrice

    Is shame social? Is it superficial? Is it a morally problematic emotion? Researchers in disciplines as different as psychology, philosophy, and anthropology have thought so. But what is the nature of shame and why are claims regarding its social nature and moral standing interesting and important...... of the evidence and arguments that are taken to support what they call the two dogmas about shame: its alleged social nature and its morally dubious character. Their analysis is conducted against the backdrop of a novel account of shame and ultimately leads to the rejection of these two dogmas.  On this account......, thus shedding light on many aspects of this complex emotion and allowing for a sophisticated understanding of its moral significance....

  18. An evolutionarily young defense metabolite influences the root growth of plants via the ancient TOR signaling pathway.

    Science.gov (United States)

    Malinovsky, Frederikke Gro; Thomsen, Marie-Louise F; Nintemann, Sebastian J; Jagd, Lea Møller; Bourgine, Baptiste; Burow, Meike; Kliebenstein, Daniel J

    2017-12-12

    To optimize fitness a plant should monitor its metabolism to appropriately control growth and defense. Primary metabolism can be measured by the universally conserved TOR (Target of Rapamycin) pathway to balance growth and development with the available energy and nutrients. Recent work suggests that plants may measure defense metabolites to potentially provide a strategy ensuring fast reallocation of resources to coordinate plant growth and defense. There is little understanding of mechanisms enabling defense metabolite signaling. To identify mechanisms of defense metabolite signaling, we used glucosinolates, an important class of plant defense metabolites. We report novel signaling properties specific to one distinct glucosinolate, 3-hydroxypropylglucosinolate across plants and fungi. This defense metabolite, or derived compounds, reversibly inhibits root growth and development. 3-hydroxypropylglucosinolate signaling functions via genes in the ancient TOR pathway. If this event is not unique, this raises the possibility that other evolutionarily new plant metabolites may link to ancient signaling pathways.

  19. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  20. Plant defense against herbivorous pests: exploiting resistance and tolerance traits for sustainable crop protection

    Directory of Open Access Journals (Sweden)

    Carolyn Mitchell

    2016-07-01

    Full Text Available Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  1. Developing a Comprehensive and Integrated Vulnerability Assessment Methodology for the Defense Department's Critical Infrastructure Protection (CIP) Program. A Report Supporting CIP Program Outread and Education

    National Research Council Canada - National Science Library

    2003-01-01

    ...) strategy for Outreach, Education, and Training. It seeks to help those interested in understanding the Defense Department's current concepts and plans for developing CIP-specific vulnerability assessments...

  2. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    Science.gov (United States)

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  3. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  4. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  5. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  6. The Full Costs of Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Arrow, Kenneth

    2003-01-01

    ... and, therefore, are expensive. The Bush administration's interest in building a comprehensive, or "layered," missile defense system could lead to extraordinary defense budget costs over the next twenty to thirty years...

  7. Defense Acquisition Transformation Report to Congress

    National Research Council Canada - National Science Library

    Krieg, Kenneth J

    2007-01-01

    ... Transformation initiatives and the goals that it has established to achieve change. It provides implementation plans to reform the Defense Acquisition System in the Department of Defense to keep pace with changing demands and adapt to new challenges...

  8. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  9. Defense and Veterans Brain Injury Center

    Science.gov (United States)

    ... content Search form Search Basket Contact Us DVBIC Defense and Veterans Brain Injury Center About DVBIC Leadership ... link is external) Read more DCoE news articles » Defense and Veterans Brain Injury Center Crisis Intervention (24/ ...

  10. Climate Change and Defense against Pathogens in Plants.

    Science.gov (United States)

    Newton, Adrian C; Torrance, Lesley; Holden, Nicola; Toth, Ian K; Cooke, David E L; Blok, Vivian; Gilroy, Eleanor M

    2012-01-01

    Most reviews of climate change are epidemiological, focusing on impact assessment and risk mapping. However, there are many reports of the effects of environmental stress factors on defense mechanisms in plants against pathogens. We review those representative of key climate change-related stresses to determine whether there are any patterns or trends in adaptation responses. We recognize the complexity of climate change itself and the multitrophic nature of the complex biological interactions of plants, microbes, soil, and the environment and, therefore, the difficulty of reductionist dissection approaches to resolving the problems. We review host defense genes, germplasm, and environmental interactions in different types of organisms but find no significant group-specific trends. Similarly, we review by host defense mechanism type and by host-pathogen trophic relationship but identify no dominating mechanism for stress response. However, we do identify core stress response mechanisms playing key roles in multiple response pathways whether to biotic or abiotic stress. We suggest that these should be central to mechanistic climate change plant defense research. We also recognize biodiversity, heterogeneity, and the need for understanding stress in a true systems biology approach as being essential components of progressing our understanding of and response to climate change. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. Impact of Childhood Malnutrition on Host Defense and Infection.

    Science.gov (United States)

    Ibrahim, Marwa K; Zambruni, Mara; Melby, Christopher L; Melby, Peter C

    2017-10-01

    The global impact of childhood malnutrition is staggering. The synergism between malnutrition and infection contributes substantially to childhood morbidity and mortality. Anthropometric indicators of malnutrition are associated with the increased risk and severity of infections caused by many pathogens, including viruses, bacteria, protozoa, and helminths. Since childhood malnutrition commonly involves the inadequate intake of protein and calories, with superimposed micronutrient deficiencies, the causal factors involved in impaired host defense are usually not defined. This review focuses on literature related to impaired host defense and the risk of infection in primary childhood malnutrition. Particular attention is given to longitudinal and prospective cohort human studies and studies of experimental animal models that address causal, mechanistic relationships between malnutrition and host defense. Protein and micronutrient deficiencies impact the hematopoietic and lymphoid organs and compromise both innate and adaptive immune functions. Malnutrition-related changes in intestinal microbiota contribute to growth faltering and dysregulated inflammation and immune function. Although substantial progress has been made in understanding the malnutrition-infection synergism, critical gaps in our understanding remain. We highlight the need for mechanistic studies that can lead to targeted interventions to improve host defense and reduce the morbidity and mortality of infectious diseases in this vulnerable population. Copyright © 2017 American Society for Microbiology.

  12. Intrinsic Defense Mechanisms of the Intestinal Epithelium.

    Science.gov (United States)

    Ramanan, Deepshika; Cadwell, Ken

    2016-04-13

    The intestinal epithelium is a single cell layer that facilitates the absorption of nutrients but also provides a tight barrier to prevent pathogen invasion and dissemination of commensal microbes. Specialized epithelial cells of the gastrointestinal tract achieve this frontline defense by working in concert with lymphoid, myeloid, and stromal cells to secrete an array of factors that limit direct contact between the epithelium and infectious agents. The importance of these mechanisms is underscored by the ability of enteric pathogens to target these mechanisms to achieve invasion and dissemination. This review highlights recent advances in our understanding of these intricate molecular and cellular mechanisms adopted by these cells to promote spatial segregation and barrier maintenance. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  14. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  15. Psychological defense mechanisms and electroencephalographic arousal

    NARCIS (Netherlands)

    Eriksen, H. R.; Olff, M.; Mann, C.; Sterman, M. B.; Ursin, H.

    1996-01-01

    The aim of this study was to examine the relationship between psychological defense as measured by the Kragh tachistoscopic Defense Mechanisms Test (DMT), and general arousal properties of the individual as measured with electroencephalogram (EEG). The DMT assesses defense by presenting neutral and

  16. Understanding classification

    NARCIS (Netherlands)

    Subianto, M.

    2009-01-01

    In practical data analysis, the understandability of models plays an important role in their acceptance. In the data mining literature, however, understandability plays is hardly ever mentioned. If it is mentioned, it is interpreted as meaning that the models have to be simple. In this thesis we

  17. Strategy for Homeland Defense and Defense Support of Civil Authorities

    Science.gov (United States)

    2013-02-01

    1 As defined by “Sustaining U.S. Global Leadership : Priorities for the 21st Century Defense,” January...and nuclear (CBRN) consequence management response forces in recognition of the proliferation of destructive technologies and the potent ideologies...the wake of Hurricane Katrina. Although DoD is always in a support role to civilian authorities (primarily the Federal Emergency Management Agency, or

  18. Embodied understanding.

    Science.gov (United States)

    Johnson, Mark

    2015-01-01

    Western culture has inherited a view of understanding as an intellectual cognitive operation of grasping of concepts and their relations. However, cognitive science research has shown that this received intellectualist conception is substantially out of touch with how humans actually make and experience meaning. The view emerging from the mind sciences recognizes that understanding is profoundly embodied, insofar as our conceptualization and reasoning recruit sensory, motor, and affective patterns and processes to structure our understanding of, and engagement with, our world. A psychologically realistic account of understanding must begin with the patterns of ongoing interaction between an organism and its physical and cultural environments and must include both our emotional responses to changes in our body and environment, and also the actions by which we continuously transform our experience. Consequently, embodied understanding is not merely a conceptual/propositional activity of thought, but rather constitutes our most basic way of being in, and engaging with, our surroundings in a deep visceral manner.

  19. Quantitative and qualitative shifts in defensive metabolites define chemical defense investment during leaf development in Inga, a genus of tropical trees.

    Science.gov (United States)

    Wiggins, Natasha L; Forrister, Dale L; Endara, María-José; Coley, Phyllis D; Kursar, Thomas A

    2016-01-01

    Selective pressures imposed by herbivores are often positively correlated with investments that plants make in defense. Research based on the framework of an evolutionary arms race has improved our understanding of why the amount and types of defenses differ between plant species. However, plant species are exposed to different selective pressures during the life of a leaf, such that expanding leaves suffer more damage from herbivores and pathogens than mature leaves. We hypothesize that this differential selective pressure may result in contrasting quantitative and qualitative defense investment in plants exposed to natural selective pressures in the field. To characterize shifts in chemical defenses, we chose six species of Inga, a speciose Neotropical tree genus. Focal species represent diverse chemical, morphological, and developmental defense traits and were collected from a single site in the Amazonian rainforest. Chemical defenses were measured gravimetrically and by characterizing the metabolome of expanding and mature leaves. Quantitative investment in phenolics plus saponins, the major classes of chemical defenses identified in Inga, was greater for expanding than mature leaves (46% and 24% of dry weight, respectively). This supports the theory that, because expanding leaves are under greater selective pressure from herbivores, they rely more upon chemical defense as an antiherbivore strategy than do mature leaves. Qualitatively, mature and expanding leaves were distinct and mature leaves contained more total and unique metabolites. Intraspecific variation was greater for mature leaves than expanding leaves, suggesting that leaf development is canalized. This study provides a snapshot of chemical defense investment in a speciose genus of tropical trees during the short, few-week period of leaf development. Exploring the metabolome through quantitative and qualitative profiling enables a more comprehensive examination of foliar chemical defense investment.

  20. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  1. The MAP kinase substrate MKS1 is a regulator of plant defense responses

    DEFF Research Database (Denmark)

    Andreasson, E.; Jenkins, T.; Brodersen, P.

    2005-01-01

    Arabidopsis MAP kinase 4 (MPK4) functions as a regulator of pathogen defense responses, because it is required for both repression of salicylic acid (SA)-dependent resistance and for activation of jasmonate (JA)-dependent defense gene expression. To understand MPK4 signaling mechanisms, we used......-dependent resistance, but does not interfere with induction of a defense gene by JA. Further yeast two-hybrid screening revealed that MKS1 interacts with the WRKY transcription factors WRKY25 and WRKY33. WRKY25 and WRKY33 were shown to be in vitro substrates of MPK4, and a wrky33 knockout mutant was found to exhibit...... increased expression of the SA-related defense gene PR1. MKS1 may therefore contribute to MPK4-regulated defense activation by coupling the kinase to specific WRKY transcription factors....

  2. Issues in national missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any of them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.

  3. Department of Defense Software Factbook

    Science.gov (United States)

    2017-07-07

    auto-generated code (created from a tool and used without change) Each of these sources requires a different amount of work effort to...for verification purposes. This tool successfully extracts the information from the standard Excel form for 2630-2 (initial) and 2630-3 (final...University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002

  4. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  5. Understanding semantics

    DEFF Research Database (Denmark)

    Thrane, Torben

    1997-01-01

    Understanding natural language is a cognitive, information-driven process. Discussing some of the consequences of this fact, the paper offers a novel look at the semantic effect of lexical nouns and the identification of reference types....

  6. Understanding Alzheimer's

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Understanding Alzheimer's Past Issues / Fall 2007 Table of Contents For ... and brain scans. No treatment so far stops Alzheimer's. However, for some in the disease's early and ...

  7. Understanding homelessness

    OpenAIRE

    Somerville, Peter

    2013-01-01

    This paper reviews the literature on understanding homelessness. It criticizes approaches that ignore, distort or diminish the humanity of homeless people, or else, add little to our understanding of that humanity. In particular, it rejects what it calls “epidemiological” approaches, which deny the possibility of agency for homeless people, insofar as those approaches view the situation of those people largely as a “social fact”, to be explained in terms of causal variables or “risk factors” ...

  8. 32 CFR 28.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority...

  9. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  10. The Venturia Apple Pathosystem: Pathogenicity Mechanisms and Plant Defense Responses

    Directory of Open Access Journals (Sweden)

    Gopaljee Jha

    2009-01-01

    Full Text Available Venturia inaequalis is the causal agent of apple scab, a devastating disease of apple. We outline several unique features of this pathogen which are useful for molecular genetics studies intended to understand plant-pathogen interactions. The pathogenicity mechanisms of the pathogen and overview of apple defense responses, monogenic and polygenic resistance, and their utilization in scab resistance breeding programs are also reviewed.

  11. Neural substrates of defensive reactivity in two subtypes of specific phobia.

    Science.gov (United States)

    Lueken, Ulrike; Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-11-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5-10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  12. Growth–Defense Tradeoffs in Plants: A Balancing Act to Optimize Fitness

    Science.gov (United States)

    Huot, Bethany; Yao, Jian; Montgomery, Beronda L.; He, Sheng Yang

    2014-01-01

    Growth–defense tradeoffs are thought to occur in plants due to resource restrictions, which demand prioritization towards either growth or defense, depending on external and internal factors. These tradeoffs have profound implications in agriculture and natural ecosystems, as both processes are vital for plant survival, reproduction, and, ultimately, plant fitness. While many of the molecular mechanisms underlying growth and defense tradeoffs remain to be elucidated, hormone crosstalk has emerged as a major player in regulating tradeoffs needed to achieve a balance. In this review, we cover recent advances in understanding growth–defense tradeoffs in plants as well as what is known regarding the underlying molecular mechanisms. Specifically, we address evidence supporting the growth–defense tradeoff concept, as well as known interactions between defense signaling and growth signaling. Understanding the molecular basis of these tradeoffs in plants should provide a foundation for the development of breeding strategies that optimize the growth–defense balance to maximize crop yield to meet rising global food and biofuel demands. PMID:24777989

  13. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  14. Understanding Maple

    CERN Document Server

    Thompson, Ian

    2016-01-01

    Maple is a powerful symbolic computation system that is widely used in universities around the world. This short introduction gives readers an insight into the rules that control how the system works, and how to understand, fix, and avoid common problems. Topics covered include algebra, calculus, linear algebra, graphics, programming, and procedures. Each chapter contains numerous illustrative examples, using mathematics that does not extend beyond first-year undergraduate material. Maple worksheets containing these examples are available for download from the author's personal website. The book is suitable for new users, but where advanced topics are central to understanding Maple they are tackled head-on. Many concepts which are absent from introductory books and manuals are described in detail. With this book, students, teachers and researchers will gain a solid understanding of Maple and how to use it to solve complex mathematical problems in a simple and efficient way.

  15. Defense Infrastructure: Department of Defense Renewable Energy Initiatives

    Science.gov (United States)

    2010-04-26

    to this report include Harold Reich, Assistant Director; Stacy Bennett; Sharon Reid; Rebecca Rygg; Christopher Turner; and Michael Willems...Photovoltaic Fully Operational 2010 No 2009 1 $37.54 $37.54 Appropriated 183 Dept Navy Naval Base San Diego CA 200 kW PV Carport, McCandless Blvd Sub...Notes from the Department of Defense 183 Dept Navy Naval Base San Diego CA 200 kW PV Carport, McCandless Blvd Sub-Station Parking Lot 0.00 0.00

  16. Understanding physics

    CERN Document Server

    Mansfield, Michael

    2011-01-01

    Understanding Physics - Second edition is a comprehensive, yet compact, introductory physics textbook aimed at physics undergraduates and also at engineers and other scientists taking a general physics course. Written with today's students in mind, this text covers the core material required by an introductory course in a clear and refreshing way. A second colour is used throughout to enhance learning and understanding. Each topic is introduced from first principles so that the text is suitable for students without a prior background in physics. At the same time the book is designed to enable

  17. Oxylipins in moss development and defense

    Directory of Open Access Journals (Sweden)

    Inés ePonce De León

    2015-07-01

    Full Text Available Oxylipins are oxygenated fatty acids that participate in plant development and defense against pathogen infection, insects and wounding. Initial oxygenation of substrate fatty acids is mainly catalyzed by lipoxygenases and alpha-dioxygenases but can also take place non-enzymatically by autoxidation or singlet oxygen-dependent reactions. The resulting hydroperoxides are further metabolized by secondary enzymes to produce a large variety of compounds, including the hormone jasmonic acid and short-chain green leaf volatiles. In flowering plants, which lack arachidonic acid, oxylipins are produced mainly from oxidation of polyunsaturated C18 fatty acids, notably linolenic and linoleic acids. Algae and mosses in addition possess polyunsaturated C20 fatty acids including arachidonic and eicosapentaenoic acids, which can also be oxidized by lipoxygenases and transformed into bioactive compounds. Mosses are phylogenetically placed between unicellular green algae and flowering plants, allowing evolutionary studies of the different oxylipin pathways. During the last years the moss Physcomitrella patens has become an attractive model plant for understanding oxylipin biosynthesis and diversity. In addition to the advantageous evolutionary position, functional studies of the different oxylipin-forming enzymes can be performed in this moss by targeted gene disruption or single point mutations by means of homologous recombination. Biochemical characterization of several oxylipin-producing enzymes and oxylipin profiling in P. patens reveal the presence of a wider range of oxylipins compared to flowering plants, including C18 as well as C20-derived oxylipins. Surprisingly, one of the most active oxylipins in plants, jasmonic acid, is not synthesized in this moss. In this review we present an overview of oxylipins produced in mosses and discuss the current knowledge related to the involvement of oxylipin-producing enzymes and their products in moss development

  18. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  19. Understanding Energy

    Science.gov (United States)

    Menon, Deepika; Shelby, Blake; Mattingly, Christine

    2016-01-01

    "Energy" is a term often used in everyday language. Even young children associate energy with the food they eat, feeling tired after playing soccer, or when asked to turn the lights off to save light energy. However, they may not have the scientific conceptual understanding of energy at this age. Teaching energy and matter could be…

  20. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  1. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  2. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    improving management in the defense, especially in its logistics, through greater synergy in action, with the least consumption of resources while maintaining or even expanding the system capability („Smart defense” concept, „Pool and share” concept, organizational changes in the field of logistics - the set up Joint Logistic Support Groups, etc.. Understanding and implementing these reforms require a special attitude towards the environment and circumstances in which management decisions are made. Logistical and „nonlogistical” management in the defense needs a broader approach to problems, which will provide them consideration of all the consequences that their decisions can have, not only in the defense, but to all stakeholders, especially end-users of services of the defense system - a society or citizens (civilians and citizens in uniform. Management in the defense system often focuses only on one aspect of the final desired state while ignoring its other aspects or impacts on the wider system, the social environment or the state. In fact, it often tends to minimize the costs of defense, regardless of the implications that arise in the field of defense capabilities and levels of security, particularly „in the long run”. Some of the basic principles of good governance in the defense logistics would be: legality, transparency, responsibility, discipline, cooperation and partnership, continuous improvement and others. As a part of planned and organized work to improve management in defense logistics (analogy applies to the defense system as a whole, special attention should be focused on creating a concept that promotes proper selection, choice, education, training, motivation and development of managers among the most competent, the most educated and the most experienced personnel.   Conclusion   Changes in governance in the public sector, more or less, affect all its segments. Given that the budget allocation for defense is rather high and the defense

  3. Understanding translation

    DEFF Research Database (Denmark)

    Schjoldager, Anne Gram; Gottlieb, Henrik; Klitgård, Ida

    Understanding Translation is designed as a textbook for courses on the theory and practice of translation in general and of particular types of translation - such as interpreting, screen translation and literary translation. The aim of the book is to help you gain an in-depth understanding...... of the phenomenon of translation and to provide you with a conceptual framework for the analysis of various aspects of professional translation. Intended readers are students of translation and languages, but the book will also be relevant for others who are interested in the theory and practice of translation...... - translators, language teachers, translation users and literary, TV and film critics, for instance. Discussions focus on translation between Danish and English....

