WorldWideScience

Sample records for understanding eu-us defense

  1. Echoes Across the Pond: Understanding EU-US Defense Industrial Relationships

    Science.gov (United States)

    2009-08-05

    Paul, MN: Zenith Press. Hammond, G.T. (1990). Countertrade , offsets and barter in international political economy. New York: St. Martin’s Press...industrial cooperation: Spain’s changing strategies on Arms Importing, in S. Martin (ed.), The Economics of Offsets: defense procurement and countertrade ... countertrade (pp. 357-379). Amsterdam: Harwood Academic Publishers. Udis, B., & Maskus, K.E. (1991). Offsets as industrial policy: Lessons from aerospace

  2. Report of an EU-US symposium on understanding nutrition-related consumer behavior: strategies to promote a lifetime of healthy food choices.

    Science.gov (United States)

    Friedl, Karl E; Rowe, Sylvia; Bellows, Laura L; Johnson, Susan L; Hetherington, Marion M; de Froidmont-Görtz, Isabelle; Lammens, Veerle; Hubbard, Van S

    2014-01-01

    This report summarizes an EU-US Task Force on Biotechnology Research symposium on healthy food choices and nutrition-related purchasing behaviors. This meeting was unique in its transdisciplinary approach to obesity and in bringing together scientists from academia, government, and industry. Discussion relevant to funders and researchers centered on (1) increased use of public-private partnerships, (2) the complexity of food behaviors and obesity risk and multilevel aspects that must be considered, and (3) the importance of transatlantic cooperation and collaboration that could accelerate advances in this field. A call to action stressed these points along with a commitment to enhanced communication strategies. Copyright © 2014 Society for Nutrition Education and Behavior. All rights reserved.

  3. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  4. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  5. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  6. 13th EU-US Transport Task Force Workshop on transport in fusion plasmas

    DEFF Research Database (Denmark)

    Connor, J.W.; Fasoli, A.; Hidalgo, C.

    2009-01-01

    This report summarizes the contributions presented at the 13th EU-US Transport Task Force Workshop on transport in fusion plasmas, held in Copenhagen, Denmark, 1-4 September 2008. There were sessions on core heat and particle transport; core and edge momentum transport; edge and scrape-off-layer ......This report summarizes the contributions presented at the 13th EU-US Transport Task Force Workshop on transport in fusion plasmas, held in Copenhagen, Denmark, 1-4 September 2008. There were sessions on core heat and particle transport; core and edge momentum transport; edge and scrape...

  7. EU-US standards harmonization task group report : feedback to standards development organizations - security

    Science.gov (United States)

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  8. EU-US standards harmonization task group report : feedback to ITS standards development organizations communications.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  9. EU-US standards harmonization task group report : status of ITS communication standards.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  10. EU-US standards harmonization task group report : stakeholder engagement and comment resolution.

    Science.gov (United States)

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  11. Summary of the 19th Joint EU-US Transport Task Force Workshop

    DEFF Research Database (Denmark)

    Angioni, C.; Mantica, P.; Naulin, Volker

    2015-01-01

    This conference report summarizes the contributions to, and discussions at, the 19th Joint EU-US Transport Task Force workshop, held in Culham, UK, during 8-11 September 2014. The workshop was organized under six topics: momentum transport, energetic particles, challenges in modelling transport i...

  12. EU-US transport task force workshop on transport in fusion plasmas: transport near operational limits

    International Nuclear Information System (INIS)

    Connor, J W; Garbet, X; Giannone, L; Greenwald, M; Hidalgo, C; Loarte, A; Mantica, P

    2003-01-01

    This conference report summarizes the contributions to, and discussions at, the 9th EU-US transport task force workshop on 'transport in fusion plasmas: transport near operational limits', held in Cordoba, Spain, during 9-12 September 2002. The workshop was organized under three main headings: edge localized mode physics and confinement, profile dynamics and confinement and confinement near operational limits: density and beta limits; this report follows the same structure

  13. Summary of 21st joint EU-US transport task force workshop.

    Czech Academy of Sciences Publication Activity Database

    Mantica, P.; Bourdelle, C.; Camenen, Y.; Dejarnac, Renaud; Evans, T.; Görler, T.; Hillesheim, J.; Idomura, Y.; Jakubowski, M.; Ricci, P.; White, A.

    2017-01-01

    Roč. 57, č. 8 (2017), č. článku 087001. ISSN 0029-5515. [Joint EU-US Transport Task Force workshop/21./. Leysin, 05.09.2016-08.09.2016] EU Projects: European Commission(XE) 633053 - EUROfusion Institutional support: RVO:61389021 Keywords : transport * confinement * turbulence Subject RIV: BL - Plasma and Gas Discharge Physics OBOR OECD: Fluids and plasma physics (including surface physics) Impact factor: 3.307, year: 2016 http://iopscience.iop.org/article/10.1088/1741-4326/aa753f/meta

  14. Proteomic approaches to understanding the role of the cytoskeleton in host-defense mechanisms

    Science.gov (United States)

    Radulovic, Marko; Godovac-Zimmermann, Jasminka

    2014-01-01

    The cytoskeleton is a cellular scaffolding system whose functions include maintenance of cellular shape, enabling cellular migration, division, intracellular transport, signaling and membrane organization. In addition, in immune cells, the cytoskeleton is essential for phagocytosis. Following the advances in proteomics technology over the past two decades, cytoskeleton proteome analysis in resting and activated immune cells has emerged as a possible powerful approach to expand our understanding of cytoskeletal composition and function. However, so far there have only been a handful of studies of the cytoskeleton proteome in immune cells. This article considers promising proteomics strategies that could augment our understanding of the role of the cytoskeleton in host-defense mechanisms. PMID:21329431

  15. Arabidopsis thaliana - Myzus persicae interaction: shaping the understanding of plant defense against phloem-feeding aphids

    Directory of Open Access Journals (Sweden)

    Joe eLouis

    2013-07-01

    Full Text Available The phloem provides a unique niche for several organisms. Aphids are a large group of Hemipteran insects that utilize stylets present in their mouthparts to pierce sieve elements and drink large volumes of phloem sap. In addition, many aphids also vector viral diseases. Myzus persicae, commonly known as the green peach aphid (GPA, is an important pest of a large variety of plants that includes Arabidopsis thaliana. This review summarizes recent studies that have exploited the compatible interaction between Arabidopsis and GPA to understand the molecular and physiological mechanisms utilized by plants to control aphid infestation, as well as genes and mechanisms that contribute to susceptibility. In addition, recent efforts to identify aphid-delivered elicitors of plant defenses and novel aphid salivary components that facilitate infestation are also discussed.

  16. 75 FR 2858 - Negotiation of a Reciprocal Defense Procurement Memorandum of Understanding With the Czech Republic

    Science.gov (United States)

    2010-01-19

    ... Czech Republic, the Czech Republic would be listed as one of the ``qualifying countries'' in the... With the Czech Republic AGENCY: Department of Defense (DoD). ACTION: Request for public comments... Republic. DoD is requesting industry feedback regarding its experience in public defense procurements...

  17. A cause-defense approach to the understanding and analysis of common cause failures

    International Nuclear Information System (INIS)

    Paula, Henrique M.; Campbell, David J.; Parry, Gareth W.; Mitchell, Donald B.; Rasmuson, Dale M.

    1990-03-01

    For improved reliability and safety, nuclear power plants are designed with redundant safety systems, many of which also have redundant trains of equipment within the system. However, the very high reliability theoretically achievable through the use of redundancy is often compromised by single events that can individually render redundant components unavailable (common cause failure [CCF] events). As evidenced by the results of probabilistic risk assessments (PRAs) and by historical experience with nuclear power plant operations, CCF events are usually major contributors to the risk posed by nuclear power plant operation. Thus, it is important that PRAs recognize the potential for CCF events and realistically account for CCF contributions to system unavailability and plant risk. Much progress has been made over the years in the area of CCF analysis, including the development of both qualitative and quantitative analysis methods. Until now, however, CCF methodologies have not explicitly and systematically accounted for the impact of plant-specific defenses, such as design features and operational and maintenance policies, in place to reduce the likelihood of failure occurrences at nuclear power plants. Recognizing the importance of this issue, the NRC has funded a research effort that has focused on developing the cause-defense methodology for CCF analysis and prevention. This report presents the results of this research. Specifically, this report discusses the development of (1) procedures for identifying the potential for CCF events at individual nuclear power plants and (2) cause-defense matrices for analysis of CCF events. Also, new concepts and more precise definitions are introduced to enhance CCF terminology and interpretation of historical event data. (author)

  18. Coherences and Differences among EU, US and PRC Approaches for Rural Urban Development: Interscalar and Interdisciplinary Analysis

    Directory of Open Access Journals (Sweden)

    Roberto De Lotto

    2017-03-01

    Full Text Available The main goal of this paper is to translate the indexing of a projects’ Data Base, based on EU vocabulary on rural urban development, into different lexicons. Built on the groundwork laid in previous researches, the authors want to enlarge the methodology applied in European Union (EU territory and defined with Rural Architectural Intensification (RAI and Rural Architectural Urbanism (RAU to other contexts, in particular People’s Republic of China (PRC and United States (US, keeping, however, this research at theoretical and methodological definition level. The study of coherences and differences between EU, US and China for rural urban development implies an interscalar and interdisciplinary analysis approach. It must be in complete adherence with national and specific directives and objectives in all the different selected countries. The analysis of main literature and national and federal laws of Europe, United States and China allows the definition of the Strategic Objectives and Main Goals for Rural Development identifying indicators and criteria. They permit to measure intensification’s outcomes in a qualitative way through the description and interpretation of operative tools for architecture and landscape design. Finally, the organized database and the territorial results can be considered as guidelines to support decision makers in rural-urban context. In addition, the whole procedure presented along with the projects’ database is a significant research package for further interdisciplinary applications.

  19. Getting carbon out: tougher than It looks. An assessment of EU, US and Chinese pledges

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2010-01-01

    Copenhagen was viewed as a 'fiasco' in Europe, as 'lacking ambition' in US newspapers and as 'significant and positive' in China. These various perceptions reflect the vastly different expectations of delegations but also the weight that NGOs and the climate movement have gained in the media and public opinion. NGOs continue to play a valuable role in raising the awareness of global warming, but most pre-Copenhagen analysis and reports focussed too much on NGO calls for strong political commitments without exploring the economic reality of whether these targets would be achievable. Understanding what happened in Copenhagen requires the review of three dates: 1990, 2005 and 2020. 1990 is the reference year set by the Kyoto protocol for future emissions reduction. 2005 is used as a reference year by several countries, including the US and China, as part of the international climate negotiations that would lead to a new climate agreement after 2012, the Kyoto protocol running from 2008 to 2012. 2005 is also halfway through 1990-2020. According to the IPCC, global emissions should peak by 2020 in order to limit the rise of Earth temperature below 2 deg. C. New emissions reductions commitments target 2020. At the world level, CO 2 emissions represented 73% of total Greenhouse Gas (GHG) emissions in 2005. CO 2 emissions trajectories between 1990 and 2005 give some indication of what to expect by 2020. This paper focuses on CO 2 emissions from fuel use which constitute the core of total CO 2 emissions: 96% of global CO 2 emissions indeed arise from energy use. The measures of how an economy uses energy that this paper will discuss are the amount of energy needed to produce one unit of GDP, the carbon intensity of energy use - the amount of CO 2 emissions produced by one unit of energy used - and the carbon intensity of the economy, the amount of CO 2 emissions produced by one unit of GDP - in fewer words: Units of Energy/Unit of GDP Value; Units of CO 2 /Unit of Energy

  20. A comparison of oil supply risks in EU, US, Japan, China and India under different climate scenarios

    International Nuclear Information System (INIS)

    Moerkerk, Mike van; Crijns-Graus, Wina

    2016-01-01

    For many countries, the inflow of energy is essential to keep economies running. Oil is typically considered to be the most critical fuel as an input for the petro-chemical and transportation sector and due to limited and less spread reserves. In this study external oil supply risks are assessed for the period up to 2035 for the European Union, United States, China, Japan and India (being the five largest importers of oil in the world), based on their current supplier portfolio. Scenarios are constructed for several climate policy and oil-supply projections. It is found that risks increase strongly, when stringent climate policies are prevented from being implemented, especially when a peak in oil supply is taken into account, resulting in major oil supply-disruptions. China faces the lowest oil supply risks in most scenarios but the trends of India, China and US converge over time due to increasing import dependency of China and India. Japan faces high risks since the country has the highest oil import dependency combined with a low oil import diversification. For the EU, all figures are strongly influenced by Russia, accounting for 32% of total imports, and to a lesser extent Norway (11%), with high overall risks. - Highlights: • External oil supply risks are assessed up to 2035 under different scenarios. • Included countries are EU, US, China, Japan and India (largest importers of oil). • India, China and EU show increasing oil supply risks in all scenarios. • Strong climate policies are needed to reduce future risks. • A constructed peak oil scenario predicts major oil supply disruptions.

  1. Climate Change in the US Government Budget. Funding for Technology and Other Programmes, and Implications for EU-US Relations

    International Nuclear Information System (INIS)

    Brewer, T.L.

    2005-01-01

    With increasing Congressional support for funding climate change technology programmes, as reflected in passage of the Hagel/Pryor amendment to the energy policy bill in June 2005, issues about the climate change budget are becoming more salient. In this Policy Brief, Congressional and Presidential actions on several recent budgets are examined for the four principal areas of the climate change budget: technology, science, international and tax credits. The emphasis is on energy technology in particular, because of its salience in current policy discussions and its relative size in financial terms. Highlights of the findings include the following: Congress imposed substantial (63.3%) increases over the administration's climate change technology proposals for 2004 and then small increases for FY2005. For 2006, the administration has proposed reductions compared with the Congressionally-enacted levels in the technology component - reductions in both nominal and inflation-adjusted terms (-4.1% and -5.6%, respectively). The administration has also proposed cuts for fiscal 2006 in the science and international programmes (-2.9 and -19.0% in real terms). These and other differences in Presidential and Congressional approaches to funding climate change programs provide further evidence that the Presidential- Congressional divide on climate policy is continuing to widen. There is an emerging bi-partisan Congressional coalition in favour of increased spending on a wide range of climate change programmes. This shift will affect EU-US relations on climate change issues for the remainder of the current administration until 2008, and beyond as well

  2. Host-pathogen interactions between the human innate immune system and Candida albicans - Understanding and modeling defense and evasion strategies

    Directory of Open Access Journals (Sweden)

    Sybille eDühring

    2015-06-01

    Full Text Available The diploid, polymorphic yeast Candida albicans is one of the most important humanpathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within thehuman host for a long time. Alterations in the host environment, however, can render C. albicansvirulent. In this review, we describe the immunological cross-talk between C. albicans and thehuman innate immune system. We give an overview in form of pairs of human defense strategiesincluding immunological mechanisms as well as general stressors such as nutrient limitation,pH, fever etc. and the corresponding fungal response and evasion mechanisms. FurthermoreComputational Systems Biology approaches to model and investigate these complex interactionare highlighted with a special focus on game-theoretical methods and agent-based models. Anoutlook on interesting questions to be tackled by Systems Biology regarding entangled defenseand evasion mechanisms is given.

  3. Pulling back the curtain on 'behind the border' trade costs: The case of EU-US agri-food trade

    International Nuclear Information System (INIS)

    Sanjuán, A.I.; Philippidis, G.; Resano, H.

