Sample records for defense technology area

  1. Influence of IR sensor technology on the military and civil defense

    NASA Astrophysics Data System (ADS)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  2. Defense switched network technology and experiments program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1983-09-01

    This report documents work performed during FY 1983 on the DCA-sponsored Defense Switched Network Technology and Experiments Program. The areas of work reported are: (1) development of routing algorithms for application in the Defense Switched Network (DSN); (2) instrumentation and integration of the Experimental Integrated Switched Network (EISN) test facility; (3) development and test of data communication techniques using DoD-standard data protocols in an integrated voice/data network; and (4) EISN system coordination and experiment planning.

  3. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  4. Modeling and simulation: A key to future defense technology

    NASA Technical Reports Server (NTRS)

    Muccio, Anthony B.

    1993-01-01

    The purpose of this paper is to express the rationale for continued technological and scientific development of the modeling and simulation process for the defense industry. The defense industry, along with a variety of other industries, is currently being forced into making sacrifices in response to the current economic hardships. These sacrifices, which may not compromise the safety of our nation, nor jeopardize our current standing as the world peace officer, must be concentrated in areas which will withstand the needs of the changing world. Therefore, the need for cost effective alternatives of defense issues must be examined. This paper provides support that the modeling and simulation process is an economically feasible process which will ensure our nation's safety as well as provide and keep up with the future technological developments and demands required by the defense industry. The outline of this paper is as follows: introduction, which defines and describes the modeling and simulation process; discussion, which details the purpose and benefits of modeling and simulation and provides specific examples of how the process has been successful; and conclusion, which summarizes the specifics of modeling and simulation of defense issues and lends the support for its continued use in the defense arena.

  5. Protecting Defense Technologies: DOD Assessment Needed to Determine Requirement for Critical Technologies List

    DTIC Science & Technology

    2013-01-01

    Service DTSA Defense Technology Security Administration MCTL Militarily Critical Technologies List This is a work of the U.S. government and is not...Respond to MCTL Weaknesses Page 8 GAO-13-157 Protecting Defense Technologies Administration ( DTSA ), military services, and DOD...implementation of technology security policies on international transfers of defense- related goods, services, and technologies; • directed DTSA to

  6. Ballistic missile defense technologies

    NASA Astrophysics Data System (ADS)

    1985-09-01

    A report on Ballistic Missile Technologies includes the following: Executive summary; Introduction; Ballistic missiles then and now; Deterrence, U.S. nuclear strategy, and BMD; BMD capabilities and the strategic balance; Crisis stability, arms race stability, and arms control issues; Ballistic missile defense technologies; Feasibility; Alternative future scenarios; Alternative R&D programs.

  7. Management of the Defense Technology Security Administration Year 2000 Program

    DTIC Science & Technology

    1998-11-03

    caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and

  8. Defense Science and Technology RELIANCE. Defense Technology Objectives Success Stories

    DTIC Science & Technology

    2001-03-01

    27 MD.04 Medical Countermeasures for Botulinum Toxin ...flexibility of U.S. forces. Completed. 1998 SPONSORS DoD Chemical and Biological Defense Program MEDICAL COUNTERMEASURES FOR BOTULINUM TOXIN (MD.04) 29...system operates satisfactorily against a high-level jamming environment in the target area. On four AGTFT free flights, the AGTFT flight test vehicles

  9. The Diffusion of Military Technologies to Foreign Nations: Arms Transfers Can Preserve the Defense Technological and Industrial Base

    DTIC Science & Technology

    1995-06-01

    required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense

  10. Defense needs for science and technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Behrens, J.W.

    1991-01-01

    Since World War 2 the defense of our country has depended on a strong science and technology (S and T) base. Now that our world is rapidly changing with such historic events as the elimination of the Berlin Wall on November 9, 1989; the reunification of the two Germanys on October 2, 1990; the democratization of many Eastern European countries; and the restructuring of the Soviet Union; we have ample reason to pause and evaluate how these changes may affect areas within our S and T base. Discussion of this base is the main subject of this paper, with particularmore » emphasis on nuclear data measurement, theory, and evaluation.« less

  11. Research on Network Defense Strategy Based on Honey Pot Technology

    NASA Astrophysics Data System (ADS)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  12. Defense Intelligence: Foreign Area/Language Needs and Academe.

    ERIC Educational Resources Information Center

    SRI International, Menlo Park, CA.

    The Department of Defense's (DOD) need for foreign language/area expertise was assessed, along with opportunities for the academic community to supplement government training. In addition to interviewing intelligence managers, questionnaires were administered to defense analysts to determine their background, training, and use of external…

  13. National Defense Industrial Association Disruptive Technologies Conference

    DTIC Science & Technology

    2009-10-14

    NDIA Disruptive Technologies 10/16/2009 Page-1 National Defense Industrial Association Disruptive Technologies Conference 14 October 2009 The...SUPPLEMENTARY NOTES Presented at the 6th Annual Disruptive Technologies Conference, 14-15 oct 2009, Washington, DC 14. ABSTRACT 15. SUBJECT TERMS 16...of conflict NDIA Disruptive Technologies 10/16/2009 Page-3 DDR&E Imperatives 1. Accelerate delivery of technical capabilities to win the current

  14. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  15. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... those areas to strengthen national security. No matter shall be assigned to the Board for its...

  16. Defense Technology Opportunities for First Responders

    DTIC Science & Technology

    2004-11-01

    both the US and Canada; and - there is a good window of opportunity for investment and application in the candidate technology. 3/82 DEFENSE...This last strategy would be difficult for the new companies wanting to enter the market because of the investment and specialized skills that are...exists in both the US and Canada; and 14/82 - there is a good window of opportunity for investment and application in the candidate technology

  17. DEFENSE TECHNOLOGY FOR ENVIRONMENTAL PROTECTION. VOLUME II. BIBLIOGRAPHY

    EPA Science Inventory

    The report condenses an effort design to identify and transfer significant technology concerned with air pollution monitoring and control from the Department of Defense (DOD) to the EPA. Included are technology profiles of each DOD laboratory involved in particular work of intere...

  18. The Science and Technology of the US National Missile Defense System

    NASA Astrophysics Data System (ADS)

    Postol, Theodore A.

    2010-03-01

    The National Missile Defense System utilizes UHF and X-band radars for search, track and discrimination, and interceptors that use long-wave infrared sensors to identify and home on attacking warheads. The radars and infrared sensors in the missile defense system perform at near the theoretical limits predicted by physics. However, in spite of the fantastic technical advances in sensor technology, signal processing, and computational support functions, the National Missile Defense System cannot be expected to ever work in realistic combat environments. This talk will describe why these impressive technologies can never deliver on the promise of a credible defense against long-range ballistic missiles.

  19. Malpractice liability, technology choice and negative defensive medicine.

    PubMed

    Feess, Eberhard

    2012-04-01

    We extend the theoretical literature on the impact of malpractice liability by allowing for two treatment technologies, a safe and a risky one. The safe technology bears no failure risk, but leads to patient-specific disutility since it cannot completely solve the health problems. By contrast, the risky technology (for instance a surgery) may entirely cure patients, but fail with some probability depending on the hospital's care level. Tight malpractice liability increases care levels if the risky technology is chosen at all, but also leads to excessively high incentives for avoiding the liability exposure by adopting the safe technology. We refer to this distortion toward the safe technology as negative defensive medicine. Taking the problem of negative defensive medicine seriously, the second best optimal liability needs to balance between the over-incentive for the safe technology in case of tough liability and the incentive to adopt little care for the risky technology in case of weak liability. In a model with errors in court, we find that gross negligence where hospitals are held liable only for very low care levels outperforms standard negligence, even though standard negligence would implement the first best efficient care level.

  20. 32 CFR 761.20 - Additional regulations governing persons and vessels in Naval Defensive Sea Areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... vessels in Naval Defensive Sea Areas. 761.20 Section 761.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY ISLANDS UNDER NAVY JURISDICTION NAVAL DEFENSIVE SEA AREAS; NAVAL AIRSPACE... Instructions § 761.20 Additional regulations governing persons and vessels in Naval Defensive Sea Areas. (a) By...

  1. Local Area Defense (LAD) Demonstration

    DTIC Science & Technology

    2004-09-01

    Prozac ? Fentanyl? Institution, incident command, community drills - use of internet - digital photos of all victims to follow them through the system...and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave...detection and rapid response system for local area defense using the University of Maryland Baltimore (UMB) Campus as a testbed. Additional goals includes

  2. Changing Manufacturing Technology and Jobs in Defense Industries.

    ERIC Educational Resources Information Center

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  3. Defense Technology Security Administration Strategic Plan 2009-2010

    DTIC Science & Technology

    2008-12-22

    NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Technology Security Administration ( DTSA ),Washington,DC 8. PERFORMING ORGANIZATION...Security Administration This document is unclassifi ed in its entirety. Photography courtesy of Defense Link and DTSA . Document printed 2009. DTSA ...STRATEGIC PLAN 2009-2010 C O N T E N T S Message from the Director 2 Envisioning 2010 3 Our Way Ahead 5 We Are DTSA 18 Metrics Matrix 24 DTSA

  4. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE PAGES

    Sankaran, Jaganath; Fearey, Bryan L.

    2017-02-06

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  5. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sankaran, Jaganath; Fearey, Bryan L.

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  6. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    DTIC Science & Technology

    2016-02-12

    SECURITY CLASSIFICATION OF: This project examined China’s drive to become a world-class defense and dual -use technological and industrial power and...2211 China, science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...Place in the Global Technology Order Report Title This project examined China’s drive to become a world-class defense and dual -use technological and

  7. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    DTIC Science & Technology

    2002-05-01

    SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION...Today, it takes roughly 10 to 15 years to develop a safe drug for a specific purpose. The task force believes that it is possible for the United...performance in later screens. DSB Summer Study on Defense Science and Technology ___________________________________________ 10 The

  8. Defenses against keratinolytic bacteria in birds living in radioactively contaminated areas

    NASA Astrophysics Data System (ADS)

    Ruiz-Rodríguez, Magdalena; Møller, Anders Pape; Mousseau, Timothy A.; Soler, Juan J.

    2016-10-01

    Microorganisms have shaped the evolution of a variety of defense mechanisms against pathogenic infections. Radioactivity modifies bacterial communities and, therefore, bird hosts breeding in contaminated areas are expected to adapt to the new bacterial environment. We tested this hypothesis in populations of barn swallows ( Hirundo rustica) from a gradient of background radiation levels at Chernobyl and uncontaminated controls from Denmark. Investment in defenses against keratinolytic bacteria was measured from feather structure (i.e., susceptibility to degradation) and uropygial secretions. We studied degradability of tail feathers from areas varying in contamination in laboratory experiments using incubation of feathers with a feather-degrading bacterium, Bacillus licheniformis, followed by measurement of the amount of keratin digested. The size of uropygial glands and secretion amounts were quantified, followed by antimicrobial tests against B. licheniformis and quantification of wear of feathers. Feathers of males, but not of females, from highly contaminated areas degraded at a lower rate than those from medium and low contamination areas. However, feathers of both sexes from the Danish populations showed little evidence of degradation. Individual barn swallows from the more contaminated areas of Ukraine produced the largest uropygial secretions with higher antimicrobial activity, although wear of feathers did not differ among males from different populations. In Denmark, swallows produced smaller quantities of uropygial secretion with lower antimicrobial activity, which was similar to swallow populations from uncontaminated areas in Ukraine. Therefore, barn swallows breeding in contaminated areas invested more in all defenses against keratinolytic bacteria than in uncontaminated areas of Ukraine and Denmark, although they had similar levels of feather wear. Strong natural selection exerted by radioactivity may have selected for individuals with higher defense

  9. Defenses against keratinolytic bacteria in birds living in radioactively contaminated areas.

    PubMed

    Ruiz-Rodríguez, Magdalena; Møller, Anders Pape; Mousseau, Timothy A; Soler, Juan J

    2016-10-01

    Microorganisms have shaped the evolution of a variety of defense mechanisms against pathogenic infections. Radioactivity modifies bacterial communities and, therefore, bird hosts breeding in contaminated areas are expected to adapt to the new bacterial environment. We tested this hypothesis in populations of barn swallows (Hirundo rustica) from a gradient of background radiation levels at Chernobyl and uncontaminated controls from Denmark. Investment in defenses against keratinolytic bacteria was measured from feather structure (i.e., susceptibility to degradation) and uropygial secretions. We studied degradability of tail feathers from areas varying in contamination in laboratory experiments using incubation of feathers with a feather-degrading bacterium, Bacillus licheniformis, followed by measurement of the amount of keratin digested. The size of uropygial glands and secretion amounts were quantified, followed by antimicrobial tests against B. licheniformis and quantification of wear of feathers. Feathers of males, but not of females, from highly contaminated areas degraded at a lower rate than those from medium and low contamination areas. However, feathers of both sexes from the Danish populations showed little evidence of degradation. Individual barn swallows from the more contaminated areas of Ukraine produced the largest uropygial secretions with higher antimicrobial activity, although wear of feathers did not differ among males from different populations. In Denmark, swallows produced smaller quantities of uropygial secretion with lower antimicrobial activity, which was similar to swallow populations from uncontaminated areas in Ukraine. Therefore, barn swallows breeding in contaminated areas invested more in all defenses against keratinolytic bacteria than in uncontaminated areas of Ukraine and Denmark, although they had similar levels of feather wear. Strong natural selection exerted by radioactivity may have selected for individuals with higher defense

  10. Semantic Web and Inferencing Technologies for Department of Defense Systems

    DTIC Science & Technology

    2014-10-01

    contact report for a specific type of aircraft . Intra-domain-specific metadata in the threat data domain might be used to categorize the contact...DEFENSE SYSTEMS by Duane Davis October 2014 Approved for public release; distribution is unlimited Prepared for: The NPS Center for Multi-INT...TITLE AND SUBTITLE Semantic Web and Inferencing Technologies for Department of Defense Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  11. Defense Technology and Trade Initiative: Ashton Carter’s Strategy in India

    DTIC Science & Technology

    2016-03-01

    Defense AT&L: March-April 2016 26 Defense Technology and Trade Initiative Ashton Carter’s Strategy in India Amit K. Maitra Maitra is a founding...officials to work on initiatives that were set in motion during President Obama’s January 2015 visit to India . During that visit, Obama and Indian Prime...engine technology. Modi, who has a broad vision of India as a global power, has a noticeably great affinity for the United States. Also, in the wake

  12. Review of defense display research programs

    NASA Astrophysics Data System (ADS)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  13. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  14. Holding the Edge: Maintaining the Defense Technology Base. Summary

    DTIC Science & Technology

    1989-04-01

    Arizona CLAIBORNE PELL GEORGE E. BROWN, JR. Rhode Island California TED STEVENS JOHN D. DINGELL Alaska Michigan ORRIN G. HATCH DON SUNDQUIST Utah Tennessee...acknowledged. JON IBBONS Director Defense Technology Base Advisory Panel Walter B. Laberge , Chair Vice President of Corporate Development Lockheed Corp

  15. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-14

    ... Defense Technologies RFP. Please visit http://www.sba.gov/clusters/index.html for more information. The RFP may be found on http://www.fedbizopps.gov . LOGISTICAL INFORMATION: The webinar will be held on Monday, July 19, 2010. For details, please visit http://www.sba.gov/clusters/index.html . SUPPLEMENTARY...