  4. Understanding Resilience

    Directory of Open Access Journals (Sweden)

    Gang eWu

    2013-02-01

    Full Text Available Resilience is the ability to adapt successfully in the face of stress and adversity. Stressful life events, trauma and chronic adversity can have a substantial impact on brain function and structure, and can result in the development of PTSD, depression and other psychiatric disorders. However, most individuals do not develop such illnesses after experiencing stressful life events, and are thus thought to be resilient. Resilience as successful adaptation relies on effective responses to environmental challenges and ultimate resistance to the deleterious effects of stress, therefore a greater understanding of the factors that promote such effects is of great relevance. This review focuses on recent findings regarding genetic, epigenetic, developmental, psychosocial and neurochemical factors that are considered essential contributors to the development of resilience. Neural circuits and pathways involved in mediating resilience are also discussed. The growing understanding of resilience factors will hopefully lead to the development of new pharmacological and psychological interventions for enhancing resilience and mitigating the untoward consequences.

  5. Understand electronics

    CERN Document Server

    Bishop, Owen

    2013-01-01

    Understand Electronics provides a readable introduction to the exciting world of electronics for the student or enthusiast with little previous knowledge. The subject is treated with the minimum of mathematics and the book is extensively illustrated.This is an essential guide for the newcomer to electronics, and replaces the author's best-selling Beginner's Guide to Electronics.The step-by-step approach makes this book ideal for introductory courses such as the Intermediate GNVQ.

  6. Understanding users

    DEFF Research Database (Denmark)

    Johannsen, Carl Gustav Viggo

    2014-01-01

    Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself....

  7. Understanding unemployment

    OpenAIRE

    Guillaume Rocheteau

    2006-01-01

    Modern economists have built models of the labor market, which isolate the market’s key drivers and describe the way these interact to produce particular levels of unemployment. One of the most popular models used by macroeconomists today is the search-matching model of equilibrium unemployment. We explain this model, and show how it can be applied to understand the way various policies, such as unemployment benefits, taxes, or technological changes, can affect the unemployment rate.

  8. MX Survivability: Passive and Active Defense.

    Science.gov (United States)

    1982-03-01

    0 u80 Acoess ion For % ZqTIS GRA&I DTIC TAB Unannounced 0 Justification- AFIT/GST/OS/82M-11 Byl~ pDistribution / Availability Codes ’, Avail and/or...12 Exoatmospheric Defense Subsystem -------------- 14 Endoatmospheric Defense Subsystem ------------- 16 System Variables...Attack Probability of Kill for Endoatmospheric Defense Model (One TDU) -------------------------------- 101 APPENDIX G: Computer Model Listing and Q

  9. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  10. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  11. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  12. The ecology and evolution of inducible defenses.

    Science.gov (United States)

    Harvell, C D

    1990-09-01

    Inducible defenses are responses activated through a previous encounter with a consumer or competitor that confer some degree of resistance to subsequent attacks. While the importance of inducible resistance has long been known in host-parasite interactions, it is only recently that its importance has emerged in other natural systems. Although the structural defenses produced by invertebrates to their competitors and predators are by no means the same as an immune response triggered by parasites, these responses all share the properties of (1) specificity, (2) amplification and (3) memory. This review discusses the following ecological consequences and evolutionary causes of inducible defenses: (1) Inducible defenses render historical factors important in biological interactions and can affect the probability of individual survival and growth, as well as affect population dynamics of consumers in some circumstances. (2) Although the benefits of inducible defenses are often balanced by fitness costs, including reduced growth, reproductive output and survivorship, the role of costs and benefits in the evolution of inducible defenses is by no means clear. A more integrated approach would involve a multivariate analysis of the role of natural selection on the inducible characters of interest, their norms of reaction and correlated fitness characters. (3) The disproportionate representation of inducible, morphological defenses among clonal organisms may be due to both a higher rate of origination and enhanced selection to maintain these defenses in clonal taxa. (4) Inducible defenses should be most common when reliable cues are available, attacks by biological agents are unpredictable, and the fitness gains of defenses are balanced by the costs. An integrated approach to studying inducible defenses would thus combine mechanistic estimates of costs, population-level estimates of defense effectiveness, and genetic estimates of correlations between fitness and inducible

  13. Understanding Technology?

    Directory of Open Access Journals (Sweden)

    Erik Bendtsen

    2016-11-01

    Full Text Available We are facing radical changes in our ways of living in the nearest future. Not necessarily of our own choice, but because tchnological development is moving so fast, that it will have still greater impact on many aspects of our lives. We have seen the beginnings of that change within the latest 35 years or so, but according to newest research that change will speed up immensely in the nearest years to come. The impact of that change or these changes will affect our working life immensely as a consequence of automation. How these changes are brought about and which are their consequences in a broad sense is being attempted to be understood and guessed by researchers. No one knows for sure, but specific patterns are visible. This paper will not try to guess, what will come, but will rather try to understand the deepest ”nature” of technology in order to understand the driving factors in this development: the genesis of technology in a broad sense in order to contibute to the understanding of the basis for the expected development.

  14. Defense Procurement Strategy for a Globalized Industry

    National Research Council Canada - National Science Library

    McLean, Mark A

    2005-01-01

    .... This paper presents an examination of the strategic issues raised by defense industrial base policy and recommends an overarching strategy that promotes the benefits of globalization while safe...

  15. Adaptive defense mechanisms: function and transcendence.

    Science.gov (United States)

    Metzger, Jesse A

    2014-05-01

    This article reviews the high-adaptive (mature) defense mechanisms, along with case material illustrating each. These defenses are described in terms of not only the specific means by which they serve to ward off anxiety and manage conflict, but also how they often transcend their role as defenses by contributing to the creation of new "products" of value, such as new meanings, perspectives, modes of relating, and works of art or science. This report also discusses the implications of the use of adaptive defenses, especially humor, in the context of psychotherapy. © 2014 Wiley Periodicals, Inc.

  16. Defense styles in Intermittent Explosive Disorder.

    Science.gov (United States)

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  18. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  19. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  20. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1999-01-01

    In the post-Cold War period, interest in having the International Atomic Energy Agency (IAEA) use its expertise in support of the arms control and disarmament process has grown. Various pledges by the U.S. and Russian presidents to place former defense materials under some type of international monitoring raises the prospect of using IAEA safeguards concepts and approaches for monitoring these materials, which may include both classified and unclassified materials. Clearly, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA monitoring is the conflict between traditional IAEA materials accounting procedures and various national and international constraints, including U.S. classification laws, and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Possible 'verification' approaches to classified former defense materials could be based on item accountancy, 'attributes measurements', and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical feasibility or for their possible acceptability in an inspection regime. Substantial work remains in these areas. This paper examines some of the challenges presented by international inspections of classified materials. (author)

  1. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  2. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  3. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  4. Financial Reporting for Other Defense Organizations at the Defense Agency Financial Services Accounting Office

    Science.gov (United States)

    2001-02-09

    FINANCIAL REPORTING FOR OTHER DEFENSE ORGANIZATIONS AT THE DEFENSE AGENCY FINANCIAL SERVICES ACCOUNTING OFFICE Report No. D-2001-048...34) 09Feb2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") Title and Subtitle Financial Reporting for Other Defense Organizations at the Defense...Supplementary Notes Abstract This report is the first in this series addressing the underlying financial reporting processes that cause abnormal balances

  5. Understanding uncertainty

    CERN Document Server

    Lindley, Dennis V

    2013-01-01

    Praise for the First Edition ""...a reference for everyone who is interested in knowing and handling uncertainty.""-Journal of Applied Statistics The critically acclaimed First Edition of Understanding Uncertainty provided a study of uncertainty addressed to scholars in all fields, showing that uncertainty could be measured by probability, and that probability obeyed three basic rules that enabled uncertainty to be handled sensibly in everyday life. These ideas were extended to embrace the scientific method and to show how decisions, containing an uncertain element, could be rationally made.

  6. Control of Carbon Assimilation and Partitioning by Jasmonate: An Accounting of Growth–Defense Tradeoffs

    Directory of Open Access Journals (Sweden)

    Nathan E. Havko

    2016-01-01

    Full Text Available Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA, which is a key indicator of leaf construction costs and leaf life span.

  7. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  8. [Relationship between defense mechanism and therapeutic alliance].

    Science.gov (United States)

    Laconi, S; Cailhol, L; Pourcel, L; Thalamas, C; Lapeyre-Mestre, M; Chabrol, H

    2015-10-01

    The therapeutic alliance can be defined as a collaborative relationship between the patient and the practitioner. It represents an essential component of the psychotherapeutic process (Ambresin et al., 2007; Cungi, 2006; Martin et al., 2000). Some authors suggest that a good alliance can have a favorable impact on the therapeutic success (Barber et al., 2000; Hubble, Duncan, & Miller 1999; Horvath & Luborsky, 1993; Horvath & Symonds, 1991). This alliance can be influenced by psychological and behavioral factors (Cungi, 2006) Thus, some defense mechanisms could prevent change or, on the contrary could facilitate adaptation (Ambresin et al., 2007) and have an impact on the therapeutic success (Muris & Merckelbach, 1996). However, the relationship between therapeutic alliance and defense mechanisms represents an insufficiently explored field (Ambresin et al., 2007; Cungi, 2006). The aim of the present study was to examine the relationship between therapeutic alliance and twenty defense mechanisms in a sample of French psychiatric patients, by differentiating results in men and women. We also examined the positive and the negative therapeutic alliance. Sixty patients aged from 18 to 58 (M=41.50; SD=11.03) completed the French versions of the Defense Style Questionnaire-40 (DSQ-40) and the Helping Alliance questionnaire-II (HAq-II). Therapeutic alliance was significantly associated with each defense style: mature (0.62), neurotic (0.45) Pdefense style was a significant predictor of therapeutic alliance (R(2) adj=36, F=12.39, β=0.65, Pdefenses, three neurotic defenses (reaction formation, pseudo-altruism, idealization) and four immature defenses (splitting, denial, somatization, passive aggression). Among men, three mature defenses were associated (anticipation, humor, sublimation), four neurotic (reaction formation, pseudo-altruism, idealization and undoing) and two immature (somatization and denial). The negative therapeutic alliance, in our total sample, was

  9. Understanding analysis

    CERN Document Server

    Abbott, Stephen

    2015-01-01

    This lively introductory text exposes the student to the rewards of a rigorous study of functions of a real variable. In each chapter, informal discussions of questions that give analysis its inherent fascination are followed by precise, but not overly formal, developments of the techniques needed to make sense of them. By focusing on the unifying themes of approximation and the resolution of paradoxes that arise in the transition from the finite to the infinite, the text turns what could be a daunting cascade of definitions and theorems into a coherent and engaging progression of ideas. Acutely aware of the need for rigor, the student is much better prepared to understand what constitutes a proper mathematical proof and how to write one. Fifteen years of classroom experience with the first edition of Understanding Analysis have solidified and refined the central narrative of the second edition. Roughly 150 new exercises join a selection of the best exercises from the first edition, and three more project-sty...

  10. Understanding ayurveda.

    Science.gov (United States)

    Gadgil, Vaidya Dilip

    2010-01-01

    Ayurveda needs to achieve its full potential both in India and globally. This requires imparting to its students full appreciation of Ayurveda's power and strength, particularly proper understanding of the advantages of applying it to treat chronic and acute diseases. To this end, we explain the necessity of learning Sanskrit as a medium of study, and the advantages of learning the Texts in the traditional way, rather than relying on translations with all the loss of meaning and precision, which that entails. We emphasize the use of Triskandhakosha as a means to fully understand Ayurveda fundamental concepts and technical terms, so that all their shades of meaning are fully understood, and all their usages given in different places in the texts. Only by such methods can full appreciation of Ayurvedic wisdom be achieved, and the full depth and power of its knowledge be applied. Only then will its true status among systems of medicine come to be appreciated, either in India or more widely in the world as a whole.

  11. Understanding Ayurveda

    Directory of Open Access Journals (Sweden)

    Vaidya Dilip Gadgil

    2010-01-01

    Full Text Available Ayurveda needs to achieve its full potential both in India and globally. This requires imparting to its students full appreciation of Ayurveda′s power and strength, particularly proper understanding of the advantages of applying it to treat chronic and acute diseases. To this end, we explain the necessity of learning Sanskrit as a medium of study, and the advantages of learning the Texts in the traditional way, rather than relying on translations with all the loss of meaning and precision, which that entails. We emphasize the use of Triskandhakosha as a means to fully understand Ayurveda fundamental concepts and technical terms, so that all their shades of meaning are fully understood, and all their usages given in different places in the texts. Only by such methods can full appreciation of Ayurvedic wisdom be achieved, and the full depth and power of its knowledge be applied. Only then will its true status among systems of medicine come to be appreciated, either in India or more widely in the world as a whole.

  12. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  13. [The clinical relevance of defense mechanisms in inpatients and outpatients].

    Science.gov (United States)

    Mitmansgruber, Horst; Beck, Thomas; Mulser, Hubert; Dahlbender, Reiner W; Schüssler, Gerhard

    2011-01-01

    How clearcut is the clinical significance of mature and immature defense mechanisms in psychological symptoms? Defense mechanisms, symptoms and well-being were assessed in 293 inpatients, 316 outpatients and 157 students. The factors "mature defense" and "immature defense" predict well-being/symptoms to a substantial degree. The assessment of defense mechanism via self-report is clinically useful.

  14. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  15. 32 CFR 150.10 - Request for appellate defense counsel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE COURTS OF CRIMINAL APPEALS RULES OF PRACTICE AND PROCEDURE § 150.10 Request...

  16. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  17. Resolution of growth-defense conflict: mechanistic insights from jasmonate signaling.

    Science.gov (United States)

    Guo, Qiang; Major, Ian T; Howe, Gregg A

    2018-03-16

    Induced plant resistance depends on the production of specialized metabolites that repel attack by biotic aggressors and is often associated with reduced growth of vegetative tissues. Despite progress in understanding the signal transduction networks that control growth-defense tradeoffs, much remains to be learned about how growth rate is coordinated with changes in metabolism during growth-to-defense transitions. Here, we highlight recent advances in jasmonate research to suggest how a major branch of plant immunity is dynamically regulated to calibrate growth-defense balance with shifts in carbon availability. We review evidence that diminished growth, as an integral facet of induced resistance, may optimize the temporal and spatial expression of defense compounds without compromising other critical roles of central metabolism. New insights into the evolution of jasmonate signaling further suggest that opposing selective pressures associated with too much or too little defense may have shaped the emergence of a modular jasmonate pathway that integrates primary and specialized metabolism through the control of repressor-transcription factor complexes. A better understanding of the mechanistic basis of growth-defense balance has important implications for boosting plant productivity, including insights into how these tradeoffs may be uncoupled for agricultural improvement. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Understanding physics

    CERN Document Server

    Cassidy, David; Rutherford, James

    2002-01-01

    Understanding Physics provides a thorough grounding in contemporary physics while placing physics into its social and historical context Based in large part on the highly respected Project Physics Course developed by two of the authors, it also integrates the results of recent pedagogical research The text thus - teaches about the basic phenomena in the physical world and the concepts developed to explain them - shows that science is a rational human endeavor with a long and continuing tradition, involving many different cultures and people - develops facility in critical thinking, reasoned argumentation, evaluation of evidence, mathematical modeling, and ethical values The treatment emphasizes not only what we know but also how we know it, why we believe it, and what effects that knowledge has - Why do we believe the Earth and planets revolve around the Sun? - Why do we believe that matter is made of atoms? - How do relativity theory and quantum mechanics alter our conception of Nature and in what ways do th...

  19. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  20. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  1. 2011 Congressional Report on Defense Business Operations

    Science.gov (United States)

    2011-04-30

    OBMS 9/20/2010 ODAA Business Management System $2.420 PVDAS 9/30/2010 Pharmacovigilance Defense Application System $2.000 TBI/PH - ITI 8/4... Pharmacovigilance Defense Application System $2.000 UITS Universal Immunization Tracking System $0.640 JTDI Joint Technical Data Integration $3.321 MSSM

  2. Teaching Psychological Defenses: An Interactive Computerized Program.

    Science.gov (United States)

    Bibace, Roger; And Others

    1987-01-01

    Describes an interactive computerized teaching program with which students learn to analyze behaviors as examples of psychological defense. Students' satisfaction with the program and their subsequent performance in identifying defense mechanisms indicated that the program was successful in developing analytical skills. (Author/JDH)

  3. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  4. The Defense Mechanisms of Coronary Patients.

    Science.gov (United States)

    Peglar, Marian; Borgen, Fred H.

    1984-01-01

    Tested 73 male inpatients with coronary heart disease on the Defense Mechanisms Inventory, State-Trait Anxiety Inventory, and a perception of health measure. Subjects were followed for five years. Principalization was discovered to be the most successful and projection the least successful defense. (JAC)

  5. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  6. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  7. Improving Defense Health Program Medical Research Processes

    Science.gov (United States)

    2017-08-08

    Board DEFENSE HEALTH BOARD MEMBERS Maj Gen (Ret.) George K. Anderson, MD, MPH DHB Second Vice President Craig H. Blakely , MS, MPH, PhD...SFS Executive Secretary, Defense Health Board (Until August 2016) Sara Higgins, MPH, CSSGB Report Lead/Analyst, Grant Thornton LLP Katharine

  8. The defense of political prisoners in the early ‘70s: professional practice, law and politics

    Directory of Open Access Journals (Sweden)

    Mauricio Chama

    2010-12-01

    Full Text Available The work addresses the relationship between law and politics in the early 70s. More precisely aims to identify and reconstruct the main features that assumes the defense of political prisoners in this period. Rather than a specific work, means that the defense of political prisoners in those years represented a new configuration that was able to articulate a new association of legal professionals, renewed defense strategies, a vast and systematic effort of denunciation, a fluid network of lawyers national and a peculiar rhetoric aimed at the formation of a “new law”. Conceived in these terms, we believe that the defense of political prisoners in the early ‘70s redefined the conventional modes of understanding the relationship between professional practice, law and politics, encouraging the emergence of a new model of counsel in the public sphere.