    2017-01-01

    With the rise of anti-free-trade sentiment on both sides of the Atlantic, there is a growing urgency by trade negotiators to conclude the Trans-Atlantic Trade and Investment Partnership (TTIP) negotiations. The harmonisation of non-tariff restrictions is a key component of the talks, whilst global modelling databases typically lack a price compatible representation of these measures, which lends a degree of bias to ex-ante modelling assessments. In the gravity literature, there is (limited) evidence of non-tariff ad-valorem equivalent (AVE) estimates of agriculture and food, although disaggregated agri-food activities and/or bilateral EU-US route specific estimates are still in relatively short supply. Using panel data, this study consolidates both of these issues, whilst also proposing an ‘indirect’ gravity method as a basis upon which to provide econometric non-tariff AVE estimates compatible with the degree of sectoral concordance typically found in global modelling databases. On a general note, the results revealed the presence of significant behind the border trade costs on both sides of the Atlantic, which exceed their tariff counterparts. Using simple aggregated averages, our estimates are comparable with ‘direct’ gravity method studies. Furthermore, rigorous qualitative and quantitative comparisons on a sector-by-sector basis showed that a number of bilateral non-tariff AVEs are also found to be plausible, although in some cases, with recourse to relevant policy documents and expert opinion, it is debatable whether the EU or the US is more restrictive. Further work could focus on refining the sector specificity of each gravity equation to improve the model's predictive capacity.

  4. Pulling back the curtain on 'behind the border' trade costs: The case of EU-US agri-food trade

    Energy Technology Data Exchange (ETDEWEB)

    Sanjuán, A.I.; Philippidis, G.; Resano, H.

    2017-07-01

    With the rise of anti-free-trade sentiment on both sides of the Atlantic, there is a growing urgency by trade negotiators to conclude the Trans-Atlantic Trade and Investment Partnership (TTIP) negotiations. The harmonisation of non-tariff restrictions is a key component of the talks, whilst global modelling databases typically lack a price compatible representation of these measures, which lends a degree of bias to ex-ante modelling assessments. In the gravity literature, there is (limited) evidence of non-tariff ad-valorem equivalent (AVE) estimates of agriculture and food, although disaggregated agri-food activities and/or bilateral EU-US route specific estimates are still in relatively short supply. Using panel data, this study consolidates both of these issues, whilst also proposing an ‘indirect’ gravity method as a basis upon which to provide econometric non-tariff AVE estimates compatible with the degree of sectoral concordance typically found in global modelling databases. On a general note, the results revealed the presence of significant behind the border trade costs on both sides of the Atlantic, which exceed their tariff counterparts. Using simple aggregated averages, our estimates are comparable with ‘direct’ gravity method studies. Furthermore, rigorous qualitative and quantitative comparisons on a sector-by-sector basis showed that a number of bilateral non-tariff AVEs are also found to be plausible, although in some cases, with recourse to relevant policy documents and expert opinion, it is debatable whether the EU or the US is more restrictive. Further work could focus on refining the sector specificity of each gravity equation to improve the model's predictive capacity.

  5. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  6. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  7. Host-pathogen interactions between the human innate immune system and Candida albicans—understanding and modeling defense and evasion strategies

    Science.gov (United States)

    Dühring, Sybille; Germerodt, Sebastian; Skerka, Christine; Zipfel, Peter F.; Dandekar, Thomas; Schuster, Stefan

    2015-01-01

    The diploid, polymorphic yeast Candida albicans is one of the most important human pathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within the human host for a long time. However, alterations in the host environment can render C. albicans virulent. In this review, we describe the immunological cross-talk between C. albicans and the human innate immune system. We give an overview in form of pairs of human defense strategies including immunological mechanisms as well as general stressors such as nutrient limitation, pH, fever etc. and the corresponding fungal response and evasion mechanisms. Furthermore, Computational Systems Biology approaches to model and investigate these complex interactions are highlighted with a special focus on game-theoretical methods and agent-based models. An outlook on interesting questions to be tackled by Systems Biology regarding entangled defense and evasion mechanisms is given. PMID:26175718

  8. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  9. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  10. Science and technology needs: Integrated research and development, the path to gaining a defensible understanding on ''watch list'' tank risk and interim stabilization needs

    International Nuclear Information System (INIS)

    Johnson, B.M.; Mellinger, G.; Strachan, D.; Hallen, R.

    1991-09-01

    The ''watch list'' waste tanks at the Hanford Site in Washington state are those that the Secretary of the Department of Energy reports upon to the Congress because of the unresolved safety question. As such, they are subject to intense surveillance and an enhanced list of controls and safety procedures. The objective of the Waste Tank Safety Program is to mitigate the safety concerns with respect to these tanks, thereby removing them from the ''watch list.'' The essential step in this process is the development of a defensible position that reduce the risk of these tanks to an acceptable level. An integrated research and development (R ampersand D) program is believed to be the most cost-effective means of achieving the information required to mitigate the safety concern and to resolve the safety issues. This program uses chemical and physical modeling studies of synthetic waste, is substantiated with limited field data and radioactive samples from a tank, and uses numerical modeling to extrapolate results to actual tank-scale operations. 3 refs., 4 figs

  11. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  14. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  15. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  16. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  17. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  18. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  19. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  20. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  2. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  3. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  4. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  5. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  6. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  7. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  8. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  9. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  10. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  11. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  12. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  13. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  14. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  15. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  16. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  17. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  18. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  19. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  20. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  1. Teaching Teaching & Understanding Understanding

    DEFF Research Database (Denmark)

    2006-01-01

    "Teaching Teaching & Understanding Understanding" is a 19-minute award-winning short-film about teaching at university and higher-level educational institutions. It is based on the "Constructive Alignment" theory developed by Prof. John Biggs. The film delivers a foundation for understanding what...

  2. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  3. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  4. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  5. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  6. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  7. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  8. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  9. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  10. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  11. 11. EU-US Transport Task Force Workshop - Proceedings

    International Nuclear Information System (INIS)

    2006-01-01

    This document gives the program of the workshop and gathers only the slides of some of the papers presented. The presentations have been organized around 5 topics: 1) multi-scale physics, 2) momentum transport, 3) electron transport, 4) particle and impurity transport, and 5) plasma scrape-off layer transport

  12. THE EU-US RELATIONS IN AN EMERGING MULTIPOLAR WORLD

    Directory of Open Access Journals (Sweden)

    Roxana Hincu

    2014-08-01

    Full Text Available In the context of an emerging multipolar world, the transatlantic partnership faces various challenges in the attempt to maintain the Western-shaped and dominated liberal order. This article aims to synthesize and rationalize the central argumentative positions on the ever-evolving transatlantic relationship provided by the following theories of international relations: neorealism, neoliberalism and constructivism. A combination of the main assumptions of the three approaches brings useful insights into the policy debates on the role of the transatlantic partnership in the process of forging the global governance. Nevertheless, where the systemic theories such as neorealism and neoliberalism fall short in explaining the transatlantic relations, constructivism, with its focus on actor identity succeeds in offering a dynamic account of them.

  13. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  14. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  15. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  16. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  17. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  18. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  19. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  20. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  1. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  2. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  3. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  4. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  5. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  6. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  7. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  8. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  9. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  10. How to understand requirements of nuclear and defense welding contracts

    International Nuclear Information System (INIS)

    Dickinson, O.D.

    1986-01-01

    This paper presents a basic requirements control plan for contract documentation and software validation and maintenance for nuclear operation. The objective is designing an integrated configuration control plan of both old, new, large or small, critical and noncritical software programs. There are positive advantages to managing a planned requirements program for product delivery or business operations. A requirements baseline like this is preferable to many iterations of design effort in the maintenance of nonbaselined programs, documentation and software. The plan that applies program requirements needs to address different levels of criticality and define matching program requirements for those levels. The plan needs to describe old vs. new requirements and define scope/responsibility that is needed to support the design, development and completion of these program requirements. Presented are management goals, relative costs, quality assurance goals, and program assessment plans. Outlined is a set of program QA requirements and document/software functional requirements for planning of program; also presented are some criteria for criticality assessment to establish levels of contract documentation or software activity. The paper shows two examples of planning work on this configuration control plan. The integrated configuration control requirements plan can be computer based or paper based for activity. It is designed to cover existing or new requirements and to cover either no documentation or all documentation

  11. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  12. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  13. Defense against Toxin Weapons

    National Research Council Canada - National Science Library

    Franz, David

    1998-01-01

    .... We typically fear what we do not understand. Although un- derstanding toxin poisoning is less useful in a toxin attack than knowledge of cold injury on an Arctic battlefield, information on any threat reduces its potential to harm...

  14. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  15. The MAP kinase substrate MKS1 is a regulator of plant defense responses

    DEFF Research Database (Denmark)

    Andreasson, E.; Jenkins, T.; Brodersen, P.

    2005-01-01

    Arabidopsis MAP kinase 4 (MPK4) functions as a regulator of pathogen defense responses, because it is required for both repression of salicylic acid (SA)-dependent resistance and for activation of jasmonate (JA)-dependent defense gene expression. To understand MPK4 signaling mechanisms, we used...

  16. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  17. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  18. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  19. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  20. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  1. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  2. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  3. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  4. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  5. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  6. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  7. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  8. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  9. 32 CFR 635.30 - Establishing domestic violence Memoranda of Understanding.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Establishing domestic violence Memoranda of Understanding. 635.30 Section 635.30 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.30 Establishing domestic violence...

  10. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  11. Eliciting maize defense pathways aboveground attracts belowground biocontrol agents.

    Science.gov (United States)

    Filgueiras, Camila Cramer; Willett, Denis S; Pereira, Ramom Vasconcelos; Moino Junior, Alcides; Pareja, Martin; Duncan, Larry W

    2016-11-04

    Plant defense pathways mediate multitrophic interactions above and belowground. Understanding the effects of these pathways on pests and natural enemies above and belowground holds great potential for designing effective control strategies. Here we investigate the effects of aboveground stimulation of plant defense pathways on the interactions between corn, the aboveground herbivore adult Diabrotica speciosa, the belowground herbivore larval D. speciosa, and the subterranean ento-mopathogenic nematode natural enemy Heterorhabditis amazonensis. We show that adult D. speciosa recruit to aboveground herbivory and methyl salicylate treatment, that larval D. speciosa are relatively indiscriminate, and that H. amazonensis en-tomopathogenic nematodes recruit to corn fed upon by adult D. speciosa. These results suggest that entomopathogenicnematodes belowground can be highly attuned to changes in the aboveground parts of plants and that biological control can be enhanced with induced plant defense in this and similar systems.

  12. Eliciting maize defense pathways aboveground attracts belowground biocontrol agents

    Science.gov (United States)

    Filgueiras, Camila Cramer; Willett, Denis S.; Pereira, Ramom Vasconcelos; Moino Junior, Alcides; Pareja, Martin; Duncan, Larry W.

    2016-01-01

    Plant defense pathways mediate multitrophic interactions above and belowground. Understanding the effects of these pathways on pests and natural enemies above and belowground holds great potential for designing effective control strategies. Here we investigate the effects of aboveground stimulation of plant defense pathways on the interactions between corn, the aboveground herbivore adult Diabrotica speciosa, the belowground herbivore larval D. speciosa, and the subterranean ento-mopathogenic nematode natural enemy Heterorhabditis amazonensis. We show that adult D. speciosa recruit to aboveground herbivory and methyl salicylate treatment, that larval D. speciosa are relatively indiscriminate, and that H. amazonensis en-tomopathogenic nematodes recruit to corn fed upon by adult D. speciosa. These results suggest that entomopathogenicnematodes belowground can be highly attuned to changes in the aboveground parts of plants and that biological control can be enhanced with induced plant defense in this and similar systems. PMID:27811992

  13. The Iranian Puzzle Piece: Understanding Iran in the Global Context

    Science.gov (United States)

    2009-01-01

    15. Barbara opall -rome, “Israeli Defenses to Use artificial Intelligence,” Defense News, 21 January 2008 (http://www.defensenews.com/story.php?i...iv Iranian Power Structure ................................................................10 iv v iv v...former requires a deep understanding of Iran’s power structures and the grievances that thwart rapprochement to determine with whom and about what

  14. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  15. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  16. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  17. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  18. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  19. Developing a Comprehensive and Integrated Vulnerability Assessment Methodology for the Defense Department's Critical Infrastructure Protection (CIP) Program. A Report Supporting CIP Program Outread and Education

    National Research Council Canada - National Science Library

    2003-01-01

    ...) strategy for Outreach, Education, and Training. It seeks to help those interested in understanding the Defense Department's current concepts and plans for developing CIP-specific vulnerability assessments...

  20. In Defense of Shame

    DEFF Research Database (Denmark)

    Deonna, Julien; Rodogno, Raffaele; Teroni, Fabrice

    Is shame social? Is it superficial? Is it a morally problematic emotion? Researchers in disciplines as different as psychology, philosophy, and anthropology have thought so. But what is the nature of shame and why are claims regarding its social nature and moral standing interesting and important...... of the evidence and arguments that are taken to support what they call the two dogmas about shame: its alleged social nature and its morally dubious character. Their analysis is conducted against the backdrop of a novel account of shame and ultimately leads to the rejection of these two dogmas.  On this account......, thus shedding light on many aspects of this complex emotion and allowing for a sophisticated understanding of its moral significance....

  1. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  2. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control

    Directory of Open Access Journals (Sweden)

    Michel Nicolas

    2017-12-01

    Full Text Available The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six (N = 296 athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  3. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    Science.gov (United States)

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  4. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  5. Impact of Childhood Malnutrition on Host Defense and Infection.

    Science.gov (United States)

    Ibrahim, Marwa K; Zambruni, Mara; Melby, Christopher L; Melby, Peter C

    2017-10-01

    The global impact of childhood malnutrition is staggering. The synergism between malnutrition and infection contributes substantially to childhood morbidity and mortality. Anthropometric indicators of malnutrition are associated with the increased risk and severity of infections caused by many pathogens, including viruses, bacteria, protozoa, and helminths. Since childhood malnutrition commonly involves the inadequate intake of protein and calories, with superimposed micronutrient deficiencies, the causal factors involved in impaired host defense are usually not defined. This review focuses on literature related to impaired host defense and the risk of infection in primary childhood malnutrition. Particular attention is given to longitudinal and prospective cohort human studies and studies of experimental animal models that address causal, mechanistic relationships between malnutrition and host defense. Protein and micronutrient deficiencies impact the hematopoietic and lymphoid organs and compromise both innate and adaptive immune functions. Malnutrition-related changes in intestinal microbiota contribute to growth faltering and dysregulated inflammation and immune function. Although substantial progress has been made in understanding the malnutrition-infection synergism, critical gaps in our understanding remain. We highlight the need for mechanistic studies that can lead to targeted interventions to improve host defense and reduce the morbidity and mortality of infectious diseases in this vulnerable population. Copyright © 2017 American Society for Microbiology.

  6. The defense counsel's perspective.

    Science.gov (United States)

    Hoffman, Peter J; Plump, Joan D; Courtney, Marcie A

    2005-04-01

    In all likelihood, most orthopedic surgeons today will be the subject of a lawsuit related to the care and treatment of a patient. This article is designed to provide physicians with pertinent material to help prepare for what seems to have become the inevitable--the medical malpractice lawsuit. There are a number of things that can be done to minimize the chance that a surgeon will be sued. Keeping informed about recent developments in orthopaedics, developing a good relationship with patients, and maintaining good documentation are just a few of the ways to help reduce the chances of being named in a potential lawsuit. Additionally, we offer physicians who have been sued assistance in getting through the litigation process, which at times can be daunting. Logical suggestions, such as not discussing a case with anyone other than a spouse and/or an attorney and not altering the medical records and larger concepts, including the importance of developing a relationship with an attorney, understanding the attorney-client privilege, and adequately preparing for the deposition and trial are discussed at length. Although it is not possible to be completely prepared for the day one gets sued, this article should provide insight and information necessary to enable surgeons to face each element of the lawsuit with some knowledge and control.

  7. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  8. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  9. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  10. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  11. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  12. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  13. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  14. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  15. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  16. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  17. Understanding disgust.