  16. The Department of Defense critical technologies plan for the Committees on Armed Services United States Congress

    NASA Astrophysics Data System (ADS)

    Young, Leo

    1990-03-01

    The second Annual Defense Critical Technologies Plan responds to the requirement that the Secretary of Defense submit to the Committees on Armed Services of the Senate and House of Representatives an annual plan for developing the technologies considered by the Secretary of Defense and the Secretary of Energy to be the technologies most critical to ensuring the long term qualitative superiority of the United States weapon systems. Twenty critical technologies are selected. The selection process is described, criteria for selection are set forth, and industrial and international assessments are summarized. The major portion of this report is contained in 20 sections in Appendix A, one section for each critical technology. Each section addresses the questions posed by Congress on funding, plans and milestones, industrial base and manufacturing issues, and the competitiveness of U.S. industry; it also provides an assessment of the positions of the Soviet Union, NATO, Japan and other industrialized countries in niche technologies within each critical technology.

  17. Instructional Technology in the Department of Defense, Now and in the Future.

    ERIC Educational Resources Information Center

    Rose, M. Richard

    Because the Department of Defense spends more than $7 billion annually on training and educational opportunities, new instructional technologies are constantly explored in an attempt to make education and training more cost effective. Technologies which have been tried include: (1) instructional systems based on behavioral objectives; (2)…

  18. Holding the Edge: Maintaining the Defense Technology Base

    DTIC Science & Technology

    1989-04-01

    report. OTA assumes full responsibility for the report and the accuracy of its contents . tv OTA Project Staff-Defense Technology Base Lionel S. Johns...necessarily approve, disapprove, or endorse this report. OTA assumes full responsibility for the report and the accuracy of its contents . vii • L ,1 Contents ...along with original research contractors) having to buy from companies that and analysis . Moreover, while DoD management do not need its business

  19. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  20. Defense Department's role in advanced technology: a personal perspective

    NASA Astrophysics Data System (ADS)

    McFarland, Ray I., Jr.

    1996-01-01

    The Department of Defense is both a developer and user of advanced technology. It does so, not as an end unto itself, but in support of its mission, which is to protect the national security of the country. In part, this is accomplished by 'supporting the warfighter,' and in part, by supporting the national leaders of the country. In accomplishing these ends, a careful balance must be achieved to ensure the Department has the necessary technology to successfully carry out its mission, without the imposition of 'an industrial policy.' Nor can the Department afford the creation of an artificial market, which only it will support, if alternative industrial markets will suffice.

  1. Defense Technology Plan

    DTIC Science & Technology

    1994-09-01

    implementation of the services necessary to support transparent "information pull " operation of decision support systems. This infrastructure will be implemented...technology. Some aspects of this area such as user- pull , mobile and highly distributed operation, bandwidth needs and degree of securihy are Dol)-driven...by a variety of statutory requirements. R&D will provide enhanced mission effectiveness and maintenance of fragile ecosystems. The goalis to develop

  2. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  3. 78 FR 22841 - Defense Federal Acquisition Regulation Supplement: Encouragement of Science, Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ..., Engineering, and Mathematics (STEM) Programs (DFARS Case 2012-D027); Withdrawal AGENCY: Defense Acquisition... mathematics (STEM) programs. FOR FURTHER INFORMATION CONTACT: Mr. Dustin Pitsch: telephone 571-372- 6090... develop science, technology, engineering, and mathematics (STEM) programs. The purpose of this Notice is...

  4. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  5. Automatic speech recognition technology development at ITT Defense Communications Division

    NASA Technical Reports Server (NTRS)

    White, George M.

    1977-01-01

    An assessment of the applications of automatic speech recognition to defense communication systems is presented. Future research efforts include investigations into the following areas: (1) dynamic programming; (2) recognition of speech degraded by noise; (3) speaker independent recognition; (4) large vocabulary recognition; (5) word spotting and continuous speech recognition; and (6) isolated word recognition.

  6. Defense Research Enterprise Assessment

    DTIC Science & Technology

    2017-01-01

    ACQUISITION, TECHNOLOGY , AND LOGISTICS OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 JAN 2 5 2017...fulfill vital missions on behalf of the Warfighter. This DoD research enterprise is characterized by high-quality science, technology transition, and...smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to serve and ready

  7. Defense on the Move: Ant-Based Cyber Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less

  8. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  9. LATIST: A Performance Support Tool for Integrating Technologies into Defense Acquisition University Learning Assets

    DTIC Science & Technology

    2011-07-01

    TECHNOLOGIES INTO DEFENSE ACqUISITION UNIVERSITY LEARNING ASSETS Nada Dabbagh, Kevin Clark, Susan Dass , Salim Al Waaili, Sally Byrd, Susan...demographic data, four Likert- scale questions that targeted respondents’ familiarity with ALT, and one Likert- scale question addressing the...use of technology in learning with under- served populations. (E-mail address: kclark6@gmu.edu) Ms. Susan Dass has over 20 years’ experi- ence in

  10. Chemical and Biological Defense Program Annual Report to Congress

    DTIC Science & Technology

    2006-03-01

    activities , which are closely guarded secrets. The prevalence of dual-use technologies and legitimate civilian applications means nuclear, chemical and...and non-state actors can conceal WMD programs and related activities , the United States, its allies and partners must expect further intelligence gaps... activities into three objective areas: Homeland Defense, War on Terror/Irregular (Asymmetric) Warfare, and Conventional Campaigns. In each area, it

  11. Photonic technology revolution influence on the defence area

    NASA Astrophysics Data System (ADS)

    Galas, Jacek; Litwin, Dariusz; Błocki, Narcyz; Daszkiewicz, Marek

    2017-10-01

    Revolutionary progress in the photonic technology provides the ability to develop military systems of new properties not possible to obtain with the use of classical technologies. In recent years, this progress has resulted in developing advanced, complex, multifunctional and relatively cheap Photonic Integrated Circuits (PIC) or Hybrid Photonics Circuits (HPC) built of a collection of standardized optical, optoelectronic and photonic components. This idea is similar to the technology of Electronic Integrated Circuits, which has revolutionized the microelectronic market. The novel approach to photonic technology is now revolutionizing the photonics' market. It simplifies the photonics technology and enables creation of technological centers for designing, development and production of advanced optical and photonic systems in the EU and other countries. This paper presents some selected photonic technologies and their impact on such defense systems like radars, radiolocation, telecommunication, and radio-communication systems.

  12. Warfighter nutrition: current opportunities and advanced technologies report from a Department of Defense workshop.

    PubMed

    Deuster, Patricia A; Weinstein, Ali A; Sobel, Annette; Young, Andrew J

    2009-07-01

    The Uniformed Services University hosted a conference in July 2008 entitled "Warfighter Nutrition: Advanced Technologies and Opportunities" with Health Affairs and the Defense Advanced Research Projects Agency to develop strategic and tactical plans that could enhance Force Health Protection (FHP) by optimizing warfighter nutrition within the Department of Defense (DoD). The conference focused on three aspects of military nutrition: (1) fueling the forces, or garrison feeding; (2) performance optimization or operational feeding during deployment; and (3) nutritional interventions to support health reset and healing. Presentations by speakers addressed practical interventions (i.e., ready for implementation now) and advanced technologies (i.e., approaches meriting prioritized research and development efforts to transition into application). The conference concluded that nutritional optimization represents an integral and proactive approach to prevent illness, injury, and performance degradation throughout all phases of military service. The overarching consensus achieved was that warfighter nutrition, as a cornerstone of FHP, warrants the critical attention of both medical and line leadership to move quickly to support current initiatives and future advanced technologies.

  13. Lessons learned from U.S. Department of Defense 911-Bio Advanced Concept Technology Demonstrations.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T.; Gasper, W.; Lacher, L.

    1999-07-06

    The US Department of Defense (DoD), in cooperation with other federal agencies, has taken many initiatives to improve its ability to support civilian response to a domestic biological terrorism incident. This paper discusses one initiative, the 911-Bio Advanced Concept Technology Demonstrations (ACTDs), conducted by the Office of the Secretary of Defense during 1997 to better understand: (1) the capability of newly developed chemical and biological collection and identification technologies in a field environment; (2) the ability of specialized DoD response teams to use these new technologies within the structure of cooperating DoD and civilian consequence management organizations; and (3) themore » adequacy of current modeling tools for predicting the dispersal of biological hazards. This paper discusses the experience of the ACTDs from the civilian community support perspective. The 911-Bio ACTD project provided a valuable opportunity for DoD and civilian officials to learn how they should use their combined capabilities to manage the aftermath of a domestic biological terrorism incident.« less

  14. Defense Technology Area Plan.

    DTIC Science & Technology

    1996-05-01

    Nonpolluting fouling-resistant or fouling-release hull coatings, which exploit low- surface-energy and surface-oriented perfluorinated alkyl compounds ... compounds Novel radioprotective drugs Fieldable biodosimetry capability Modeling for casualties in NBC environments Combined injury treatment protocols...Viral Agents, including encephalomyelitis viruses, variola (smallpox), and filoviridae (e.g., Ebola virus). • Neuroactive Compounds , including

  15. Promoting transportation applications in defense conversion and other advanced technologies : summary of proceedings January 1994

    DOT National Transportation Integrated Search

    1994-01-01

    From September-November 1993, U.S. Department of Transportation (DOT) Secretary Federico Pena sponsored a series of meetings, called "Promoting Transportation Applications in Defense Conversion and Other Advanced Technologies," to advance President B...

  16. Analysis of Expedited Defense Contracting Methods in the Acquisition of Emerging Technology

    DTIC Science & Technology

    2016-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT ANALYSIS OF EXPEDITED DEFENSE CONTRACTING METHODS IN THE...CONTRACTING METHODS IN THE ACQUISITION OF EMERGING TECHNOLOGY 5. FUNDING NUMBERS 6. AUTHOR(S) Jacob D. Sabin and Mark K. Zakner 7. PERFORMING...firms. The DOD has authority for applying non-traditional contracting methods to better adapt to this competitive marketplace. This project studied non

  17. Artificial Intelligence Applications to Maintenance Technology Working Group Report (IDA/OSD R&M (Institute for Defense Analyses/Office of the Secretary of Defense Reliability and Maintainability) Study).

    DTIC Science & Technology

    1983-08-01

    Research and Engineering and Office of the Assistant Secretary of Defense (Mw Reserve Affairs and Logistics) 1WTITR#OR DEFENSE ANALYSES ~~’AND... TITLE (and Subdlee) S.TYPE OF REPORT & PERIOD COVERED Final Artificial Intelligence Applications to Main- July 1982 - August 1983 tenance Technology...of DoD (Short Title : R&M Study). This task order was structured to address the improvement of R&M and readiness through innovative program structuring

  18. Defining Moments: Selected Highlights from 25 Years of Missile Defense Technology Development and Transfer. A Technology Applications Report

    DTIC Science & Technology

    2006-05-23

    average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed...and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of...Applications started offering Technology Applications Reviews , which had grown out of SDIO briefings to other Defense organizations (Army, Navy, Air

  19. 76 FR 71928 - Defense Federal Acquisition Regulation Supplement; Updates to Wide Area WorkFlow (DFARS Case 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ... Defense Federal Acquisition Regulation Supplement; Updates to Wide Area WorkFlow (DFARS Case 2011-D027... Wide Area WorkFlow (WAWF) and TRICARE Encounter Data System (TEDS). WAWF, which electronically... civil emergencies, when access to Wide Area WorkFlow by those contractors is not feasible; (4) Purchases...