  9. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  10. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  11. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models......An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  12. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  13. Transforming Department of Defense Financial Management: A Strategy for Change

    National Research Council Canada - National Science Library

    2001-01-01

    At the request of the Secretary of Defense (SECDEF), the Department of Defense (DoD) contracted with the Institute for Defense Analyses to conduct a study to recommend a strategy for financial management improvements within the Department...

  14. Breaking the Nordic Defense Deadlock

    Science.gov (United States)

    2015-02-01

    U.S. understanding of the Finnish dilemma and balancing act was perhaps not deep enough, as U.S. good intentions and acts of support and good will...Finland. Despite its well-deserved reputation for knowing and understanding Russia, Finland did not act as a whistleblower , but kept well in line with

  15. Understanding PISA

    Directory of Open Access Journals (Sweden)

    Stephen DOWNES

    2005-04-01

    Full Text Available Understanding PISA Stephen DOWNESMoncton, CANADA ABSTRACT The headline was dramatic enough to cause a ripple in the reading public. "Students who use computers a lot at school have worse maths and reading performance," noted the BBC news article, citing a 2004 study by Ludger Woessmann and Thomas Fuchs (Fuchs and Woessman, 2004. It was not long before the blogosphere took notice. Taking the theme and running with it, Alice and Bill ask, "Computers Make School Kids Dumber?" They theorize, "If you track the admitted decline of education, you'll probably notice that it follows along with the increase of technology in the classroom." In a similar vein, James Bartholomew asks, "Do you think that the government will turn down the volume of its boasting about how it has spent billions introducing computers in schools (while keeping down the pay of teachers so much that there are shortages? Do you think it will stop sending governors of state schools glossy pamphlets about insisting that computers are used in their schools as much as possible?" In this study, therefore, PISA looks well beyond educational attainment, and also includes school demographics, such as whether it is a public or private school, has large or small classes, or has access or not to technological resources. Finally, it does measure student information-their family background, access to books and computers and parental support as well. The PISA survey departs from previous surveys in disregarding the stated curricula of the schools being measured. Therefore, the conclusion is not surprising, nor even wrong for him to consider independently of any parental or teacher support, considered without reference to the software running on it, considered without reference to student attitudes and interests, does not positively impact an education. Finally, he focus on missing the reporting of results

  16. Natural selection on immune defense: A field experiment.

    Science.gov (United States)

    Langeloh, Laura; Behrmann-Godel, Jasminca; Seppälä, Otto

    2017-02-01

    Predicting the evolution of phenotypic traits requires an understanding of natural selection on them. Despite its indispensability in the fight against parasites, selection on host immune defense has remained understudied. Theory predicts immune traits to be under stabilizing selection due to associated trade-offs with other fitness-related traits. Empirical studies, however, report mainly positive directional selection. This discrepancy could be caused by low phenotypic variation in the examined individuals and/or variation in host resource level that confounds trade-offs in empirical studies. In a field experiment where we maintained Lymnaea stagnalis snails individually in cages in a lake, we investigated phenotypic selection on two immune defense traits, phenoloxidase (PO)-like activity and antibacterial activity, in hemolymph. We used a diverse laboratory population and manipulated snail resource level by limiting their food supply. For six weeks, we followed immune activity, growth, and two fitness components, survival and fecundity of snails. We found that PO-like activity and growth were under stabilizing selection, while antibacterial activity was under positive directional selection. Selection on immune traits was mainly driven by variation in survival. The form of selection on immune defense apparently depends on the particular trait, possibly due to its importance for countering the present parasite community. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  17. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  18. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  19. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  20. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  1. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  2. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    .... Since establishment of the Defense Business Operations Fund (DBOF), the General Accounting Office; Inspector General (IO), DoD; and Service audit agencies have completed several audits on the preparation...

  3. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  4. Department of Defense Chiropractic Internships

    Science.gov (United States)

    Dunn, Andrew S.

    2006-01-01

    Objective: Department of Defense (DoD) chiropractic internships first began in July of 2001. At the time of this study, 30 New York Chiropractic College student interns had completed part of their clinical education within chiropractic clinics at either the National Naval Medical Center or Naval Hospital Camp Lejeune. The purpose of this study was to evaluate and compare the careers of DoD chiropractic internship participants with comparable nonparticipants in terms of demographics, professional activities, income, and satisfaction. Methods: Survey research was employed to gather data from DoD chiropractic internship participants and comparable nonparticipants. Statistical analysis was carried out to determine significant differences with a nominal significance level set as.05. Results: There were no statistically significant differences in demographics, professional activities, income, or career satisfaction between the 21 DoD chiropractic internship participants (70% response rate) and 35 internship nonparticipants (35% response rate). Conclusions: This study utilized practice parameters as a form of feedback for a comparative analysis of DoD chiropractic internship participants and nonparticipants and found no significant differences between these groups. Limitations of the study may have influenced the results. Opportunities for chiropractic students to train within these settings remains limited and should be further explored, as should additional research into this component of chiropractic clinical education. PMID:18483629

  5. [Changes in defense mechanisms resulting from a Day Treatment Center therapy in persons suffering from psychotic disorders].

    Science.gov (United States)

    Cichocki, Lukasz

    2008-01-01

    The objectives of this investigation are to describe the changes in the psychopathological state and defense mechanisms occurring during therapy in a Day Treatment Center. The study group consisted of 55 persons suffering from psychotic disorders. Most of them suffered from schizophrenia, some from schizophrenia spectrum disorders, bipolar disorder and organic psychotic disorder. In the course of therapy in the Day Treatment Center, apart from pharmacotherapy and individual care, the patients took part in an intensive psychosocial therapeutic programme. The study was a pre-post design. The first investigation took place two weeks after admission into the Day Treatment Center and the second in the last week of therapy (average time of hospitalization was 3 months). The psychopathological state was examined according to the PANSS scale. Defense mechanisms were investigated with the Defense Style Questionnaire 40. The results of the study show significant changes occurring, both in psychopathological state, as well as defensive functioning of the patients during the therapy. Changes in the psychopathological state occurred in all subscales of the PANSS scale: positive, negative and global. Changes in defense mechanisms occurred in the mature factor of the defense mechanisms and in two separate immature mechanisms: autistic fantasies and displacement. A change in defense mechanisms did not influence changes that occurred in the psychopathological state. This could mean that psychopathological state--Axis I in DSM IV and defense mechanisms--part of the Axis II are partly independent elements. Defense functioning seems to be a useful construct in understanding changes occuring in the course of therapy. The Defense Style Questionnaire 40 is a practical instrument in measuring conscious derivates of defense mechanisms.

  6. Defensive behavior of Dipsas sanctijoannis (Serpentes: Dipsadidae

    Directory of Open Access Journals (Sweden)

    Julián Andrés Rojas Morales

    2010-12-01

    Full Text Available Herein, we report the defensive behavior of Dipsas sanctijoannis (Boulenger, 1911 for first time, based on observations of three different individuals in the Municipality of Manizales, Departamento de Caldas, Colombia.

  7. Self-defense training for college women.

    Science.gov (United States)

    Cummings, N

    1992-01-01

    This article explores the effectiveness of self-defense training for college women. Advocates of self-defense training believe these courses will not only provide women with the physical survival techniques necessary to repel attacks effectively, but that this kind of training will also help to prevent future violence by developing traits such as assertiveness and confidence in individuals. There is evidence that women who convey such characteristics are less likely to be victimized. Opponents argue that self-defense training does not properly prepare women for an attack, does not adequately address acquaintance rape threats, and can provide a dangerous false sense of security to students. This article reviews the relevant literature, outlines practical suggestions for initiatives in this area, and describes a model self-defense course at one university. Guidelines for evaluation and implications for university policy and program decisions that address violence against women on college campuses are included.

  8. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  9. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  10. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  11. Introduction to Defense Acquisition Management. Fifth Edition

    National Research Council Canada - National Science Library

    Cochrane, C

    2001-01-01

    ...) acquisition management policies and procedures, the Department of Defense (DoD) 5000 Documents. This handbook is designed to be a quick study guide to refresh the skilled and experienced acquisition management professional...

  12. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  13. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  14. Human Capital: Defense Contracting Command-Washington

    National Research Council Canada - National Science Library

    2002-01-01

    ... and staffing of contracting organizations. The Director, Defense Procurement requested the audit after a Procurement Management Review identified potential issues concerning equal employment opportunity, "pay banding" in employee compensation...

  15. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  16. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    OpenAIRE

    Mathilde Gralepois; Corinne Larrue; Mark Wiering; Ann Crabbé; Sue Tapsell; Hannelore Mees; Kristina Ek; Malgorzata Szwed

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with th...

  17. Options for Deploying Missile Defenses in Europe

    Science.gov (United States)

    2009-02-01

    efforts at missile defense (such as the 1960s- era Nike -Zeus program) were aimed at countering the vast Soviet missile arsenal. Recent efforts are...on unclassified performance parameters for the various radars and interceptors and assumed that the systems would work “as advertised .” (A...develop defenses against ballistic missiles. Early U.S. efforts (such as the 1960s-era Nike -Zeus program) were aimed at countering the Soviet Union’s

  18. Defense Task Force on Domestic Violence

    Science.gov (United States)

    2001-02-28

    forward the initial report of the Defense Task Force on Domestic Violence . This report is submitted in accordance with the provisions of Section 591...programs and policies associated with domestic violence in the military. These programs are commonly referred to within the Department of Defense as...Department in addressing domestic violence matters. During our initial meeting on April 24-26, 2000, we formed four standing workgroups: (1) Community

  19. Fungal Recognition and Host Defense Mechanisms.

    Science.gov (United States)

    Dambuza, I M; Levitz, S M; Netea, M G; Brown, G D

    2017-07-01

    Fungi have emerged as premier opportunistic microbes of the 21st century, having a considerable impact on human morbidity and mortality. The huge increase in incidence of these diseases is largely due to the HIV pandemic and use of immunosuppressive therapies, underscoring the importance of the immune system in defense against fungi. This article will address how the mammalian immune system recognizes and mounts a defense against medically relevant fungal species.

  20. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  1. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  2. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  3. Understanding War in Afghanistan

    Science.gov (United States)

    2011-01-01

    Admiral Ann Ron- deau, USN, President of the National Defense University, and Major General Robert Steel, USAF, then-Commandant of the National War...administration. Greater congressional interest re- sulted in the 5-year, $7.5 billion Kerry-Lugar- Berman economic assistance package in the fall of...former U.S. Ambassador to Pakistan Robert Oakley, both distinguished National Defense University scholars, have reminded us of an opportunity cost

  4. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  5. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Defense programs beryllium good practice guide

    International Nuclear Information System (INIS)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D ampersand D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is

  7. 76 FR 11414 - Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical...

    Science.gov (United States)

    2011-03-02

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 231 Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical Descriptions (DFARS Case 2010-D011) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION...

  8. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ...-OS-0018] Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising its Privacy Act procedural and.... This rule provides policies and procedures for the Defense Logistics Agency's implementation of the...

  9. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ...-OS-0018] Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend... Regulatory Action a. This rule provides policies and procedures for the Defense Logistics Agency's...

  10. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  11. The Identification and Modification of Defense Mechanisms in Counseling.

    Science.gov (United States)

    Clark, Arthur J.

    1991-01-01

    Suggests considerations and strategies for identifying and modifying a client's defense mechanisms in counseling. Provides definitions of individual defenses and indicators for identifying the mechanisms. Literature review focuses on counseling implications of defenses. Process of defense mechanism modification is illustrated through case example.…

  12. 28 CFR 69.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Secretary of Defense. 69.500 Section 69... § 69.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  13. 6 CFR 9.41 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic....41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  14. 22 CFR 227.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Secretary of Defense. 227.500 Section 227.500... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  15. 45 CFR 1158.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Secretary of Defense. 1158.500 Section 1158.500... Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  16. 43 CFR 18.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Secretary of Defense. 18.500 Section 18... Exemptions § 18.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  17. 20 CFR 438.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Secretary of Defense. 438.500 Section 438.500... of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  18. 22 CFR 519.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secretary of Defense. 519.500 Section 519.500... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  19. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500....500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  20. 38 CFR 45.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Secretary of Defense. 45...) NEW RESTRICTIONS ON LOBBYING Exemptions § 45.500 Secretary of Defense. (a) The Secretary of Defense.... (b) The Department of Defense may issue supplemental regulations to implement paragraph (a) of this...

  1. 22 CFR 712.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secretary of Defense. 712.500 Section 712.500... LOBBYING Exemptions § 712.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by... written exemption to Congress immediately after making such a determination. (b) The Department of Defense...

  2. 31 CFR 21.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Secretary of Defense. 21.500 Section... LOBBYING Exemptions § 21.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by... written exemption to Congress immediately after making such a determination. (b) The Department of Defense...

  3. 40 CFR 34.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Secretary of Defense. 34.500 Section 34... RESTRICTIONS ON LOBBYING Exemptions § 34.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on... Department of Defense may issue supplemental regulations to implement paragraph (a) of this section. ...

  4. 13 CFR 146.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Secretary of Defense. 146.500... Exemptions § 146.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis... exemption to Congress immediately after making such a determination. (b) The Department of Defense may issue...

  5. 45 CFR 1168.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Secretary of Defense. 1168.500 Section 1168.500... of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  6. 22 CFR 138.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Secretary of Defense. 138.500 Section 138.500... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  7. 10 CFR 601.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Secretary of Defense. 601.500 Section 601.500 Energy... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  8. 49 CFR 20.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Secretary of Defense. 20.500 Section 20.500... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  9. 15 CFR 28.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Secretary of Defense. 28.500 Section... Exemptions § 28.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  10. 45 CFR 93.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Secretary of Defense. 93.500 Section 93.500 Public... Exemptions § 93.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a... Congress immediately after making such a determination. (b) The Department of Defense may issue...

  11. 34 CFR 82.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Secretary of Defense. 82.500 Section 82.500 Education... Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal... immediately after making such a determination. (b) The Department of Defense may issue supplemental...

  12. 45 CFR 604.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Secretary of Defense. 604.500 Section 604.500... RESTRICTIONS ON LOBBYING Exemptions § 604.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on... Department of Defense may issue supplemental regulations to implement paragraph (a) of this section. ...

  13. 32 CFR 634.21 - Department of Defense Form 2220.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Department of Defense Form 2220. 634.21 Section 634.21 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Motor Vehicle Registration § 634.21...

  14. The Eye Movement Desensitization and Reprocessing Procedure Prevents Defensive Processing in Health Persuasion

    NARCIS (Netherlands)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a

  15. Transforming Cultural Conflict in the Foreign Language Classroom: The Case of Arabic at Defense Language Institute

    Science.gov (United States)

    Barrett, Tyler; Trosky, Abram; Tawadrous, Adel

    2018-01-01

    This paper considers the impact of global and national political polarisation on perspectives of instructors and learners in Arabic classrooms at Defense Language Institute Foreign Language Center (DLIFLC) in the United States with particular interest in understanding cultural conflicts that occur between instructors and learners. Instructors and…

  16. Food Fight: Role of Itaconate and Other Metabolites in Anti-Microbial Defense

    Science.gov (United States)

    Luan, Harding H.; Medzhitov, Ruslan

    2016-01-01

    Summary Itaconate is a newly discovered mammalian metabolite bearing significant implications for our understanding of cellular immunometabolism and anti-microbial defense. Here, we explore recent findings regarding the role of itaconate in the innate immune response and highlight the emerging principle that metabolites can have distinct immunological functions independent of bioenergetics. PMID:27626199

  17. Defense Mechanisms in Adolescence as Predictors of Adult Personality Disorders.

    Science.gov (United States)

    Strandholm, Thea; Kiviruusu, Olli; Karlsson, Linnea; Miettunen, Jouko; Marttunen, Mauri

    2016-05-01

    Our study examines whether defense styles and separate defenses in depressed adolescent outpatients predict adult personality disorders (PDs). We obtained data from consecutive adolescent outpatients who participated in the Adolescent Depression Study at baseline and at the 8-year follow-up (N = 140). Defense styles were divided into mature, neurotic, image-distorting, and immature and a secondary set of analyses were made with separate defenses as predictors of a PD diagnosis. Neurotic, image-distorting, and immature defense styles in adolescence were associated with adulthood PDs. Neurotic defense style associated with cluster B diagnosis and image-distorting defense style associated with cluster A diagnosis. Separate defenses of displacement, isolation, and reaction formation were independent predictors of adult PD diagnosis even after adjusting for PD diagnosis in adolescence. Defense styles and separate defenses predict later PDs and could be used in the focusing of treatment interventions for adolescents.

  18. Differentiation of depression and anxiety groups using defense mechanisms.

    Science.gov (United States)

    Olson, Trevor R; Presniak, Michelle D; MacGregor, Michael Wm

    2009-11-01

    We examined whether participants in depressed and anxious groups could be classified correctly using observer and self-report measures of defense mechanisms. A sample of 1182 university students completed the Personality Assessment Inventory and those scoring in the clinical range on either depression or anxiety indices were selected for participation. In total, 25 participants met criteria for the depressed group and 94 met criteria for the anxious group. Individual defense scores from the Defense-Q and the Defense Style Questionnaire were separately entered into 2 stepwise discriminant analyses. After cross-validation, the Defense-Q and Defense Style Questionnaire analyses classified participants with 75.0% and 71.3% accuracy, respectively. The results indicated that depression and anxiety groups can be significantly differentiated by defense use alone. Important differences in defensive functioning between these groups were confirmed and differences between observer and self-report measures of defenses mechanisms and current challenges in defense research were highlighted.

  19. Massive Activation of Archaeal Defense Genes during Viral Infection

    Science.gov (United States)

    Voet, Marleen; Sismeiro, Odile; Dillies, Marie-Agnes; Jagla, Bernd; Coppée, Jean-Yves; Sezonov, Guennadi; Forterre, Patrick; van der Oost, John; Lavigne, Rob

    2013-01-01

    Archaeal viruses display unusually high genetic and morphological diversity. Studies of these viruses proved to be instrumental for the expansion of knowledge on viral diversity and evolution. The Sulfolobus islandicus rod-shaped virus 2 (SIRV2) is a model to study virus-host interactions in Archaea. It is a lytic virus that exploits a unique egress mechanism based on the formation of remarkable pyramidal structures on the host cell envelope. Using whole-transcriptome sequencing, we present here a global map defining host and viral gene expression during the infection cycle of SIRV2 in its hyperthermophilic host S. islandicus LAL14/1. This information was used, in combination with a yeast two-hybrid analysis of SIRV2 protein interactions, to advance current understanding of viral gene functions. As a consequence of SIRV2 infection, transcription of more than one-third of S. islandicus genes was differentially regulated. While expression of genes involved in cell division decreased, those genes playing a role in antiviral defense were activated on a large scale. Expression of genes belonging to toxin-antitoxin and clustered regularly interspaced short palindromic repeat (CRISPR)-Cas systems was specifically pronounced. The observed different degree of activation of various CRISPR-Cas systems highlights the specialized functions they perform. The information on individual gene expression and activation of antiviral defense systems is expected to aid future studies aimed at detailed understanding of the functions and interplay of these systems in vivo. PMID:23698312

  20. 22 CFR 126.15 - Expedited processing of license applications for the export of defense articles and defense...