    Science.gov (United States)

    Chapman, Hanah A; Anderson, Adam K

    2012-03-01

    Disgust is characterized by a remarkably diverse set of stimulus triggers, ranging from extremely concrete (bad tastes and disease vectors) to extremely abstract (moral transgressions and those who commit them). This diversity may reflect an expansion of the role of disgust over evolutionary time, from an origin in defending the body against toxicity and disease, through defense against other threats to biological fitness (e.g., incest), to involvement in the selection of suitable interaction partners, by motivating the rejection of individuals who violate social and moral norms. The anterior insula, and to a lesser extent the basal ganglia, are implicated in toxicity- and disease-related forms of disgust, although we argue that insular activation is not exclusive to disgust. It remains unclear whether moral disgust is associated with insular activity. Disgust offers cognitive neuroscientists a unique opportunity to study how an evolutionarily ancient response rooted in the chemical senses has expanded into a uniquely human social cognitive domain; many interesting research avenues remain to be explored. © 2012 New York Academy of Sciences.

  18. Understanding Alzheimer's

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Understanding Alzheimer's Past Issues / Fall 2007 Table of Contents For ... and brain scans. No treatment so far stops Alzheimer's. However, for some in the disease's early and ...

  19. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  20. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  1. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  2. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  3. The Venturia Apple Pathosystem: Pathogenicity Mechanisms and Plant Defense Responses

    Directory of Open Access Journals (Sweden)

    Gopaljee Jha

    2009-01-01

    Full Text Available Venturia inaequalis is the causal agent of apple scab, a devastating disease of apple. We outline several unique features of this pathogen which are useful for molecular genetics studies intended to understand plant-pathogen interactions. The pathogenicity mechanisms of the pathogen and overview of apple defense responses, monogenic and polygenic resistance, and their utilization in scab resistance breeding programs are also reviewed.

  4. Defense AT and L. Volume 41, Number 6

    Science.gov (United States)

    2012-12-01

    own specialty. To paraphrase Abraham Maslow : If all you have is a hammer, everything looks like a nail. Systems engineers are supposed to take a...technology, and logistics face in the austere times we have entered. We will have to provide the ser- vices and products our warfighters need and...understanding of: (1) the constraints we must live within; (2) a willingness to prioritize our needs and accept less than we Defense AT&L: November–December

  5. Department of Defense Systems Engineering FY 2012 Annual Report

    Science.gov (United States)

    2013-03-01

    by the Utility Helicopter PMO, is utilizing the latest Defense Acquisition Guidelines and previously approved PEO AVN SEP examples to develop all...efforts. As a whole, all of PEO AVN Program Management Offices understand the importance of systems engineering. They stress the continued use of...established SE guidelines, practices and procedures throughout our acquisition processes. PEO AVN , working with the AMRDEC SE Division, has

  6. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  7. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  8. Embodied Understanding

    Directory of Open Access Journals (Sweden)

    Mark Leonard Johnson

    2015-06-01

    Full Text Available Western culture has inherited a view of understanding as an intellectual cognitive operation of grasping of concepts and their relations. However, cognitive science research has shown that this received intellectualist conception is substantially out of touch with how humans actually make and experience meaning. The view emerging from the mind sciences recognizes that understanding is profoundly embodied, insofar as our conceptualization and reasoning recruit sensory, motor, and affective patterns and processes to structure our understanding of, and engagement with, our world. A psychologically realistic account of understanding must begin with the patterns of ongoing interaction between an organism and its physical and cultural environments and must include both our emotional responses to changes in our body and environment, and also the actions by which we continuously transform our experience. Consequently, embodied understanding is not merely a conceptual/propositional activity of thought, but rather constitutes our most basic way of being in, and engaging with, our surroundings in a deep visceral manner.

  9. Understanding Maple

    CERN Document Server

    Thompson, Ian

    2016-01-01

    Maple is a powerful symbolic computation system that is widely used in universities around the world. This short introduction gives readers an insight into the rules that control how the system works, and how to understand, fix, and avoid common problems. Topics covered include algebra, calculus, linear algebra, graphics, programming, and procedures. Each chapter contains numerous illustrative examples, using mathematics that does not extend beyond first-year undergraduate material. Maple worksheets containing these examples are available for download from the author's personal website. The book is suitable for new users, but where advanced topics are central to understanding Maple they are tackled head-on. Many concepts which are absent from introductory books and manuals are described in detail. With this book, students, teachers and researchers will gain a solid understanding of Maple and how to use it to solve complex mathematical problems in a simple and efficient way.

  10. Understanding physics

    CERN Document Server

    Mansfield, Michael

    2011-01-01

    Understanding Physics - Second edition is a comprehensive, yet compact, introductory physics textbook aimed at physics undergraduates and also at engineers and other scientists taking a general physics course. Written with today's students in mind, this text covers the core material required by an introductory course in a clear and refreshing way. A second colour is used throughout to enhance learning and understanding. Each topic is introduced from first principles so that the text is suitable for students without a prior background in physics. At the same time the book is designed to enable

  11. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  12. Understanding Federalism.

    Science.gov (United States)

    Hickok, Eugene W., Jr.

    1990-01-01

    Urges returning to the original federalist debates to understand contemporary federalism. Reviews "The Federalist Papers," how federalism has evolved, and the centralization of the national government through acts of Congress and Supreme Court decisions. Recommends teaching about federalism as part of teaching about U.S. government…

  13. Understanding Energy

    Science.gov (United States)

    Menon, Deepika; Shelby, Blake; Mattingly, Christine

    2016-01-01

    "Energy" is a term often used in everyday language. Even young children associate energy with the food they eat, feeling tired after playing soccer, or when asked to turn the lights off to save light energy. However, they may not have the scientific conceptual understanding of energy at this age. Teaching energy and matter could be…

  14. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  15. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  16. Making Information Visible, Accessible, and Understandable: Meta-Data and Registries

    National Research Council Canada - National Science Library

    Robinson, Clay

    2007-01-01

    ... the interoperability, discovery, and utility of data assets throughout the Department of Defense (DoD). Proper use and understanding of metadata can substantially enhance the utility of data by making it more visible, accessible, and understandable...

  17. Understanding Translation

    DEFF Research Database (Denmark)

    Schjoldager, Anne Gram; Gottlieb, Henrik; Klitgård, Ida

    Understanding Translation is designed as a textbook for courses on the theory and practice of translation in general and of particular types of translation - such as interpreting, screen translation and literary translation. The aim of the book is to help you gain an in-depth understanding...... of the phenomenon of translation and to provide you with a conceptual framework for the analysis of various aspects of professional translation. Intended readers are students of translation and languages, but the book will also be relevant for others who are interested in the theory and practice of translation...... - translators, language teachers, translation users and literary, TV and film critics, for instance. Discussions focus on translation between Danish and English....

  18. Understanding Resilience

    Directory of Open Access Journals (Sweden)

    Gang eWu

    2013-02-01

    Full Text Available Resilience is the ability to adapt successfully in the face of stress and adversity. Stressful life events, trauma and chronic adversity can have a substantial impact on brain function and structure, and can result in the development of PTSD, depression and other psychiatric disorders. However, most individuals do not develop such illnesses after experiencing stressful life events, and are thus thought to be resilient. Resilience as successful adaptation relies on effective responses to environmental challenges and ultimate resistance to the deleterious effects of stress, therefore a greater understanding of the factors that promote such effects is of great relevance. This review focuses on recent findings regarding genetic, epigenetic, developmental, psychosocial and neurochemical factors that are considered essential contributors to the development of resilience. Neural circuits and pathways involved in mediating resilience are also discussed. The growing understanding of resilience factors will hopefully lead to the development of new pharmacological and psychological interventions for enhancing resilience and mitigating the untoward consequences.

  19. Understand electronics

    CERN Document Server

    Bishop, Owen

    2013-01-01

    Understand Electronics provides a readable introduction to the exciting world of electronics for the student or enthusiast with little previous knowledge. The subject is treated with the minimum of mathematics and the book is extensively illustrated.This is an essential guide for the newcomer to electronics, and replaces the author's best-selling Beginner's Guide to Electronics.The step-by-step approach makes this book ideal for introductory courses such as the Intermediate GNVQ.

  20. Understanding unemployment

    OpenAIRE

    Guillaume Rocheteau

    2006-01-01

    Modern economists have built models of the labor market, which isolate the market’s key drivers and describe the way these interact to produce particular levels of unemployment. One of the most popular models used by macroeconomists today is the search-matching model of equilibrium unemployment. We explain this model, and show how it can be applied to understand the way various policies, such as unemployment benefits, taxes, or technological changes, can affect the unemployment rate.

  1. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    improving management in the defense, especially in its logistics, through greater synergy in action, with the least consumption of resources while maintaining or even expanding the system capability („Smart defense” concept, „Pool and share” concept, organizational changes in the field of logistics - the set up Joint Logistic Support Groups, etc.. Understanding and implementing these reforms require a special attitude towards the environment and circumstances in which management decisions are made. Logistical and „nonlogistical” management in the defense needs a broader approach to problems, which will provide them consideration of all the consequences that their decisions can have, not only in the defense, but to all stakeholders, especially end-users of services of the defense system - a society or citizens (civilians and citizens in uniform. Management in the defense system often focuses only on one aspect of the final desired state while ignoring its other aspects or impacts on the wider system, the social environment or the state. In fact, it often tends to minimize the costs of defense, regardless of the implications that arise in the field of defense capabilities and levels of security, particularly „in the long run”. Some of the basic principles of good governance in the defense logistics would be: legality, transparency, responsibility, discipline, cooperation and partnership, continuous improvement and others. As a part of planned and organized work to improve management in defense logistics (analogy applies to the defense system as a whole, special attention should be focused on creating a concept that promotes proper selection, choice, education, training, motivation and development of managers among the most competent, the most educated and the most experienced personnel.   Conclusion   Changes in governance in the public sector, more or less, affect all its segments. Given that the budget allocation for defense is rather high and the defense

  2. Understanding Technology?

    Directory of Open Access Journals (Sweden)

    Erik Bendtsen

    2016-11-01

    Full Text Available We are facing radical changes in our ways of living in the nearest future. Not necessarily of our own choice, but because tchnological development is moving so fast, that it will have still greater impact on many aspects of our lives. We have seen the beginnings of that change within the latest 35 years or so, but according to newest research that change will speed up immensely in the nearest years to come. The impact of that change or these changes will affect our working life immensely as a consequence of automation. How these changes are brought about and which are their consequences in a broad sense is being attempted to be understood and guessed by researchers. No one knows for sure, but specific patterns are visible. This paper will not try to guess, what will come, but will rather try to understand the deepest ”nature” of technology in order to understand the driving factors in this development: the genesis of technology in a broad sense in order to contibute to the understanding of the basis for the expected development.

  3. Understanding Magnitudes to Understand Fractions

    Science.gov (United States)

    Gabriel, Florence

    2016-01-01

    Fractions are known to be difficult to learn and difficult to teach, yet they are vital for students to have access to further mathematical concepts. This article uses evidence to support teachers employing teaching methods that focus on the conceptual understanding of the magnitude of fractions.

  4. Testing Understanding and Understanding Testing.

    Science.gov (United States)

    Pedersen, Jean; Ross, Peter

    1985-01-01

    Provides examples in which graphs are used in the statements of problems or in their solutions as a means of testing understanding of mathematical concepts. Examples (appropriate for a beginning course in calculus and analytic geometry) include slopes of lines and curves, quadratic formula, properties of the definite integral, and others. (JN)

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  7. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  8. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  9. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  10. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  11. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  12. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  13. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  14. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  15. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  16. Understanding uncertainty

    CERN Document Server

    Lindley, Dennis V

    2013-01-01

    Praise for the First Edition ""...a reference for everyone who is interested in knowing and handling uncertainty.""-Journal of Applied Statistics The critically acclaimed First Edition of Understanding Uncertainty provided a study of uncertainty addressed to scholars in all fields, showing that uncertainty could be measured by probability, and that probability obeyed three basic rules that enabled uncertainty to be handled sensibly in everyday life. These ideas were extended to embrace the scientific method and to show how decisions, containing an uncertain element, could be rationally made.

  17. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  18. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  19. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  20. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  1. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  2. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  3. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  4. Understanding analysis

    CERN Document Server

    Abbott, Stephen

    2015-01-01

    This lively introductory text exposes the student to the rewards of a rigorous study of functions of a real variable. In each chapter, informal discussions of questions that give analysis its inherent fascination are followed by precise, but not overly formal, developments of the techniques needed to make sense of them. By focusing on the unifying themes of approximation and the resolution of paradoxes that arise in the transition from the finite to the infinite, the text turns what could be a daunting cascade of definitions and theorems into a coherent and engaging progression of ideas. Acutely aware of the need for rigor, the student is much better prepared to understand what constitutes a proper mathematical proof and how to write one. Fifteen years of classroom experience with the first edition of Understanding Analysis have solidified and refined the central narrative of the second edition. Roughly 150 new exercises join a selection of the best exercises from the first edition, and three more project-sty...

  5. Understanding ayurveda.

    Science.gov (United States)

    Gadgil, Vaidya Dilip

    2010-01-01

    Ayurveda needs to achieve its full potential both in India and globally. This requires imparting to its students full appreciation of Ayurveda's power and strength, particularly proper understanding of the advantages of applying it to treat chronic and acute diseases. To this end, we explain the necessity of learning Sanskrit as a medium of study, and the advantages of learning the Texts in the traditional way, rather than relying on translations with all the loss of meaning and precision, which that entails. We emphasize the use of Triskandhakosha as a means to fully understand Ayurveda fundamental concepts and technical terms, so that all their shades of meaning are fully understood, and all their usages given in different places in the texts. Only by such methods can full appreciation of Ayurvedic wisdom be achieved, and the full depth and power of its knowledge be applied. Only then will its true status among systems of medicine come to be appreciated, either in India or more widely in the world as a whole.

  6. Understanding Ayurveda

    Directory of Open Access Journals (Sweden)

    Vaidya Dilip Gadgil

    2010-01-01

    Full Text Available Ayurveda needs to achieve its full potential both in India and globally. This requires imparting to its students full appreciation of Ayurveda′s power and strength, particularly proper understanding of the advantages of applying it to treat chronic and acute diseases. To this end, we explain the necessity of learning Sanskrit as a medium of study, and the advantages of learning the Texts in the traditional way, rather than relying on translations with all the loss of meaning and precision, which that entails. We emphasize the use of Triskandhakosha as a means to fully understand Ayurveda fundamental concepts and technical terms, so that all their shades of meaning are fully understood, and all their usages given in different places in the texts. Only by such methods can full appreciation of Ayurvedic wisdom be achieved, and the full depth and power of its knowledge be applied. Only then will its true status among systems of medicine come to be appreciated, either in India or more widely in the world as a whole.

  7. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  8. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  9. Control of Carbon Assimilation and Partitioning by Jasmonate: An Accounting of Growth–Defense Tradeoffs

    Directory of Open Access Journals (Sweden)

    Nathan E. Havko

    2016-01-01

    Full Text Available Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA, which is a key indicator of leaf construction costs and leaf life span.

  10. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  11. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  12. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  13. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  14. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  15. Understanding physics

    CERN Document Server

    Cassidy, David; Rutherford, James

    2002-01-01

    Understanding Physics provides a thorough grounding in contemporary physics while placing physics into its social and historical context Based in large part on the highly respected Project Physics Course developed by two of the authors, it also integrates the results of recent pedagogical research The text thus - teaches about the basic phenomena in the physical world and the concepts developed to explain them - shows that science is a rational human endeavor with a long and continuing tradition, involving many different cultures and people - develops facility in critical thinking, reasoned argumentation, evaluation of evidence, mathematical modeling, and ethical values The treatment emphasizes not only what we know but also how we know it, why we believe it, and what effects that knowledge has - Why do we believe the Earth and planets revolve around the Sun? - Why do we believe that matter is made of atoms? - How do relativity theory and quantum mechanics alter our conception of Nature and in what ways do th...