  20. Department of Defense high power laser program guidance

    NASA Astrophysics Data System (ADS)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  1. Defense Business Transformation

    DTIC Science & Technology

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  2. Defense Horizons. Number 31, September 2003. Technology, Transformation, and New Operational Concepts

    DTIC Science & Technology

    2003-09-01

    armor would provide both individual and commander a continuous medical status report. Edible vaccines genetically engineered into food could deliver...Defense economic opportunities; transition from the familiar Cold War threat to one that is non-nodal, more pervasive, and often nonstate, nonde...The Role of Technology in Transformation The military that was developed to fight the Cold War in a bi- polar world must transform to meet current and

  3. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  4. Defense Science Board Task Force on The Manufacturing Technology Program: A Key to Affordably Equipping the Future Force

    DTIC Science & Technology

    2006-02-01

    technology for cost and risk reduction of products, software, and processes; long-term, multi-Service needs; and disruptive technologies , both...initiatives and for disruptive technologies , the Office of the Secretary of Defense (OSD) can better promote the importance and value of the program...multi- Service programs, research in “ disruptive ” technologies , and SBIR programs. Balance current, near term, and future needs as well as small and

  5. Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence

    ERIC Educational Resources Information Center

    National Academies Press, 2011

    2011-01-01

    The National Research Council (NRC) was asked by the National Defense Intelligence College (NDIC) to convene a committee to review the curriculum and syllabi for their proposed master of science degree in science and technology intelligence. The NRC was asked to review the material provided by the NDIC and offer advice and recommendations…

  6. Review of flat panel display programs and defense applications

    NASA Astrophysics Data System (ADS)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  7. Information Resource Management Planning in the Office of the Under Secretary of Defense (Acquisition)

    DTIC Science & Technology

    1989-08-01

    Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales

  8. 77 FR 19265 - Notification of an Open Meeting of the National Defense University Board of Visitors (BOV)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... future agenda will include discussion on Defense transformation, faculty development, facilities, information technology, curriculum development, as well as other operational issues and areas of interest...

  9. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    DTIC Science & Technology

    2017-12-01

    Political ............................................................................. 55 2. Economic ...the political, economic , social, technological, environmental, and legal forces affecting entry into the defense industrial base...development BBP 1.0 Better Buying Power 1.0 BBP 2.0 Better Buying Power 2.0 BBP 3.0 Better Buying Power 3.0 BEA Bureau of Economic Analysis BLS

  10. Defense Workforce Training Programs.

    ERIC Educational Resources Information Center

    Fletcher, J. D.; And Others

    This report discusses the amount and kinds of Department of Defense (DoD) interactive courseware (ICW) programs that are candidates for transfer to the private sector. Candidates for transfer were identified through an analysis of the Defense Instructional Technology Information System (DITIS). Out of 4,644 ICW programs that have been reported to…

  11. The Defense Systems Acquisition and Review Council

    DTIC Science & Technology

    1976-09-15

    THE DEFENSE SYSTEMS ACQUISITION AND REVIEW COUNCIL.. A Study of Areas of Consideration Affecting the Functions and Process of Defense Major...COUNfIL: 4 Study of Areas of Considerationi Affecting/he Functions and Process of Defense _- 1 Major Systems Acquisition. , ; O,. v AUTHOR(e) I. C...Studies DSARC -- Functions and Process OSDCAIG *, Army Systems . A - =A -- he Defense Systems Acquisition Review Council (DSARC) was created to assume

  12. NASA Technology Area 1: Launch Propulsion Systems

    NASA Technical Reports Server (NTRS)

    McConnaughey, Paul; Femminineo, Mark; Koelfgen, Syri; Lepsch, Roger; Ryan, Richard M.; Taylor, Steven A.

    2011-01-01

    This slide presentation reviews the technology advancements plans for the NASA Technology Area 1, Launch Propulsion Systems Technology Area (LPSTA). The draft roadmap reviews various propulsion system technologies that will be developed during the next 25 + years. This roadmap will be reviewed by the National Research Council which will issue a final report, that will include findings and recommendations.

  13. Application of quality function deployment in defense technology development

    NASA Astrophysics Data System (ADS)

    Cornejo, Estrella De Maria Forster

    1998-12-01

    program management concerns. The Q-PMM provided an improvement in defining the MOPs that would best describe the overall system MOEs. Both, MOP-MOE associations and a basis of comparison between the two ensembles were elucidated. Conclusion. The findings demonstrated QFD to be an effective approach to defense technology development.

  14. Cost of space-based laser ballistic missile defense.

    PubMed

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  15. The science, technology, and politics of ballistic missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coyle, Philip E.

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billionmore » per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.« less

  16. The science, technology, and politics of ballistic missile defense

    NASA Astrophysics Data System (ADS)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  17. 6 CFR 25.8 - Government contractor Defense.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  18. 6 CFR 25.8 - Government contractor Defense.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  19. 6 CFR 25.8 - Government contractor Defense.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  20. Report on Defense Business Operations to the Congressional Defense Committees

    DTIC Science & Technology

    2009-03-15

    7 . PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Department of Defense,Business Information Agency,Washington,DC 8. PERFORMING ORGANIZATION...Defense Business Transformation 7 Table 2-2: System Modernizations and Initiatives by Business Enterprise Priority* Personnel Visibility...and people to ensure reliable and accurate delivery of acceptable goods and services. The procurement functional area establishes requirements for

  1. Dynamic defense workshop :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-artmore » work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.« less

  2. Self-defense or undermining the self? Exploring the possibilities and limitations of a novel anti-rape technology.

    PubMed

    White, Deborah; Rees, Gethin

    2014-03-01

    Despite decades of feminist-inspired law reforms, rape remains highly prevalent. While many continue to fight for broad cultural and institutional changes, some argue that more immediate interventions are required. Self-defense techniques represent a key strategy of resistance to rape, and empirical evidence suggests that women's active resistance may hold a number of positive benefits. In this essay, we compare the aims and objectives of a novel anti-rape technology, known as the Rape-aXe, with traditional self-defense techniques, focusing upon the potential for both to resist individual acts of sexual aggression and, more broadly, end gendered sexual violence.

  3. The Defense Acquisition Workforce Improvement Strategy. Appendix 1: DOD Strategic Human Capital Plan Update. The Defense Acquisition Workforce

    DTIC Science & Technology

    2010-04-01

    Frank J . Anderson, Jr., April 5, 2010. A Message from the Under Secretary of Defense For Acquisition, Technology and Logistics The importance of...Defense agencies. The Deputy Secretary of Defense, the Honorable William J . Lynn III, recently emphasized that the acquisition workforce rebalancing...20 Asch B., Haider S., and Zizzimopoulos, J . (2003) The Effects of Workforce-Shaping Incentives

  4. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  5. Protecting Networks Via Automated Defense of Cyber Systems

    DTIC Science & Technology

    2016-09-01

    autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our

  6. Cost of space-based laser ballistic missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Field, G.; Spergel, D.

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to bemore » used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ration. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems. 28 references, 2 tables.« less

  7. Technology Area Roadmap for In Space Propulsion Technologies

    NASA Technical Reports Server (NTRS)

    Johnson, Les; Meyer, Mike; Coote, David; Goebel, Dan; Palaszewski, Bryan; White, Sonny

    2010-01-01

    This slide presentation reviews the technology area (TA) roadmap to develop propulsion technologies that will be used to enable further exploration of the solar system, and beyond. It is hoped that development of the technologies within this TA will result in technical solutions that will improve thrust levels, specific impulse, power, specific mass, volume, system mass, system complexity, operational complexity, commonality with other spacecraft systems, manufacturability and durability. Some of the propulsion technologies that are reviewed include: chemical and non-chemical propulsion, and advanced propulsion (i.e., those with a Technology Readiness level of less than 3). Examples of these advanced technologies include: Beamed Energy, Electric Sail, Fusion, High Energy Density Materials, Antimatter, Advanced Fission and Breakthrough propulsion technologies. Timeframes for development of some of these propulsion technologies are reviewed, and top technical challenges are reviewed. This roadmap describes a portfolio of in-space propulsion technologies that can meet future space science and exploration needs.

  8. NASA's Spaceliner Investment Area Technology Activities

    NASA Technical Reports Server (NTRS)

    Hueter, Uwe; Lyles, Garry M. (Technical Monitor)

    2001-01-01

    NASA's has established long term goals for access-to-space. The third generation launch systems are to be fully reusable and operational around 2025. The goals for the third generation launch system are to significantly reduce cost and improve safety over current conditions. The Advanced Space Transportation Program Office (ASTP) at the NASA's Marshall Space Flight Center in Huntsville, AL has the agency lead to develop space transportation technologies. Within ASTP, under the Spaceliner Investment Area, third generation technologies are being pursued in the areas of propulsion, airframes, integrated vehicle health management (IVHM), avionics, power, operations, and range. The ASTP program will mature these technologies through both ground and flight system testing. The Spaceliner Investment Area plans to mature vehicle technologies to reduce the implementation risks for future commercially developed reusable launch vehicles (RLV). The plan is to substantially increase the design and operating margins of the third generation RLV (the Space Shuttle is the first generation) by incorporating advanced technologies in propulsion, materials, structures, thermal protection systems, avionics, and power. Advancements in design tools and better characterization of the operational environment will allow improvements in design margins. Improvements in operational efficiencies will be provided through use of advanced integrated health management, operations, and range technologies. The increase in margins will allow components to operate well below their design points resulting in improved component operating life, reliability, and safety which in turn reduces both maintenance and refurbishment costs. These technologies have the potential of enabling horizontal takeoff by reducing the takeoff weight and achieving the goal of airline-like operation. These factors in conjunction with increased flight rates from an expanding market will result in significant improvements in safety

  9. 76 FR 35424 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ...; Defense Federal Acquisition Regulation Supplement; Acquisition of Information Technology AGENCY: Defense... techniques or other forms of information technology. The Office of Management and Budget (OMB) has approved... Information Technology, and the associated clauses at DFARS 252.239-7000 and 252.239-7006; OMB Control Number...

  10. Defense Technologies: DOD’s Critical Technologies Lists Rarely Inform Export Control and other Policy Decisions

    DTIC Science & Technology

    2006-07-01

    9 In 1988, Congress enacted the Exon- Florio amendment to the Defense Production Act, which...more information on the committee see, GAO, Defense Trade: Enhancements to the Implementation of Exon- Florio Could Strengthen the Law’s...Products Page 25 GAO-06-793 Related GAO Products Defense Trade: Enhancements to the Implementation of Exon- Florio Could Strengthen the Law’s

  11. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-04-01

    Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T. Dillard Naval...Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change...describes the preliminary analysis and findings of our study exploring what drives successful organizational adaptation in the context of technology

  12. Thrust Area Report, Engineering Research, Development and Technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Langland, R. T.

    1997-02-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the knowledge base, process technologies, specialized equipment, tools and facilities to support current and future LLNL programs. Engineering`s efforts are guided by a strategy that results in dual benefit: first, in support of Department of Energy missions, such as national security through nuclear deterrence; and second, in enhancing the nation`s economic competitiveness through our collaboration with U.S. industry in pursuit of the most cost- effective engineering solutions to LLNL programs. To accomplish this mission, the Engineering Research, Development, and Technology Programmore » has two important goals: (1) identify key technologies relevant to LLNL programs where we can establish unique competencies, and (2) conduct high-quality research and development to enhance our capabilities and establish ourselves as the world leaders in these technologies. To focus Engineering`s efforts technology {ital thrust areas} are identified and technical leaders are selected for each area. The thrust areas are comprised of integrated engineering activities, staffed by personnel from the nine electronics and mechanical engineering divisions, and from other LLNL organizations. This annual report, organized by thrust area, describes Engineering`s activities for fiscal year 1996. The report provides timely summaries of objectives, methods, and key results from eight thrust areas: Computational Electronics and Electromagnetics; Computational Mechanics; Microtechnology; Manufacturing Technology; Materials Science and Engineering; Power Conversion Technologies; Nondestructive Evaluation; and Information Engineering. Readers desiring more information are encouraged to contact the individual thrust area leaders or authors. 198 refs., 206 figs., 16 tabs.« less

  13. Strategic defense initiative: critical issues

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuckolls, J.H.

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to themore » defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)« less

  14. Functions of the Department of Defense and Its Major Components

    DTIC Science & Technology

    2010-12-21

    Information Center (DTIC),” August 19, 2005 (ax) DoD Directive 5105.72, “Defense Technology Security Administration ( DTSA ),” July 28, 2005 (ay) DoD...Information Center (DTIC). See DoDD 5105.73 (Reference (aw)). (4) Defense Technology Security Administration ( DTSA ). See DoDD 5105.72

  15. Planetary Defense is More Than Science and Technology: Policy, People, and Disaster Management

    NASA Astrophysics Data System (ADS)

    Harrison, A. A.

    2009-12-01

    Physical scientists and engineers who work to identify and then deflect or destroy threatening Near Earth Objects deserve the support of colleagues who have a thorough understanding of human psychology, society and culture. Behavioral and social scientists can help build governmental and public support for vigorous and comprehensive programs of planetary defense as well as apply their work to minimize the human cost of NEO threats and impacts. Tasks include preparing the public for a succession of possible threats of differing levels; developing effective warning and evacuation strategies; and supporting residents of affected areas during the impact and recovery phases. Although much can be learned from the pre-existing disaster literature, it is important to remain mindful of differences between asteroid or comet impacts and other natural disasters such as hurricanes and earthquakes. After identifying widespread but erroneous stereotypes that exaggerate human weakness and interfere with effective disaster planning, we turn to models whereby international, national, and regional organizations help local communities and citizens develop the skills, attitudes and resources that they need to help protect their own welfare. These models view residents of disaster areas as part of the solution as well as part of the problem, acknowledge dangers and disruptions outside of the immediate impact area, and demand high sensitivity to political and cultural issues. We conclude with a brief discussion of strategies for preserving the human legacy under worst-case scenarios including the construction and administration of survival communities and sending time capsules into space. Anthropology, political science, psychology and sociology are already contributing to astrobiology and SETI, and it is time for researchers and practitioners in these areas to become conspicuous partners in the pursuit of planetary defense.