    Science.gov (United States)

    2010-04-01

    ... for the export of defense articles and defense services to Australia or the United Kingdom. 126.15... articles and defense services to Australia or the United Kingdom. (a) Any application submitted for authorization of the export of defense articles or services to Australia or the United Kingdom will be...

  1. Defense Science Board Task Force Report on Defense Strategies for Ensuring the Resilience of National Space Capabilities

    Science.gov (United States)

    2017-03-01

    March 2017 Task Force on Defense Strategies for Ensuring the Resilience of National Space Capabilities OFFICE OF THE UNDER SECRETARY OF...the Department of Defense. The DSB Task Force on Defense Strategies for Ensuring the Resilience of National Space Capabilities completed its formal...Ensuring the Resilience of National Space Capabilities | i DSB Task Force on Defense Strategies for Ensuring the

  2. The First Line of Defense: Higher Education in Wartime and the Development of National Defense Education, 1939-1959

    Science.gov (United States)

    Ponte, Dana Adrienne

    2016-01-01

    This study posits that the National Defense Education Act of 1958 (NDEA) represented the culmination of nearly a century-long process through which education was linked to national defense in periods of wartime, and later retained a strategic utility for defense purposes in times of peace. That a defense rationale for federal support of public…

  3. Defense Commissary Agency Financial Reporting of Property, Plant, and Equipment.

    Science.gov (United States)

    1998-03-27

    ort DEFENSE COMMISSARY AGENCY FINANCIAL REPORTING OF PROPERTY, PLANT, AND EQUIPMENT Report Number 98-097 March 27, 1998 Office of the Inspector...UNDER SECRETARY OF DEFENSE (COMPTROLLER) DIRECTOR, DEFENSE COMMISSARY AGENCY SUBJECT: Audit Report on Defense Commissary Agency Financial Reporting of...General for Auditing Office of the Inspector General, DoD Report No. 98-097 March 27, 1998 (Project No. 7FJ-2026) Defense Commissary Agency Financial

  4. Human defensive behaviors to threat scenarios show parallels to fear- and anxiety-related defense patterns of non-human mammals.

    Science.gov (United States)

    Blanchard, D C; Hynd, A L; Minke, K A; Minemoto, T; Blanchard, R J

    2001-12-01

    Defense patterns of rats and mice have been characterized in terms of the relationships between the type of defensive behavior (e.g. flight, freezing, hiding, defensive threat/attack, and risk assessment) and particular features of the eliciting (threat) stimulus and the situation in which it is encountered. Because the defense systems of rodents serve as major models for investigating and understanding both the physiology and the behavioral expression of emotional response to aversive stimuli, it is essential to evaluate whether these systems show strong parallels in human responsivity to threat. One hundred and sixty male and female undergraduate students read a set of 12 scenarios involving a present or potential threatening conspecific, and chose a primary defensive response to each. These scenarios were designed to vary features known to influence defensive responding in rodents: magnitude of threat; escapability of the situation; ambiguity of the threat stimulus; distance between the threat and the subject; presence of a hiding place. Male and female responses to the various scenarios were highly correlated, except for yell, scream, or call for help which was frequent for females, rare for males. However, a combination of this response category with 'attack' showed a highly positive (+0.96) male-female correlation, across scenarios.Correlations between manipulated (and rated) features of the threat stimulus and situation, and type of defensive behavior chosen, strongly supported a view that the patterning of defensive behavior is similar for humans and non-human mammals. Significant correlations were obtained relevant to eight specific hypotheses derived from the animal literature, with some support for two additional hypotheses (non-significant correlations averaging 0.4 or more in expected direction). While three predicted correlations were not supported in these findings, only a single significant correlation was obtained that had not been predicted on the

  5. Ego Defenses and Reaction to Stress: A Validation Study of the Defense Mechanisms Inventory

    Science.gov (United States)

    Gleser, Goldine C.; Sacks, Marilyn

    1973-01-01

    This study investigated the relationship between scores on the Defense Mechanisms Inventory and reaction to an experimental conflict situation in which Ss (85 undergraduate college students) were led to believe that their performance was deficient on a new test of scholastic ability. The pattern of defenses predicted residual posttest estimates of…

  6. Evolution of defensive playing in handball: Towards alternative defenses as concept

    Directory of Open Access Journals (Sweden)

    Juan de Dios Román Seco

    2016-12-01

    The author exposes a rigorous methodological system in which the concepts of playing space and the moment of action are conjugated in an alternative way as base of the defensive complexity. It translates all into a philosophy of defensive behavior valid for any structure applicable to all times and circumstances.

  7. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  8. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  9. 77 FR 30361 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaty With the...

    Science.gov (United States)

    2012-05-22

    ... Ireland Concerning Defense Trade Cooperation (the Treaty) and the Security Cooperation Act of 2010... articles, technical data, and defense services. The governing law is the Arms Export Control Act (AECA) (22... 22 CFR 126.17(g) and other applicable U.S. laws and regulations. These requirements include marking...

  10. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... Kingdom of Great Britain and Northern Ireland Concerning Defense Trade Cooperation (the U.S.-U.K. DTC... America and the Government of the United Kingdom of Great Britain and Northern Ireland Concerning Defense... governing law is the Arms Export Control Act (22 U.S.C. 2778 et seq.) and implementing regulations in the...

  11. Advances in understanding begomovirus satellites.

    Science.gov (United States)

    Zhou, Xueping

    2013-01-01

    Begomoviruses are numerous and geographically widespread viruses that cause devastating diseases in many crops. Monopartite begomoviruses are frequently associated with betasatellites or alphasatellites. Both betasatellite and alphasatellite DNA genomes are approximately half the size of begomovirus DNA genomes. Betasatellites are essential for induction of typical disease symptoms. The βC1 genes encoded by the betasatellites have important roles in symptom induction, in suppression of transcriptional and posttranscriptional gene silencing, and they can affect jasmonic acid responsive genes. Host plants of begomoviruses have evolved diverse innate defense mechanisms against the βC1 protein to counter these challenges. Alphasatellites have been identified mainly in monopartite begomoviruses that associate with betasatellites and have no known contributions to pathogenesis of begomovirus-betasatellite disease complexes. Applications of current molecular tools are facilitating viral diagnosis and the discovery of novel species of geminiviruses and satellite DNAs and are also advancing our understanding of the global diversity and evolution of satellite DNAs.

  12. The dimensionality of defense-mechanism parcels in the Defense Style Questionnaire-40.

    Science.gov (United States)

    Wilkinson, Wayne W; Ritchie, Timothy D

    2015-03-01

    The Defense Style Questionnaire-40 (DSQ-40; Andrews, Singh, & Bond, 1993) uses pairs of items to measure 20 individual defense mechanisms. In a statistical sense, these item pairs represent parcels and are subject to the standards of unidimensionality demanded of parcels in general. Using a 2-facet modeling approach (N = 672), the present study examined the dimensionality of the defense-mechanism parcels in the DSQ-40 and found that the majority of the parcels did not satisfy the criteria for unidimensionality. In addition, the original 3-factor model of defense styles was not tenable with the present data. Overall, the results suggest caution when attempting to assess individual defense mechanisms using the DSQ-40. 2015 APA, all rights reserved

  13. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  14. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  15. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  16. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  17. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  18. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  19. Prevalence and Mechanisms of Dynamic Chemical Defenses in Tropical Sponges

    Science.gov (United States)

    Rohde, Sven; Nietzer, Samuel; Schupp, Peter J.

    2015-01-01

    Sponges and other sessile invertebrates are lacking behavioural escape or defense mechanisms and rely therefore on morphological or chemical defenses. Studies from terrestrial systems and marine algae demonstrated facultative defenses like induction and activation to be common, suggesting that sessile marine organisms also evolved mechanisms to increase the efficiency of their chemical defense. However, inducible defenses in sponges have not been investigated so far and studies on activated defenses are rare. We investigated whether tropical sponge species induce defenses in response to artificial predation and whether wounding triggers defense activation. Additionally, we tested if these mechanisms are also used to boost antimicrobial activity to avoid bacterial infection. Laboratory experiments with eight pacific sponge species showed that 87% of the tested species were chemically defended. Two species, Stylissa massa and Melophlus sarasinorum, induced defenses in response to simulated predation, which is the first demonstration of induced antipredatory defenses in marine sponges. One species, M. sarasinorum, also showed activated defense in response to wounding. Interestingly, 50% of the tested sponge species demonstrated induced antimicrobial defense. Simulated predation increased the antimicrobial defenses in Aplysinella sp., Cacospongia sp., M. sarasinorum, and S. massa. Our results suggest that wounding selects for induced antimicrobial defenses to protect sponges from pathogens that could otherwise invade the sponge tissue via feeding scars. PMID:26154741

  20. Partial activation of SA- and JA-defensive pathways in strawberry upon Colletotrichum acutatum interaction

    Directory of Open Access Journals (Sweden)

    FRANCISCO AMIL-RUIZ

    2016-07-01

    Full Text Available Understanding the nature of pathogen host interaction may help improve strawberry (Fragaria × ananassa cultivars. Plant resistance to pathogenic agents usually operates through a complex network of defense mechanisms mediated by a diverse array of signaling molecules. In strawberry, resistance to a variety of pathogens has been reported to be mostly polygenic and quantitatively inherited, making it difficult to associate molecular markers with disease resistance genes. Colletotrichum acutatum spp. is a major strawberry pathogen, and completely resistant cultivars have not been reported. Moreover, strawberry defense network components and mechanisms remain largely unknown and poorly understood. Assessment of the strawberry response to C. acutatum included a global transcript analysis, and acidic hormones SA and JA measurements were analyzed after challenge with the pathogen. Induction of transcripts corresponding to the SA and JA signaling pathways and key genes controlling major steps within these defense pathways was detected. Accordingly, SA and JA accumulated in strawberry after infection. Contrastingly, induction of several important SA, JA, and oxidative stress-responsive defense genes, including FaPR1-1, FaLOX2, FaJAR1, FaPDF1, and FaGST1, was not detected, which suggests that specific branches in these defense pathways (those leading to FaPR1-2, FaPR2-1, FaPR2-2, FaAOS, FaPR5 and FaPR10 were activated. Our results reveal that specific aspects in SA and JA dependent signaling pathways are activated in strawberry upon interaction with C. acutatum. Certain described defense-associated transcripts related to these two known signaling pathways do not increase in abundance following infection. This finding suggests new insight into a specific putative molecular strategy for defense against this pathogen.

  1. Spatial proximity amplifies valence in emotional memory and defensive approach-avoidance.

    Science.gov (United States)

    Åhs, Fredrik; Dunsmoor, Joseph E; Zielinski, David; LaBar, Kevin S

    2015-04-01

    In urban areas, people often have to stand or move in close proximity to others. The egocentric distance to stimuli is a powerful determinant of defensive behavior in animals. Yet, little is known about how spatial proximity to others alters defensive responses in humans. We hypothesized that the valence of social cues scales with egocentric distance, such that proximal social stimuli have more positive or negative valence than distal stimuli. This would predict enhanced defensive responses to proximal threat and reduced defensive responses to proximal reward. We tested this hypothesis across four experiments using 3-D virtual reality simulations. Results from Experiment 1 confirmed that proximal social stimuli facilitate defensive responses, as indexed by fear-potentiated startle, relative to distal stimuli. Experiment 2 revealed that interpersonal defensive boundaries flexibly increase with aversive learning. Experiment 3 examined whether spatial proximity enhances memory for aversive experiences. Fear memories for social threats encroaching on the body were more persistent than those acquired at greater interpersonal distances, as indexed by startle. Lastly, Experiment 4 examined how egocentric distance influenced startle responses to social threats during defensive approach and avoidance. Whereas fear-potentiated startle increased with proximity when participants actively avoided receiving shocks, startle decreased with proximity when participants tolerated shocks to receive monetary rewards, implicating opposing gradients of distance on threat versus reward. Thus, proximity in egocentric space amplifies the valence of social stimuli that, in turn, facilitates emotional memory and approach-avoidance responses. These findings have implications for understanding the consequences of increased urbanization on affective interpersonal behavior. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Partial Activation of SA- and JA-Defensive Pathways in Strawberry upon Colletotrichum acutatum Interaction

    Science.gov (United States)

    Amil-Ruiz, Francisco; Garrido-Gala, José; Gadea, José; Blanco-Portales, Rosario; Muñoz-Mérida, Antonio; Trelles, Oswaldo; de los Santos, Berta; Arroyo, Francisco T.; Aguado-Puig, Ana; Romero, Fernando; Mercado, José-Ángel; Pliego-Alfaro, Fernando; Muñoz-Blanco, Juan; Caballero, José L.

    2016-01-01

    Understanding the nature of pathogen host interaction may help improve strawberry (Fragaria × ananassa) cultivars. Plant resistance to pathogenic agents usually operates through a complex network of defense mechanisms mediated by a diverse array of signaling molecules. In strawberry, resistance to a variety of pathogens has been reported to be mostly polygenic and quantitatively inherited, making it difficult to associate molecular markers with disease resistance genes. Colletotrichum acutatum spp. is a major strawberry pathogen, and completely resistant cultivars have not been reported. Moreover, strawberry defense network components and mechanisms remain largely unknown and poorly understood. Assessment of the strawberry response to C. acutatum included a global transcript analysis, and acidic hormones SA and JA measurements were analyzed after challenge with the pathogen. Induction of transcripts corresponding to the SA and JA signaling pathways and key genes controlling major steps within these defense pathways was detected. Accordingly, SA and JA accumulated in strawberry after infection. Contrastingly, induction of several important SA, JA, and oxidative stress-responsive defense genes, including FaPR1-1, FaLOX2, FaJAR1, FaPDF1, and FaGST1, was not detected, which suggests that specific branches in these defense pathways (those leading to FaPR1-2, FaPR2-1, FaPR2-2, FaAOS, FaPR5, and FaPR10) were activated. Our results reveal that specific aspects in SA and JA dependent signaling pathways are activated in strawberry upon interaction with C. acutatum. Certain described defense-associated transcripts related to these two known signaling pathways do not increase in abundance following infection. This finding suggests new insight into a specific putative molecular strategy for defense against this pathogen. PMID:27471515

  3. Confronting actual influence of radiation on human bodies and biological defense mechanism

    International Nuclear Information System (INIS)

    Matsubara, Junko

    2012-01-01

    After the accident at Fukushima Daiichi Nuclear Power Plant of Tokyo Electric Power Company, social, economical, psychological pressures on local residents and fears of radiation among the general public have not been resolved. Based on the assumption that the negligence of specialists to clearly explain the influence of radiation on human bodies to the general public is the factor for above mentioned pressures and fears, the influence of radiation from a realistic view was discussed. The topics covered are: (1) understanding the meaning of radiation regulation, (2) radiation and threshold values, (3) actual influence of low-dose radiation, (4) chemical and biological defense in defense mechanism against radiation, (5) problems raised by Fukushima Daiichi nuclear accident. Furthermore, the article explains the principles and the applications of biological defense function activation, and suggested that self-help efforts to fight against stress are from now on. (S.K.)

  4. The pathogen-actin connection: A platform for defense signaling in plants

    Energy Technology Data Exchange (ETDEWEB)

    Day, B; Henty, Jessica L; Porter, K J; Staiger, Chris J

    2011-09-08

    The cytoskeleton, a dynamic network of cytoplasmic polymers, plays a central role in numerous fundamental processes, such as development, reproduction, and cellular responses to biotic and abiotic stimuli. As a platform for innate immune responses in mammalian cells, the actin cytoskeleton is a central component in the organization and activation of host defenses, including signaling and cellular repair. In plants, our understanding of the genetic and biochemical responses in both pathogen and host that are required for virulence and resistance has grown enormously. Additional advances in live-cell imaging of cytoskeletal dynamics have markedly altered our view of actin turnover in plants. In this review, we outline current knowledge of host resistance following pathogen perception, both in terms of the genetic interactions that mediate defense signaling, as well as the biochemical and cellular processes that are required for defense signaling.

  5. Nest defense- Grassland bird responses to snakes

    Science.gov (United States)

    Ellison, Kevin S.; Ribic, Christine

    2012-01-01

    Predation is the primary source of nest mortality for most passerines; thus, behaviors to reduce the impacts of predation are frequently quantified to study learning, adaptation, and coevolution among predator and prey species. Video surveillance of nests has made it possible to examine real-time parental nest defense. During 1999-2009, we used video camera systems to monitor 518 nests of grassland birds. We reviewed video of 48 visits by snakes to 34 nests; 37 of these visits resulted in predation of active nests. When adult birds encountered snakes at the nest (n = 33 visits), 76% of the encounters resulted in a form of nest defense (nonaggressive or aggressive); in 47% of the encounters, birds physically struck snakes. When defending nests, most birds pecked at the snakes; Eastern Meadowlarks (Sturnella magna) and Bobolinks (Dolichonyx oryzivorus) pecked most frequently in anyone encounter. Also, two Eastern Meadowlarks ran around snakes, frequently with wings spread, and three Bobolinks struck at snakes from the air. Nest defense rarely appeared to alter snake behavior; the contents of seven nests defended aggressively and two nests defended nonaggressively were partially depredated, whereas the contents of six nests defended each way were consumed completely. One fledgling was produced at each of three nests that had been aggressively defended. During aggressive defense, one snake appeared to be driven away and one was wounded. Our findings should be a useful starting point for further research. For example, future researchers may be able to determine whether the behavioral variation we observed in nest defense reflects species differences, anatomic or phylogenetic constraints, or individual differences related to a bird's prior experience. There appears to be much potential for studying nest defense behavior using video recording of both real and simulated encounters. 

  6. Does the "Special Relationship" Have a Role to Play in Future EU-US Relations?

    National Research Council Canada - National Science Library

    Hunter, James H

    2006-01-01

    .... However, despite the Solana Paper's statement that this trans-Atlantic relationship is one of the core elements of the international system, with the numerous trade and foreign policy conflicts...

  7. EU-US economic relations: the TTIP negotiations and its implications

    Directory of Open Access Journals (Sweden)

    Javier Arregui Moreno

    2015-09-01

    Full Text Available This article analyses some of the most important arguments for creating a free trade area between the EU and the United States. It also identifies the most conflictive issues in the Transatlantic Trade and Investment Partnership (TTIP and the possible agreements according to the mechanisms and strategies used. The article shows that the TTIP negotiation has sufficient potential to link issues together so that both the EU and the US can exchange positions on various subjects via the logrolling mechanism. Given that the TTIP presents significant potential advantages to both sides and that in this type of negotiation absolute profits tend to prevail, it is feasible that a final agreement will be reached that is accepted by both parties. It would be a new turn of the screw in the process of globalisation, with the aim of preserving the West’s central role on the international stage.