  16. Understanding users

    DEFF Research Database (Denmark)

    Johannsen, Carl Gustav Viggo

    2014-01-01

    Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... tested in library contexts and the aim of this article is to identify the main approaches and to discuss their perspectives, including their strenghts and weaknesses in, especially, public library contexts. The purpose is also to prsent and discuss the results of a recent - 2014 - Danish library user...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself....

  17. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  18. Defense pattern of Chinese cork oak across latitudinal gradients: influences of ontogeny, herbivory, climate and soil nutrients

    Science.gov (United States)

    Wang, Xiao-Fei; Liu, Jian-Feng; Gao, Wen-Qiang; Deng, Yun-Peng; Ni, Yan-Yan; Xiao, Yi-Hua; Kang, Feng-Feng; Wang, Qi; Lei, Jing-Pin; Jiang, Ze-Ping

    2016-06-01

    Knowledge of latitudinal patterns in plant defense and herbivory is crucial for understanding the mechanisms that govern ecosystem functioning and for predicting their responses to climate change. Using a widely distributed species in East Asia, Quercus variabilis, we aim to reveal defense patterns of trees with respect to ontogeny along latitudinal gradients. Six leaf chemical (total phenolics and total condensed tannin concentrations) and physical (cellulose, hemicellulose, lignin and dry mass concentration) defensive traits as well as leaf herbivory (% leaf area loss) were investigated in natural Chinese cork oak (Q. variabilis) forests across two ontogenetic stages (juvenile and mature trees) along a ~14°-latitudinal gradient. Our results showed that juveniles had higher herbivory values and a higher concentration of leaf chemical defense substances compared with mature trees across the latitudinal gradient. In addition, chemical defense and herbivory in both ontogenetic stages decreased with increasing latitude, which supports the latitudinal herbivory-defense hypothesis and optimal defense theory. The identified trade-offs between chemical and physical defense were primarily determined by environmental variation associated with the latitudinal gradient, with the climatic factors (annual precipitation, minimum temperature of the coldest month) largely contributing to the latitudinal defense pattern in both juvenile and mature oak trees.

  19. The defense of political prisoners in the early ‘70s: professional practice, law and politics

    Directory of Open Access Journals (Sweden)

    Mauricio Chama

    2010-12-01

    Full Text Available The work addresses the relationship between law and politics in the early 70s. More precisely aims to identify and reconstruct the main features that assumes the defense of political prisoners in this period. Rather than a specific work, means that the defense of political prisoners in those years represented a new configuration that was able to articulate a new association of legal professionals, renewed defense strategies, a vast and systematic effort of denunciation, a fluid network of lawyers national and a peculiar rhetoric aimed at the formation of a “new law”. Conceived in these terms, we believe that the defense of political prisoners in the early ‘70s redefined the conventional modes of understanding the relationship between professional practice, law and politics, encouraging the emergence of a new model of counsel in the public sphere.

  20. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  1. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  2. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  3. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  4. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  5. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  6. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  7. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  8. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  9. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  10. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  11. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  12. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  13. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  14. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  15. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. Understanding PISA

    Directory of Open Access Journals (Sweden)

    Stephen DOWNES

    2005-04-01

    Full Text Available Understanding PISA Stephen DOWNESMoncton, CANADA ABSTRACT The headline was dramatic enough to cause a ripple in the reading public. "Students who use computers a lot at school have worse maths and reading performance," noted the BBC news article, citing a 2004 study by Ludger Woessmann and Thomas Fuchs (Fuchs and Woessman, 2004. It was not long before the blogosphere took notice. Taking the theme and running with it, Alice and Bill ask, "Computers Make School Kids Dumber?" They theorize, "If you track the admitted decline of education, you'll probably notice that it follows along with the increase of technology in the classroom." In a similar vein, James Bartholomew asks, "Do you think that the government will turn down the volume of its boasting about how it has spent billions introducing computers in schools (while keeping down the pay of teachers so much that there are shortages? Do you think it will stop sending governors of state schools glossy pamphlets about insisting that computers are used in their schools as much as possible?" In this study, therefore, PISA looks well beyond educational attainment, and also includes school demographics, such as whether it is a public or private school, has large or small classes, or has access or not to technological resources. Finally, it does measure student information-their family background, access to books and computers and parental support as well. The PISA survey departs from previous surveys in disregarding the stated curricula of the schools being measured. Therefore, the conclusion is not surprising, nor even wrong for him to consider independently of any parental or teacher support, considered without reference to the software running on it, considered without reference to student attitudes and interests, does not positively impact an education. Finally, he focus on missing the reporting of results

  18. Natural selection on immune defense: A field experiment.

    Science.gov (United States)

    Langeloh, Laura; Behrmann-Godel, Jasminca; Seppälä, Otto

    2017-02-01

    Predicting the evolution of phenotypic traits requires an understanding of natural selection on them. Despite its indispensability in the fight against parasites, selection on host immune defense has remained understudied. Theory predicts immune traits to be under stabilizing selection due to associated trade-offs with other fitness-related traits. Empirical studies, however, report mainly positive directional selection. This discrepancy could be caused by low phenotypic variation in the examined individuals and/or variation in host resource level that confounds trade-offs in empirical studies. In a field experiment where we maintained Lymnaea stagnalis snails individually in cages in a lake, we investigated phenotypic selection on two immune defense traits, phenoloxidase (PO)-like activity and antibacterial activity, in hemolymph. We used a diverse laboratory population and manipulated snail resource level by limiting their food supply. For six weeks, we followed immune activity, growth, and two fitness components, survival and fecundity of snails. We found that PO-like activity and growth were under stabilizing selection, while antibacterial activity was under positive directional selection. Selection on immune traits was mainly driven by variation in survival. The form of selection on immune defense apparently depends on the particular trait, possibly due to its importance for countering the present parasite community. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  19. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  20. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  1. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  2. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  3. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  4. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  5. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  6. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  7. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  8. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  9. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  10. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  11. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  12. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  13. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  14. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  15. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  16. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  17. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  18. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  19. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  20. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  1. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  2. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  3. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  4. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  5. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  6. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  7. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  8. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  9. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  11. Defense programs beryllium good practice guide

    International Nuclear Information System (INIS)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D ampersand D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is

  12. 75 FR 32640 - Defense Federal Acquisition Regulation Supplement; Finland- Public Interest Exception to the Buy...

    Science.gov (United States)

    2010-06-08

    ... procurement memorandum of understanding (RDP MOU) between the government of Finland and the Government of the United States has been in effect since 1991. The governments have negotiated and concluded a new RDP MOU... Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System. 0 Therefore, 48...

  13. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

    NARCIS (Netherlands)

    Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Trujillo-Rasua, Rolando

    2016-01-01

    Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack

  14. Defense AT and L. Volume 41, Number 2, March-April 2012

    Science.gov (United States)

    2012-03-01

    a philosophical perspective, but let’s put some “shoe leather ” on this discussion. What will it take to prepare and groom these current and future...guidebook) rep- resents the harvested fruit of many years of difficult, complicated efforts in establishing and understanding the Defense AT&L: Product

  15. The Eye Movement Desensitization and Reprocessing Procedure Prevents Defensive Processing in Health Persuasion

    NARCIS (Netherlands)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a

  16. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  17. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  18. A statistical analysis of individual success after successful completion of Defense Language Institute Foreign Language Center Training

    OpenAIRE

    Hinson, William B.

    2005-01-01

    "The Defense Language Institute Foreign Language Center (DLIFLC) trains students in various foreign languages and dialects for the Department of Defense (DOD). The majority of students are firstterm enlistees in the basic program. This study uses classification trees and logistic regression to understand the military, academic and personal characteristics that influence first-term success after successfully completing DLIFLC training. Success was defined as completing a firstterm enlistme...

  19. Massive activation of archaeal defense genes during viral infection.

    Science.gov (United States)

    Quax, Tessa E F; Voet, Marleen; Sismeiro, Odile; Dillies, Marie-Agnes; Jagla, Bernd; Coppée, Jean-Yves; Sezonov, Guennadi; Forterre, Patrick; van der Oost, John; Lavigne, Rob; Prangishvili, David

    2013-08-01

    Archaeal viruses display unusually high genetic and morphological diversity. Studies of these viruses proved to be instrumental for the expansion of knowledge on viral diversity and evolution. The Sulfolobus islandicus rod-shaped virus 2 (SIRV2) is a model to study virus-host interactions in Archaea. It is a lytic virus that exploits a unique egress mechanism based on the formation of remarkable pyramidal structures on the host cell envelope. Using whole-transcriptome sequencing, we present here a global map defining host and viral gene expression during the infection cycle of SIRV2 in its hyperthermophilic host S. islandicus LAL14/1. This information was used, in combination with a yeast two-hybrid analysis of SIRV2 protein interactions, to advance current understanding of viral gene functions. As a consequence of SIRV2 infection, transcription of more than one-third of S. islandicus genes was differentially regulated. While expression of genes involved in cell division decreased, those genes playing a role in antiviral defense were activated on a large scale. Expression of genes belonging to toxin-antitoxin and clustered regularly interspaced short palindromic repeat (CRISPR)-Cas systems was specifically pronounced. The observed different degree of activation of various CRISPR-Cas systems highlights the specialized functions they perform. The information on individual gene expression and activation of antiviral defense systems is expected to aid future studies aimed at detailed understanding of the functions and interplay of these systems in vivo.

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  1. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  2. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  3. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  4. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  5. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  6. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  7. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  8. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  9. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  10. Plant defense response against Fusarium oxysporum and strategies to develop tolerant genotypes in banana.

    Science.gov (United States)

    Swarupa, V; Ravishankar, K V; Rekha, A

    2014-04-01

    Soil-borne fungal pathogen, Fusarium oxysporum causes major economic losses by inducing necrosis and wilting symptoms in many crop plants. Management of fusarium wilt is achieved mainly by the use of chemical fungicides which affect the soil health and their efficiency is often limited by pathogenic variability. Hence understanding the nature of interaction between pathogen and host may help to select and improve better cultivars. Current research evidences highlight the role of oxidative burst and antioxidant enzymes indicating that ROS act as an important signaling molecule in banana defense response against Fusarium oxysporum f.sp. cubense. The role of jasmonic acid signaling in plant defense against necrotrophic pathogens is well recognized. But recent studies show that the role of salicylic acid is complex and ambiguous against necrotrophic pathogens like Fusarium oxysporum, leading to many intriguing questions about its relationship between other signaling compounds. In case of banana, a major challenge is to identify specific receptors for effector proteins like SIX proteins and also the components of various signal transduction pathways. Significant progress has been made to uncover the role of defense genes but is limited to only model plants such as Arabidopsis and tomato. Keeping this in view, we review the host response, pathogen diversity, current understanding of biochemical and molecular changes that occur during host and pathogen interaction. Developing resistant cultivars through mutation, breeding, transgenic and cisgenic approaches have been discussed. This would help us to understand host defenses against Fusarium oxysporum and to formulate strategies to develop tolerant cultivars.

  11. Partial activation of SA- and JA-defensive pathways in strawberry upon Colletotrichum acutatum interaction

    Directory of Open Access Journals (Sweden)

    FRANCISCO AMIL-RUIZ

    2016-07-01

    Full Text Available Understanding the nature of pathogen host interaction may help improve strawberry (Fragaria × ananassa cultivars. Plant resistance to pathogenic agents usually operates through a complex network of defense mechanisms mediated by a diverse array of signaling molecules. In strawberry, resistance to a variety of pathogens has been reported to be mostly polygenic and quantitatively inherited, making it difficult to associate molecular markers with disease resistance genes. Colletotrichum acutatum spp. is a major strawberry pathogen, and completely resistant cultivars have not been reported. Moreover, strawberry defense network components and mechanisms remain largely unknown and poorly understood. Assessment of the strawberry response to C. acutatum included a global transcript analysis, and acidic hormones SA and JA measurements were analyzed after challenge with the pathogen. Induction of transcripts corresponding to the SA and JA signaling pathways and key genes controlling major steps within these defense pathways was detected. Accordingly, SA and JA accumulated in strawberry after infection. Contrastingly, induction of several important SA, JA, and oxidative stress-responsive defense genes, including FaPR1-1, FaLOX2, FaJAR1, FaPDF1, and FaGST1, was not detected, which suggests that specific branches in these defense pathways (those leading to FaPR1-2, FaPR2-1, FaPR2-2, FaAOS, FaPR5 and FaPR10 were activated. Our results reveal that specific aspects in SA and JA dependent signaling pathways are activated in strawberry upon interaction with C. acutatum. Certain described defense-associated transcripts related to these two known signaling pathways do not increase in abundance following infection. This finding suggests new insight into a specific putative molecular strategy for defense against this pathogen.

  12. Confronting actual influence of radiation on human bodies and biological defense mechanism

    International Nuclear Information System (INIS)

    Matsubara, Junko

    2012-01-01

    After the accident at Fukushima Daiichi Nuclear Power Plant of Tokyo Electric Power Company, social, economical, psychological pressures on local residents and fears of radiation among the general public have not been resolved. Based on the assumption that the negligence of specialists to clearly explain the influence of radiation on human bodies to the general public is the factor for above mentioned pressures and fears, the influence of radiation from a realistic view was discussed. The topics covered are: (1) understanding the meaning of radiation regulation, (2) radiation and threshold values, (3) actual influence of low-dose radiation, (4) chemical and biological defense in defense mechanism against radiation, (5) problems raised by Fukushima Daiichi nuclear accident. Furthermore, the article explains the principles and the applications of biological defense function activation, and suggested that self-help efforts to fight against stress are from now on. (S.K.)

  13. The pathogen-actin connection: A platform for defense signaling in plants

    Energy Technology Data Exchange (ETDEWEB)

    Day, B; Henty, Jessica L; Porter, K J; Staiger, Chris J

    2011-09-08

    The cytoskeleton, a dynamic network of cytoplasmic polymers, plays a central role in numerous fundamental processes, such as development, reproduction, and cellular responses to biotic and abiotic stimuli. As a platform for innate immune responses in mammalian cells, the actin cytoskeleton is a central component in the organization and activation of host defenses, including signaling and cellular repair. In plants, our understanding of the genetic and biochemical responses in both pathogen and host that are required for virulence and resistance has grown enormously. Additional advances in live-cell imaging of cytoskeletal dynamics have markedly altered our view of actin turnover in plants. In this review, we outline current knowledge of host resistance following pathogen perception, both in terms of the genetic interactions that mediate defense signaling, as well as the biochemical and cellular processes that are required for defense signaling.

  14. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  15. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  16. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  17. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  18. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  19. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  20. Dynamic extrafloral nectar production: the timing of leaf damage affects the defensive response in Senna mexicana var. chapmanii (Fabaceae).

    Science.gov (United States)

    Jones, Ian M; Koptur, Suzanne

    2015-01-01

    • Extrafloral nectar (EFN) mediates food for protection mutualisms between plants and defensive insects. Understanding sources of variation in EFN production is important because such variations may affect the number and identity of visitors and the effectiveness of plant defense. We investigated the influence of plant developmental stage, time of day, leaf age, and leaf damage on EFN production in Senna mexicana var. chapmanii. The observed patterns of variation in EFN production were compared with those predicted by optimal defense theory.• Greenhouse experiments with potted plants were conducted to determine how plant age, time of day, and leaf damage affected EFN production. A subsequent field study was conducted to determine how leaf damage, and the resulting increase in EFN production, affected ant visitation in S. chapmanii.• More nectar was produced at night and by older plants. Leaf damage resulted in increased EFN production, and the magnitude of the response was greater in plants damaged in the morning than those damaged at night. Damage to young leaves elicited a stronger defensive response than damage to older leaves, in line with optimal defense theory. Damage to the leaves of S. chapmanii also resulted in significantly higher ant visitation in the field.• Extrafloral nectar is an inducible defense in S. chapmanii. Developmental variations in its production support the growth differentiation balance hypothesis, while within-plant variations and damage responses support optimal defense theory. © 2015 Botanical Society of America, Inc.