  16. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    DTIC Science & Technology

    1996-01-01

    can we offer those in government who formulate national policy? For what wars should American forces prepare? How should defense firms think about their...Haitis or was our withdrawal from Somalia the start of a trend toward isolationism? How big should the defense budget be and what should be its...and I are often asked to identify the strategy the United States should adopt now that the Cold War has become a fast fading memory. What guidance

  17. The Art and Science of Defense Logistics

    DTIC Science & Technology

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  18. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-10-01

    pmlkploba=obmloq=pbofbp= Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change 5a. CONTRACT NUMBER 5b. GRANT...findings of our study exploring what drives successful organizational adaptation in the context of technology transition and acquisition within the

  19. System Requirements Analysis and Technological Support for the Ballistic Missile Defense System (BMDS) - FY07 Progress Report

    DTIC Science & Technology

    2007-07-01

    Systems , Boeing-led Airborne Laser Team Actively Tracks Airborne Target, Compensates for Atmospheric Turbulence and Fires Sur- rogate High-Energy Laser...7100 System Requirements Analysis and Technological Support for the Ballistic Missile Defense System (BMDS) FY07 Progress Report By...Office of Management and Budget , Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE July

  20. Optimal defense theory explains deviations from latitudinal herbivory defense hypothesis.

    PubMed

    Kooyers, Nicholas J; Blackman, Benjamin K; Holeski, Liza M

    2017-04-01

    The latitudinal herbivory defense hypothesis (LHDH) postulates that the prevalence of species interactions, including herbivory, is greater at lower latitudes, leading to selection for increased levels of plant defense. While latitudinal defense clines may be caused by spatial variation in herbivore pressure, optimal defense theory predicts that clines could also be caused by ecogeographic variation in the cost of defense. For instance, allocation of resources to defense may not increase plant fitness when growing seasons are short and plants must reproduce quickly. Here we use a common garden experiment to survey genetic variation for constitutive and induced phenylpropanoid glycoside (PPG) concentrations across 35 Mimulus guttatus populations over a ~13° latitudinal transect. Our sampling regime is unique among studies of the LHDH in that it allows us to disentangle the effects of growing season length from those of latitude, temperature, and elevation. For five of the seven PPGs surveyed, we find associations between latitude and plant defense that are robust to population structure. However, contrary to the LHDH, only two PPGs were found at higher levels in low latitude populations, and total PPG concentrations were higher at higher latitudes. PPG levels are strongly correlated with growing season length, with higher levels of PPGs in plants from areas with longer growing seasons. Further, flowering time is positively correlated with the concentration of nearly all PPGs, suggesting that there may be a strong trade-off between development time and defense production. Our results reveal that ecogeographic patterns in plant defense may reflect variation in the cost of producing defense compounds in addition to variation in herbivore pressure. Thus, the biogeographic pattern predicted by the LHDH may not be accurate because the underlying factors driving variation in defense, in this case, growing season length, are not always associated with latitude in the same

  1. New technology for early detection of health threats

    NASA Astrophysics Data System (ADS)

    Southern, Šárka O.; Lilienthal, Gerald W.

    2008-04-01

    Governmental agencies charged with protecting the health of the population and agriculture have several main strategic objectives including the detection of harmful agents, the identification of vulnerable biological targets, the prediction of health outcomes and the development of countermeasures. New technologies are urgently needed in several critical areas of bio-chemical defense: economical and minimally invasive biosensors for field use in humans and other species important for agriculture and infrastructure, universal analytical platforms for broad-based, early warnings of threats and technologies guiding the development of countermeasures. A new technology called Stress Response Profiling (SRP) was recently developed by the Gaia Medical Institute. SRP provides a universal analytical platform for monitoring health status based on measurements of physiological stress. The platform is implemented through handheld devices that can be used for noninvasive detection of early-stage health problems. This paper summarizes SRP features, advantages and potential benefits for critical areas of homeland defense.

  2. Department of Defense, Department of the Navy FY 1994 Budget Estimates, Report on Information Technology Systems

    DTIC Science & Technology

    1993-04-01

    3,822 2,076 0 Exhibit 43A-Za Page 71 of 77 DEPARTMENT OF DEFENSE Department of the Navy FY 1994 Budget Estimates Exhibit 43A-2a Report on Operations...Contracts: Martin Marietta , Information Systems Group is the systems integrator with principle subcontractors of Hewlett. Packard and Racal-Milgo...DEPARTMENT OF PEFENSE April 1993 Department of the Navy FY 1994 Budget Estimates Report on Information Technology Systmm INDEX E xh bi-t tl

  3. The National Aerospace Initiative (NAI): Technologies For Responsive Space Access

    NASA Technical Reports Server (NTRS)

    Culbertson, Andrew; Bhat, Biliyar N.

    2003-01-01

    The Secretary of Defense has set new goals for the Department of Defense (DOD) to transform our nation's military forces. The Director for Defense Research and Engineering (DDR&E) has responded to this challenge by defining and sponsoring a transformational initiative in Science and Technology (S&T) - the National Aerospace Initiative (NAI) - which will have a fundamental impact on our nation's military capabilities and on the aerospace industry in general. The NAI is planned as a joint effort among the tri-services, DOD agencies and National Aeronautics and Space Administration (NASA). It is comprised of three major focus areas or pillars: 1) High Speed Hypersonics (HSH), 2) Space Access (SA), and 3) Space Technology (ST). This paper addresses the Space Access pillar. The NAI-SA team has employed a unique approach to identifying critical technologies and demonstrations for satisfying both military and civilian space access capabilities needed in the future. For planning and implementation purposes the NAI-SA is divided into five technology subsystem areas: Airframe, Propulsion, Flight Subsystems, Operations and Payloads. Detailed technology roadmaps were developed under each subsystem area using a time-phased, goal oriented approach that provides critical space access capabilities in a timely manner and involves subsystem ground and flight demonstrations. This S&T plan addresses near-term (2009), mid-term (2016), and long-term (2025) goals and objectives for space access. In addition, system engineering and integration approach was used to make sure that the plan addresses the requirements of the end users. This paper describes in some detail the technologies in NAI-Space Access pillar. Some areas of emphasis are: high temperature materials, thermal protection systems, long life, lightweight, highly efficient airframes, metallic and composite cryotanks, advanced liquid rocket engines, integrated vehicle health monitoring and management, highly operable systems and

  4. Hypermedia Laboratory, Defense Applied Information Technology Center; Review for 1988

    DTIC Science & Technology

    1988-12-01

    Information System (DGIS): The Department of Defense Microcomputer User’s Gateway to the World;" Microcomputers for Information Management : An International...accessing. "Knowledge Gateways: The Building Blocks." Information Processing & Management , Volume 24, Number 4, pp. 459-468, 1988. Donald T. Hawkins...intelligence and hypermedia. This activity is managed by the Defense Technical Information Center (DTIC). Much of our development at this point is

  5. Developing defensive aids suite technology on a virtual battlefield

    NASA Astrophysics Data System (ADS)

    Rapanotti, John L.; DeMontigny-Leboeuf, Annie; Palmarini, Marc; Cantin, Andre

    2002-07-01

    Modern anti-tank missiles and the requirement of rapid deployment are limiting the use of passive armour in protecting land vehicles. Vehicle survivability is becoming more dependent on sensors, computers and countermeasures to detect and avoid threats. The integration of various technologies into a Defensive Aids Suite (DAS) can be designed and analyzed by combining field trials and laboratory data with modeling and simulation. MATLAB is used as a quick prototyping tool to model DAS systems and facilitate transfer to other researchers. The DAS model can be transferred from MATLAB or programmed directly in ModSAF (Modular Semi-Automated Forces), which is used to construct the virtual battlefield. Through scripted input files, a fixed battle approach ensures implementation and analysis meeting the requirements of three different interests. These three communities include the scientists and engineers, military and operations research. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. A system can be modelled phenomenologically until more information is available. Further processing of the simulation can be used to optimize the vehicle for a specific mission. ModSAF will be used to analyze and plan trials and develop DAS technology for future vehicles. Survivability of a DAS-equipped vehicle can be assessed relative to a basic vehicle without a DAS. In later stages, more complete DAS systems will be analyzed to determine the optimum configuration of the DAS components and the effectiveness of a DAS-equipped vehicle for specific missions. These concepts and approach will be discussed in the paper.

  6. Private Industry Support to Defense Needs.

    DTIC Science & Technology

    1982-04-19

    especially private industry, must fully understand that defense procurement is changing drastically and it will no longer be looking for all its...products on the leading edge of technology. The price in time and money dictates this changed procure - ment strategy immediately. Private industry would...A process to stablize procurements and breakdown the barriers that are stopping new firms from entering into defense business; private industry

  7. Statement on the Science and Technology Program and the Role of Department of Defense Laboratories FY 1979,

    DTIC Science & Technology

    1978-05-16

    Di~t Scci ~_STATEMENT ON THE SCIENCI AND TECHNOLOGY PROGRAM AND THE ROLE OF DEPARTMENT OF ’DEFENSE LABORATORIES DR. RUTH M. /DAVIS DEPUTY UNDER...guidance and control 2 and electronics through materials , mathematics and physics, through oceanographic and environmental sciences to chemical and...warfare 23 19 21 Weaponry Landmines, Landmine Countermeasures 13 18 18 and Barriers Ocean Vehicles 114 118 138 Land Mobility 26 26 47 Materials and

  8. Directed Energy Technology Working Group Report (IDA/OSD R&M (Institute for Defense Analyses/Office of the Secretary of Defense Reliability and Maintainability) Study).

    DTIC Science & Technology

    1983-08-01

    Missile (SLBM) Defense Scenario ............................................ B-1 C Space-Based Anti-Ballistic Missile ( ABM ) Defense Scenario...Ballistic Missile (SLBM) Defense Scenario, and at Strategic Space-Based Anti-Ballistic Missile ( ABM ) Defense Scenario. These case studies are provided...of flight. 3.5.3 Spaced-Based ABM Defense Scenario In this scenario, an orbiting battle station is operating as an element of GBMD System, and it is

  9. Chemical-biological defense remote sensing: what's happening

    NASA Astrophysics Data System (ADS)

    Carrico, John P.

    1998-08-01

    The proliferation of weapons of mass destruction (WMD) continues to be a serious threat to the security of the US. Proliferation of chemical and biological (CB) weapons is particularly disturbing, and the threats posed can be devastating. Critical elements of the US efforts to reduce and counter WMD proliferation include: (1) the location and characterization of WMD facilities and capabilities worldwide; (2) the ability to rapidly detect and identify the use of CB weapons for expeditious warning and reporting on the battlefield; and (3) the capability to mitigate deleterious consequences of a CB incident through effective protective and medical treatment measures. Remote sensing has been touted as a key technology in these efforts. Historically, the role of remote sensing in CB defense has been to provide early warning of an attack from an extended distance. However, additional roles for remote sensing in CB defense, as well as applications in related missions, are possible and should be pursued. This paper examines what has been happening in remote sensing over the past decade to address needs in this area. Accomplishments, emerging technologies, programmatic issues, and opportunities for the future are covered. The Department of Defence chemical- biological, the Department of Energy's Chemical Analysis by Laser Interrogation of Proliferation Effluents, and other agency related programs are examined. Also, the status of remote sensing in the commercial market arena for environmental monitoring, its relevance to the WMD counterproliferation program, and opportunities for technology transfer are discussed. A course of action for the future is recommended.

  10. Biotech Business Lessons for Defense Acquisition

    DTIC Science & Technology

    2016-01-01

    Strategic Studies Quarterly ♦ Summer 2016 The pick-a-winner approach is focused on particular areas of research . Within the DOD, the Defense Advanced......94 Strategic Studies Quarterly ♦ Summer 2016 Biotech Business Lessons for Defense Acquisition Col David L. Peeler Jr., USAF Abstract The desire to

  11. Department of Defense Basic Research Program.

    DTIC Science & Technology

    1980-08-01

    Oamond Laboratories, ERADCOM. Foreword This report has been prepared by the Research Office, ffice of the Deputy Under Secretary of Defense for... Research and Engineering ( Research and Advanced Technology~jlt is the first report ever written for the express purpose of describing the Department of...Defense basic research program. The report is part of an overall effort to improve communications with the national research community by increasing the

  12. Defense Science Board 2006 Summer Study on 21st Century Strategic Technology Vectors. Volume 4. Accelerating the Transition of Technologies into U.S. Capabilities

    DTIC Science & Technology

    2007-04-01

    perform more research on future defense technology, the DOD should invest in companies that are leaders in the development of innovative sources of next...well. In fact, the kit from one vender out-performed the standard up-armor kits being produced for the Army’s acquisition team. That Army company ...subsequently purchased the company that had built the improved performance kit. As part of the process to look at alternatives, the Army Material

  13. Arms control and The President's Strategic Defense Initiative

    NASA Astrophysics Data System (ADS)

    Bon, J. J.

    1985-04-01

    The President's Strategic Defense Initiative (SDI) provides the hope for eliminating the threat from ballistic missiles. This study evaluates the impact of SDI on existing and future arms control agreements. Because new or modified space-related treaties are a probable result of the SDI, this study concludes that the best single strategy for arms control negotiations is to preserve overall US interests and maintain open technological options vice severely limiting any space technology that might some day become part of a space-based defensive system.