  8. No fracking way: how the EU-US trade agreement risks expanding fracking

    International Nuclear Information System (INIS)

    2014-03-01

    A major trade deal currently being negotiated between the European Union (EU) and the United States (US) threatens the power of governments to protect communities, citizens and the environment from risky new technologies such as fracking. The Transatlantic Trade and Investment Partnership (TTIP) covers a huge range of issues and sectors, including food safety, genetically modified products, toxic chemicals, highly polluting fuels and data protection. The talks threaten to weaken or roll-back democratically agreed safeguards put in place to protect the environment and citizens - for the sake of corporate profits. The talks are likely to favour safeguards for corporate investments over safeguards for citizens and the environment, allowing companies to seek compensation when government decisions affect their profits. This could benefit companies seeking to exploit natural resources through hazardous technologies whose activities may be affected by environmental or health regulations. Fracking - or high-volume hydraulic fracturing - is used to extract hard-to-access unconventional fossil fuels, such as shale gas and oil, tight gas and coal bed methane. Fracking will increase available gas supplies, locking us into fossil fuel dependency for several decades. There is growing evidence of huge health and environmental risks and impacts from fracking and this is leading to widespread public opposition at the community level, both in the EU and the US. This brief analyses how the TTIP could limit governments' ability to regulate the development and expansion of fracking. It argues that the TTIP could dangerously thwart government efforts to address climate change and to protect citizens; could expand fracking by removing the ability of governments to control natural gas exports; and could mean that states would be forced to pay millions in compensation to corporations for profits lost to regulation. It calls on the EU and the US to exclude investor-state dispute settlement rights from the agreement and from other trade deals in the pipeline - including the EU-Canada Comprehensive Economic and Trade Agreement (CETA)

  9. Does information and communication technology drive EU-US productivity growth differentials?

    NARCIS (Netherlands)

    Timmer, MP; van Ark, B

    2005-01-01

    This paper compares the effects of information and communication technology (ICT) on aggregate labour productivity growth in the European Union and the United States. It focuses on two transmission channels, namely (i) ICT-capital deepening and (ii) total factor productivity (TFP) growth originating

  10. Report on the Joint EU-US Workshop on Microbial Community Dynamics: Cooperation and Competition

    Energy Technology Data Exchange (ETDEWEB)

    Wall, Judy D. [Univ. of Missouri, Columbia, MO (United States)

    2013-07-01

    The European Commission (EC)-United States (US) Task Force on Biotechnology Research has a longstanding joint Working Group on Biotechnology for the Environment whose mission is to foster collaborations between researchers in the European Union (EU) and US in the field of environmental biotechnology. A special focus of the Working Group is to increase scientific interchange between early career scientists in the US and EU. Such interactions initiate a foundation of respect and trust needed to develop long-term collaborations. In order to realize the full potential for the application of modern technologies to obtain a sustainable biosphere, it is vital to create conduits for knowledge exchange among scientists worldwide engaged in environmental microbial biotechnology research. Since its formation in 1994, the Working Group has organized many activities for early career scientists designed to promote this scientific exchange, including two week courses with hands-on research experience, intensive workshops of two or three days, and research scholar exchanges of one to six months. These interactions are focused on environmental problems that respect no international boundaries.

  11. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  12. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    -fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... social defense, a Pseudonocardia bacteria that helps to control pathogens in the ants' fungus garden, showed a significant colony of origin by rearing environment interaction, whereby ants that acquired the bacteria of a foster colony obtained a less abundant cover of bacteria: one explanation...

  13. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    46.202-4), “Examples of higher-level quality standards are ISO 9001 , 9002, or 9003; ANSI/ ISO /ASQ Q9001-2000; ANSI/ASQC Q9001, Q9002, or Q9003; QS...United States—Armed Forces—Supplies and stores. 2. Logistics —United States. 3. United States. Defense Logistics Agency. 4. United States. Dept. of...Defense—Rules and practice—Evaluation. I. Robbins, Marc. II. McGovern, Geoffrey. III. United States. Deputy Under Secretary of Defense ( Logistics and

  14. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  15. Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios.

    Directory of Open Access Journals (Sweden)

    Laura A Harrison

    Full Text Available How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin's conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario's most common reaction, both for the original sample of subjects and a separate replication group (n = 22. At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our

  16. IMPROVING THE STRATEGIC PLANNING OF THE DEFENSE-INDUSTRIAL COMPLEX CORPORATIONS OF RUSSIA

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2016-01-01

    Full Text Available In this paper, we develop proposals to improve the strategic planning of Russian corporations of the defense-industrial complex. The relevance of the study due to the fact that the methodology for the adaptation of the strategic management of the military-industrial enterprises with substantial scientifi c and technical potential, should take into account a number of features, such as the identifi cation of the features of competition in the future; understanding of the prospects and development opportunities in the medium and long term; assessment of resource potential; impact assessment and risk in the implementation of promising strategies. In the more precise understanding of the strategy as a pattern of behavior aimed at achieving these goals, a set of rules for search and opportunities; strategic plan is seen as a series of specifi c steps and actions that are integrated in space and time, which lead to the transformation of the current position to the desired. We consider the practice of corporate transformation strategies of the world defense industry using a system method. To improve the strategic planning of Russian defense industry corporations it is recommended to apply the strategy of adapting the defense industry companies and their diversifi cation with the civilian sectors. The key vectors of the development strategy of the defense-industrial complex of Russian corporations are defi ned: providing an acceptable investment climate in the sphere of military-technical cooperation; neutralization of threats by the activities of DIC TNCs; creation of their own TNK defense industry and others.

  17. Infection with Rhizoctonia solani induces defense genes and systemic resistance in potato sprouts grown without light.

    Science.gov (United States)

    Lehtonen, M J; Somervuo, P; Valkonen, J P T

    2008-11-01

    Rhizoctonia solani is an important soilborne and seedborne fungal pathogen of potato (Solanum tuberosum). The initial infection of sprouts prior to emergence causes lesions and may be lethal to the sprout or sprout tip, which results in initiation and compensatory growth of new sprouts. They emerge successfully and do not suffer significant damage. The mechanism behind this recovery phenomenon is not known. It was hypothesized that infection may induce pathogen defense in sprouts, which was investigated in the present study. Tubers were sprouted in cool and moist conditions in darkness to mimic conditions beneath soil. The basal portion of the sprout was isolated from the apical portion with a soft plastic collar and inoculated with highly virulent R. solani. Induction of defense-related responses was monitored in the apical portion using microarray and quantitative polymerase chain reaction techniques at 48 and 120 h postinoculation (hpi) and by challenge-inoculation with R. solani in two experiments. Differential expression of 122 and 779 genes, including many well-characterized defense-related genes, was detected at 48 and 120 hpi, respectively. The apical portion of the sprout also expressed resistance which inhibited secondary infection of the sprouts. The observed systemic induction of resistance in sprouts upon infection with virulent R. solani provides novel information about pathogen defense in potato before the plant emerges and becomes photosynthetically active. These results advance our understanding of the little studied subject of pathogen defense in subterranean parts of plants.

  18. Role of resveratrol in regulation of cellular defense systems against oxidative stress.

    Science.gov (United States)

    Truong, Van-Long; Jun, Mira; Jeong, Woo-Sik

    2018-01-01

    Resveratrol, a natural polyphenolic compound, is found in various kinds of fruits, plants, and their commercial products such as red wine. It has been demonstrated to exhibit a variety of health-promoting effects including prevention and/or treatment of cardiovascular diseases, inflammation, diabetes, neurodegeneration, aging, and cancer. Cellular defensive properties of resveratrol can be explained through its ability of either directly neutralizing reactive oxygen species/reactive nitrogen species (ROS/RNS) or indirectly upregulating the expression of cellular defensive genes. As a direct antioxidant agent, resveratrol scavenges diverse ROS/RNS as well as secondary organic radicals with mechanisms of hydrogen atom transfer and sequential proton loss electron transfer, thereby protecting cellular biomolecules from oxidative damage. Resveratrol also enhances the expression of various antioxidant defensive enzymes such as heme oxygenase 1, catalase, glutathione peroxidase, and superoxide dismutase as well as the induction of glutathione level responsible for maintaining the cellular redox balance. Such defenses could be achieved by regulating various signaling pathways including sirtuin 1, nuclear factor-erythroid 2-related factor 2 and nuclear factor κB. This review provides current understanding and information on the role of resveratrol in cellular defense system against oxidative stress. © 2017 BioFactors, 44(1):36-49, 2018. © 2017 International Union of Biochemistry and Molecular Biology.

  19. Isonitrosoacetophenone drives transcriptional reprogramming in Nicotiana tabacum cells in support of innate immunity and defense.

    Directory of Open Access Journals (Sweden)

    Arnaud T Djami-Tchatchou

    Full Text Available Plants respond to various stress stimuli by activating broad-spectrum defense responses both locally as well as systemically. As such, identification of expressed genes represents an important step towards understanding inducible defense responses and assists in designing appropriate intervention strategies for disease management. Genes differentially expressed in tobacco cell suspensions following elicitation with isonitrosoacetophenone (INAP were identified using mRNA differential display and pyro-sequencing. Sequencing data produced 14579 reads, which resulted in 198 contigs and 1758 singletons. Following BLAST analyses, several inducible plant defense genes of interest were identified and classified into functional categories including signal transduction, transcription activation, transcription and protein synthesis, protein degradation and ubiquitination, stress-responsive, defense-related, metabolism and energy, regulation, transportation, cytoskeleton and cell wall-related. Quantitative PCR was used to investigate the expression of 17 selected target genes within these categories. Results indicate that INAP has a sensitising or priming effect through activation of salicylic acid-, jasmonic acid- and ethylene pathways that result in an altered transcriptome, with the expression of genes involved in perception of pathogens and associated cellular re-programming in support of defense. Furthermore, infection assays with the pathogen Pseudomonas syringae pv. tabaci confirmed the establishment of a functional anti-microbial environment in planta.

  20. The Development of Defense Mechanisms During the Latency Period.

    Science.gov (United States)

    Cramer, Phebe

    2018-02-06

    The developmental period of latency, during middle childhood, has not been previously studied for possible change in the use of defense mechanisms. Using a validated narrative method to assess defenses, the present research examines change in children's defense use during this period. As predicted from theory, there was a significant increase in the use of the defense of Identification. This finding is consistent with theory that posits a shift at this time from defense against anxiety that is based on lack of impulse control to defense that is based on anxiety due to violation of conscience.

  1. Defense programs beryllium good practice guide

    Energy Technology Data Exchange (ETDEWEB)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  2. Data Farming and Defense Applications

    Science.gov (United States)

    Horne, Gary; Meyer, Ted

    2011-01-01

    .Data farm,ing uses simulation modeling, high performance computing, experimental design and analysis to examine questions of interest with large possibility spaces. This methodology allows for the examination of whole landscapes of potential outcomes and provides the capability of executing enough experiments so that outliers might be captured and examined for insights. It can be used to conduct sensitivity studies, to support validation and verification of models, to iteratively optimize outputs using heuristic search and discovery, and as an aid to decision-makers in understanding complex relationships of factors. In this paper we describe efforts at the Naval Postgraduate School in developing these new and emerging tools. We also discuss data farming in the context of application to questions inherent in military decision-making. The particular application we illustrate here is social network modeling to support the countering of improvised explosive devices.

  3. RNAi and Antiviral Defense in the Honey Bee

    Directory of Open Access Journals (Sweden)

    Laura M. Brutscher

    2015-01-01

    Full Text Available Honey bees play an important agricultural and ecological role as pollinators of numerous agricultural crops and other plant species. Therefore, investigating the factors associated with high annual losses of honey bee colonies in the US is an important and active area of research. Pathogen incidence and abundance correlate with Colony Collapse Disorder- (CCD- affected colonies in the US and colony losses in the US and in some European countries. Honey bees are readily infected by single-stranded positive sense RNA viruses. Largely dependent on the host immune response, virus infections can either remain asymptomatic or result in deformities, paralysis, or death of adults or larvae. RNA interference (RNAi is an important antiviral defense mechanism in insects, including honey bees. Herein, we review the role of RNAi in honey bee antiviral defense and highlight some parallels between insect and mammalian immune systems. A more thorough understanding of the role of pathogens on honey bee health and the immune mechanisms bees utilize to combat infectious agents may lead to the development of strategies that enhance honey bee health and result in the discovery of additional mechanisms of immunity in metazoans.

  4. [Comparative immunological analysis of echinoderm cellular and humoral defense factors].

    Science.gov (United States)

    Kudriavtsev, I V; Polevshchikov, A V

    2004-01-01

    Coelomocyte are found in the fluid filling coelomic cavity of echinoderms and depending on species can be a mixture of several morphologically different types. There are among them: granular and agranular amoebocytes, morula cells, vibratile and lymphocyte-like cells. All these cells take part in cellular response to immune challenges through phagocytosis, clotting, encapsulation of foreign particles, cytotoxicity, and the production of antimicrobial agents, such as reactive oxygen and nitric oxide. The data are given on a variety of humoral factors found in the coelomic fluid, including different types of lectines, agglutinins, hemolysins, acute phase proteins and antimicrobial factors. The discussion on cooperation between cellular and humoral arms of defense reactions during inflammation reveals the crucial role of coelomocytes in immune response. It is suggested that the sea urchin complement system (that is homologous to the alternative pathway in vertebrates) is appeared initially in echinoderms as a protein cascade that points to opsonization of foreign cells and particles, augmenting their phagocytosis and subsequent destruction by coelomocytes. So the identification of a simple complement system as a part of the echinoderm immune response shows that these animals as well as all invertebrate deuterostomes share innate immune system homologies with vertebrates. Studying the simpler immune response demonstrated by echinoderms is important for understanding the ancestral deuterostome defense system and reconstructing the evolution of immune system in higher vertebrates.

  5. Mechanisms and strategies of plant defense against Botrytis cinerea.

    Science.gov (United States)

    AbuQamar, Synan; Moustafa, Khaled; Tran, Lam Son

    2017-03-01

    Biotic factors affect plant immune responses and plant resistance to pathogen infections. Despite the considerable progress made over the past two decades in manipulating genes, proteins and their levels from diverse sources, no complete genetic tolerance to environmental stresses has been developed so far in any crops. Plant defense response to pathogens, including Botrytis cinerea, is a complex biological process involving various changes at the biochemical, molecular (i.e. transcriptional) and physiological levels. Once a pathogen is detected, effective plant resistance activates signaling networks through the generation of small signaling molecules and the balance of hormonal signaling pathways to initiate defense mechanisms to the particular pathogen. Recently, studies using Arabidopsis thaliana and crop plants have shown that many genes are involved in plant responses to B. cinerea infection. In this article, we will review our current understanding of mechanisms regulating plant responses to B. cinerea with a particular interest on hormonal regulatory networks involving phytohormones salicylic acid (SA), jasmonic acid (JA), ethylene (ET) and abscisic acid (ABA). We will also highlight some potential gene targets that are promising for improving crop resistance to B. cinerea through genetic engineering and breeding programs. Finally, the role of biological control as a complementary and alternative disease management will be overviewed.

  6. Managing Change: Converting the Defense Industry

    Science.gov (United States)

    1993-04-01

    America’s historical opposition to central planning. This research paper explores the issue from the perspective of commercial firms’ strategic planning...Executive Office of the President. This research paper concludes that the defense conversion effort is actually a transition which isn’t

  7. Rape aggression defense and workplace violence prevention.

    Science.gov (United States)

    Wells, Sarah Steelman

    2012-01-01

    An R.A.D. Basic Physical Defense program for women employees, launched by a health system's corporate security department, has proven to be a popular low cost method of workplace violence prevention, according to the author, one of the program's instructors. The initial investment in equipment and certification is negligible compared to the benefits and potential benefits it brings, she reports.

  8. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  9. Role of advanced technologies in strategic defense

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.

    1988-10-01

    This report discusses the role of advanced technologies in strategic defense and reviews the threats, the proposed solutions, the risks involved in implementing the solutions, and the roles advanced technologies could play in reducing the risks. Although current technologies could address nominal threats, advanced technologies would be required for increased threats. 34 refs., 3 tabs.

  10. Artificial Intelligence and the Future of Defense

    DEFF Research Database (Denmark)

    De Spiegeleire, Stephan; Maas, Matthijs Michiel; Sweijs, Tim

    . The report contains an overview of the role that ‘intelligence’ - the computational part of the ability to achieve goals in the world - has played in defense and security throughout human history; a primer on AI (what it is, where it comes from and where it stands today - in both civilian and military...

  11. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  12. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    capabilities as a “poison pill ” to make it more difficult to be bought by a foreign company? The need to obtain security clearances was another barrier to...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  13. Biotech Business Lessons for Defense Acquisition

    Science.gov (United States)

    2016-01-01

    swing the pendulum . Since establishing the current structure during the McNamara era, the four or five large-scale reforms have failed. Sadly, defense...replaced the buggy; the mobile phone supplanted Ma Bell; and petroleum displaced whale oil. Revolution is more likely in such an environment than the

  14. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    2 Regular Military Compensation ...Military Compensation CRS In Focus IF10532, Defense Primer: Regular Military Compensation , by Lawrence Kapp Military Pay Raise CRS In Focus...Specialist on Congress and the Legislative Process vheitshusen@crs.loc.gov, 7-8635 Kristy N. Kamarck Analyst in Military Manpower kkamarck@crs.loc.gov

  15. Does reproduction compromise defense in woody plants?

    Science.gov (United States)

    Daniel A. Herms; William J. Mattson

    1991-01-01

    A general principle of adaptive allocation was proposed by Cody (1966) who hypothesized that 1) all living organisms have finite resources to partition among growth and competing physiological processes such as reproduction and defense; and 2) natural selection results in the evolution of unique resource allocation patterns that maximize fitness in different...

  16. 77 FR 59404 - Food Defense; Public Workshop

    Science.gov (United States)

    2012-09-27

    ... [Docket No. FDA-2012-N-0001] Food Defense; Public Workshop AGENCY: Food and Drug Administration, HHS. ACTION: Notice of public workshop. SUMMARY: The Food and Drug Administration (FDA), Office of Regulatory...), Robert M. Kerr Food & Agricultural Products Center (FAPC), is announcing a public workshop entitled...

  17. British Defense Policy: A New Approach?

    Science.gov (United States)

    1988-12-14

    by the 15th century. It was soon to be followed by the discovery of the New World, Newfoundland fishing areas, and sea routes to the Far East during... Zanzibar , Borneo, Tanganyika, 65 Uganda, Mauritus, Malaya and Korea. 13 Defense spending actually reflected the ambitious nature of the British pursuit of

  18. Defense Acquisition Structures and Capabilities Review

    Science.gov (United States)

    2007-06-01

    McWilliams, Department POC C-4 Stephen Miller Capt Andrew Rozek Kevin Slone Brian Shannon LtCol Michelle Trigg Grace Yang U.S. Special...Acquisition Executive, Defense Threat Reduction Agency Durante , Blaise, Deputy Assistant Secretary of the Air Force for Acquisi- tion Integration

  19. Assessment of Department of Defense reinvention laboratories.

    OpenAIRE

    Gosnell, James L.

    1997-01-01

    Approved for public release; distribution is unlimited This thesis examines improvements in business practices accomplished by Department of Defense (DOD) Reinvention Laboratories. DOD goals for the National Performance Review and accomplishments are analyzed. DOD incorporation of entrepreneurial government ideas of restructuring, reengineering, reinventing realigning, and rethinking are evaluated. Over $16.4 billion in financial savings achieved through increased efficiency are described....

  20. Host Defense Against Opportunist Microorganisms Following Trauma

    Science.gov (United States)

    1989-06-30

    Include Security Clasification ) (U) Host Defense Against Opportunist Microorganisms Following Trauma 12. PERSONAL AUTHOR(S) Bjornson, A. B., Bjornson...the course of bacterial and viral infec- tions. Infect. Immun. 30:824-831. 25. Zimmerli, W., B. Seligmann, and J. I. Gallin. 1986. Exudation primes

  1. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... discrimination under this part may include, but are not limited to, the following: (a) Disparate treatment... defense to a charge of discrimination, as described in § 1630.10, that an alleged application of... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...