  1. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  2. Prospects for the EU-US Trade Relations in the Light of the TTIP

    Directory of Open Access Journals (Sweden)

    Ružeková Viera

    2016-12-01

    Full Text Available To success on international markets, individual economies are trying to take measures to increase their efficiency, flexibility and competitiveness. There is a liberalization of tariff and non-tariff barriers mainly due to trade based on regional integration. Among such agreements belong also the Transatlantic Trade and Investment Partnership (TTIP between the EU and the USA, which represent the largest economies in the world. The paper analyses developed scientific studies that assess the economic impact, advantages and disadvantages of closer economic cooperation. However, it reflects not only the economic but also foreign policy importance of this partnership. In the case of signing the TTIP, it would become the most important bilateral trade agreement ever, both in terms of international trade as well as in terms of the impact on international trade as a whole.

  3. EU-US economic relations: the TTIP negotiations and its implications

    Directory of Open Access Journals (Sweden)

    Javier Arregui Moreno

    2015-09-01

    Full Text Available This article analyses some of the most important arguments for creating a free trade area between the EU and the United States. It also identifies the most conflictive issues in the Transatlantic Trade and Investment Partnership (TTIP and the possible agreements according to the mechanisms and strategies used. The article shows that the TTIP negotiation has sufficient potential to link issues together so that both the EU and the US can exchange positions on various subjects via the logrolling mechanism. Given that the TTIP presents significant potential advantages to both sides and that in this type of negotiation absolute profits tend to prevail, it is feasible that a final agreement will be reached that is accepted by both parties. It would be a new turn of the screw in the process of globalisation, with the aim of preserving the West’s central role on the international stage.

  4. Mind the Gap: furthering the development of EU-US collaboration in marine geoscience.

    Science.gov (United States)

    Glaves, H.; Miller, S.; Schaap, D.

    2012-04-01

    There is a large and ever increasing amount of marine geological and geophysical data available throughout Europe, the USA and beyond. The challenges associated with the acquisition of this data mean that the cost of collecting it is very high and there is therefore a need to maximise the potential re-use of this data wherever possible. Facilitating this is becoming an increasingly important aspect of marine geosciences data management as the need for marine data increases at a time when the financial resources for data acquisition are being dramatically reduced. A significant barrier to the re-use of marine geoscience data is the variety of different formats, standards, vocabularies etc which have been used by the various organisations engaged with the collection and management of marine geosciences data at a regional, national and international scale. This is also proving to be a barrier to the development of interoperability with other data types at a time when there is a need to develop a more holistic approach to marine research. These challenges are currently being addressed within Europe by a number of EU funded initiatives, the objectives of which are an improvement in the discovery and access to marine data. The Geo-Seas project is just one of these initiatives, the focus of which is the development of an e-infrastructure for the delivery of standardised marine geological and geophysical data across Europe. The project is developing this e-infrastructure by adopting and adapting the methodologies of the SeaDataNet project which currently provides an e-infrastructure for the management of oceanographic data. This re-use of the existing technologies has lead to the development a joint multidisciplinary e-infrastructure for the delivery or both geoscientific and oceanographic data. In order to expand these initiatives further and bridge the gap between these European projects and those being undertaken by colleagues in both the US and elsewhere a number of collaborative relationships have been developed. To further these growing collaborative relationships a new EU initiative has recently been proposed in parallel with the relevant funding agencies in the USA and Australia with the objective of developing common standards and methodologies which will allow the development of a common multidisciplinary approach to marine science on an international scale.

  5. No fracking way: how the EU-US trade agreement risks expanding fracking

    International Nuclear Information System (INIS)

    2014-03-01

    A major trade deal currently being negotiated between the European Union (EU) and the United States (US) threatens the power of governments to protect communities, citizens and the environment from risky new technologies such as fracking. The Transatlantic Trade and Investment Partnership (TTIP) covers a huge range of issues and sectors, including food safety, genetically modified products, toxic chemicals, highly polluting fuels and data protection. The talks threaten to weaken or roll-back democratically agreed safeguards put in place to protect the environment and citizens - for the sake of corporate profits. The talks are likely to favour safeguards for corporate investments over safeguards for citizens and the environment, allowing companies to seek compensation when government decisions affect their profits. This could benefit companies seeking to exploit natural resources through hazardous technologies whose activities may be affected by environmental or health regulations. Fracking - or high-volume hydraulic fracturing - is used to extract hard-to-access unconventional fossil fuels, such as shale gas and oil, tight gas and coal bed methane. Fracking will increase available gas supplies, locking us into fossil fuel dependency for several decades. There is growing evidence of huge health and environmental risks and impacts from fracking and this is leading to widespread public opposition at the community level, both in the EU and the US. This brief analyses how the TTIP could limit governments' ability to regulate the development and expansion of fracking. It argues that the TTIP could dangerously thwart government efforts to address climate change and to protect citizens; could expand fracking by removing the ability of governments to control natural gas exports; and could mean that states would be forced to pay millions in compensation to corporations for profits lost to regulation. It calls on the EU and the US to exclude investor-state dispute settlement rights from the agreement and from other trade deals in the pipeline - including the EU-Canada Comprehensive Economic and Trade Agreement (CETA)

  6. Does the "Special Relationship" Have a Role to Play in Future EU-US Relations?

    National Research Council Canada - National Science Library

    Hunter, James H

    2006-01-01

    .... However, despite the Solana Paper's statement that this trans-Atlantic relationship is one of the core elements of the international system, with the numerous trade and foreign policy conflicts...

  7. Report on the Joint EU-US Workshop on Microbial Community Dynamics: Cooperation and Competition

    Energy Technology Data Exchange (ETDEWEB)

    Wall, Judy D. [Univ. of Missouri, Columbia, MO (United States)

    2013-07-01

    The European Commission (EC)-United States (US) Task Force on Biotechnology Research has a longstanding joint Working Group on Biotechnology for the Environment whose mission is to foster collaborations between researchers in the European Union (EU) and US in the field of environmental biotechnology. A special focus of the Working Group is to increase scientific interchange between early career scientists in the US and EU. Such interactions initiate a foundation of respect and trust needed to develop long-term collaborations. In order to realize the full potential for the application of modern technologies to obtain a sustainable biosphere, it is vital to create conduits for knowledge exchange among scientists worldwide engaged in environmental microbial biotechnology research. Since its formation in 1994, the Working Group has organized many activities for early career scientists designed to promote this scientific exchange, including two week courses with hands-on research experience, intensive workshops of two or three days, and research scholar exchanges of one to six months. These interactions are focused on environmental problems that respect no international boundaries.

  8. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  9. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  10. IMPROVING THE STRATEGIC PLANNING OF THE DEFENSE-INDUSTRIAL COMPLEX CORPORATIONS OF RUSSIA

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2016-01-01

    Full Text Available In this paper, we develop proposals to improve the strategic planning of Russian corporations of the defense-industrial complex. The relevance of the study due to the fact that the methodology for the adaptation of the strategic management of the military-industrial enterprises with substantial scientifi c and technical potential, should take into account a number of features, such as the identifi cation of the features of competition in the future; understanding of the prospects and development opportunities in the medium and long term; assessment of resource potential; impact assessment and risk in the implementation of promising strategies. In the more precise understanding of the strategy as a pattern of behavior aimed at achieving these goals, a set of rules for search and opportunities; strategic plan is seen as a series of specifi c steps and actions that are integrated in space and time, which lead to the transformation of the current position to the desired. We consider the practice of corporate transformation strategies of the world defense industry using a system method. To improve the strategic planning of Russian defense industry corporations it is recommended to apply the strategy of adapting the defense industry companies and their diversifi cation with the civilian sectors. The key vectors of the development strategy of the defense-industrial complex of Russian corporations are defi ned: providing an acceptable investment climate in the sphere of military-technical cooperation; neutralization of threats by the activities of DIC TNCs; creation of their own TNK defense industry and others.

  11. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  12. Isonitrosoacetophenone drives transcriptional reprogramming in Nicotiana tabacum cells in support of innate immunity and defense.

    Directory of Open Access Journals (Sweden)

    Arnaud T Djami-Tchatchou

    Full Text Available Plants respond to various stress stimuli by activating broad-spectrum defense responses both locally as well as systemically. As such, identification of expressed genes represents an important step towards understanding inducible defense responses and assists in designing appropriate intervention strategies for disease management. Genes differentially expressed in tobacco cell suspensions following elicitation with isonitrosoacetophenone (INAP were identified using mRNA differential display and pyro-sequencing. Sequencing data produced 14579 reads, which resulted in 198 contigs and 1758 singletons. Following BLAST analyses, several inducible plant defense genes of interest were identified and classified into functional categories including signal transduction, transcription activation, transcription and protein synthesis, protein degradation and ubiquitination, stress-responsive, defense-related, metabolism and energy, regulation, transportation, cytoskeleton and cell wall-related. Quantitative PCR was used to investigate the expression of 17 selected target genes within these categories. Results indicate that INAP has a sensitising or priming effect through activation of salicylic acid-, jasmonic acid- and ethylene pathways that result in an altered transcriptome, with the expression of genes involved in perception of pathogens and associated cellular re-programming in support of defense. Furthermore, infection assays with the pathogen Pseudomonas syringae pv. tabaci confirmed the establishment of a functional anti-microbial environment in planta.

  13. Defense programs beryllium good practice guide

    Energy Technology Data Exchange (ETDEWEB)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  14. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  15. Hypergame theory applied to cyber attack and defense

    Science.gov (United States)

    House, James Thomas; Cybenko, George

    2010-04-01

    This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.

  16. RNAi and Antiviral Defense in the Honey Bee

    Science.gov (United States)

    Brutscher, Laura M.; Flenniken, Michelle L.

    2015-01-01

    Honey bees play an important agricultural and ecological role as pollinators of numerous agricultural crops and other plant species. Therefore, investigating the factors associated with high annual losses of honey bee colonies in the US is an important and active area of research. Pathogen incidence and abundance correlate with Colony Collapse Disorder- (CCD-) affected colonies in the US and colony losses in the US and in some European countries. Honey bees are readily infected by single-stranded positive sense RNA viruses. Largely dependent on the host immune response, virus infections can either remain asymptomatic or result in deformities, paralysis, or death of adults or larvae. RNA interference (RNAi) is an important antiviral defense mechanism in insects, including honey bees. Herein, we review the role of RNAi in honey bee antiviral defense and highlight some parallels between insect and mammalian immune systems. A more thorough understanding of the role of pathogens on honey bee health and the immune mechanisms bees utilize to combat infectious agents may lead to the development of strategies that enhance honey bee health and result in the discovery of additional mechanisms of immunity in metazoans. PMID:26798663

  17. RNAi and Antiviral Defense in the Honey Bee

    Directory of Open Access Journals (Sweden)

    Laura M. Brutscher

    2015-01-01

    Full Text Available Honey bees play an important agricultural and ecological role as pollinators of numerous agricultural crops and other plant species. Therefore, investigating the factors associated with high annual losses of honey bee colonies in the US is an important and active area of research. Pathogen incidence and abundance correlate with Colony Collapse Disorder- (CCD- affected colonies in the US and colony losses in the US and in some European countries. Honey bees are readily infected by single-stranded positive sense RNA viruses. Largely dependent on the host immune response, virus infections can either remain asymptomatic or result in deformities, paralysis, or death of adults or larvae. RNA interference (RNAi is an important antiviral defense mechanism in insects, including honey bees. Herein, we review the role of RNAi in honey bee antiviral defense and highlight some parallels between insect and mammalian immune systems. A more thorough understanding of the role of pathogens on honey bee health and the immune mechanisms bees utilize to combat infectious agents may lead to the development of strategies that enhance honey bee health and result in the discovery of additional mechanisms of immunity in metazoans.

  18. Defense plan of Hydro-Quebec for extreme contingencies

    International Nuclear Information System (INIS)

    Trudel, Guilles; Bernard, Serge; Portales, Esteban

    2000-01-01

    In the last years, Hydro-Quebec it undertook an important program to improve the dependability of their net of energy transport. They concentrated the efforts on increasing the capacity of the net resist in the event of carries to an extreme contingency caused in general by multiple incidents or for successive disconnection of the lines of energy transport. To neutralize these contingencies, Hydro-Quebec it adopted a series of special measures that are contained under the general title of Plan of Defense for Extreme Contingencies. The objective of this plan is to detect the incidents that surpass the capacity of the net. It is completely automatic and it is based mainly in: A system of automatic disconnection of generation and tele-shot of loads; A system of automatic maneuver (opening and closing) of inductances shunt of 735 kw; A system of disconnection of loads for low voltage; A system of disconnection of loads for low frequency. The present document summarizes the orientations that there is taking Hydro-Quebec to protect its net in the event of extreme contingencies and it describes the different automatism that they are adopts, in particular the system automatic disconnection of generation and tele-shot of loads (RPTC) that is one of the main components of the defense plan. The system RPTC detects the simultaneous loss of several lines directly in 15 substations of 735 kw. It understands four places of automatic disconnection of generation and a centralized system of tele-shot of loads

  19. Shape understanding system machine understanding and human understanding

    CERN Document Server

    Les, Zbigniew

    2015-01-01

    This is the third book presenting selected results of research on the further development of the shape understanding system (SUS) carried out by authors in the newly founded Queen Jadwiga Research Institute of Understanding. In this book the new term Machine Understanding is introduced referring to a new area of research aiming to investigate the possibility of building machines with the ability to understand. It is presented that SUS needs to some extent mimic human understanding and for this reason machines are evaluated according to the rules applied for the evaluation of human understanding. The book shows how to formulate problems and how it can be tested if the machine is able to solve these problems.    

  20. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  1. Excessive Profits of German Defense Contractors

    Science.gov (United States)

    2014-09-01

    its business unit Thyssen Krupp Marine Systems, is a German defense contractor. (2) Tognom AG Tognum AG owned the MTU Friedrichshafen GmbH before... Friedrichshafen provided engines for many ships of the German Navy and for German battle tanks, such as the Leopard I and Leopard II. MTU refers to the

  2. The Transferability and Retraining of Defense Engineers.

    Science.gov (United States)

    Rittenhouse, Carl H.

    This study was undertaken to describe any special barriers to the transfer of engineers from defense to commercial work, and to evaluate retraining and reorientation techniques that might help ease the transfer. Interviews and questionnaires were used to obtain data from about 2,100 engineers and 100 managers in 14 industries. Characteristics,…

  3. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  4. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  5. Defense.gov Special Report: Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  6. Under Secretary of Defense (Comptroller) > Budget

    Science.gov (United States)

    functionalStatements OUSD(C) History FMR Budget Materials Budget Execution Financial Management Improving Financial Performance Reports Regulations Press Release | Budget Briefing | Transcripts: David L. Norquist, Under PDF document. Click on Excel icon for Excel document Overview - FY2019 Defense Budget Performance

  7. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  8. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  9. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  10. Department of Defense Education Activity. An Overview.