  14. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    DTIC Science & Technology

    1996-05-01

    Nudist colonies Carribean resots List of Targets List ofWeapons List of lists List of Places Vacation spots Nudist colonies Carribean resots List of...Targets List ofWeapons List of lists L of Places Vacation spots Nudist colonies Carribean resots List of Targets List fW apons List of lists L of...Places Vacation pots Nudist colonies Carribean resots IV -A -63 DISTRIBUTED AOC PROTOTYPE PROVISIONAL EXIT CRITERIA BASELINE GOALMINIMUMOPERATIONAL

  15. Department of Defense Laboratory Civilian Science and Engineering Workforce - 2013

    DTIC Science & Technology

    2013-10-01

    was completed by the Institute for Defense Analysis (IDA) in 20091 with an update prepared by the Defense Laboratories Office (DLO) in 2011. By...demographics will emerge giving decision- and policy-makers greater clarity about the impacts of budgets and macro scale policies on this important...Physiology 819 Environmental Engineering 1382 Food Technology 414 Entomology 830 Mechanical Engineering 1384 Textile Technology 415 Toxicology 840

  16. Issues in national missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any ofmore » them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.« less

  17. Department Of Defense Science And Technology Invigoration

    DTIC Science & Technology

    2002-02-01

    38 Army Science Board, Summer Study, 1982. 39 Hamel, G. and Prahalad , C.K., “ Strategic Intent ,” Harvard Business Review, May-June 1989, 63-76... strategic intent (aggressively stretching resources rather than fitting resources) and core competence (collective learning in an organization...system and defense-related industry. 3. Develop a strategic plan for the DOD S&T infrastructure of the future, defining the complementary roles of

  18. Department of Defense Research, Development, Test, and Evaluation (RDT and E): Appropriations Structure

    DTIC Science & Technology

    2016-12-13

    Task Force on Defense Science and Technology Base for the 21st Century, June 1998. Appropriations Structure of Defense RDT&E Congressional Research...Technology Base for the 21st Century, June 1998. 22 Ibid, p. 45. Appropriations Structure of Defense RDT&E Congressional Research Service 18 Applied...funding streams. Among the many other factors that may affect the effectiveness of the performance of RDT&E are: organizational structures and

  19. Make or Buy: A Systematic Approach to Department of Defense Sourcing Decisions

    DTIC Science & Technology

    2013-07-30

    Defense-Industrial Initiatives Group at CSIS, where he worked on projects related to U.S. and European technology and industrial bases supporting defense...Prior to joining CSIS, Mr. Ben-Ari was a research associate at George Washington University’s Center for International Science and Technology ...collaborative research and development programs for Gilat Satellite Networks Ltd., an Israeli high- technology company in the field of satellite

  20. How To Organize Technology Areas.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1998-01-01

    Highlights three ways a college or university can organize its technology areas to maximize comfort and save space. Examples are provided on controlling equipment sprawl through thoughtful workstation development, designing computer rooms for flexibility and effective cable management, and emulating business setups that are work-flow efficient and…

  1. Information Technology and Community Restoration Studies/Task 1: Information Technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Upton, Jaki F.; Lesperance, Ann M.; Stein, Steven L.

    2009-11-19

    Executive Summary The Interagency Biological Restoration Demonstration—a program jointly funded by the Department of Defense's Defense Threat Reduction Agency and the Department of Homeland Security's (DHS's) Science and Technology Directorate—is developing policies, methods, plans, and applied technologies to restore large urban areas, critical infrastructures, and Department of Defense installations following the intentional release of a biological agent (anthrax) by terrorists. There is a perception that there should be a common system that can share information both vertically and horizontally amongst participating organizations as well as support analyses. A key question is: "How far away from this are we?" As partmore » of this program, Pacific Northwest National Laboratory conducted research to identify the current information technology tools that would be used by organizations in the greater Seattle urban area in such a scenario, to define criteria for use in evaluating information technology tools, and to identify current gaps. Researchers interviewed 28 individuals representing 25 agencies in civilian and military organizations to identify the tools they currently use to capture data needed to support operations and decision making. The organizations can be grouped into five broad categories: defense (Department of Defense), environmental/ecological (Environmental Protection Agency/Ecology), public health and medical services, emergency management, and critical infrastructure. The types of information that would be communicated in a biological terrorism incident include critical infrastructure and resource status, safety and protection information, laboratory test results, and general emergency information. The most commonly used tools are WebEOC (web-enabled crisis information management systems with real-time information sharing), mass notification software, resource tracking software, and NW WARN (web-based information to protect critical

  2. Strategy for Homeland Defense and Defense Support of Civil Authorities

    DTIC Science & Technology

    2013-02-01

    1 As defined by “Sustaining U.S. Global Leadership : Priorities for the 21st Century Defense,” January...and nuclear (CBRN) consequence management response forces in recognition of the proliferation of destructive technologies and the potent ideologies...the wake of Hurricane Katrina. Although DoD is always in a support role to civilian authorities (primarily the Federal Emergency Management Agency, or

  3. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  4. A Research Program in Computer Technology. 1982 Annual Technical Report

    DTIC Science & Technology

    1983-03-01

    for the Defense Advanced Research Projects Agency. The research applies computer science and technology to areas of high DoD/ military impact. The ISI...implement the plan; New Computing Environment - investigation and adaptation of developing computer technologies to serve the research and military ...Computing Environment - ,.*_i;.;"’.)n and adaptation of developing computer technologies to serve the research and military tser communities; and Computer

  5. Defense AT&L. Volume 40, Number 3, May-June 2011

    DTIC Science & Technology

    2011-05-01

    181, Sections 886, January 2008) and is implemented by the Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 225.77. Origins of...of Defense Technology and the Lessons of History IGA Robert Ranquet, IHEDN, Paris The United States has long relied on tech-nology to secure...Gen. Vincent Desportes, latest commandant of the French National War College, puts it in his recent book, La Guerre Probable ( Paris , 2008: Economica

  6. NASA's Spaceliner 100 Investment Area Technology Activities

    NASA Technical Reports Server (NTRS)

    Hueter, Uwe; Lyles, Garry M. (Technical Monitor)

    2001-01-01

    NASA's has established long term goals for access-to-space. The third generation launch systems are to be fully reusable and operational around 2025. The goals for the third generation launch system are to reduce cost by a factor of 100 and improve safety by a factor of 10,000 over current conditions. The Advanced Space Transportation Program Office (ASTP) at the NASA's Marshall Space Flight Center in Huntsville, AL has the agency lead to develop space transportation technologies. Within ASTP, under the Spaceliner100 Investment Area, third generation technologies are being pursued in the areas of propulsion, airframes, integrated vehicle health management (IVHM), launch systems, and operations and range. The ASTP program will mature these technologies through ground system testing. Flight testing where required, will be advocated on a case by case basis.

  7. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    DTIC Science & Technology

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  8. SDI (Strategic Defense Initiative) Software Technology Program Plan

    DTIC Science & Technology

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  9. Learning with and about Technology: A Middle School Nature Area.

    ERIC Educational Resources Information Center

    Fetterman, David

    1998-01-01

    Discussion of learning with technology as well as about technology focuses on a case study of a middle school nature area that uses technology to extend accessibility of environmental data. Highlights include the design of Web pages to describe the nature area; file sharing software; and the use of videoconferencing. (LRW)

  10. Planetary Defense

    DTIC Science & Technology

    2016-05-01

    is very likely that they may develop a solution for planetary defense. 8 United States is leading in space private investments. SpaceX , for...technology, with the ultimate goal of enabling people to live on other planets.5 SpaceX is the only private company ever to return a spacecraft from low...a technically challenging feat previously accomplished only by governments.6 Contracted by NASA and commercial companies, SpaceX already did 50

  11. Defense Threat Reduction Agency > Research > DTRIAC > Our Services

    Science.gov Websites

    DTRIAC reference collection of more than 300,000 documents dating from 1946; experimental test data Analysis of nuclear and non-nuclear-related technology information as applied to defense policy, force technology transfer (application of nuclear related technologies to non-nuclear weapon phenomenologies and

  12. Toward a defense-dominated world

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution nomore » less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.« less

  13. Defense.gov Special Report: Defense Intelligence

    Science.gov Websites

    Department of Defense Submit Search Defense intelligence is critical to the Defense Department's role in and conduct successful military and security operations that protect America. Defense Intelligence News Story Intelligence Chief Describes 'Pervasive Uncertainty' of Worldwide Threats "

  14. Defense Science and Technology Strategy

    DTIC Science & Technology

    1994-09-01

    I 3 IV. The Science and Technology Program .................... 15 Advanced Concept Technology Demomstrations...product and process concepts that pcrmit us to tailor, modify, and optimize the manufactUriiig process; develop sensors a-t i~a Mcrials that will detect...It can be used during concept formulations to expand the range of technical, operational, and system alternatives evaluated. The technology can

  15. 32 CFR 37.1030 - What information must I report to the Defense Technical Information Center?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What information must I report to the Defense Technical Information Center? 37.1030 Section 37.1030 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award Reporting Information About the...

  16. Emerging aerospace technologies

    NASA Technical Reports Server (NTRS)

    Ballhaus, W. F., Jr.; Milov, L. A.

    1985-01-01

    The United States Government has a long history of promoting the advancement of technology to strengthen the economy and national defense. An example is NASA, which was formed in 1958 to establish and maintain U.S. space technology leadership. This leadership has resulted in technological benefits to many fields and the establishment of new commercial industries, such as satellite communications. Currently, NASA's leading technology development at Ames Research Center includes the Tilt Rotor XV-15, which provides the versatility of a helicopter with the speed of a turboprop aircraft; the Numerical Aerodynamic Simulator, which is pushing the state of the art in advanced computational mathematics and computer simulation; and the Advanced Automation and Robotics programs, which will improve all areas of space development as well as life on Earth. Private industry is involved in maintaining technological leadership through NASA's Commercial Use of Space Program, which provides for synergistic relationships among government, industry, and academia. The plan for a space station by 1992 has framed much of NASA's future goals and has provided new areas of opportunity for both domestic space technology and leadership improvement of life on Earth.

  17. Engineering Research and Development and Technology thrust area report FY92

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Langland, R.T.; Minichino, C.

    1993-03-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the technical staff and the technology needed to support current and future LLNL programs. To accomplish this mission, the Engineering Research, Development, and Technology Program has two important goals: (1) to identify key technologies and (2) to conduct high-quality work to enhance our capabilities in these key technologies. To help focus our efforts, we identify technology thrust areas and select technical leaders for each area. The thrust areas are integrated engineering activities and, rather than being based on individual disciplines, theymore » are staffed by personnel from Electronics Engineering, Mechanical Engineering, and other LLNL organizations, as appropriate. The thrust area leaders are expected to establish strong links to LLNL program leaders and to industry; to use outside and inside experts to review the quality and direction of the work; to use university contacts to supplement and complement their efforts; and to be certain that we are not duplicating the work of others. This annual report, organized by thrust area, describes activities conducted within the Program for the fiscal year 1992. Its intent is to provide timely summaries of objectives, theories, methods, and results. The nine thrust areas for this fiscal year are: Computational Electronics and Electromagnetics; Computational Mechanics; Diagnostics and Microelectronics; Emerging Technologies; Fabrication Technology; Materials Science and Engineering; Microwave and Pulsed Power; Nondestructive Evaluation; and Remote Sensing and Imaging, and Signal Engineering.« less

  18. Modeling of high-fidelity synthetic imagery for defense applications

    NASA Astrophysics Data System (ADS)

    Filbee, David R.; Kirk, Albert; Stroud, Colin A.; Hutchings, G.; Ward, T.; Brunnen, D.

    2002-08-01

    Within the military environment there is a growing interest in the use of synthetic imagery as a method for assessing the performance potential of many assets, such as camouflage systems, ATR/I systems, future sensor systems and the susceptibility of such systems to countermeasures. Field trials are expensive, subject to the vagaries of weather, and cannot be used to design or assess new systems and technologies. The requirements for high fidelity synthetic image simulation differ quite significantly dependent on the application area. The Camouflage Electro-Optic Simulation System (CAMEO-SIM) has been developed as a modular system to deliver 0.4-20 micron2 32-bit physics based synthetic imagery to defense researchers in the UK based on a 3D textured geometric representation of the synthetic environment. The system has been developed to be sufficiently flexible to support a wide range of defense applications requiring synthetic image streams as their inputs. The key difference between the CAMEO-SIM system and commercial image generation systems is that CAMEO-SIM is a first principle simulator working in spectral radiometric space solving the underlying physical equations of radiation transport. This difference underpins the military usefulness of the system and also enables the system to become predictive in nature. Using CAMEO-SIM, the user can examine the effects of changes in input parameters such as time of day, weather, material properties (optical and thermophysical), and wavelength from one set of geometric and textural information to assess the effects on the performance of the defense function being researched. If this goal can be achieved more robust defense function performance, due to larger available training sets or better understanding of the issues at the start of the development, will ensue. This paper outlines the development status of the CAMEO-SIM system and describes the current enhancements undertaken to improve the fidelity and accuracy of the

  19. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    DTIC Science & Technology

    2017-12-21

    51 Applying Rapid Acquisition Policy Lessons for Defense Innovation Jonathan Wong Abstract: With the Department of Defense’s (DOD) recent focus on ...finds that DOD can incorporate innovation practices by dispersing organizations focused on new capabilities development across the agency to avoid...adjunct political scientist at the Rand Corporation. His research focuses on the intersection of new technology and defense acquisition. Prior to Rand

  20. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    NASA Astrophysics Data System (ADS)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  1. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    DTIC Science & Technology

    2015-06-01

    Stockholm International Peace Research Institute (SIPRI) yearbooks, published documents of EU governments, annual reports and studies , and others. The main...the framework of impact assessment. In this context, five studies were commissioned, in particular to collect more 48 quantitative information...military spending, in particular in the defense procurement and research and development areas, has been negatively affecting defense companies in