  2. Upper Airway Control in Airway Defense

    Directory of Open Access Journals (Sweden)

    Poliacek I

    2016-04-01

    Full Text Available Upper airways (UA are an organic component of the respiratory tract, they serve to respiration, respiratory tract protection and defense, phonation, deglutition, etc. The functions of UA are regulated by motor control of the oral, pharyngeal, and laryngeal muscles.

  3. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Brian T. Smith, Roxanna T. Sun, Bruce H. Thomas, Oziel A. Trevino, and Alyssa Weir. The following primary staff were responsible for individual...ATOR) Erin E. Preston , Sean E. Manzano Integrated Air and Missile Defense (IAMD) Maria A. Durant, John M. Ortiz Joint Air-to-Surface Standoff Missile

  4. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  5. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  6. The Defense of Henderson Field, Guadalcanal

    Science.gov (United States)

    2011-03-31

    Combat Training Squadron, Creech Air Force Base, Nevada , where I will instruct airbase defense. In Memory Of Corporal Daniel J, Filler, United...intelligence. 22 / 4 The living conditions on Guadalcanal were extremely harsh throughout the campaign due to the near constant combat, hunger from lack of

  7. Langerhans cells in innate defense against pathogens

    NARCIS (Netherlands)

    de Jong, Marein A. W. P.; Geijtenbeek, Teunis B. H.

    2010-01-01

    Langerhans cells (LCs) are at the frontline in defense against mucosal infections because they line the mucosal tissues and are ideally situated to intercept pathogens. Recent data suggest that LCs have an innate anti-HIV-1 function. LCs express the LC-specific C-type lectin Langerin that

  8. Innate host defense against intracellular pathogens

    NARCIS (Netherlands)

    Vaart, Michiel van der

    2013-01-01

    This thesis focuses on the recognition of pathogenic bacteria and the defense mechanisms that are activated during the innate immune response to infection. Detection of pathogens, such as bacteria, viruses, and parasites, depends on receptors that bind to evolutionary conserved structures on their

  9. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  10. Pathogen pressure puts immune defense into perspective

    NARCIS (Netherlands)

    Horrocks, N.P.C.; Matson, K.D.; Tieleman, B.I.

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  11. Robust Defense Against Small Boat Attacks

    Science.gov (United States)

    2010-12-01

    Factors 24 Non-controllable Factors Fixed / Variable Levels Weather Fixed Fair weather Sea-State Fixed Benign (0 to 1) Environ- mental Shipping...McIntosh, G. C., Galligan, D. P., Anderson, M. A., & Lauren, M. K. (2007). MANA user’s manual. Defense Technology Agency, Auckland , New Zealand. Naval

  12. Shape understanding system machine understanding and human understanding

    CERN Document Server

    Les, Zbigniew

    2015-01-01

    This is the third book presenting selected results of research on the further development of the shape understanding system (SUS) carried out by authors in the newly founded Queen Jadwiga Research Institute of Understanding. In this book the new term Machine Understanding is introduced referring to a new area of research aiming to investigate the possibility of building machines with the ability to understand. It is presented that SUS needs to some extent mimic human understanding and for this reason machines are evaluated according to the rules applied for the evaluation of human understanding. The book shows how to formulate problems and how it can be tested if the machine is able to solve these problems.    

  13. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  14. A Study of Historical Inflation Forecasts Used in the Department of Defense Future Years Defense Program

    National Research Council Canada - National Science Library

    Sweitzer, Mark

    1997-01-01

    ...) Future Years Defense Program. The study examines historical DoD forecasts against experienced inflation as measured by the Gross National Product and Gross Domestic Product implicit price deflator (GNP/GDP IPD) from 1979 to 1996...

  15. Trends in German Defense Policy: The Defense Policy Guidelines and the Centralization of Operational Control

    National Research Council Canada - National Science Library

    Young, Thomas-Durell

    1994-01-01

    .... Bonn is also under pressure to reorient the Bundeswehr (Federal Armed Forces) from a defense force organized to deter war in the Central Region to one with deployment capabilities similar to those of other comparable powers...

  16. Area Ballistic Missile Defense Coordinator and the Airborne Laser: Creating Ballistic Missile Defense Unity of Effort

    National Research Council Canada - National Science Library

    Oms, Pedro

    2003-01-01

    Theater Ballistic Missile Defense (TBMD) is a challenging mission area for any Theater Combatant or Joint Task Force Commander, and one he must focus on to mitigate the strategic effects this "terror" weapon can impart...

  17. 75 FR 32635 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2010-06-08

    ... Regulation Supplement; Balance of Payments Program Exemption for Commercial Information Technology... Balance of Payments Program for construction material that is commercial information technology. This... Defense Federal Acquisition Regulation Supplement (DFARS) to implement the exemption from the Balance of...

  18. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  19. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... governance, audit and finance, human resources and compensation, economics, technology and healthcare. The... overall management and governance of the Department of Defense. The Board shall provide the Secretary of...

  20. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  1. Defense Acquisitions: Perspectives on Potential Changes to Department of Defense Acquisition Management Framework

    National Research Council Canada - National Science Library

    2009-01-01

    ...) for Major Defense Acquisition Programs (MDAP). In preparing the report, the review was required to include the feasibility and advisability of seven potential modifications of DOD's organization and structure for MDAPs...

  2. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  3. Department of Defense Annual Report to Congress on Defense Acquisition Challenge Program for FY 2006

    National Research Council Canada - National Science Library

    Kubricky, John J

    2007-01-01

    The Defense Acquisition Challenge (DAC) provides funds for the test and evaluation of technologies and products with potential to improve current acquisition programs at the component, subsystem, or system level...

  4. Allegations to the Defense Hotline on the Defense Security Assistance Management System

    National Research Council Canada - National Science Library

    Granetto, Paul

    2001-01-01

    .... (Appendix B provides a synopsis of each allegation and audit results.) The Defense Security Cooperation Agency initiated development of the DSAMS in 1995, to manage and process foreign military sales and replace 13 legacy systems...

  5. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  6. Defense Mechanisms: Discussions and Bibliographies; General or Multiple, and Specific.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This publication considers some Freudian ego mechanisms. The first discussion and bibliography concerns defense mechanisms, in general or in multiple; after which, the discussions and bibliographies concern specific defense mechanisms: denial; displacement, substitution, sublimation; fixation; identification, introjection, incorporation,…

  7. Interleukin-6 mediates host defense responses induced by abdominal surgery

    NARCIS (Netherlands)

    Wortel, C. H.; van Deventer, S. J.; Aarden, L. A.; Lygidakis, N. J.; Büller, H. R.; Hoek, F. J.; Horikx, J.; ten Cate, J. W.

    1993-01-01

    Cytokines have been implicated as pivotal mediators of the host defense reaction. In patients undergoing surgery we investigated the relationship between such mediators and postoperative host defense responses. Tumor necrosis factor (TNF) was determined with an immunoradiometric assay, interleukin

  8. Department of Defense Dictionary of Military and Associated Terms

    National Research Council Canada - National Science Library

    2007-01-01

    ... as to encompass the Department of Defense (DOD) as a whole. These military and associated terms, together with their definitions, constitute approved DOD terminology for general use by all components of the Department of Defense...

  9. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  10. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  11. Inventory Accuracy at the Defense Depot, Columbus, Ohio

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    We identified issues on the accuracy of inventory reporting for materiel stored at the Defense Depot, Columbus, Ohio during our overall audit of the inventory accounts in the FY 1996 Defense Business...

  12. Defense Readiness Reporting System: A Better Way to Measure Readiness?

    National Research Council Canada - National Science Library

    Dewey, John T

    2007-01-01

    ...) examines the Defense Readiness Report System (DRRS) to see if it (a) provides an objective assessment of capabilities to meet the mission priorities established by the Office of the Secretary of Defense (OSD) (b...

  13. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  14. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  15. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  16. Defense mechanisms in psychology today. Further processes for adaptation.

    Science.gov (United States)

    Cramer, P

    2000-06-01

    Although the concept of the defense mechanism was rejected from academic psychology for a number of years, recent empirical studies show renewed interest in defenses. Cognitive psychologists have confirmed the existence of unconscious psychological processes, a requisite for defenses. Developmental, personality, and social psychologists have all found evidence for defense mechanisms that explicate psychological functioning. The relevance of this new information for clinical practice is discussed.

  17. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    press-center/press-releases/Pages/jl2197.aspx. 2 For purposes of this report, total obligations are defined as total direct obligations. Deflators for...Department of Defense, “Department of Defense Deflators – TOA by Category ‘Total Non- (continued...) Defense Acquisition Reform: Background...April 2013, p. 5. 37 The five largest 2012 defense budgets were China ($102.4B), United Kingdom ($60.8B), Russia ($59.9B), Japan ($59.4B), and

  18. Case series on defense mechanisms in patients for reconstructive hand transplantation: consideration on transplant defense concept.

    Science.gov (United States)

    Kumnig, Martin; Jowsey, Sheila G; Moreno, Elisa; Brandacher, Gerald; Azari, Kodi; Rumpold, Gerhard

    2014-05-16

    The technical demands of reconstructive hand transplantation (RHT) and need for complex multidisciplinary care have led to intense research efforts to improve patient care and outcomes. However, RHT is an extraordinary life event which carries the potential for long-term consequences including psychological distress, which invokes coping and defense mechanisms. Little is known about the relationship between psychological defense mechanisms and health outcomes in RHT patients. In an effort to elucidate this relationship, we studied seven RHT patients who underwent standardized psychological assessment either pre- or post transplantation. No single defense concept was identified as common to all patients, which we suspect was due in part to the varied mechanisms of hand loss. All seven patients demonstrated diverse psychological reactions to RHT. The self-reported defense styles were associated with psychological adjustment. The patients who reported defenses that distorted reality described less adaptive functioning and psychological well-being. These preliminary findings reveal the varied psychological mechanisms invoked in RHT patients. An assessment of defense mechanisms should be part of multicenter evaluation protocols that address unique psychosocial aspects of RHT in large samples, in order to better guide psychological management.

  19. Attacked from All Sides: RNA Decay in Antiviral Defense

    Directory of Open Access Journals (Sweden)

    Jerome M. Molleston

    2017-01-01

    Full Text Available The innate immune system has evolved a number of sensors that recognize viral RNA (vRNA to restrict infection, yet the full spectrum of host-encoded RNA binding proteins that target these foreign RNAs is still unknown. The RNA decay machinery, which uses exonucleases to degrade aberrant RNAs largely from the 5′ or 3′ end, is increasingly recognized as playing an important role in antiviral defense. The 5′ degradation pathway can directly target viral messenger RNA (mRNA for degradation, as well as indirectly attenuate replication by limiting specific pools of endogenous RNAs. The 3′ degradation machinery (RNA exosome is emerging as a downstream effector of a diverse array of vRNA sensors. This review discusses our current understanding of the roles of the RNA decay machinery in controlling viral infection.

  20. Attacked from All Sides: RNA Decay in Antiviral Defense

    Science.gov (United States)

    Molleston, Jerome M.; Cherry, Sara

    2017-01-01

    The innate immune system has evolved a number of sensors that recognize viral RNA (vRNA) to restrict infection, yet the full spectrum of host-encoded RNA binding proteins that target these foreign RNAs is still unknown. The RNA decay machinery, which uses exonucleases to degrade aberrant RNAs largely from the 5′ or 3′ end, is increasingly recognized as playing an important role in antiviral defense. The 5′ degradation pathway can directly target viral messenger RNA (mRNA) for degradation, as well as indirectly attenuate replication by limiting specific pools of endogenous RNAs. The 3′ degradation machinery (RNA exosome) is emerging as a downstream effector of a diverse array of vRNA sensors. This review discusses our current understanding of the roles of the RNA decay machinery in controlling viral infection. PMID:28054965

  1. Mechanisms of Defense: Nepenthe Theory and Psychiatric Symptomatology

    Science.gov (United States)

    Azibo, Daudi Ajani ya

    2007-01-01

    Results of exploratory research on defense mechanisms and psychiatric symptomatology are reported about Black students enrolled in classes on the campus of one Historically Black College and University. Theoretical influences are twofold: ego mechanisms of defense conceptualized hierarchically and a culture-specific view of defense mechanism…

  2. 22 CFR 120.12 - Directorate of Defense Trade Controls.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Directorate of Defense Trade Controls. 120.12 Section 120.12 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.12 Directorate of Defense Trade Controls. Directorate of Defense Trade Controls, Bureau of...

  3. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    finds that DOD can incorporate innovation practices by dispersing organizations focused on new capabilities development across the agency to avoid...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management, organizational culture ...Device De- feat Organization , JIEDDO, Rapid Equipping Force, REF Silicon Valley-style innovation is a hot topic in the Department of De-fense (DOD). For

  4. The Child as Psychologist: Attributions and Evaluations of Defensive Strategies.

    Science.gov (United States)

    Dollinger, Stephen J.; And Others

    1981-01-01

    Studied children's attributions and evaluations concerning defense mechanisms used by other children. Children negatively evaluated the blame-externalizing defense of projection and viewed it as a masculine characteristic. The internalizing defense of self-blame was evaluated more positively and viewed as a feminine characteristic. (Author/DB)

  5. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  6. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  7. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.

    2003-01-01

    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  8. Using Breaking Bad to teach about defense mechanisms.

    Science.gov (United States)

    Johnson, Justin M; Beresin, Eugene V; Stern, Theodore A

    2014-12-01

    Defense mechanisms represent an important component of medical education that should be taught to all medical students, psychiatry residents, and other mental health trainees. Teaching about defense mechanisms can become more engaging by analyzing popular media. Using Breaking Bad, a well-known television show, we recommend specific scenes and episodes that can be used in teaching about defense mechanisms.

  9. 29 CFR 1450.8 - Omissions not a defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Omissions not a defense. 1450.8 Section 1450.8 Labor... OWED THE UNITED STATES General Provisions § 1450.8 Omissions not a defense. The failure of FMCS to comply with any provision in this regulation shall not serve as a defense to the debt. ...

  10. 45 CFR 1230.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Secretary of Defense. 1230.500 Section 1230.500... SERVICE NEW RESTRICTIONS ON LOBBYING Exemptions § 1230.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the prohibition whenever the...

  11. 22 CFR 213.7 - Omission not a defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Omission not a defense. 213.7 Section 213.7... defense. Failure by USAID to comply with any provision of this part is not available to a debtor as a defense against payment of a debt. ...

  12. 44 CFR 18.500 - Secretary of Defense.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Secretary of Defense. 18.500... HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Exemptions § 18.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the prohibition...

  13. 49 CFR 1018.6 - Omissions not a defense.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Omissions not a defense. 1018.6 Section 1018.6... Omissions not a defense. (a) The failure of the Board to include in this part any provision of the Federal... the Federal Claims Collection Standards as a defense to the debt. ...

  14. 24 CFR 87.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Secretary of Defense. 87.500... Development NEW RESTRICTIONS ON LOBBYING Exemptions § 87.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the prohibition whenever the...

  15. 40 CFR 13.7 - Omission not a defense.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Omission not a defense. 13.7 Section 13... General § 13.7 Omission not a defense. Failure by the Administrator to comply with any provision of this regulation is not available to a debtor as a defense against payment of a debt. ...

  16. 7 CFR 3018.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Secretary of Defense. 3018.500 Section 3018.500..., DEPARTMENT OF AGRICULTURE NEW RESTRICTIONS ON LOBBYING Exemptions § 3018.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the prohibition...

  17. 22 CFR 512.8 - Omissions not a defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Omissions not a defense. 512.8 Section 512.8... 1982 General Provisions § 512.8 Omissions not a defense. The failure of Broadcasting Board of Governors to comply with any provision in this regulation shall not serve as a defense to the debt. ...

  18. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a... § 274a.2(b) of this part shall have established a rebuttable affirmative defense that the person or...

  19. 22 CFR 311.500 - Secretary of Defense.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secretary of Defense. 311.500 Section 311.500 Foreign Relations PEACE CORPS NEW RESTRICTIONS ON LOBBYING Exemptions § 311.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the...

  20. 10 CFR 70.13 - Department of Defense.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Department of Defense. 70.13 Section 70.13 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DOMESTIC LICENSING OF SPECIAL NUCLEAR MATERIAL Exemptions § 70.13 Department of Defense. The regulations in this part do not apply to the Department of Defense to the extent...

  1. 47 CFR 1.1908 - Omissions not a defense.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Omissions not a defense. 1.1908 Section 1.1908... United States General Provisions § 1.1908 Omissions not a defense. The failure or omission of the Commission to comply with any provision in this regulation shall not serve as a defense to any debtor. ...

  2. 29 CFR 93.500 - Secretary of Defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Secretary of Defense. 93.500 Section 93.500 Labor Office of the Secretary of Labor NEW RESTRICTIONS ON LOBBYING Exemptions § 93.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered Federal action from the prohibition...

  3. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  4. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  5. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  6. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  8. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  10. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    OpenAIRE

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enrich...

  11. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  12. 75 FR 68333 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; DFARS...

    Science.gov (United States)

    2010-11-05

    ... Defense Acquisition Regulations System Information Collection Requirement; Defense Federal Acquisition... electronic form. The information is required for material inspection and acceptance, shipping, and payment...-0248) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Notice and...

  13. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  14. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  15. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  16. Infrared point sensors for homeland defense applications

    Science.gov (United States)

    Thomas, Ross C.; Carter, Michael T.; Homrighausen, Craig L.

    2004-03-01

    We report recent progress toward the development of infrared point sensors for the detection of chemical warfare agents and explosive related chemicals, which pose a significant threat to both health and environment. Technical objectives have focused on the development of polymer sorbents to enhance the infrared response of these hazardous organic compounds. For example, infrared point sensors which part-per-billion detection limits have been developed that rapidlypartition chemical warfare agents and explosive related chemicals into polymer thin films with desirable chemical and physical properties. These chemical sensors demonstrate novel routes to reversible sensing of hazardous organic compounds. The development of small, low-power, sensitive, and selective instruments employing these chemical sensors would enhance the capabilities of federal, state, and local emergency response to incidents involving chemical terrorism. Specific applications include chemical defense systems for military personnel and homeland defense, environmental monitors for remediation and demilitarization, and point source detectors for emergency and maintenance response teams.

  17. Plant defense against herbivores: chemical aspects.

    Science.gov (United States)

    Mithöfer, Axel; Boland, Wilhelm

    2012-01-01

    Plants have evolved a plethora of different chemical defenses covering nearly all classes of (secondary) metabolites that represent a major barrier to herbivory: Some are constitutive; others are induced after attack. Many compounds act directly on the herbivore, whereas others act indirectly via the attraction of organisms from other trophic levels that, in turn, protect the plant. An enormous diversity of plant (bio)chemicals are toxic, repellent, or antinutritive for herbivores of all types. Examples include cyanogenic glycosides, glucosinolates, alkaloids, and terpenoids; others are macromolecules and comprise latex or proteinase inhibitors. Their modes of action include membrane disruption, inhibition of nutrient and ion transport, inhibition of signal transduction processes, inhibition of metabolism, or disruption of the hormonal control of physiological processes. Recognizing the herbivore challenge and precise timing of plant activities as well as the adaptive modulation of the plants' metabolism is important so that metabolites and energy may be efficiently allocated to defensive activities.