    Science.gov (United States)

    US Department of Defense, 2004

    2004-01-01

    DoDEA operates 223 public schools in 16 districts located in seven states, Puerto Rico, Guam, and 13 foreign countries to serve the children of military service members and Department of Defense civilian employees. Approximately 104,935 students are enrolled in DoDEA schools, with approximately 73,200 students in the DoDDS system, and…

  11. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Innovation in the Defense Acquisition Enterprise

    Science.gov (United States)

    2015-12-01

    uni- versities in the fields of innovation and entrepreneurship . Many books and articles have been written on innovation, perhaps none more well...partners has been the possible loss of freedom to make their own IR&D invest- ment decisions. That was never my intent . I once ran a major defense

  13. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  14. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  15. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  16. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  17. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  18. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  19. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  20. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  1. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  2. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  3. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  4. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  5. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  6. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  7. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  8. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  9. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  10. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  11. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  12. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  13. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  14. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  15. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  16. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  17. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  18. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  19. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  20. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  1. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  2. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  3. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  4. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  5. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  6. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  8. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  10. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  11. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  12. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  13. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  14. Understanding Alliance Formation Patterns

    Science.gov (United States)

    2015-12-01

    military, transportation, and communications technologies, which caused every place in the world to be politically significant. Second, “divisions of power...test a similar claim about the association between distance and dyadic alliance formation. In their first model, in which they use the complete data...1885 to 1990] are positively related to dyadic trade levels, and that their non- defense-pact counterparts are not significantly related to trade in

  15. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  16. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna

    2016-01-01

    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  17. Defense waste processing facility startup progress report

    International Nuclear Information System (INIS)

    Iverson, D.C.; Elder, H.H.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing

  18. Defense Waste Processing Facility, Savannah River Plant

    International Nuclear Information System (INIS)

    After 10 years of research, development, and testing, the US Department of Energy is building a new facility which will prepare high-level radioactive waste for permanent disposal. The Defense Waste Processing Facility, known as the DWPF, will be the first production-scale facility of its kind in the United States. In the DWPF, high-level waste produced by defense activities at the Savannah River Plant will be processed into a solid form, borosilicate glass, suitable for permanent off-site geologic disposal. With construction beginning in the fall of 1983, the DWPT is scheduled to be operational in 1989. By 2005, the DWPF will have immobilized the backlog of high-level waste which has been accumulating in storage tanks at the Savannah River Plant since 1954. Canisters of the immobilized waste will then be ready for permanent disposal deep under the ground, safely isolated from the environment

  19. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  20. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  1. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  2. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  3. Assessment of Accelerated Acquisition of Defense Programs

    Science.gov (United States)

    2016-09-01

    Quadrennial Defense Review explicitly called for doubling production rates of ISR UAVs, including Global Hawk. By 2009, Global Hawks had logged over 25,000...Honeywell (Formerly AlliedSignal) turboprop engine, compared to the Predator’s 115 hp (86 kW) piston engine. The power increase allows the Reaper...on basic requirements subsequently translated into costs at least double initial estimates and years of schedule slippage. In other words a classic

  4. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  5. Strategic nuclear policy and ballistic missile defense

    International Nuclear Information System (INIS)

    1981-01-01

    The article explains the problems of the antirockets (ABM) as they were part of the presentation Salt I 1972. It is a translation from the English of a publication of the Foreign Affairs Research Institute in London. A topical analysis of the strategic nuclear policy of the two superpowers and their attitudes in the question of ballistic missile defense are given by means of two monographies. (orig./HSCH) [de

  6. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    OpenAIRE

    Oleksandr Yu. Burov

    2016-01-01

    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  7. Compatible Goals: Defense and Environmental Protection

    Science.gov (United States)

    1984-03-22

    Remedial Action Site. AD-P004 146 Treatment of Wastewater (Red Water ) Resulti g from TNT Trinitrotoluene) Purification. AD-P004 147 Location of Volatile... Availabilit C040e3 _Vafl" -,ior OEC 5 1984 Ths document has been appeoved Dist Spool.A distribution.Is unlimiedL..... .. . COMFATABLE GOALS : DEFENSE AND...surface water to the same good biological quality as the water entering the installation. 4. Conserve fossil fuel energy to the highest degree possi

  8. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  9. Is Soviet Defense Policy Becoming Civilianized?

    Science.gov (United States)

    1990-08-01

    Larionov, a consultant to the institute, both at RAND and in Moscow; and Drs. Alexei Arbatov and Aleksandr Savelyev and several of their colleagues during...Soviet defense industry resources to civilian use is presented in Arthur J. Alexander , Perestroika and Change in Soviet Weapons Acquisition, The RAND...1986, especially pp. 101-102. 17 18 the more prominent younger specialists like Alexei Arbatov, Andrei Kokoshin, and Aleksandr Savelyev have long been

  10. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  11. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  12. Effective but costly, evolved mechanisms of defense against a virulent opportunistic pathogen in Drosophila melanogaster.

    OpenAIRE

    Yixin H Ye; Stephen F Chenoweth; Elizabeth A McGraw

    2009-01-01

    Drosophila harbor substantial genetic variation for antibacterial defense, and investment in immunity is thought to involve a costly trade-off with life history traits, including development, life span, and reproduction. To understand the way in which insects invest in fighting bacterial infection, we selected for survival following systemic infection with the opportunistic pathogen Pseudomonas aeruginosa in wild-caught Drosophila melanogaster over 10 generations. We then examined genome-wide...

  13. SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

    OpenAIRE

    Wu, Daoyuan; Cheng, Yao; Gao, Debin; Li, Yingjiu; Deng, Robert H.

    2018-01-01

    Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is also introduced. By hijacking a vulnerable component in victim apps, an attack app can escalate its privilege for operations originally prohibited. Many prior studies have been performed to understand and mitigate this issue, but no defense is being deployed in the wild, largely due...

  14. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  15. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  16. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  17. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  18. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  19. Erwinia carotovora elicitors and Botrytis cinerea activate defense responses in Physcomitrella patens

    Directory of Open Access Journals (Sweden)

    Bentancor Marcel

    2007-10-01

    . cinerea induce this type of cell death in vascular plants, our results suggest that E.c. carotovora CFSCC1 containing HrpN and B. cinerea could also induce this type of cell death in Physcomitrella. Our studies thus establish Physcomitrella as an experimental host for investigation of plant-pathogen interactions and B. cinerea and elicitors of E.c. carotovora as promising tools for understanding the mechanisms involved in defense responses and in pathogen-mediated cell death in this simple land plant.

  20. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  1. Role of Soluble Innate Effector Molecules in Pulmonary Defense against Fungal Pathogens

    Directory of Open Access Journals (Sweden)

    Soledad R. Ordonez

    2017-10-01

    Full Text Available Fungal infections of the lung are life-threatening but rarely occur in healthy, immunocompetent individuals, indicating efficient clearance by pulmonary defense mechanisms. Upon inhalation, fungi will first encounter the airway surface liquid which contains several soluble effector molecules that form the first barrier of defense against fungal infections. These include host defense peptides, like LL-37 and defensins that can neutralize fungi by direct killing of the pathogen, and collectins, such as surfactant protein A and D, that can aggregate fungi and stimulate phagocytosis. In addition, these molecules have immunomodulatory activities which can aid in fungal clearance from the lung. However, existing observations are based on in vitro studies which do not reflect the complexity of the lung and its airway surface liquid. Ionic strength, pH, and the presence of mucus can have strong detrimental effects on antifungal activity, while the potential synergistic interplay between soluble effector molecules is largely unknown. In this review, we describe the current knowledge on soluble effector molecules that contribute to antifungal activity, the importance of environmental factors and discuss the future directions required to understand the innate antifungal defense in the lung.

  2. Role of Soluble Innate Effector Molecules in Pulmonary Defense against Fungal Pathogens

    Science.gov (United States)

    Ordonez, Soledad R.; Veldhuizen, Edwin J. A.; van Eijk, Martin; Haagsman, Henk P.

    2017-01-01

    Fungal infections of the lung are life-threatening but rarely occur in healthy, immunocompetent individuals, indicating efficient clearance by pulmonary defense mechanisms. Upon inhalation, fungi will first encounter the airway surface liquid which contains several soluble effector molecules that form the first barrier of defense against fungal infections. These include host defense peptides, like LL-37 and defensins that can neutralize fungi by direct killing of the pathogen, and collectins, such as surfactant protein A and D, that can aggregate fungi and stimulate phagocytosis. In addition, these molecules have immunomodulatory activities which can aid in fungal clearance from the lung. However, existing observations are based on in vitro studies which do not reflect the complexity of the lung and its airway surface liquid. Ionic strength, pH, and the presence of mucus can have strong detrimental effects on antifungal activity, while the potential synergistic interplay between soluble effector molecules is largely unknown. In this review, we describe the current knowledge on soluble effector molecules that contribute to antifungal activity, the importance of environmental factors and discuss the future directions required to understand the innate antifungal defense in the lung. PMID:29163395

  3. The eye movement desensitization and reprocessing procedure prevents defensive processing in health persuasion.

    Science.gov (United States)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a university sample (n = 124) listened to the persuasive message in a randomized laboratory experiment. In the EMDR condition, they were also instructed to follow with their eyes a dot on the computer screen. The dot constantly moved from one side of the screen to the other in 2 seconds. In addition, a self-affirmation procedure was applied in half of the participants. EMDR led to a significant increase in persuasion, only in recipients in whom the persuasive message could be expected to activate defensive self-regulation (in participants with a moderate health value and in participants with low self-esteem). In those with a moderate health value, EMDR increased persuasion, but only when recipients were not affirmed. In addition, EMDR increased persuasion only in recipients with low self-esteem, not in those with high self-esteem. These results showed that EMDR influenced persuasion and in some way lowered defensive reactions. The similarities and differences in effects of EMDR and self-affirmation further increased our insight into the psychology of defensiveness.

  4. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  5. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  6. Understanding Complexity and Self-Organization in a Defense Program Management Organization (Experimental Design)

    Science.gov (United States)

    2016-03-18

    initiatives such as the Packard Commission study, Goldwater-Nichols Legislation, and more recently, the Better Buying Power initiative. While the DoD...potential communications pathways in an organizational structure) Self-Organizing Network Behavior The nodes in the network are specific individuals... behavior pattern impacts of changing predetermined independent variables  Phase 4: Refined hypothesis testing to examine how decision and

  7. Defense Contracting: Use of Undefinitized Contract Actions Understand and Definitization Time Frames Often Not Met

    National Research Council Canada - National Science Library

    2007-01-01

    ...), which authorize contractors to begin work before reaching a final agreement on contract terms. The contractor has little incentive to control costs during this period, creating a potential for wasted taxpayer dollars...

  8. UNDERSTANDING THE “HOUSEHOLDER DEFENCE”: PROPORTIONALITY AND REASONABLENESS IN DEFENSIVE FORCE

    OpenAIRE

    Dsouza, M.

    2016-01-01

    IN Collins v Secretary of State [2016] EWHC 33 (Admin), the High Court refused to declare that Criminal Justice and Immigration Act 2008, s. 76(5A) – the so-called “householder's defence” – was incompatible with the right to life enshrined in Article 2 of the ECHR, in that it failed to protect the lives of attackers sufficiently. Section 76(5A) was inserted into the 2008 Act by Crime and Courts Act 2013, s. 43, and came into force in April 2013.

  9. When the Guns Fall Silent: a Leader’s Guide to Understanding Defensive Coping Mechanisms

    Science.gov (United States)

    2011-05-19

    can result in a person creating behaviors to make 73Gregory and Smeltzer, 9. 74Joanna Bourke , An Intimate History of Killing (London: Basic Books...mentality. Joann Bourke writes of a Vietnam veteran, who remarked, “I thought people were… uh… I mean I was kind of paranoid. I thought everybody knew...friend is almost like betraying lost comrades once a Soldier has returned home. 81 Kaplan and Sadock, 305. 82 Bourke ,217. 26

  10. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  11. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  12. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  13. Reagan Defense Forum: The Third Offset Strategy

    Science.gov (United States)

    2015-11-07

    guided weapons as you do, and have a homefield advantage. How would you do that? And the LRRDPP really, really did a great job in looking at that...The second thing was the Defense Science Board summer study on autonomy . To a person, every single person on the summer study said, we can’t prove...it, but we believe we are at an inflection point at an artificial intelligence and autonomy . How might we use that as an advantage in an offset

  14. Defensive Jurisprudence and Productivity Goals: Jabuticaba Consumerist

    Directory of Open Access Journals (Sweden)

    Miguel Luiz Barros Barreto de Oliveira

    2016-10-01

    Full Text Available This paper analyzes the application of so-called procedural defensive jurisprudence that values exacerbated rationalization of the judiciary activities, preventing the processing of judicial review in the higher courts, and its consequences in consumeristas indemnity processes. It analyzes the pressure to which judges are subjected, especially because of the need to comply with productivity goals. The construction work suggests the misconception of these imposed judicial policies to decrease the procedural stock since that attack the problem on screen superficially and do not solve the basic question.

  15. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  16. Defense Waste Processing Facility prototypic analytical laboratory

    International Nuclear Information System (INIS)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-01-01

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R ampersand D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R ampersand D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy

  17. Biotech Business Lessons for Defense Acquisition

    Science.gov (United States)

    2016-01-01

    repudiates what func- tional personnel hold dear—that their hurdles are vital to some moral or ethical responsibility to protect or safeguard...94 Strategic Studies Quarterly ♦ Summer 2016 Biotech Business Lessons for Defense Acquisition Col David L. Peeler Jr., USAF Abstract The desire to...examples and lessons from private business sectors would serve DOD interests well. ✵ ✵ ✵ ✵ ✵ Acquisition reform! No other two words so stress or trouble

  18. Indian Defense Procurements: Advantage Russia or USA?

    Science.gov (United States)

    2015-02-17

    premiers of both the countries. The recent visit of President Obama saw Mr. Modi breaking the protocol to greet him with a bear hug on his arrival at New...between Russia and US. 56 Ritesh Srivastava, India caught between Russia and US. 57 Ankit Panda , “Pakistan Courts Both US and Russia on Defense...www.indiatvnews.com/business/india/-india-invites-japan-to-join-rs-50000-crore- submarine-project-17058.html (accessed 3 February 2015). Panda , Ankit. “Pakistan

  19. Multicellular oxidant defense in unicellular organisms.

    OpenAIRE

    Ma, M; Eaton, J W

    1992-01-01

    Although catalase is thought to be a major defense against hydrogen peroxide (H2O2), the catalase activity within individual Escherichia coli fails to protect against exogenous H2O2. Contrary to earlier reports, we find that dilute suspensions of wild-type and catalase-deficient E. coli are identical in their sensitivity to H2O2, perhaps because even wild-type, catalase-positive E. coli cannot maintain an internal/external concentration gradient of this highly diffusible oxidant. However, con...

  20. Defense meteorological satellite measurements of total ozone

    International Nuclear Information System (INIS)

    Lovill, J.E.; Ellis, J.S.; Luther, F.M.; Sullivan, R.J.; Weichel, R.L.

    1992-01-01

    A multichannel filter radiometer (MFR) on Defense Meteorological Satellites (DMS) that measured total ozone on a global-scale from March 1977 - February 1980 is described. The total ozone data measured by the MFR were compared with total ozone data taken by surfaced-based Dobson spectrophotometers. When comparisons were made for five months, the Dobson spectrophotometer measured 2-5% more total ozone than the MFR. Comparisons between the Dobson spectrophotometer and the MFR showed a reduced RMS difference as the comparisons were made at closer proximity. A Northern Hemisphere total ozone distribution obtained from MFR data is presented

  1. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  2. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  3. Sex Differences in Defensive Behavior and Venom of The Striped Bark Scorpion Centruroides vittatus (Scorpiones: Buthidae).