  2. A Sandia weapon review bulletin : defense programs, Autumn 1992.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    Topics in this issue: (1) Focal Point and STEP. Sandia National Laboratories has always focused its advanced weapon development not only on future weapon needs, but also on the engineering and manufacturing sciences needed to meet them. Both areas are changing dramatically. As the nation dismantles many of its warheads, it becomes essential that those that remain are increasingly reliable, secure, capable, and safe. And as development resources diminish, it becomes vital that they are applied to the most critical technologies in a disciplined manner. The mission of the Focal Point program and the Stockpile Transition Enabling Program (STEP) ismore » to develop processes for meeting these challenges. Focal Point offers a decision-making process for allocating Sandia's resources to meets its defense programs strategic goals. (2) Defense Programs news in brief. (3) Dismantling the nuclear stockpile. (4) W88/MK5: Arming, Fuzing, and Firing system meets all requirements and goals. (5) The Common Radar Fuze. (6) Insertable-explosive arming of firing sets. (7) Preparing for fewer underground tests.« less

  3. Wide area restoration following biological contamination

    NASA Astrophysics Data System (ADS)

    Yang, Lynn; Hibbard, Wilthea; Edwards, Donna; Franco, David; Fruetel, Julie; Tucker, Mark; Einfeld, Wayne; Knowlton, Robert; Brown, Gary; Brockmann, John; Greenwalt, Robert; Miles, Robin; Raber, Ellen; Carlsen, Tina; Krauter, Paula; Dillon, Michael; MacQueen, Don; Intrepido, Tony; Hoppes, Bill; Wilson, Wendy; Mancieri, Sav

    2008-04-01

    Current understanding of how to restore a wide area that has been contaminated following a large biological attack is limited. The Department of Homeland Security and Department of Defense are executing a four-year collaborative program named the Interagency Biological Restoration Demonstration (IBRD) program. This program is aimed at developing technologies, methods, plans and policies necessary to restore a wide area, including military installations and critical infrastructures, in the event of a large outdoor aerosol release of anthrax. The IBRD program partner pilot city is the Seattle Urban Area to include Fort Lewis, WA and McChord Air Force Base. A front-end systems analysis was conducted as part of IBRD, to: 1) assess existing technologies and processes for wide area restoration; from this, 2) develop an "as-is" decision framework for wide area restoration; and 3) identify and prioritize capability gaps. Qualitative assessments and quantitative analyses, including sensitivity, timeline and case study analyses, were conducted to evaluate existing processes and rank capability gaps. This paper describes the approach and results from this front-end systems analysis.

  4. Indirect plant defense against insect herbivores: a review.

    PubMed

    Aljbory, Zainab; Chen, Ming-Shun

    2018-02-01

    Plants respond to herbivore attack by launching 2 types of defenses: direct defense and indirect defense. Direct defense includes all plant traits that increase the resistance of host plants to insect herbivores by affecting the physiology and/or behavior of the attackers. Indirect defense includes all traits that by themselves do not have significant direct impact on the attacking herbivores, but can attract natural enemies of the herbivores and thus reduce plant loss. When plants recognize herbivore-associated elicitors, they produce and release a blend of volatiles that can attract predators, parasites, and other natural enemies. Known herbivore-associated elicitors include fatty acid-amino acid conjugates, sulfur-containing fatty acids, fragments of cell walls, peptides, esters, and enzymes. Identified plant volatiles include terpenes, nitrogenous compounds, and indoles. In addition, constitive traits including extrafloral nectars, food bodies, and domatia can be further induced to higher levels and attract natural enemies as well as provide food and shelter to carnivores. A better understanding of indirect plant defense at global and componential levels via advanced high throughput technologies may lead to utilization of indirect defense in suppression of herbivore damage to plants. © 2016 Institute of Zoology, Chinese Academy of Sciences.

  5. Standing Committee on Defense Materials, Manufacturing, and Infrastructure

    DTIC Science & Technology

    2012-02-06

    advanced materials and processes used in GE’s aeronautical turbine engines and their marine and industrial derivatives. He oversees Materials...DOD to play technologically to assist the industry in smoothing out “rough edges” of initial production. For example, if DOD chooses to use Defense...to critical and strategic materials availability has not kept pace. In addition, the ability of US industry and the defense industrial base to

  6. 32 CFR 1602.4 - Area office.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Area office. 1602.4 Section 1602.4 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM DEFINITIONS § 1602.4 Area office. The Selective Service Office which is responsible for all administrative and operational support...

  7. Next Generation Nuclear Plant Defense-in-Depth Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This papermore » includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.« less

  8. Neural substrates of defensive reactivity in two subtypes of specific phobia

    PubMed Central

    Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I.; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-01-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5–10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. PMID:24174207

  9. Manufacturing Innovation and Technological Superiority

    DTIC Science & Technology

    2016-09-01

    Defense AT&L: September-October 2016 2 From the Under Secretary of Defense for Acquisit ion, Technology, and Logist ics Manufacturing Innovation ...program to establish Manufacturing Innovation Institutes (MIIs) that would create incubators for advanced manufacturing technology in key

  10. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  11. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  12. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  13. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  14. MTBE TREATMENT TECHNOLOGIES DEMONSTRATION PROJECTS

    EPA Science Inventory

    The NRMRL, in collaboration with the State of California, and Department of Defense research program (ESTCP) is hosting a field-scale evaluation of cleanup technologies at the Department of Defense National Environmental Technology Test Site at Port Hueneme California. EPA has ...

  15. IT-Adventures: A Program to Spark IT Interest in High School Students Using Inquiry-Based Learning with Cyber Defense, Game Design, and Robotics

    ERIC Educational Resources Information Center

    Rursch, Julie A.; Luse, Andy; Jacobson, Doug

    2010-01-01

    The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…

  16. 31 CFR 800.209 - Critical technologies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical technologies. 800.209..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.209 Critical technologies. The term critical technologies means: (a) Defense articles or defense services covered by the United States Munitions List (USML...

  17. An Illustrative Case Study for Twentieth Century Defense Planners: The Technology and Politics of United States Coastal Defense, 1880-1898.

    DTIC Science & Technology

    1980-04-24

    plunging fire on the armored decks of attacking ships. Some inventors and technicians would propose increased use of submarine mines and torpedoes for...and mines , see "The Defense of Our Sea-Ports," Harper’s Weekly 71 (November 1885): 928-930 and the "Endicott Report," p. 97; for the Navy’s role, see...urgently re- quired, the character and kind of defenses best adapted for each, with reference to armament [and] the utilization of torpedoes, mines

  18. Defense Acquisition Research Journal. Volume 20, Number 2, Issue 66, July 2013

    DTIC Science & Technology

    2013-07-01

    Wirthlin Air Force Institute of Technology Dr. Roy Wood Defense Acquisition University The Defense Acquisition Research Journal, formerly the Defense...of an Economic Price Adjustment Clause to the Government Scot Arnold, Bruce Harmon, Susan Rose, and John Whitley An Economic Price Adjustment (EPA...Adjustment (EPA) Clauses, Risk, Target Fee Valuing the Cost of an Economic Price Adjustment Clause to the Government Scot Arnold, Bruce Harmon, Susan

  19. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    NASA Technical Reports Server (NTRS)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  20. The role of the Department of Defense in PACS and telemedicine research and development.

    PubMed

    Mogel, Greg T

    2003-01-01

    The United States Department of Defense (DOD) has played a leading role in the movement of digital imaging, picture archiving and communications systems, and more recently telemedicine with its associated technologies into the mainstream of healthcare. Beginning in the 1980s with domestic implementations, and followed in the 1990s by both small and large-scale military deployments, these technologies have been put into action with varying degrees of success. These efforts however, have always served as a guidepost for similar civilian efforts and the establishment of a marketplace for the technologies. This paper examines the history of the DOD's role in these areas, the projects and programs established, assessing their current state of development and identifying the future direction of the DOD's research and implementation efforts in telemedicine and advanced medical technologies. Copyright 2002 Published by Elsevier Science Ltd.

  1. Six Information Technology Services Contracts for the Defense Intelligence Community

    DTIC Science & Technology

    2000-04-24

    This category covers Defense Intelligence Community organizations whose mission is to provide for the planning, development, deployment, operation ... management , and oversight of global information networks and infrastructure supporting intelligence producers. • Information Systems. This category

  2. Role of defense/stress-related marker genes, proteins and secondary metabolites in defining rice self-defense mechanisms.

    PubMed

    Jwa, Nam-Soo; Agrawal, Ganesh Kumar; Tamogami, Shigeru; Yonekura, Masami; Han, Oksoo; Iwahashi, Hitoshi; Rakwal, Randeep

    2006-01-01

    Rice, a first cereal crop whose draft genome sequence from two subspecies (japonica-type cv. Nipponbare and indica-type 93-11) was available in 2002, along with its almost complete genome sequence in 2005, has drawn the attention of researchers worldwide because of its immense impact on human existence. One of the most critical research areas in rice is to discern the self-defense mechanism(s), an innate property of all living organisms. The last few decades have seen scattered research into rice responses to diverse environmental stimuli and stress factors. Our understanding on rice self-defense mechanism has increased considerably with accelerated research during recent years mainly due to identification and characterization of several defense/stress-related components, genes, proteins and secondary metabolites. As these identified components have been used to study the defense/stress pathways, their compilation in this review will undoubtedly help rice (and others) researchers to effectively use them as a potential marker for better understanding, and ultimately, in defining rice (and plant) self-defense response pathways.

  3. Collaborative Information Technology Center (CITC) for Rural Areas.

    ERIC Educational Resources Information Center

    Fontenot, Dean; Driskill, David A.

    The digital divide remains a formidable issue in rural areas where the only broadband access to the Internet may be at public schools or city governments. As the only locations in rural areas with adequate technological resources, schools, libraries, health facilities, and agricultural extension facilities can be places where citizens learn about…

  4. Legal interfaces in telemedicine technology.

    PubMed

    Lott, C M

    1996-05-01

    Telemedicine, an emerging technology which seeks to use advanced telecommunications equipment to enhance medical care, is progressing rapidly in the Department of Defense health care delivery system. This paper recommends that a cautious, preventive law approach be simultaneously initiated to ensure that the technology does not abridge patients' rights to confidentiality or security of medical records, and that agreement on practice parameters be developed. Seven interfaces, in the areas of informed consent, physician liability, non-physician liability, costs, practice parameters, physician-patient relationships, and ergonomics, are discussed in the context of telemedicine. The author recommends that telemedicine pioneers include the legal community's early input in the application of telemedicine technology to help avoid needless litigation.

  5. Network Speech Systems Technology Program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1980-09-01

    This report documents work performed during FY 1980 on the DCA-sponsored Network Speech Systems Technology Program. The areas of work reported are: (1) communication systems studies in Demand-Assignment Multiple Access (DAMA), voice/data integration, and adaptive routing, in support of the evolving Defense Communications System (DCS) and Defense Switched Network (DSN); (2) a satellite/terrestrial integration design study including the functional design of voice and data interfaces to interconnect terrestrial and satellite network subsystems; and (3) voice-conferencing efforts dealing with support of the Secure Voice and Graphics Conferencing (SVGC) Test and Evaluation Program. Progress in definition and planning of experiments for the Experimental Integrated Switched Network (EISN) is detailed separately in an FY 80 Experiment Plan Supplement.

  6. Neural substrates of defensive reactivity in two subtypes of specific phobia.

    PubMed

    Lueken, Ulrike; Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-11-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5-10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  7. Research on moving target defense based on SDN

    NASA Astrophysics Data System (ADS)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  8. 32 CFR 1605.51 - Area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Area. 1605.51 Section 1605.51 National Defense... ORGANIZATION Local Boards § 1605.51 Area. (a) The Director of Selective Service shall divide each State into local board areas and establish local boards. There shall be at least one local board in each county...

  9. 32 CFR 1605.51 - Area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Area. 1605.51 Section 1605.51 National Defense... ORGANIZATION Local Boards § 1605.51 Area. (a) The Director of Selective Service shall divide each State into local board areas and establish local boards. There shall be at least one local board in each county...

  10. 32 CFR 1605.51 - Area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Area. 1605.51 Section 1605.51 National Defense... ORGANIZATION Local Boards § 1605.51 Area. (a) The Director of Selective Service shall divide each State into local board areas and establish local boards. There shall be at least one local board in each county...

  11. 32 CFR 1605.51 - Area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Area. 1605.51 Section 1605.51 National Defense... ORGANIZATION Local Boards § 1605.51 Area. (a) The Director of Selective Service shall divide each State into local board areas and establish local boards. There shall be at least one local board in each county...

  12. 32 CFR 1605.51 - Area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Area. 1605.51 Section 1605.51 National Defense... ORGANIZATION Local Boards § 1605.51 Area. (a) The Director of Selective Service shall divide each State into local board areas and establish local boards. There shall be at least one local board in each county...

  13. Defense Technology Objectives of the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan.

    DTIC Science & Technology

    1997-01-01

    isolated targets, significantly reduce false alarms ( PFA = 0.01/km2), and recognize force structure (e.g., maneuver battalions). During FY97, a laboratory...probability of false alarm ( Pfa ) of 0.3 at an altitude of 500-1,000 ft and at airspeeds of 60-100 kn is planned. Enhanced COBRA optics-including a...hibiting the desired properties and initiate agent sorption assessments. The FY00 goal is to com- plete performance evaluations of candidate

  14. Unmanned and Unattended Response Capability for Homeland Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologiesmore » supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.« less

  15. Hybrid Network Defense Model Based on Fuzzy Evaluation

    PubMed Central

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870

  16. Hybrid network defense model based on fuzzy evaluation.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  17. Defense Acquisitions: How and Where DOD Spends and Reports Its Contracting Dollars

    DTIC Science & Technology

    2016-12-20

    Sargent Jr. Specialist in Science and Technology Policy Gabriel M. Nelson Research Assistant Ceir Coral National Defense Fellow December 20, 2016......Congressional Research Service Summary The Department of Defense (DOD) has long relied on contractors to provide the U.S. military with a wide range

  18. 78 FR 17186 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... Requirements for Critical Safety Items AGENCY: Defense Acquisition Regulations System, Department of Defense... of the burden of the proposed information collection; (c) ways to enhance the quality, utility, and... technology. The Office of Management and Budget (OMB) has approved this information collection for use...