  18. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  19. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna

    2016-01-01

    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  20. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    , there is no reason why this framework could not be extended to the Baltic states.36 A NORBALDEFCO would not only cement the prominent role of Sweden and Finland within NATO as premier partners, it would also formally continue the work begun with Baltic independ- ence after the Cold War, and furthermore strengthen......The Nordic-Baltic countries are not really a region, but a proto- region that perhaps is coming closer to being a proper region because of the changing geopolitical conditions outside the area. Russian actions in Ukraine have increased threat perception in the region and pose a fundamental...... and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  1. NATIONAL DEFENSE FROM “A TO Z”. DEFINITIONS AND CONCEPTS

    Directory of Open Access Journals (Sweden)

    JULIO SOTO SILVA

    2018-02-01

    Full Text Available Today, we can confirm that a growing interest get acquainted with Security and Defense related issues exists. Besides of this fact, our Spanish language is more and more influenced by new slangs and words most of the times without an appropriate translation. I have thought that establishing a set of current definitions will assist to a better understanding of the words and concepts normally used when we talk about Security and Defense. With these concepts on hand, is easier to understand the lexicon used in the treatment to such issues. This list are by no means the final one, moreover, it can be enriched with a lot of more definitions and concepts, that will help to build up a larger lexicon.

  2. Seven Defense Priorities for the New Administration

    Science.gov (United States)

    2016-12-16

    building consume human and financial military resources for decades. New weapons like cyber and autonomous systems are aimed at the heart of the U.S...defense to make optimal use of funding and of scarce technical human resources ; determining the challenges and opportunities of cyber relative to...commitment needed, but the price to pay in both human resources and budget is substantial, given the more than two decades of neglect. Through its

  3. Defense Horizons. Number 79, April 2015

    Science.gov (United States)

    2015-04-01

    control number. 1. REPORT DATE APR 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Defense Horizons. Number...on the block number of the aircraft. While the maritime inverse synthetic aper - ture radar is available on the new RQ-4 Block 40, a more accessible...maintains a loiter time of approximately 24 hours. Its specifications match exactly what would be called for in this type of mission. However, unlike the

  4. Defense: FY2010 Authorization and Appropriations

    Science.gov (United States)

    2009-12-23

    is becoming a matter of increasing concern within the Defense Department. New stealthy aircraft, multi-mission ships, advanced space systems, and...Authorization and Appropriations Congressional Research Service 23 • Poor cost estimates: The difficulties engendered by accelerating intergenerational ...Feickert. 95 Amy Butler, “Army Shifts Focus to Helo Pilot Training,” Aviation Week and Space Technology, April 20, 2009. 96 Prepared by Ronald

  5. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    gain a US concession, (strategic defense would eliminate this threat) or a threat from what has been referred to as a " suitcase bomb". (5:60) A...34 suitcase bomb" refers to smuggling nuclear devices into the US and placing the bomb close to targets. Detonation would occur when deemed appropriate...parti- cles can degrade electronic systems on a satellite. Although the altitudes vary with solar activity, the inner proton belt’s peak flux is

  6. Macrophage defense mechanisms against intracellular bacteria.

    Science.gov (United States)

    Weiss, Günter; Schaible, Ulrich E

    2015-03-01

    Macrophages and neutrophils play a decisive role in host responses to intracellular bacteria including the agent of tuberculosis (TB), Mycobacterium tuberculosis as they represent the forefront of innate immune defense against bacterial invaders. At the same time, these phagocytes are also primary targets of intracellular bacteria to be abused as host cells. Their efficacy to contain and eliminate intracellular M. tuberculosis decides whether a patient initially becomes infected or not. However, when the infection becomes chronic or even latent (as in the case of TB) despite development of specific immune activation, phagocytes have also important effector functions. Macrophages have evolved a myriad of defense strategies to combat infection with intracellular bacteria such as M. tuberculosis. These include induction of toxic anti-microbial effectors such as nitric oxide and reactive oxygen intermediates, the stimulation of microbe intoxication mechanisms via acidification or metal accumulation in the phagolysosome, the restriction of the microbe's access to essential nutrients such as iron, fatty acids, or amino acids, the production of anti-microbial peptides and cytokines, along with induction of autophagy and efferocytosis to eliminate the pathogen. On the other hand, M. tuberculosis, as a prime example of a well-adapted facultative intracellular bacterium, has learned during evolution to counter-balance the host's immune defense strategies to secure survival or multiplication within this otherwise hostile environment. This review provides an overview of innate immune defense of macrophages directed against intracellular bacteria with a focus on M. tuberculosis. Gaining more insights and knowledge into this complex network of host-pathogen interaction will identify novel target sites of intervention to successfully clear infection at a time of rapidly emerging multi-resistance of M. tuberculosis against conventional antibiotics. © 2015 The Authors

  7. Improving Europe’s Conventional Defenses.

    Science.gov (United States)

    1983-06-01

    pictured as offensive, it helps to penetrate such justifications The more clearly defensive the NATO military posture, the harder it is for the...able to avoid such messy questions as how to conduct a fighting withdrawal through Nürnberg or a meeting engagement on the plains of Lower Saxony ...NATO Europe to prepare to fight if it wants to deter, to address such messy questions as Nürnberg and Lower Saxony . Yet, even serious war fighting

  8. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    largely signature based, 4 requiring prior knowledge of a threat. Second, enterprise- class network defense devices handle incredibly high speeds...to the high volume of response actions that must be performed on enterprise- class networks, very little analysis is applied to the correlation of the...examine traffic only at perimeter gateways. Some enterprise antivirus solutions provide protection at the host level, but fail to allow network

  9. Macrophage defense mechanisms against intracellular bacteria

    Science.gov (United States)

    Weiss, Günter; Schaible, Ulrich E

    2015-01-01

    Macrophages and neutrophils play a decisive role in host responses to intracellular bacteria including the agent of tuberculosis (TB), Mycobacterium tuberculosis as they represent the forefront of innate immune defense against bacterial invaders. At the same time, these phagocytes are also primary targets of intracellular bacteria to be abused as host cells. Their efficacy to contain and eliminate intracellular M. tuberculosis decides whether a patient initially becomes infected or not. However, when the infection becomes chronic or even latent (as in the case of TB) despite development of specific immune activation, phagocytes have also important effector functions. Macrophages have evolved a myriad of defense strategies to combat infection with intracellular bacteria such as M. tuberculosis. These include induction of toxic anti-microbial effectors such as nitric oxide and reactive oxygen intermediates, the stimulation of microbe intoxication mechanisms via acidification or metal accumulation in the phagolysosome, the restriction of the microbe's access to essential nutrients such as iron, fatty acids, or amino acids, the production of anti-microbial peptides and cytokines, along with induction of autophagy and efferocytosis to eliminate the pathogen. On the other hand, M. tuberculosis, as a prime example of a well-adapted facultative intracellular bacterium, has learned during evolution to counter-balance the host's immune defense strategies to secure survival or multiplication within this otherwise hostile environment. This review provides an overview of innate immune defense of macrophages directed against intracellular bacteria with a focus on M. tuberculosis. Gaining more insights and knowledge into this complex network of host-pathogen interaction will identify novel target sites of intervention to successfully clear infection at a time of rapidly emerging multi-resistance of M. tuberculosis against conventional antibiotics. PMID:25703560

  10. Defense mechanisms of hepatocytes against Burkholderia pseudomallei

    Directory of Open Access Journals (Sweden)

    Antje eBast

    2012-01-01

    Full Text Available The gram-negative facultative intracellular rod Burkholderia pseudomallei causes melioidosis, an infectious disease with a wide range of clinical presentations. Among the observed visceral abscesses, the liver is commonly affected. However, neither this organotropism of B. pseudomallei nor local hepatic defense mechanisms have been thoroughly investigated so far. Own previous studies using electron microscopy of the murine liver after systemic infection of mice indicated that hepatocytes might be capable of killing B. pseudomallei. Therefore, the aim of this study was to further elucidate the interaction of B. pseudomallei with these cells and to analyse the role of hepatocytes in anti-B. pseudomallei host defense. In vitro studies using the human hepatocyte cell line HepG2 revealed that B. pseudomallei can invade these cells. Subsequently, B. pseudomallei is able to escape from the vacuole, to replicate within the cytosol of HepG2 cells involving its type 3 and type 6 secretion systems, and to induce actin tail formation. Furthermore, stimulation of HepG2 cells showed that IFNgamma can restrict growth of B. pseudomallei in the early and late phase of infection whereas the combination of IFNgamma, IL-1beta and TNFalpha is required for the maximal antibacterial activity. This anti-B. pseudomallei defense of HepG2 cells did not seem to be mediated by iNOS-derived nitric oxide or NADPH oxidase-derived superoxide. In summary, this is the first study describing B. pseudomallei intracellular life cycle characteristics in hepatocytes and showing that IFNgamma-mediated, but nitric oxide- and reactive oxygen species-independent, effector mechanisms are important in anti-B. pseudomallei host defense of hepatocytes.

  11. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    of OS NETWORK LAYER • Static Routing - routes are chosen from fixed tables which are determined manually at sysgen time. Each possible .. " 4’ source...Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...and signalling operations staff in the event of a failure. The DDN is designed to be able to continue operation without manual intervention . in the

  12. National Defense Industrial Association Disruptive Technologies Conference

    Science.gov (United States)

    2009-10-14

    Algorithms, MEMS • Nano ; Meta; & New Materials • Cognitive Computing • Bio-Revolution NDIA Disruptive Technologies 10/16/2009 Page-8 Forces of Change...DISTRIBUTE 2 1 st Cen t u r y St r a t eg ic Tec h n o l o g y Vec t o r s Defense Science Board 2006 Summer Study August 18, 2006 (Final) NDIA

  13. Defense Systems Modernization and Sustainment Initiative

    Science.gov (United States)

    2014-03-31

    System Resilience and Survivability SR &S1 R. T , Tŕ Defense Systems Modernization X X and Sustainment Initiative Center for Integrated...approximately by a percent, which is significant, considering that some of the cells are only used within 20% of their capacity. Chen- Mora model, described...CTL for modeling transients at different rates. ST9 VT) Ccapacity soc Figure 8. Chen- Mora model2 Time-domain analysis is based on a short

  14. Russian Ballistic Missile Defense: Rhetoric and Reality

    Science.gov (United States)

    2015-06-01

    cooperate (they even share a common catalog of tar - 7 gets with single designations), but, as one Russian de- fense analyst put it, “in practice such...19 Aleksandr Tar - nayev, a member of the Russian State Duma Defense Committee, complained that due to insufficient funds, the VKO command could not...well as nuclear warheads, will probably utilize the presently moth- balled 51T6 (Gorgon) silos. It should have a range of up to 100-km and an

  15. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ..., public health and safety effects, distributive impacts, and equity). E.O. 13563 emphasizes the importance...). The defense agencies are the Defense Advanced Research Projects Agency, the Defense Commissary Agency, the Defense Contract Management Agency, the Defense Finance and Accounting Service, the Defense...

  16. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  17. Strategic defense requirements for progressive applications

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.; Browne, J.C.

    1991-03-01

    A companion paper discusses various applications for which strategic defense concepts could be used. The applications form a progression in size and complexity from accidental or unauthorized launches, through third country or subnational threats, to limited or strategic exchanges. This report attempts to quantify the requirements for meeting those applications and to assess the maturity of current strategic defense concepts relative to them, concluding that there are adequate interceptors for all of them, but that sensitivities to uncertainties in discrimination are awkward at all levels and bothersome at the high end. Strategic defenses are applicable to a progression of threats that range from accidental or unauthorized launches, through third country or subnational threats, to limited or strategic exchanges. Technologies exist for long range launches, but launches close to shore are feasible, stressing, and favor the attacker. Space based interceptors are suited to meeting the bulk of the launches; directed energy has significant advantages in reducing the threat to manageable levels. Current interceptor concepts appear adequate, but discrimination is both pivotal and delayed. 38 refs., 10 figs.

  18. Hanford defense waste environmental impact statement

    International Nuclear Information System (INIS)

    Burnham, J.B.; Nelson, I.C.; White, J.D.

    1986-01-01

    The environmental impacts of three alternative methods for disposal of Hanford defense wastes were analyzed in an environmental impact statement (EIS), DOE/EIS-0013. A fourth alternative, no disposal action, was included to satisfy CEQ regulations. Hanford defense waste differ dramatically from commercial nuclear wastes. The fuel elements are irradiated to very low burnups (by commercial standards), the fuel has all been processed (in some cases several times) to extract uranium and plutonium, much of the strontium and cesium has been removed and concentrated in capsules, and the remaining wastes have been highly diluted by processing and by neutralizing salts. The activity per unit volume is ∼ 1/1000 that of commercial spent fuel. Hanford waste is currently stored in a variety of forms and locations. It was categorized into six classes for analysis. The major radionuclides by waste class are shown. Numerous alternatives were considered for treating Hanford defense wastes. Of those studied, four were considered to be reasonable for detailed analysis. A highly abbreviated description of their salient features is presented: (1) geologic disposal; (2) in-place stabilization and disposal; (3) reference (combination disposal); and (4) no disposal action

  19. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  20. DIFFICULTIES IN EMOTION REGULATION AMONG INPATIENTS WITH SUBSTANCE USE DISORDERS: THE MEDIATING EFFECT OF MATURE DEFENSES MECHANISMS

    Directory of Open Access Journals (Sweden)

    Rossella Di Pierro

    2015-08-01

    Full Text Available Objective: Although the relationship between Substance Use Disorders (SUDs and emotion regulation is a topic of great scientific interest, little is still known about the nature of this association. The aim of the present study is to clarify which specific difficulties in emotion regulation describe SUD inpatients, studying whether this relationship is mediated by the use of defense mechanisms. Method: Difficulties in emotion regulation and defense mechanisms were evaluated in 58 SUDs inpatients and 73 community participants. Results: Results showed that SUDs are associated with limited access to emotion regulation strategies when negative emotions are experienced. This relationship between difficulty in accessing emotion regulation strategies and the presence of SUDs was mediated by mature defenses. The more difficulties in accessing such strategies were, the less mature defenses were used; the less mature defenses were used, the more likely the presence of SUDs was. Conclusions: These findings suggest the importance of considering mature defense mechanisms in understanding difficulties in emotion regulation among SUD inpatients. Research and Clinical implications are discussed.

  1. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  2. Molecular Mechanisms for Microbe Recognition and Defense by the Red SeaweedLaurencia dendroidea.

    Science.gov (United States)

    de Oliveira, Louisi Souza; Tschoeke, Diogo Antonio; Magalhães Lopes, Ana Carolina Rubem; Sudatti, Daniela Bueno; Meirelles, Pedro Milet; Thompson, Cristiane C; Pereira, Renato Crespo; Thompson, Fabiano L

    2017-01-01

    The ability to recognize and respond to the presence of microbes is an essential strategy for seaweeds to survive in the marine environment, but understanding of molecular seaweed-microbe interactions is limited. Laurencia dendroidea clones were inoculated with the marine bacterium Vibrio madracius . The seaweed RNA was sequenced, providing an unprecedentedly high coverage of the transcriptome of Laurencia , and the gene expression levels were compared between control and inoculated samples after 24, 48, and 72 h. Transcriptomic changes in L. dendroidea in the presence of V. madracius include the upregulation of genes that participate in signaling pathways described here for the first time as a response of seaweeds to microbes. Genes coding for defense-related transcription activators, reactive oxygen species metabolism, terpene biosynthesis, and energy conversion pathways were upregulated in inoculated samples of L. dendroidea , indicating an integrated defensive system in seaweeds. This report contributes significantly to the current knowledge about the molecular mechanisms involved in the highly dynamic seaweed-bacterium interactions. IMPORTANCE Marine bacteria are part of the healthy microbiota associated with seaweeds, but some species, such as Vibrio spp., are frequently associated with disease outbreaks, especially in economically valuable cultures. In this context, the ability of seaweeds to recognize microbes and, when necessary, activate defense mechanisms is essential for their survival. However, studies dedicated to understanding the molecular components of the immune response in seaweeds are rare and restricted to indirect stimulus. This work provides an unprecedentedly large-scale evaluation of the transcriptional changes involved in microbe recognition, cellular signaling, and defense in the red seaweed Laurencia dendroidea in response to the marine bacterium Vibrio madracius . By expanding knowledge about seaweed-bacterium interactions and about the

  3. Erwinia carotovora elicitors and Botrytis cinerea activate defense responses in Physcomitrella patens

    Directory of Open Access Journals (Sweden)

    Bentancor Marcel

    2007-10-01

    . cinerea induce this type of cell death in vascular plants, our results suggest that E.c. carotovora CFSCC1 containing HrpN and B. cinerea could also induce this type of cell death in Physcomitrella. Our studies thus establish Physcomitrella as an experimental host for investigation of plant-pathogen interactions and B. cinerea and elicitors of E.c. carotovora as promising tools for understanding the mechanisms involved in defense responses and in pathogen-mediated cell death in this simple land plant.

  4. Role of Soluble Innate Effector Molecules in Pulmonary Defense against Fungal Pathogens.

    Science.gov (United States)

    Ordonez, Soledad R; Veldhuizen, Edwin J A; van Eijk, Martin; Haagsman, Henk P

    2017-01-01

    Fungal infections of the lung are life-threatening but rarely occur in healthy, immunocompetent individuals, indicating efficient clearance by pulmonary defense mechanisms. Upon inhalation, fungi will first encounter the airway surface liquid which contains several soluble effector molecules that form the first barrier of defense against fungal infections. These include host defense peptides, like LL-37 and defensins that can neutralize fungi by direct killing of the pathogen, and collectins, such as surfactant protein A and D, that can aggregate fungi and stimulate phagocytosis. In addition, these molecules have immunomodulatory activities which can aid in fungal clearance from the lung. However, existing observations are based on in vitro studies which do not reflect the complexity of the lung and its airway surface liquid. Ionic strength, pH, and the presence of mucus can have strong detrimental effects on antifungal activity, while the potential synergistic interplay between soluble effector molecules is largely unknown. In this review, we describe the current knowledge on soluble effector molecules that contribute to antifungal activity, the importance of environmental factors and discuss the future directions required to understand the innate antifungal defense in the lung.

  5. The eye movement desensitization and reprocessing procedure prevents defensive processing in health persuasion.

    Science.gov (United States)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a university sample (n = 124) listened to the persuasive message in a randomized laboratory experiment. In the EMDR condition, they were also instructed to follow with their eyes a dot on the computer screen. The dot constantly moved from one side of the screen to the other in 2 seconds. In addition, a self-affirmation procedure was applied in half of the participants. EMDR led to a significant increase in persuasion, only in recipients in whom the persuasive message could be expected to activate defensive self-regulation (in participants with a moderate health value and in participants with low self-esteem). In those with a moderate health value, EMDR increased persuasion, but only when recipients were not affirmed. In addition, EMDR increased persuasion only in recipients with low self-esteem, not in those with high self-esteem. These results showed that EMDR influenced persuasion and in some way lowered defensive reactions. The similarities and differences in effects of EMDR and self-affirmation further increased our insight into the psychology of defensiveness.