    Science.gov (United States)

    Miller, D W; Jones, A D; Goldston, J S; Rowe, M P; Rowe, A H

    2016-11-01

    Studies of venom variability have advanced from describing the mechanisms of action and relative potency of medically important toxins to understanding the ecological and evolutionary causes of the variability itself. While most studies have focused on differences in venoms among taxa, populations, or age-classes, there may be intersexual effects as well. Striped bark scorpions (Centruroides vittatus) provide a good model for examining sex differences in venom composition and efficacy, as this species exhibits dramatic sexual dimorphism in both size and defensive behavior; when threatened by an enemy, larger, slower females stand and fight while smaller, fleeter males prefer to run. We here add evidence suggesting that male and female C. vittatus indeed have different defensive propensities; when threatened via an electrical stimulus, females were more likely to sting than were males. We reasoned that intersexual differences in defensive phenotypes would select for venoms with different functions in the two sexes; female venoms should be effective at predator deterrence, whereas male venoms, less utilized defensively, might be better suited to capturing prey or courting females. This rationale led to our predictions that females would inject more venom and/or possess more painful venom than males. We were wrong. While females do inject more venom than males in a defensive sting, females are also larger; when adjusted for body size, male and female C. vittatus commit equal masses of venom in a sting to a potential enemy. Additionally, house mice (Mus musculus) find an injection of male venom more irritating than an equal amount of female venom, likely because male venom contains more of the toxins that induce pain. Taken together, our results suggest that identifying the ultimate causes of venom variability will, as we move beyond adaptive storytelling, be hard-won. © The Author 2016. Published by Oxford University Press on behalf of the Society for Integrative and

  4. The importance of ecological costs for the evolution of plant defense against herbivory.

    Science.gov (United States)

    van Velzen, Ellen; Etienne, Rampal S

    2015-05-07

    Plant defense against herbivory comes at a cost, which can be either direct (reducing resources available for growth and reproduction) or indirect (through reducing ecological performance, for example intraspecific competitiveness). While direct costs have been well studied in theoretical models, ecological costs have received almost no attention. In this study we compare models with a direct trade-off (reduced growth rate) to models with an ecological trade-off (reduced competitive ability), using a combination of adaptive dynamics and simulations. In addition, we study the dependence of the level of defense that can evolve on the type of defense (directly by reducing consumption, or indirectly by inducing herbivore mortality (toxicity)), and on the type of herbivore against which the plant is defending itself (generalists or specialists). We find three major results: First, for both direct and ecological costs, defense only evolves if the benefit to the plant is direct (through reducing consumption). Second, the type of cost has a major effect on the evolutionary dynamics: direct costs always lead to a single optimal strategy against herbivores, but ecological costs can lead to branching and the coexistence of non-defending and defending plants; however, coexistence is only possible when defending against generalist herbivores. Finally, we find that fast-growing plants invest less than slow-growing plants when defending against generalist herbivores, as predicted by the Resource Availability Hypothesis, but invest more than slow-growing plants when defending against specialists. Our results clearly show that assumptions about ecological interactions are crucial for understanding the evolution of defense against herbivores. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Carnivore Attractant or Plant Elicitor? Multifunctional Roles of Methyl Salicylate Lures in Tomato Defense.

    Science.gov (United States)

    Rowen, Elizabeth; Gutensohn, Michael; Dudareva, Natalia; Kaplan, Ian

    2017-06-01

    Synthetic plant volatile lures attract natural enemies, but may have non-target effects due to the multifunctional nature of volatile signals. For example, methyl salicylate (MeSA) is used to attract predators, yet also serves as a signaling hormone involved in plant pathogen defense. We investigated the consequences of deploying MeSA lures to attract predators for tomato (Solanum lycopersicum) defense against herbivores. To understand the spatial distribution of the lure's effect, we exposed tomatoes in the field to MeSA along a linear distance gradient and induced defenses by simulating feeding by hornworm caterpillars in a fully crossed factorial design (+/- MeSA, +/- herbivory). Subsequently, we analyzed activity of several defensive proteins (protease inhibitors, polyphenol oxidase, peroxidase), development of hornworm larvae (Manduca sexta), growth of fungal pathogens (Cladosporium and Alternaria), and attractiveness to herbivores and predators. Overall, MeSA-exposed plants were more resistant to both insects and pathogens. Secondary pathogen infection was reduced by 25% in MeSA exposed plants, possibly due to elevated polyphenol oxidase activity. Interestingly, we found that lures affected plant pathogen defenses equivalently across all distances (up to 4 m away) indicating that horizontal diffusion of a synthetic volatile may be greater than previously assumed. While thrips avoided colonizing hornworm- damaged tomato plants, this induced resistance was not observed upon pre-exposure to MeSA, suggesting that MeSA suppresses the repellant effect induced by herbivory. Thus, using MeSA lures in biological control may inadvertently protect crops from pathogens, but has mixed effects on plant resistance to insect herbivores.

  6. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  7. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  8. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  9. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  10. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  11. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  12. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  13. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  14. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  15. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  16. Understanding in mathematics

    CERN Document Server

    Sierpinska, Anna

    1994-01-01

    The concept of understanding in mathematics with regard to mathematics education is considered in this volume, the main problem for mathematics teachers being how to facilitate their students'' understanding of the mathematics being taught.

  17. Understand Your Medication

    Science.gov (United States)

    ... Disease Lookup > Asthma > Living with Asthma > Managing Asthma Understand Your Asthma Medication There are a variety of ... healthcare team. They can help make sure you understand the correct way to take the medicines, or ...

  18. Understanding Puberty (For Parents)

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Understanding Puberty KidsHealth / For Parents / Understanding Puberty What's in this ... your child through all the changes? Stages of Puberty Sure, most of us know the telltale signs ...

  19. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  20. Understanding Cancer Prognosis

    Medline Plus

    Full Text Available ... Understanding Cancer What Is Cancer? Cancer Statistics Cancer Disparities Understanding Cancer What Is Cancer Cancer Statistics Cancer Disparities Causes & Prevention Risk Factors Genetics Cancer Prevention Overview ...

  1. Understanding Food Labels

    Science.gov (United States)

    ... Healthy eating for girls Understanding food labels Understanding food labels There is lots of info on food ... need to avoid because of food allergies. Other food label terms top In addition to the Nutrition ...

  2. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  3. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  4. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  5. Department of Defense Facilities Energy Conservation Policies and Spending

    National Research Council Canada - National Science Library

    Andrews, Anthony

    2008-01-01

    .... This report reviews energy conservation legislation and Executive Orders that apply to the Department of Defense, directives and instructions to the military departments and agencies on implementing...

  6. Comprehensiveness of the FY 1996 Other Defense Organizations Financial Statements

    National Research Council Canada - National Science Library

    1997-01-01

    The primary audit objective was to determine whether the Defense Finance and Accounting Service Indianapolis Center consistently and accurately compiled financial data received from field accounting...

  7. 77 FR 13013 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2012-03-05

    ... Organization Government Procurement Agreement and the Free Trade Agreements, as determined by the United States... 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System...

  8. Veiled Normalization: The Implications of Japanese Missile Defense

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    Japan's development of a missile defense system has been accompanied by the acquisition of potentially offensive military assets, an increased command and control capability, significant restructuring...

  9. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  10. Competition: A Means to Transform the Defense Industrial Base

    National Research Council Canada - National Science Library

    Hansen, Richard

    2003-01-01

    .... The defense acquisition process and its industrial base comprise a significant economic institution in need of transformation to ensure that research, development, and acquisition efforts remain...

  11. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  12. Accounting for Defense Logistics Agency Supply Management Receivables

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this part of the audit, we determined whether Defense Logistics Agency supply management receivables were accurately accounted for, classified, and reported in the Statement of Financial Position...

  13. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  14. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors endash the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. The report is necessarily based on a limited review of the defense production reactors. It does not address whether any of the reactors are ''safe,'' because such an analysis would involve a determination of acceptable risk endash a matter of obvious importance, but one that was beyond the purview of the committee. It also does not address whether the safety of the production reactors is comparable to that of commercial nuclear power stations, because even this narrower question extended beyond the charge to the committee and would have involved detailed analyses that the committee could not undertake

  15. Process arrangement options for Defense waste immobilization

    International Nuclear Information System (INIS)

    1980-02-01

    Current plans are to immobilize the SRP high-level liquid wastes in a high integrity form. Borosilicate glass was selected in 1977 as the reference waste form and a mjaor effort is currently underway to develop the required technology. A large new facility, referred to as the Defense Waste Processing Facility (DWPF) is being designed to carry out this mission, with project authorization targeted for 1982 and plant startup in 1989. However, a number of other process arrangements or manufacturing strategies, including staging the major elements of the project or using existing SRP facilities for some functions, have been suggested in lieu of building the reference DWPF. This study assesses these various options and compares them on a technical and cost basis with the DWPF. Eleven different manufacturing options for SRP defense waste solidification were examined in detail. These cases are: (1) vitrification of acid waste at current generation rate; (2) vitrification of current rate acid waste and caustic sludge; (3 and 4) vitrification of the sludge portion of neutralized waste; (5) decontamination of salt cake and storage of concentrated cesium and strontium for later immobilization; (6) processing waste in a facility with lower capacity than the DWPF; (7) processing waste in a combination of existing and new facilities; (8) waste immobilization in H Canyon; (9) vitrification of both sludge and salt; (10) DWPF with onsite storage; (11) deferred authorization of DWPF

  16. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  17. An enrichment of CRISPR and other defense-related features in marine sponge-associated microbial metagenomes

    Directory of Open Access Journals (Sweden)

    Hannes Horn

    2016-11-01

    Full Text Available Many marine sponges are populated by dense and taxonomically diverse microbial consortia. We employed a metagenomics approach to unravel the differences in the functional gene repertoire among three Mediterranean sponge species, Petrosia ficiformis, Sarcotragus foetidus, Aplysina aerophoba and seawater. Different signatures were observed between sponge and seawater metagenomes with regard to microbial community composition, GC content, and estimated bacterial genome size. Our analysis showed further a pronounced repertoire for defense systems in sponge metagenomes. Specifically, Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR, restriction modification, DNA phosphorothioation and phage growth limitation systems were enriched in sponge metagenomes. These data suggest that defense is an important functional trait for an existence within sponges that requires mechanisms to defend against foreign DNA from microorganisms and viruses. This study contributes to an understanding of the evolutionary arms race between viruses/phages and bacterial genomes and it sheds light on the bacterial defenses that have evolved in the context of the sponge holobiont.

  18. Plant lectins: the ties that bind in root symbiosis and plant defense.

    Science.gov (United States)

    De Hoff, Peter L; Brill, Laurence M; Hirsch, Ann M

    2009-07-01

    Lectins are a diverse group of carbohydrate-binding proteins that are found within and associated with organisms from all kingdoms of life. Several different classes of plant lectins serve a diverse array of functions. The most prominent of these include participation in plant defense against predators and pathogens and involvement in symbiotic interactions between host plants and symbiotic microbes, including mycorrhizal fungi and nitrogen-fixing rhizobia. Extensive biological, biochemical, and molecular studies have shed light on the functions of plant lectins, and a plethora of uncharacterized lectin genes are being revealed at the genomic scale, suggesting unexplored and novel diversity in plant lectin structure and function. Integration of the results from these different types of research is beginning to yield a more detailed understanding of the function of lectins in symbiosis, defense, and plant biology in general.

  19. Mechanism of bystander-blaming: defensive attribution, counterfactual thinking, and gender.

    Science.gov (United States)

    Levy, Inna; Ben-David, Sarah

    2015-01-01

    Contemporary victimology recognizes that an understanding of the mechanism of blaming requires a comprehensive approach that includes the victim, the offender, and the bystander. However, most of the existing research on blaming focuses on the victim and the offender, ignoring the issue of bystander-blaming. This study highlights the bystander and investigates bystander-blaming by exploring some theoretical explanations, including counterfactual thinking, defensive attribution, and gender differences. The study included 363 young male and female participants, who read vignettes describing the behavior of the victim and the bystander in a rape scenario and answered questions regarding bystander-blaming. The results show that both counterfactual thinking and defensive attribution play a role in bystander-blaming. This article addresses the theoretical and practical implications of these findings. © The Author(s) 2013.

  20. Molecular Dynamics Simulation and Statistics Analysis Reveals the Defense Response Mechanism in Plants

    Science.gov (United States)

    Liu, Zhichao; Zhao, Yunjie; Zeng, Chen; Computational Biophysics Lab Team

    As the main protein of the bacterial flagella, flagellin plays an important role in perception and defense response. The newly discovered locus, FLS2, is ubiquitously expressed. FLS2 encodes a putative receptor kinase and shares many homologies with some plant resistance genes and even with some components of immune system of mammals and insects. In Arabidopsis, FLS2 perception is achieved by the recognition of epitope flg22, which induces FLS2 heteromerization with BAK1 and finally the plant immunity. Here we use both analytical methods such as Direct Coupling Analysis (DCA) and Molecular Dynamics (MD) Simulations to get a better understanding of the defense mechanism of FLS2. This may facilitate a redesign of flg22 or de-novo design for desired specificity and potency to extend the immune properties of FLS2 to other important crops and vegetables.

  1. TOOLS OF KNOWLEDGE DISSEMINATION WITHIN A NATIONAL DEFENSE INSTITUTION FOR INNOVATION, TECHNOLOGY AND SCIENCE

    Directory of Open Access Journals (Sweden)

    Edson Aparecida de Araújo Querido Oliveira

    2006-11-01

    Full Text Available This paper describes and analyzes in a National Defense Institution for Innovation, Technology and Science its tools of knowledge dissemination. The methodology contemplates the period of 2004 and 2005. Qualitative and quantitative information orientate the research in order to understand focal aspects on knowledge dissemination, in comparison with theoretical references of renowned authors and other elaborated research searching for elements to perform an organizational diagnosis, focused on the knowledge dissemination as well as on the forces which promote or obstruct the organizational development. Conclusions are that the tools of knowledge dissemination must suitable to spread the tacit knowledge in such a way as the explicit ones and that, in a National Defense Institution, other important aspects must be considered, a time that, being the spread knowledge of wrong form can, besides bringing damages for the organization, to compromise the national sovereignty.

  2. Valuation of Understanding

    DEFF Research Database (Denmark)

    Wiberg, Merete

    An important aim for the teacher in Higher Education is that students, in order to learn, achieve understanding in terms of being able to handle knowledge in a certain way. In this paper focus will be on understanding as a phenomenon which is permeated with values of what good understanding might...... be. Understanding is to be discussed as a phenomenon which in its definition is relative to the paradigm of educational thinking in which it is embedded. Paradigms of valuation of understanding in higher education will be viewed from two perspectives: An anglosaxon curriculum studies tradition...

  3. Genome Wide Association Mapping in Arabidopsis thaliana Identifies Novel Genes Involved in Linking Allyl Glucosinolate to Altered Biomass and Defense.

    Science.gov (United States)

    Francisco, Marta; Joseph, Bindu; Caligagan, Hart; Li, Baohua; Corwin, Jason A; Lin, Catherine; Kerwin, Rachel E; Burow, Meike; Kliebenstein, Daniel J

    2016-01-01

    A key limitation in modern biology is the ability to rapidly identify genes underlying newly identified complex phenotypes. Genome wide association studies (GWAS) have become an increasingly important approach for dissecting natural variation by associating phenotypes with genotypes at a genome wide level. Recent work is showing that the Arabidopsis thaliana defense metabolite, allyl glucosinolate (GSL), may provide direct feedback regulation, linking defense metabolism outputs to the growth, and defense responses of the plant. However, there is still a need to identify genes that underlie this process. To start developing a deeper understanding of the mechanism(s) that modulate the ability of exogenous allyl GSL to alter growth and defense, we measured changes in plant biomass and defense metabolites in a collection of natural 96 A. thaliana accessions fed with 50 μM of allyl GSL. Exogenous allyl GSL was introduced exclusively to the roots and the compound transported to the leaf leading to a wide range of heritable effects upon plant biomass and endogenous GSL accumulation. Using natural variation we conducted GWAS to identify a number of new genes which potentially control allyl responses in various plant processes. This is one of the first instances in which this approach has been successfully utilized to begin dissecting a novel phenotype to the underlying molecular/polygenic basis.

  4. Genome wide association mapping in Arabidopsis thaliana identifies novel genes involved in linking allyl glucosinolate to altered biomass and defense

    Directory of Open Access Journals (Sweden)

    Marta Francisco

    2016-07-01

    Full Text Available A key limitation in modern biology is the ability to rapidly identify genes underlying newly identified complex phenotypes. Genome wide association studies (GWAS have become an increasingly important approach for dissecting natural variation by associating phenotypes with genotypes at a genome wide level. Recent work is showing that the Arabidopsis thaliana defense metabolite, allyl glucosinolate (GSL, may provide direct feedback regulation, linking defense metabolism outputs to the growth and defense responses of the plant. However, there is still a need to identify genes that underlie this process. To start developing a deeper understanding of the mechanism(s that modulate the ability of exogenous allyl GSL to alter growth and defense, we measured changes in plant biomass and defense metabolites in a collection of natural 96 A. thaliana accessions fed with 50 µM of allyl GSL. Exogenous allyl GSL was introduced exclusively to the roots and the compound transported to the leaf leading to a wide range of heritable effects upon plant biomass and endogenous GSL accumulation. Using natural variation we conducted GWAS to identify a number of new genes which potentially control allyl responses in various plant processes. This is one of the first instances in which this approach has been successfully utilized to begin dissecting a novel phenotype to the underlying molecular/polygenic basis.