  19. The Full Costs of Ballistic Missile Defense

    DTIC Science & Technology

    2003-01-01

    following words: “We assess that countries developing ballistic missiles would also develop various responses to US theater and national defenses. Russia...and China each have developed numerous countermeasures and probably are willing to sell the requisite technologies. • Many countries , such as North...penetration aids and countermeasures. • These countries could develop countermeasures based on these technologies by the time they flight test their missiles

  20. Defense Trade. Clarification and More Comprehensive Oversight of Export Exemptions Certified by DOD Are Needed

    DTIC Science & Technology

    2007-09-01

    Identified in DTSA Guidelines for Military Service Certification and ITAR Exemption Description 8 Table 2: GAO Analysis of DOD Exemption... DTSA Defense Technology Security Administration ITAR International Traffic in Arms Regulations NATO North Atlantic Treaty Organization This is...and friendly nations. To clarify exemption use, DOD’s Defense Technology Security Administration ( DTSA )—which is responsible for developing and

  1. Offense-Defense Theory Analysis of Russian Cyber Capability

    DTIC Science & Technology

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  2. Discrete Event Simulation of a Suppression of Enemy Air Defenses (SEAD) Mission

    DTIC Science & Technology

    2008-03-01

    component-based DES developed in Java® using the Simkit simulation package. Analysis of ship self air defense system selection ( Turan , 1999) is another...Institute of Technology, Wright-Patterson AFB OH, March 2003 (ADA445279 ) Turan , Bulent. A Comparative Analysis of Ship Self Air Defense (SSAD) Systems

  3. Overview of Accelerator Applications for Security and Defense

    DOE PAGES

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  4. Philosophical Scrutiny of the Strategic Defense Initiatives.

    ERIC Educational Resources Information Center

    Schonsheck, Jonathan

    1986-01-01

    Analyzes three Strategic Defense Initiative (SDI) proposals, and argues that only the least technologically feasible variant (the AstroAtmosOceanDome conception) can be judged morally superior to old-fashioned "we'll kill you if you kill us" deterrence ideas. (JDH)

  5. Application and the key technology on high power fiber-optic laser in laser weapon

    NASA Astrophysics Data System (ADS)

    Qu, Zhou; Li, Qiushi; Meng, Haihong; Sui, Xin; Zhang, Hongtao; Zhai, Xuhua

    2014-12-01

    The soft-killing laser weapon plays an important role in photoelectric defense technology. It can be used for photoelectric detection, search, blinding of photoelectric sensor and other devices on fire control and guidance devices, therefore it draws more and more attentions by many scholars. High power fiber-optic laser has many virtues such as small volume, simple structure, nimble handling, high efficiency, qualified light beam, easy thermal management, leading to blinding. Consequently, it may be used as the key device of soft-killing laser weapon. The present study introduced the development of high power fiber-optic laser and its main features. Meanwhile the key technology of large mode area (LMA) optical fiber design, the beam combination technology, double-clad fiber technology and pumping optical coupling technology was stated. The present study is aimed to design high doping LMA fiber, ensure single mode output by increasing core diameter and decrease NA. By means of reducing the spontaneous emission particle absorbed by fiber core and Increasing the power density in the optical fiber, the threshold power of nonlinear effect can increase, and the power of single fiber will be improved. Meantime, high power will be obtained by the beam combination technology. Application prospect of high power fiber laser in photoelectric defense technology was also set forth. Lastly, the present study explored the advantages of high power fiber laser in photoelectric defense technology.

  6. 2011 Joint Program Executive Office for Chemical and Biological Defense Advance Planning Briefing for Industry (APBI) Held in Baltimore, Maryland on September 7-9, 2011

    DTIC Science & Technology

    2011-09-09

    Chemical and Biological Defense Defense Threat Reduction Agency (DTRA)/Joint Science & Technology Office (JSTO) Dr. Alan Rudolph , Director, Chemical...Mr. Douglas W. Bryce 9:05 am – 9:45 am Dr. Alan Rudolph Director, Chemical and Biological Technologies Directorate, Defense Threat Reduction...Joint Science and Technology Office for Chemical and Biological Defense Dr. Alan S. Rudolph Mr. David K. Grimm Acting Heidi Shyu Joint Combat

  7. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    PubMed

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  8. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    DTIC Science & Technology

    2007-12-01

    overhead costs. Also in 1993, Norman R. Augustine, then CEO of Lockheed Martin, headed an effort involving other major defense industry executives...name programs, Lockheed Chairman Norman Augustine could only name one (Pearlstein, 14 July 1997). A GAO study looked into one method that...latest technology could, essential, resort to monopolistic practices of market and cost control. Kovacic and Smallwood , in an analysis of defense

  9. Detection technique of targets for missile defense system

    NASA Astrophysics Data System (ADS)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  10. Cyber-Defense Return on Investment for NAVFAC Energy Technologies

    DTIC Science & Technology

    2017-12-01

    Stakeholder input is important to properly develop a tool that reflects the legitimate concerns of those who routinely design , operate, and use control ...cybersecurity results with no control system network connectivity at all. Both are extreme scenarios, unless electrical engineers can design a...support of a Department of Defense (DOD) effort to improve cyber- security in relation to DOD installation control systems. Space and Naval Warfare

  11. Defense Labs: The Innovation Engine for Sustaining Our Quality Edge

    DTIC Science & Technology

    2015-10-01

    LRRDPP) and, more broadly, the Defense Innovation Initiative ( DII ), aim to shape these investments by pursuing leap-ahead technologies that give us...this advantage. The DII supports the first pillar of the Force of the Future, Com- petitiveness through Technological and Operational Supe- riority

  12. Managing U.S. Military Technology and Arms Release Policy to Israel

    DTIC Science & Technology

    2009-04-01

    in the world. In accordance with the laws governing defense export, the Defense Technology Security Administration ( DTSA ) is chartered to be the...Marines, Air Force) Defense Technology Security Administration ( DTSA ) Figure 1. U.S. Defense Technology Trade Key Players Most of the U.S. laws...within each military establishment that lend themselves to the necessary collaboration. For the U.S., the DoD’s DTSA would be the appropriate

  13. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, E.; Antkowiak, M.; Butt, R.

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less

  14. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  15. Applications of the Strategic Defense Initiative's compact accelerators

    NASA Technical Reports Server (NTRS)

    Montanarelli, Nick; Lynch, Ted

    1991-01-01

    The Strategic Defense Initiative's (SDI) investment in particle accelerator technology for its directed energy weapons program has produced breakthroughs in the size and power of new accelerators. These accelerators, in turn, have produced spinoffs in several areas: the radio frequency quadrupole linear accelerator (RFQ linac) was recently incorporated into the design of a cancer therapy unit at the Loma Linda University Medical Center, an SDI-sponsored compact induction linear accelerator may replace Cobalt-60 radiation and hazardous ethylene-oxide as a method for sterilizing medical products, and other SDIO-funded accelerators may be used to produce the radioactive isotopes oxygen-15, nitrogen-13, carbon-11, and fluorine-18 for positron emission tomography (PET). Other applications of these accelerators include bomb detection, non-destructive inspection, decomposing toxic substances in contaminated ground water, and eliminating nuclear waste.

  16. 32 CFR Appendix A to Subpart M of... - DPCA Recreational Areas in Training Areas

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Appendix A to Subpart M of Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE... Policy for Fort Lewis, Yakima Training Center, and Camp Bonneville Pt. 552, Subpt. M, App. A Appendix A to Subpart M of Part 552—DPCA Recreational Areas in Training Areas 1. This listing applies to Fort...

  17. 32 CFR Appendix A to Subpart M of... - DPCA Recreational Areas in Training Areas

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Appendix A to Subpart M of Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE... Policy for Fort Lewis, Yakima Training Center, and Camp Bonneville Pt. 552, Subpt. M, App. A Appendix A to Subpart M of Part 552—DPCA Recreational Areas in Training Areas 1. This listing applies to Fort...

  18. Under Secretary of Defense for Policy > OUSDP Offices > ASD for

    Science.gov Websites

    cooperation programs and foreign military sales programs in these regions. Responsibilities and Functions The defense establishments; and for oversight of security cooperation programs and foreign military sales all foreign governments in assigned areas of responsibility. Develop regional security and defense

  19. Defense Programs benchmarking in Chicago, April 1994: Identifying best practices in the pollution prevention programs of selected private industries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-12-01

    The Office of Defense Programs (DP) was the first US Department of Energy (DOE) Cognizant Secretarial Office (CSO) to attempt to benchmark private industries for best-in-class practices in the field of pollution prevention. Defense Programs` intent in this effort is to identify and bring to DOE field offices strategic and technological tools that have helped private companies minimize waste and prevent pollution. Defense Programs` premier benchmarking study focused on business practices and process improvements used to implement exceptional pollution prevention programs in four privately owned companies. The current interest in implementing partnerships information exchange, and technology transfer with the privatemore » sector prompted DP to continue to seek best practices in the area of pollution prevention through a second benchmarking endeavor in May 1994. This report presents the results of that effort. The decision was made to select host facilities that own processes similar to those at DOE plants and laboratories, that have programs that have been recognized on a local or national level, that have an interest in partnering with the Department on an information-sharing basis, and that are located in proximity to each other. The DP benchmarking team assessed the pollution prevention programs of five companies in the Chicago area--GE Plastics, Navistar, Northrop Corporation, Sundstrand and Caterpillar. At all facilities visited, Ozone Depleting Compounds (ODCs), hazardous wastes, releases under the Superfund Amendments and Reauthorization Act (SARA), waste water and non-hazardous wastes are being eliminated, replaced, reduced, recycled and reused whenever practicable.« less

  20. Assessment of Industry Attitudes on Collaborating With the U.S. Department of Defense in Research and Technology Sharing

    DTIC Science & Technology

    2003-08-01

    The following chart shows the motivational factors companies reported for non- defense federal agencies and labs. Motivation to Communicate with...programs to the Department of Defense. Note the similar profile, but difference in magnitude between defense and non-defense contractors. 35 Motivation to Communicate with

  1. Multi-Objective Optimization of System Capability Satisficing in Defense Acquisition

    DTIC Science & Technology

    2012-04-30

    sponsored by the USD(AT&L). Second, we issue an annual internal call for proposals to seek NPS faculty research supporting the interests of our...program sponsors. Finally, we serve as a “broker” to market specific research topics identified by our sponsors to NPS graduate students. This three...expanding the technology readiness level within defense acquisition. International Journal of Defense Acquisition Management, 1, 39–58. Tan, W

  2. 75 FR 32638 - Defense Federal Acquisition Regulation Supplement; Contract Authority for Advanced Component...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... Prototype Units (DFARS Case 2009-D034) AGENCY: Defense Acquisition Regulations System, Department of Defense... Component Development or Prototype Units.'' Section 819 is intended to prevent a contract for new technology... development of advanced components or the procurement of prototype units. To do so, section 819 places...

  3. Suggestions for Maintaining Educational Technology Programs in Hard-Pressed Areas.

    ERIC Educational Resources Information Center

    Greene, John W.

    1984-01-01

    Discusses personnel development and inexpensive sources of equipment needed for successful educational technology programs in economically hard-pressed areas in the United States and in Third World countries. Surveys future technological trends and stresses need for planning and foresight. (CJM)

  4. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bos, Nathan; Paul, Celeste; Gersh, John

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one ofmore » two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.« less

  5. [Brazilian technological output in the area of nursing: advances and challenges].

    PubMed

    Koerich, Micheline Henrique Araujo da Luz; Vieira, Raquel Heloisa Guedes; Silva, Daniela Eda; Erdmann, Alacoque Lorenzini; Meirelles, Betina Horner Shlindwein

    2011-12-01

    This article aims to analyze the patents registered in the nursing area, since these patents may be used as an indicator of the technological development in the area. It presents and discusses national technological productions, tracked through the "nursing" keyword, patented in the period from 1990-2009. This is a retrospective documental research, using, as a source, data from the National Industrial Property Institute (INPI). The information gathered is discussed in relation to the appropriation of the technologies, the incentive to develop them and register them as a source of knowledge in the nursing field, aiming the practice of care. Light and light hard technology productions are increasing in the nursing field. However, these are not registered and patented. The technological advance in the nursing field is emergent and needs policies for its development.

  6. Improving The Prototyping Process In Department Of Defense Acquisition

    DTIC Science & Technology

    2014-06-01

    System Flow Chart ................................................. 39 Figure 13. TRL Definitions (from ASD [R&E] 2011... ASD (R&E) Assistant Secretary of Defense for Research and Engineering BCL Business Capability Life cycle CDD Capability Development Document CDR...TRL 6 cannot be attained until the technology has been demonstrated in a relevant operational environment ( ASD [R&E] 2011). A technology that has

  7. Defense Primer: The National Defense Budget Function (050)

    DTIC Science & Technology

    2017-03-17

    in parenthesis). This defense primer addresses the National Defense Budget (050), which is frequently used to explain trends in military spending...but which also includes some activities not conducted by the Department of Defense. What Is the Purpose of the Budget Function System? The budget

  8. Investment decisions with the social and environmental impacts of new technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, D.A.C.