  6. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  7. Chemical defenses in Sacoglossan Opisthobranchs: Taxonomic trends and evolutionary implications

    Directory of Open Access Journals (Sweden)

    Arnaldo Marín

    2004-04-01

    Full Text Available Sacoglossan sea slugs (Mollusca: Opisthobranchia are one of the few groups of specialist herbivores in the marine environment. Sacoglossans feed suctorially on the cell sap of macroalgae, from which they "steal" chloroplasts (kleptoplasty and deterrent substances (kleptochemistry, retaining intracellularly both host plastids and chemicals. The ingested chloroplasts continue to photosynthesize for periods ranging from a few hours or days up to 3 months in some species. Shelled, more primitive sacoglossans feed only on the siphonalean green algal genus Caulerpa, and they do not have functional kleptoplasty. The diet of sacoglossans has radiated out from this ancestral food. Among the shell-less Plakobranchidae (=Elysiidae, the more primitive species feed on other siphonales (families Derbesiaceae, Caulerpaceae, Bryopsidaceae and Codiaceae and fix carbon, while the more "advanced" species within the Plakobranchidae and Limapontioidae have a more broad dietary range. Most of these "advanced" species are unable to fix carbon because the chloroplasts of their food algae are mechanically disrupted during ingestion. Mesoherbivores are likely to be eaten if they live on palatable seaweeds, their cryptic coloration and form not always keeping them safe from predators. Sacoglossans prefer to live on and eat chemically defended seaweeds, and they use ingested algal chemicals as deterrents of potential predators. The most ancestral shelled sacoglossans (Oxynoidae and some Plakobranchidae such as Elysia translucens, Thuridilla hopei and Bosellia mimetica have developed a diet-derived chemical defense mechanism. Oxynoids and Thuridilla hopei are able to biomodify the algal metabolites. However, the Plakobranchidae Elysia timida and E. viridis, together with Limapontioidea species, are characterized by their ability to de novo synthesize polypropionate metabolites. A whole analysis of kleptoplasty and chemical defenses in sacoglossans may offer a better

  8. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  9. Subversion and utilization of host innate defense by Leishmania amazonensis

    Directory of Open Access Journals (Sweden)

    Lynn eSoong

    2012-03-01

    Full Text Available Infection with Leishmania amazonensis and other members of the L. mexicana complex can lead to diverse clinical manifestations, some of which are relatively difficult to control, even with standard chemotherapy. Diffuse cutaneous leishmaniasis is a rare but severe form, and its clinical hallmark is excessive parasitic growth in infected cells accompanied by profound impairments in host immune responses to the parasites. Since these parasites also cause non-healing cutaneous leishmaniasis in most inbred strains of mice, these animals are valuable models for dissecting the mechanisms of persistent infection and disease pathogenesis. In comparison to other Leishmania species, L. amazonensis infections are most remarkable for their ability to repress the activation and effector functions of macrophages, dendritic cells and CD4+ T cells, implying discrete mechanisms at work. In addition to this multilateral suppression of host innate and adaptive immunity, the activation of types I and II interferon-mediated responses and autophagic/lipid metabolic pathways actually promotes rather than restrains L. amazonensis infection. These seemingly contradictory findings reflect the remarkable adaptation of the parasites to the ancient defense machinery of the host, as well as the complex parasite-host interactions at different stages of infection, which collectively contribute to non-healing leishmaniasis in the New World. This review article highlights new evidence that reveals the strategies utilized by L. amazonensis parasites to subvert or modulate host innate defense machinery in neutrophils and macrophages, as well as the regulatory roles of host innate responses in promoting parasite survival and replication within the huge parasitophorous vacuoles. A better understanding of unique features in host responses to these parasites at early and late stages of infection is important for the rational design of control strategies for non-healing leishmaniasis.

  10. Subversion and Utilization of Host Innate Defense by Leishmania amazonensis.

    Science.gov (United States)

    Soong, Lynn

    2012-01-01

    Infection with Leishmania amazonensis and other members of the Leishmania mexicana complex can lead to diverse clinical manifestations, some of which are relatively difficult to control, even with standard chemotherapy. Diffuse cutaneous leishmaniasis (CL) is a rare but severe form, and its clinical hallmark is excessive parasitic growth in infected cells accompanied by profound impairments in host immune responses to the parasites. Since these parasites also cause non-healing CL in most inbred strains of mice, these animals are valuable models for dissecting the mechanisms of persistent infection and disease pathogenesis. In comparison to other Leishmania species, L. amazonensis infections are most remarkable for their ability to repress the activation and effector functions of macrophages, dendritic cells, and CD4(+) T cells, implying discrete mechanisms at work. In addition to this multilateral suppression of host innate and adaptive immunity, the activation of types I and II interferon-mediated responses and autophagic/lipid metabolic pathways actually promotes rather than restrains L. amazonensis infection. These seemingly contradictory findings reflect the remarkable adaptation of the parasites to the ancient defense machinery of the host, as well as the complex parasite-host interactions at different stages of infection, which collectively contribute to non-healing leishmaniasis in the New World. This review article highlights new evidence that reveals the strategies utilized by L. amazonensis parasites to subvert or modulate host innate defense machinery in neutrophils and macrophages, as well as the regulatory roles of host innate responses in promoting parasite survival and replication within the huge parasitophorous vacuoles. A better understanding of unique features in host responses to these parasites at early and late stages of infection is important for the rational design of control strategies for non-healing leishmaniasis.

  11. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  12. 75 FR 2858 - Negotiation of a Reciprocal Defense Procurement Memorandum of Understanding With the Czech Republic

    Science.gov (United States)

    2010-01-19

    ... notices of proposed purchases; The content and availability of solicitations for proposed purchases... process to ensure that, to the extent possible, complaints are equitably and expeditiously resolved. Based... warfare protection clothing restrictions in 10 U.S.C. 2533a and the specialty metals restriction in 10 U.S...

  13. Promoting Students' Conceptual Understanding of Plant Defense Responses Using the Fighting Plant Learning Unit (FPLU)

    Science.gov (United States)

    Nantawanit, Nantawan; Panijpan, Bhinyo; Ruenwongsa, Pintip

    2012-01-01

    Most students think animals are more interesting than plants as a study topic believing that plants are inferior to animals because they are passive and unable to respond to external challenges, particularly biological invaders such as microorganisms and insect herbivores. The purpose of this study was to develop an inquiry-based learning unit,…

  14. Understanding Complexity and Self-Organization in a Defense Program Management Organization (Experimental Design)

    Science.gov (United States)

    2016-03-18

    and the interrelationship with the social bureaucratic influences . Experimental Research Design The Joint Tactical Radio System (JTRS) is a family...initiatives such as the Packard Commission study, Goldwater-Nichols Legislation, and more recently, the Better Buying Power initiative. While the DoD...potential communications pathways in an organizational structure) Self-Organizing Network Behavior The nodes in the network are specific individuals

  15. When the Guns Fall Silent: a Leader’s Guide to Understanding Defensive Coping Mechanisms

    Science.gov (United States)

    2011-05-19

    social behavior, and obstinacy.”75 Isolation is often times associated with compulsive rituals such as touching or repeated washing following a...proclaim my undying love for you, and buy you flowers.” 78McMartin, 145. A mother resents having to care for her child and “smothers it” with love...Undoing or Reaction Formation compulsive behavior, intensification of self-restraint, overformal social behavior, and obstinacy Fantasy associated

  16. Defense Contracting: Use of Undefinitized Contract Actions Understand and Definitization Time Frames Often Not Met

    National Research Council Canada - National Science Library

    2007-01-01

    ...), which authorize contractors to begin work before reaching a final agreement on contract terms. The contractor has little incentive to control costs during this period, creating a potential for wasted taxpayer dollars...

  17. Understanding How Program Managers Successfully Manage Innovation in Major Defense Acquisition Programs (MDAPs): An Exploratory Study

    National Research Council Canada - National Science Library

    Stinson, Benjamin

    2001-01-01

    .... The DoD 5000 Series encourages PMs to, "continually search for innovative practices that reduce cycle-time, reduce cost, and encourage team-work", yet little is contained in the DoD 5000 Series...

  18. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    of a vehicle above its chassis. These storage compartments are lined with mint and other canine “detracting” spices such as cardamom, pepper, and cin...Organisation: People, Power, and Politics, Cambridge, UK, and New York: Cambridge University Press, 1984. Collins, Eamon, and Mick McGovern, Killing Rage

  19. Overcoming Information Aesthetics: In Defense of a Non-Quantitative Informational Understanding of Artworks

    OpenAIRE

    Rodrigo Hernández-Ramírez

    2016-01-01

    Attempts to describe aesthetic artefacts through informational models have existed at least since the late 1950s; but they have not been as successful as their proponents expected nor are they popular among art scholars because of their (mostly) quantitative nature. However, given how information technology has deeply shifted every aspect of our world, it is fair to ask whether aesthetic value continues to be immune to informational interpretations. This paper discusses the ideas of the late ...

  20. Report of the Defense Science Board Task Force on Understanding Human Dynamics

    Science.gov (United States)

    2009-03-01

    I T I ONS OF CUL T URE I 75 culture is individualistic if each person is expected to look after him or herself and collectivistic if there...country, region, or culture. With respect to human dynamics, these documents should include perspectives of factions (tribes, clans, villages), fears...military and technology studies, Iraqi and terrorist perspectives , religious and ideological studies, and new disciplines in social sciences. Commercial

  1. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  2. Plant defense genes are regulated by ethylene

    Energy Technology Data Exchange (ETDEWEB)

    Ecker, J.R.; Davis, R.W.

    1987-08-01

    One of the earliest detectable events during plant-pathogen interaction is a rapid increase in ethylene biosynthesis. This gaseous plant stress hormone may be a signal for plants to activate defense mechanisms against invading pathogens such as bacteria, fungi, and viruses. The effect of ethylene on four plant genes involved in three separate plant defense response pathways was examined; these included (i and ii) genes that encode L-phenylalanine ammonia-lyase (EC 4.3.1.5) and 4-coumarate:CoA ligase (4-coumarate:CoA ligase (AMP-forming), EC 6.2.1.12), enzymes of the phenylpropanoid pathway, (iii) the gene encoding chalcone synthase, an enzyme of the flavonoid glycoside pathway, and (iv) the genes encoding hydroxyproline-rich glycoprotein, a major protein component(s) of plant cell walls. Blot hybridization analysis of mRNA from ethylene-treated carrot roots reveals marked increases in the levels of phenylalanine ammonia-lyase mRNA, 4-coumarate CoA ligase mRNA, chalcone synthase mRNA, and certain hydroxyproline-rich glycoprotein transcripts. The effect of ethylene on hydroxyproline-rich glycoprotein mRNA accumulation was different from that of wounding. Ethylene induces two hydroxyproline-rich glycoprotein mRNAs (1.8 and 4.0 kilobases), whereas wounding of carrot root leads to accumulation of an additional hydroxyproline-rich mRNA (1.5 kilobases). These results indicate that at least two distinct signals, ethylene and a wound signal, can affect the expression of plant defense-response genes.

  3. Image and Imago: A Rational Defense of a Theological Anthropology of Gender

    Directory of Open Access Journals (Sweden)

    Christopher P. Klofft

    2014-12-01

    Full Text Available Modern and Post-Modern discourse espouses a subjective understanding of gender. As a result, confusing new problems erupt in discussions as practical as marriage and as theoretical as questions of human meaning and purpose. Catholic theology, drawing primarily from the personalistic approach to gender contained in Pope John Paul II’s Theology of the Body, provides a consistent account of gender that is also compatible with the best evidence available in support of a purely rational approach. A defense of this approach could lead to a better understanding of ourselves and our relationships, to the betterment of culture as a whole.

  4. Indian Defense Policy, Its Implications for Nepal.

    Science.gov (United States)

    1986-04-15

    defended at the Hindu Kush, the Himalayas, the Malacca Straits and A Bab- el Mandab, it not the Suez.9 Senior military leaders still support this view...attack thereby reinforcing the traditional concept of a defense based on the Hindu Kush, the Himalayas, the Malacca Straits and Bab- el Mandab. After...Shanghai-II FAC(T). 4 Ch Huchwan hydrofoil FAC(T). 3 US Adjutant and MSC268 coastal MCM. 2 tankers (1 ocean, 1 coastal), 1 Br Oido cruiser (cadet trg/AA

  5. Mosquito immune defenses against Plasmodium infection.

    Science.gov (United States)

    Cirimotich, Chris M; Dong, Yuemei; Garver, Lindsey S; Sim, Shuzhen; Dimopoulos, George

    2010-04-01

    The causative agent of malaria, Plasmodium, has to undergo complex developmental transitions and survive attacks from the mosquito's innate immune system to achieve transmission from one host to another through the vector. Here we discuss recent findings on the role of the mosquito's innate immune signaling pathways in preventing infection by the Plasmodium parasite, the identification and mechanistic description of novel anti-parasite molecules, the role that natural bacteria harbored in the mosquito midgut might play in this immune defense and the crucial parasite and vector molecules that mediate midgut infection.

  6. Defense meteorological satellite measurements of total ozone

    International Nuclear Information System (INIS)

    Lovill, J.E.; Ellis, J.S.; Luther, F.M.; Sullivan, R.J.; Weichel, R.L.

    1992-01-01

    A multichannel filter radiometer (MFR) on Defense Meteorological Satellites (DMS) that measured total ozone on a global-scale from March 1977 - February 1980 is described. The total ozone data measured by the MFR were compared with total ozone data taken by surfaced-based Dobson spectrophotometers. When comparisons were made for five months, the Dobson spectrophotometer measured 2-5% more total ozone than the MFR. Comparisons between the Dobson spectrophotometer and the MFR showed a reduced RMS difference as the comparisons were made at closer proximity. A Northern Hemisphere total ozone distribution obtained from MFR data is presented

  7. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  8. Defensive Jurisprudence and Productivity Goals: Jabuticaba Consumerist

    Directory of Open Access Journals (Sweden)

    Miguel Luiz Barros Barreto de Oliveira

    2016-10-01

    Full Text Available This paper analyzes the application of so-called procedural defensive jurisprudence that values exacerbated rationalization of the judiciary activities, preventing the processing of judicial review in the higher courts, and its consequences in consumeristas indemnity processes. It analyzes the pressure to which judges are subjected, especially because of the need to comply with productivity goals. The construction work suggests the misconception of these imposed judicial policies to decrease the procedural stock since that attack the problem on screen superficially and do not solve the basic question.

  9. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  10. Defensive pessimism, self-esteem instability, and goal strivings.

    Science.gov (United States)

    Yamawaki, Niwako; Tschanz, Brian; Feick, David

    2004-02-01

    Defensive pessimism (Norem & Cantor, 1986a) is conceived as an adaptive motivational strategy employed in academic contexts. The present research investigates some potentially deleterious correlates of the defensively pessimistic strategy. We examined the hypothesis that defensive pessimists would have a relatively high ratio of negative-to-positive academically relevant self-thoughts, and these accessible thoughts would be related to high self-esteem instability. Mediational analyses generally supported this hypothesis. However, defensive pessimism-optimism differences in self-esteem seemed to partially account for the mediated effects. We also found support for the hypothesis that, relative to optimists, defensive pessimists would tend to be less oriented toward mastery goals and more oriented toward performance-avoidance achievement goals in academic settings. Results were discussed in terms of the processing correlates and adaptive trade-offs of defensive pessimism.

  11. Defense mechanisms and morality: a link between isolation and moralization.

    Science.gov (United States)

    Björklund, F

    2000-03-01

    The relationship between morality and perceptual defense mechanisms was studied. Three new scales were constructed to measure different aspects of morality: moralism (the tendency to evaluate everything in terms of right and wrong), conscience (strength of feelings of right and wrong) and reparation (inclination to repair the damage one has caused). Perceptual defense mechanisms were measured with Kragh's Defense Mechanism Test (DMT). Three hypotheses about relationships between morality and defense mechanisms, derived from psychoanalytical literature, were tested on 54 male University students. Results show positive correlations between the defense mechanism isolation of affect and moralism, and between identification with the aggressor and reparation. Total amount of perceptual defense correlated positively with moralism. It is argued that the psychological study of morality should take unconscious processes into consideration.

  12. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  13. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 3. Natural Disasters.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The effects of natural disasters and the implications which those effects have for community emergency preparedness are discussed. Major topics include: (1) Similarities and differences in types of responses required by a nuclear and natural disasters, (2) The civil defense function in natural disasters, (3) Vulnerability analysis, (4) Warning…

  14. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  15. 2010 Department of Defense (DoD) Chemical and Biological Defense Program (CBDP) Portfolio

    Science.gov (United States)

    2010-03-01

    causative agent of anthrax. AVA is produced by Emergent BioSolutions and is FDA-approved. AVA is administered in a five dose regimen over an 18...Guard U.S. Army Reserve U.S. SOCOM Homeland Defense DoD Other Agencies Academia Foreign Military NSN: 6505013996825 USER(S) Emergent BioSolutions

  16. Plant chemical defense against herbivores and pathogens: generalized defense or trade-offs?

    NARCIS (Netherlands)

    Biere, A.; Marak, H.B.; Van Damme, J.M.M.

    2004-01-01

    Plants are often attacked by multiple enemies, including pathogens and herbivores. While many plant secondary metabolites show specific effects toward either pathogens or herbivores, some can affect the performance of both these groups of natural enemies and are considered to be generalized defense

  17. An Analysis of the Defense Acquisition Strategy for Unmanned Systems

    Science.gov (United States)

    2014-03-01

    85 Figure 23. FY2011–2018 Budget for UCAV UAV (after IHS Aerospace, Defense...Budget for MQ-1/MQ-9 UAV (after IHS Aerospace, Defense, & Maritime, 2013) Figure 23 and Figure 24 show funding for the Navy UCAV and UCLASS. The UCAV ...9 Reaper (General Atomic) Other DOD Army USAF 86 Figure 23. FY2011–2018 Budget for UCAV UAV (after IHS Aerospace, Defense, & Maritime, 2013

  18. Defense Acquisition: Observations Two Years After the Packard Commission

    Science.gov (United States)

    1988-11-01

    businesses. 10 To clarify Costello’s funcions , Under S•cretary Taft issued a memorandum in December 1987. This , memEan-dumn is mproduced in Chapter 13. 7 I...Defense (For, Management and Personnel) Assistant Secretary of Defense (Reserve Affairs) Assistant Secretary of Defense ( Health Affairs) Assistant Secretary...Test and Evaluation which reports directly to the Secretary. d. Legal Uncertainty And Complexity Breeds Overly Cautious Mentality In discussing the

  19. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    homeland defense efforts and to coordinate defense support of civil authorities.”52 This double bind affects all aspects of a domestic response. For...Guard and the modern SDF. A. THE EARLY COLONIAL MILITIA 1607–1754 Based on the fear of despotism, early colonial leaders avoided the idea of a...defense, the British government began to impose a series of taxes without offering the colonials a voice in parliament to protest, hence, taxation

  20. FY 1997 Financial Reporting by The Defense Automated Printing Service.

    Science.gov (United States)

    1998-09-23

    FINANCIAL REPORTING BY THE DEFENSE AUTOMATED PRINTING SERVICE Report No. 98-201 September 23, 1998 Office of the Inspector...ACCOUNTING SERVICE DIRECTOR, DEFENSE LOGISTICS AGENCY DIRECTOR, DEFENSE AUTOMATED PRINTING SERVICE SUBJECT: Audit Report on FY 1997 Financial Reporting by the...General for Auditing Office of the Inspector General, DoD Report No. 98-201 September 23, 1998 (Project No. 8FJ-2002.04) FY 1997 Financial Reporting by