  5. Chromosome-level genome map provides insights into diverse defense mechanisms in the medicinal fungus Ganoderma sinense

    Science.gov (United States)

    Zhu, Yingjie; Xu, Jiang; Sun, Chao; Zhou, Shiguo; Xu, Haibin; Nelson, David R.; Qian, Jun; Song, Jingyuan; Luo, Hongmei; Xiang, Li; Li, Ying; Xu, Zhichao; Ji, Aijia; Wang, Lizhi; Lu, Shanfa; Hayward, Alice; Sun, Wei; Li, Xiwen; Schwartz, David C.; Wang, Yitao; Chen, Shilin

    2015-01-01

    Fungi have evolved powerful genomic and chemical defense systems to protect themselves against genetic destabilization and other organisms. However, the precise molecular basis involved in fungal defense remain largely unknown in Basidiomycetes. Here the complete genome sequence, as well as DNA methylation patterns and small RNA transcriptomes, was analyzed to provide a holistic overview of secondary metabolism and defense processes in the model medicinal fungus, Ganoderma sinense. We reported the 48.96 Mb genome sequence of G. sinense, consisting of 12 chromosomes and encoding 15,688 genes. More than thirty gene clusters involved in the biosynthesis of secondary metabolites, as well as a large array of genes responsible for their transport and regulation were highlighted. In addition, components of genome defense mechanisms, namely repeat-induced point mutation (RIP), DNA methylation and small RNA-mediated gene silencing, were revealed in G. sinense. Systematic bioinformatic investigation of the genome and methylome suggested that RIP and DNA methylation combinatorially maintain G. sinense genome stability by inactivating invasive genetic material and transposable elements. The elucidation of the G. sinense genome and epigenome provides an unparalleled opportunity to advance our understanding of secondary metabolism and fungal defense mechanisms. PMID:26046933

  6. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  7. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  8. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  9. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  10. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  11. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  12. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  13. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  14. Understanding radioactive waste

    International Nuclear Information System (INIS)

    Murray, R.L.

    1981-12-01

    This document contains information on all aspects of radioactive wastes. Facts are presented about radioactive wastes simply, clearly and in an unbiased manner which makes the information readily accessible to the interested public. The contents are as follows: questions and concerns about wastes; atoms and chemistry; radioactivity; kinds of radiation; biological effects of radiation; radiation standards and protection; fission and fission products; the Manhattan Project; defense and development; uses of isotopes and radiation; classification of wastes; spent fuels from nuclear reactors; storage of spent fuel; reprocessing, recycling, and resources; uranium mill tailings; low-level wastes; transportation; methods of handling high-level nuclear wastes; project salt vault; multiple barrier approach; research on waste isolation; legal requiremnts; the national waste management program; societal aspects of radioactive wastes; perspectives; glossary; appendix A (scientific American articles); appendix B (reference material on wastes)

  15. Understanding radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Murray, R.L.

    1981-12-01

    This document contains information on all aspects of radioactive wastes. Facts are presented about radioactive wastes simply, clearly and in an unbiased manner which makes the information readily accessible to the interested public. The contents are as follows: questions and concerns about wastes; atoms and chemistry; radioactivity; kinds of radiation; biological effects of radiation; radiation standards and protection; fission and fission products; the Manhattan Project; defense and development; uses of isotopes and radiation; classification of wastes; spent fuels from nuclear reactors; storage of spent fuel; reprocessing, recycling, and resources; uranium mill tailings; low-level wastes; transportation; methods of handling high-level nuclear wastes; project salt vault; multiple barrier approach; research on waste isolation; legal requiremnts; the national waste management program; societal aspects of radioactive wastes; perspectives; glossary; appendix A (scientific American articles); appendix B (reference material on wastes). (ATT)

  16. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  17. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  18. Adversity Quotient and Defense Mechanism of Secondary School Students

    Science.gov (United States)

    Nikam, Vibhawari B.; Uplane, Megha M.

    2013-01-01

    The present study was conducted to explore the relationship between Adversity Quotient (AQ) and Defense Mechanism (DM) of secondary school students. The aim of the study was to ascertain relationship between Adversity Quotient and Defense mechanism i. e. Turning against object (TAO), Projection (PRO), Turning against self (TAS), Principalisation…

  19. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  20. Induction of phenolics, lignin and key defense enzymes in eggplant ...

    African Journals Online (AJOL)

    Elicitors are capable of mimicking the perception of a pathogen by a plant, thereby triggering induction of a sophisticated defense response in plants. In this study, we investigated an induced resistance in eggplant in respect to cell wall strengthening and defense enzyme activation affected by four elicitors such as, chitosan ...

  1. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  2. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  3. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  4. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  5. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  6. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  7. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  8. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  9. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  10. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  11. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  12. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  13. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News

  14. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  15. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  16. Animal defense strategies and anxiety disorders

    Directory of Open Access Journals (Sweden)

    Rosana Shuhama

    2007-03-01

    Full Text Available Anxiety disorders are classified according to symptoms, time course and therapeutic response. Concurrently, the experimental analysis of defensive behavior has identified three strategies of defense that are shared by different animal species, triggered by situations of potential, distal and proximal predatory threat, respectively. The first one consists of cautious exploration of the environment for risk assessment. The associated emotion is supposed to be anxiety and its pathology, Generalized Anxiety Disorder. The second is manifested by oriented escape or by behavioral inhibition, being related to normal fear and to Specific Phobias, as disorders. The third consists of disorganized flight or complete immobility, associated to dread and Panic Disorder. Among conspecific interactions lies a forth defense strategy, submission, that has been related to normal social anxiety (shyness and to Social Anxiety Disorder. In turn, Posttraumatic Stress Disorder and Obsessive-Compulsive Disorder do not seem to be directly related to innate defense reactions. Such evolutionary approach offers a reliable theoretical framework for the study of the biological determinants of anxiety disorders, and a sound basis for psychiatric classification.Os transtornos de ansiedade são classificados conforme a sintomatologia, decurso temporal e resposta terapêutica. Paralelamente, a análise experimental dos comportamentos de defesa identificou três estratégias comuns a diferentes espécies de animais, desencadeadas por situações de perigo predatório potencial, distal ou proximal, respectivamente. A primeira consiste na investigação cautelosa do ambiente, avaliando o risco. Supõe-se que a emoção que a acompanha seja a ansiedade e sua patologia, o Transtorno de Ansiedade Generalizada. A segunda é expressa pela fuga orientada ou pela inibição comportamental, sendo a emoção correlata o medo, e a patologia representada pelas Fobias Específicas. Finalmente, a

  17. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  18. Defense waste processing facility precipitate hydrolysis process

    International Nuclear Information System (INIS)

    Doherty, J.P.; Eibling, R.E.; Marek, J.C.

    1986-03-01

    Sodium tetraphenylborate and sodium titanate are used to assist in the concentration of soluble radionuclide in the Savannah River Plant's high-level waste. In the Defense Waste Processing Facility, concentrated tetraphenylborate/sodium titanate slurry containing cesium-137, strontium-90 and traces of plutonium from the waste tank farm is hydrolyzed in the Salt Processing Cell forming organic and aqueous phases. The two phases are then separated and the organic phase is decontaminated for incineration outside the DWPF building. The aqueous phase, containing the radionuclides and less than 10% of the original organic, is blended with the insoluble radionuclides in the high-level waste sludge and is fed to the glass melter for vitrification into borosilicate glass. During the Savannah River Laboratory's development of this process, copper (II) was found to act as a catalyst during the hydrolysis reactions, which improved the organic removal and simplified the design of the reactor

  19. [Bio-terrorism, bio-defense, bioethics].

    Science.gov (United States)

    Kottow, Miguel

    2003-01-01

    The terrorist attacks launched on September 11, 2001, ignited fear of further aggression with biological weapons, leading to a discourse and allocation of resources for both defensive and dissuasive/ offensive use in order to counteract such threats. Many such measures involved the investigation and production of biological agents, and the public health field has been called upon to participate in these strategic efforts. Participation by health programs is in moral contradiction with military tactics and should be limited to protecting the health of the purportedly threatened population, in itself a difficult task due to the numerous imponderable factors. The additional resources being made available to public health are largely conditioned on their strategic military application, leaving traditional public health care in its chronic state of insufficient funding and non-egalitarian allocation.

  20. Overview - Defense Waste Processing Facility Operating Experience

    International Nuclear Information System (INIS)

    Norton, M.R.

    2002-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the world's largest radioactive waste vitrification facility. Radioactive operations began in March 1996 and over 1,000 canisters have been produced. This paper presents an overview of the DWPF process and a summary of recent facility operations and process improvements. These process improvements include efforts to extend the life of the DWPF melter, projects to increase facility throughput, initiatives to reduce the quantity of wastewater generated, improved remote decontamination capabilities, and improvements to remote canyon equipment to extend equipment life span. This paper also includes a review of a melt rate improvement program conducted by Savannah River Technology Center personnel. This program involved identifying the factors that impacted melt rate, conducting small scale testing of proposed process changes and developing a cost effective implementation plan

  1. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors - the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. This report examines the safety objective established by the Department of Energy for the production reactors and the process the Department of its contractors use to implement the objective; focuses on a variety of uncertainties concerning the production reactors, particularly those related to potential vulnerabilities to severe accidents; and identifies ways in which the DOE approach to management of the safety of the production reactors can be improved

  2. History of Hanford Site Defense Production (Brief)

    International Nuclear Information System (INIS)

    GERBER, M.S.

    2001-01-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history

  3. News/High speed oil defense boat

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    An oil defense boat that can travel at 30 knots to the scene of a spill and surround the polluted area or protect a nearby beach or harbor, with a 200 m floating plastic barrier within 20 minutes, has been developed by Vator Oy of Helsinki in association with the Finnish Board of Navigation. The Vator 18T boat, which can carry a crew of three or four, has a trimaran glass reinforced plastic hull. The floating plastic barrier (Nokia SUP Spillbooms) is produced by the Oy Nokia A.B., Cable Works Division of Helsinki and is made of a PVC-coated fabric enclosing floats of polyethylene foam and either chain ballast or iron sinkers.

  4. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  5. Environmental information document defense waste processing facility

    International Nuclear Information System (INIS)

    1981-07-01

    This report documents the impact analysis of a proposed Defense Waste Processing Facility (DWPF) for immobilizing high-level waste currently being stored on an interim basis at the Savannah River Plant (SRP). The DWPF will process the waste into a form suitable for shipment to and disposal in a federal repository. The DWPF will convert the high-level waste into: a leach-resistant form containing above 99.9% of all the radioactivity, and a residue of slightly contaminated salt. The document describes the SRP site and environs, including population, land and water uses; surface and subsurface soils and waters; meteorology; and ecology. A conceptual integrated facility for concurrently producing glass waste and saltcrete is described, and the environmental effects of constructing and operating the facility are presented. Alternative sites and waste disposal options are addressed. Also environmental consultations and permits are discussed

  6. Building Stakeholder Trust: Defensible Government Decisions - 13110

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

    2013-07-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the

  7. Building Stakeholder Trust: Defensible Government Decisions - 13110

    International Nuclear Information System (INIS)

    Franklin, Victor A.

    2013-01-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of

  8. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  9. The topological defense in SIS epidemic models

    International Nuclear Information System (INIS)

    Arbore, Andrea; Fioriti, Vincenzo; Chinnici, Marta

    2016-01-01

    The spreading of dangerous malware or faults in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding software details, in order to generalize to the maximum extent the defensive strategies. For example, it has been suggested that the maximum eigenvalue of the network adjacency matrix could act as a threshold for the malware’s spreading. This leads naturally to use the spectral graph theory to identify the most critical and influential nodes in technological networks. Many well-known graph parameters have been studied in the past years to accomplish the task. In this work, we test our AV11 algorithm showing that outperforms degree, closeness, betweenness centrality and the dynamical importance.

  10. ["Animal hypnosis" and defensive dominant, behavioral aspect].

    Science.gov (United States)

    Pavlygina, R A; Galashina, A G; Bogdanov, A V

    2002-01-01

    A stationary excitation focus produced in the sensorimotor cortex of a rabbit by rhythmic electrodermal paw stimulation was manifested in the reaction to a testing sound stimulus earlier indifferent for the animal. Regardless of the stimulated paw (left or right), reactions to the testing stimuli appeared approximately in the equal percent of cases (70.7% and 71.5%, respectively). After a single-trial induction of the "animal hypnosis" state, it was difficult to produce the dominant focus by simulation of the left paw, whereas the results of the right-paw stimulation did not differ from those obtained during control stimulation. Consequently, the influence of hypnosis on defensive stationary excitation foci in different hemispheres was not the same.

  11. Artificial Intelligence and the Future of Defense

    DEFF Research Database (Denmark)

    De Spiegeleire, Stephan; Maas, Matthijs Michiel; Sweijs, Tim

    Artificial intelligence (AI) is on everybody’s minds these days. Most of the world’s leading companies are making massive investments in it. Governments are scrambling to catch up. Every single one of us who uses Google Search or any of the new digital assistants on our smartphones has witnessed...... suggests that the advent of artificial super-intelligence (i.e. AI that is superior across the board to human intelligence), which many experts now put firmly within the longer-term planning horizons of our DSOs, presents us with unprecedented risks but also opportunities that we have to start to explore....... The report contains an overview of the role that ‘intelligence’ - the computational part of the ability to achieve goals in the world - has played in defense and security throughout human history; a primer on AI (what it is, where it comes from and where it stands today - in both civilian and military...

  12. Impact of defense conversion and US response

    International Nuclear Information System (INIS)

    Montanarelli, N.

    1994-01-01

    Conversion from military to civilian products due to defense conversion after the end of the Cold War takes a long as 20 years. In USA there are over 50 government programs funded to assist in defence conversion. This paper concentrates on the three major programs that will have the greatest impact on the economy, in the framework of the issues and needs of American industry. Federal government and US industry are making a considerable effort to transform how to do business today. One of the most important emerging themes in the federal program is international competitiveness. Large federal expenditures are made to support research and development that will increase productivity, thereby helping industry in global economic competition. This, in turn will play a key role in absorbing a large quantity od resources affected by the end of the Cold War

  13. Understanding quantum physics

    International Nuclear Information System (INIS)

    Spillner, Vera

    2011-01-01

    This thesis presents a bundle definition for 'scientific understanding' through which the empirically equivalent interpretations of quantum mechanics can be evaluated with respect to the understanding they generate. The definition of understanding is based on a sufficient and necessary criterion, as well as a bundle of conditions - where a theory can be called most understandable whenever it fulfills the highest number of bundle criteria. Thereby the definition of understanding is based on the one hand on the objective number of criteria a theory fulfills, as well as, on the other hand, on the individual's preference of bundle criteria. Applying the definition onto three interpretations of quantum mechanics, the interpretation of David Bohm appears as most understandable, followed by the interpretation of Tim Maudlin and the Kopenhagen interpretation. These three interpretations are discussed in length in my thesis. (orig.)

  14. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  15. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  16. Understanding Cancer Prognosis

    Medline Plus

    Full Text Available ... our information on Coping With Cancer helpful. Understanding Statistics About Survival Doctors estimate prognosis by using statistics that researchers have collected over many years about ...

  17. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  18. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  19. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  20. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.