    1985-01-01

    The purpose of this study was to analyze technology assessment from a finance point of view. Specifically, the study investigated the opinions of firms in the chemical, the computer, and the pharmaceutical industries on technology assessment and the practices they currently use. In addition, it examined the effect of these practices on the financial performances of the firms. Results indicated that the accountability of the firm is the primary explanation for (1) the firm's perceived feasibility of assessing the impacts of new technology, and (2) the firm's emphasis of those impacts in its investment decision. Technology assessment was seen asmore » beneficial because it helped to identify areas of financial and market exposure and to stay in legal compliance. The firms indicated a mistrust of the public and the government. The technology assessment methods used confirmed that assessment is performed as a defensive action. Firms establish the relative importance of their impacts based on the punishment they might face for neglecting them (e.g., government penalties). Likewise, the most selected method of identifying impacts (determining whether the technology will meet government regulation) displays defensiveness.« less

  9. Evaluation of wireless Local Area Networks

    NASA Astrophysics Data System (ADS)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  10. Grumman and SDI-related technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, B.

    1985-01-01

    The application of Grumman Corporation's aerospace and nuclear fusion technology to the Strategic Defense Initiative (SDI) program has taken place in at least five major areas. These include infrared boost surveillance and tracking to detect intercontinental ballistic missiles just after launch, space-based radar, neutral particle beam platforms, nuclear electric power and propulsion units in space, and battle management systems. The author summarizes developments in each of these areas to illustrate how Grumman has responded to the request that the scientific and industrial communities pursue innovative, high-risk concepts involving materials, structures, space power, space physics, and kinetic energy weapon concepts. 3more » figures.« less

  11. Abstract - Cooperative Research and Development Agreement between Environmental Defense Fund and National Energy Technology Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rose, Kelly K.; Zavala-Zraiza, Daniel

    Here, we summarize an effort to develop a global oil and gas infrastructure (GOGI) taxonomy and geodatabase, using a combination of big data computing, custom search and data integration algorithms, and expert driven spatio-temporal analytics to identify, access, and evaluate open oil and gas data resources and uncertainty trends worldwide. This approach leveraged custom National Energy Technology Laboratory (NETL) tools and capabilities in collaboration with Environmental Defense Fund (EDF) and Carbon Limits subject matter expertise, to identify over 380 datasets and integrate more than 4.8 million features into the GOGI database. In addition to acquisition of open oil and gasmore » infrastructure data, information was collected and analyzed to assess the spatial, temporal, and source quality of these resources, and estimate their completeness relative to the top 40 hydrocarbon producing and consuming countries.« less

  12. Antiviral Defenses in Plants through Genome Editing

    PubMed Central

    Romay, Gustavo; Bragard, Claude

    2017-01-01

    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  13. Schools Enlisting Defense Industry to Boost STEM

    ERIC Educational Resources Information Center

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  14. Analysis of Land Subsidence Monitoring in Mining Area with Time-Series Insar Technology

    NASA Astrophysics Data System (ADS)

    Sun, N.; Wang, Y. J.

    2018-04-01

    Time-series InSAR technology has become a popular land subsidence monitoring method in recent years, because of its advantages such as high accuracy, wide area, low expenditure, intensive monitoring points and free from accessibility restrictions. In this paper, we applied two kinds of satellite data, ALOS PALSAR and RADARSAT-2, to get the subsidence monitoring results of the study area in two time periods by time-series InSAR technology. By analyzing the deformation range, rate and amount, the time-series analysis of land subsidence in mining area was realized. The results show that InSAR technology could be used to monitor land subsidence in large area and meet the demand of subsidence monitoring in mining area.

  15. NATO Enlargement 2000 - 2015. Implications for Defense Planning

    DTIC Science & Technology

    2001-01-01

    alliance, while reaffirming its commitment to the collective defense of its members, expanded its mission to include conflict prevention and conflict ... management throughout Europe, including areas outside the boundaries of the NATO treaty area. Both NATO’s enlargement and its transformation have been

  16. Passive automatic anti-piracy defense system of ships

    NASA Astrophysics Data System (ADS)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  17. Information Technology Exchange Program (ITEP) - U.S. Department of Defense

    Science.gov Websites

    Skip to main content (Press Enter). Toggle navigation Chief Information Officer Search Search Chief Information Officer: Search Search Chief Information Officer: Search Chief Information Officer U.S. Department of Defense Chief Information Officer Home About DoD CIO Bios Organization DCIO C4&IIC DCIO IE

  18. Ground-Based Missile Defense (National Missile Defense): Is It Feasible?

    DTIC Science & Technology

    2004-03-19

    Westview Press), 191. 47 Ibid. 192. 48 Dr. Nicholas Berry, National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia...153. 18 19 BIBLIOGRAPHY Berry, Nicholas. National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia, Center for

  19. Neuromodulation research and application in the U.S. Department of Defense.

    PubMed

    Nelson, Jeremy T; Tepe, Victoria

    2015-01-01

    Modern neuromodulatory techniques for military applications have been explored for the past decade, with an intent to optimize operator performance and, ultimately, to improve overall military effectiveness. In light of potential military applications, some researchers have voiced concern about national security agency involvement in this area of research, and possible exploitation of research findings to support military objectives. The aim of this article is to examine the U.S. Department of Defense's interest in and application of neuromodulation. We explored articles, cases, and historical context to identify critical considerations of debate concerning dual use (i.e., national security and civilian) technologies, specifically focusing on non-invasive brain stimulation (NIBS). We review the background and recent examples of DoD-sponsored neuromodulation research, framed in the more general context of research that aims to optimize and/or rehabilitate human performance. We propose that concerns about military exploitation of neuromodulatory science and technology are not unique, but rather are part of a larger philosophic debate pertaining to military application of human performance science and technology. We consider unique aspects of the Department of Defense research enterprise--which includes programs crucial to the advancement of military medicine--and why it is well-situated to fund and perform such research. We conclude that debate concerning DoD investment in human performance research must recognize the significant potential for dual use (civilian, medical) benefit as well as the need for civilian scientific insight and influence. Military interests in the health and performance of service members provide research funding and impetus to dual use applications that will benefit the civilian community. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Emerging Technologies and Techniques for Wide Area Radiological Survey and Remediation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sutton, M.; Zhao, P.

    2016-03-24

    Technologies to survey and decontaminate wide-area contamination and process the subsequent radioactive waste have been developed and implemented following the Chernobyl nuclear power plant release and the breach of a radiological source resulting in contamination in Goiania, Brazil. These civilian examples of radioactive material releases provided some of the first examples of urban radiological remediation. Many emerging technologies have recently been developed and demonstrated in Japan following the release of radioactive cesium isotopes (Cs-134 and Cs-137) from the Fukushima Dai-ichi nuclear power plant in 2011. Information on technologies reported by several Japanese government agencies, such as the Japan Atomic Energymore » Agency (JAEA), the Ministry of the Environment (MOE) and the National Institute for Environmental Science (NIES), together with academic institutions and industry are summarized and compared to recently developed, deployed and available technologies in the United States. The technologies and techniques presented in this report may be deployed in response to a wide area contamination event in the United States. In some cases, additional research and testing is needed to adequately validate the technology effectiveness over wide areas. Survey techniques can be deployed on the ground or from the air, allowing a range of coverage rates and sensitivities. Survey technologies also include those useful in measuring decontamination progress and mapping contamination. Decontamination technologies and techniques range from non-destructive (e.g., high pressure washing) and minimally destructive (plowing), to fully destructive (surface removal or demolition). Waste minimization techniques can greatly impact the long-term environmental consequences and cost following remediation efforts. Recommendations on technical improvements to address technology gaps are presented together with observations on remediation in Japan.« less

  1. Assistant Secretary of Defense for Homeland Defense and Global Security

    Science.gov Websites

    Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland

  2. The Department of Defense Chemical and Biological Defense Program: An Enabler of the Third Offset Strategy.

    PubMed

    Roos, Jason; Chue, Calvin; DiEuliis, Diane; Emanuel, Peter

    The US Department of Defense (DOD) established programs to defend against chemical and biological weapons 100 years ago because military leaders understood that the operational capability of the US military is diminished when service member health is compromised. These threats to operational readiness can be from an overt attack using chemical and biological threats but may also arise from natural exposures. In the current era of rapidly emerging technologies, adversaries are not only rediscovering chemical and biological weapons; they are also displaying an increased propensity to employ them to cause strategic instability among deployed forces or nations undergoing conflict. The United States's investments in its Chemical and Biological Defense Program (CBDP) can be a critical enabler of the third offset strategy, which is a DOD initiative that seeks to maximize force capability to offset emerging threats. To realize this vision, the CBDP must make fundamental changes in acquiring and employing effective technologies so that enemy use of chemical and biological agents against US assets is no longer a viable option. Maximization of US force health status will provide a strategic advantage over theater opponents more vulnerable to operational degradation from chemical and biological threats.

  3. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    ERIC Educational Resources Information Center

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  4. Awareness and using of medical students about mobile health technology in clinical areas.

    PubMed

    Ehteshami, Asghar; Hachesu, Peyman Rezaei; Esfahani, Mahtab Kasayi; Rezazadeh, Esmaeil

    2013-01-01

    NONE DECLARED. Necessity of data transmission and getting contact with specialists is so evident in impassable regions. In order to solve such problems, there are different solutions one of which is mobile health technology. Being small and user-friendly, easy to enter data and having low expense are some of its advantages. This study aims to define the association between awareness of medical students in clinical stage about mobile health technology application and the rate of their using this technology in educational hospital of Isfahan in 2011. The study is a cross-sectional analytical application research. Sixty medical students were selected as samples from a society of 240 medical students. A researcher-made questionnaire was used. The questionnaire included 21 multiple choice and 15 yes no questions, which were corrected to reach a score. A researcher-made checklist with 5-fold Likert scale was used to define the rate of applying such technology. The reliability of questionnaire was confirmed through a test-retest. The collected data were analyzed with the help of SPSS software in descriptive and deductive statistics level. The highest percentage of awareness about mobile health technology among medical students in the clinical stage of Azzahra educational hospital is 45.6 in nature areas, and their lowest percentage of awareness is 17.8 in the infrastructure area. In addition, their mean awareness of all areas is 54.4. The highest percentage of using mobile health technology by medical students is 14.6 in the education area, and their lowest percentage of usage is 6.8 in the treatment area. Their mean usage of all areas is 9.4 as well. The rate of awareness and application of mobile health technology is not favorable. Except for treatment, there is no significant association between the rate of awareness and application of mobile health technology.

  5. Study of the measurement of defense style using Bond's Defense Style Questionnaire.

    PubMed

    Nishimura, R

    1998-08-01

    Two hundred and seventy healthy university students were surveyed in December 1995 using Bond's Defense Style Questionnaire (DSQ) to measure the subjects' defense mechanisms. At the same time, a survey using Byrne's R-S Scale (Repression-Sensitization Scale) of the MMPI (Minnesota multiphasic personality inventory) and five psychiatric symptom indexes (anxiety, sense of inadequacy, sensitivity, depression and impulsive anger) selected from the CMI (Cornell Medical Index-Health Questionnaire) was conducted. Three factors were extracted from the DSQ through factor analysis: immature defenses, neurotic defenses, and mature defenses. The results of analysis of variance revealed the following: (i) for anxiety and anxiety related symptoms, both immature defenses and neurotic defenses indicated principal effect; (ii) for impulsive anger and depression, immature defenses presented principal effect; and (iii) for sensitivity and impulsive anger, interaction between a mature defense style and neurotic defense style was noted. The relationship between defense styles and psychiatric symptoms in healthy people is studied in this paper.

  6. Defense.gov Special Report: Travels With Carter

    Science.gov Websites

    . Story Carter Visits Silicon Valley Companies to Enhance DoD Technology Innovation Defense Secretary Ash innovation found in that part of the nation. Story Carter Seeks Tech-sector Partnerships During Two-day the highest-tech companies in one of the nation's innovation hotspots. Story Secretary's Silicon

  7. Report of the Defense Science Board Task Force on University Responsiveness to National Security Requirements.

    DTIC Science & Technology

    1982-01-01

    R.ugustine Chairman iv OFFICE OF THE SECRETARY OF DEFENSE WASHINGTON, D.C. 20301 27 January 1982 DEFENSE SCIENCIE BOARD Mr. Norman R. Augustine Chai rman...Institute of Technology Dr. Norman Hackerman President Rice University Dr. Richard L. Haley Assistant Deputy Science and Technology USA Material ...Biological and Medical Sciences 51.8 67.8 22% Materials 53.2 65.1 13% Chemistry 47.8 60.1 17% Math and Computer Sciences 44.2 53.6 12% Oceanography 43.2

  8. Benefit Estimates of Terminal Area Productivity Program Technologies

    NASA Technical Reports Server (NTRS)

    Hemm, Robert; Shapiro, Gerald; Lee, David; Gribko, Joana; Glaser, Bonnie

    1999-01-01

    This report documents benefit analyses for the NASA Terminal Area Technology (TAP) technology programs. Benefits are based on reductions in arrival delays at ten major airports over the 10 years from 2006 through 2015. Detailed analytic airport capacity and delay models were constructed to produce the estimates. The goal of TAP is enable good weather operations tempos in all weather conditions. The TAP program includes technologies to measure and predict runway occupancy times, reduce runway occupancy times in bad weather, accurately predict wake vortex hazards, and couple controller automation with aircraft flight management systems. The report presents and discusses the estimate results and describes the models. Three appendixes document the model algorithms and discuss the input parameters selected for the TAP technologies. The fourth appendix is the user's guide for the models. The results indicate that the combined benefits for all TAP technologies at all 10 airports range from $550 to $650 million per year (in constant 1997 dollars). Additional benefits will accrue from reductions in departure delays. Departure delay benefits are calculated by the current models.

  9. An Approach to Establishing System Benefits for Technology in NASA's Hypersonics Investment Area

    NASA Technical Reports Server (NTRS)

    Hueter, Uwe; Pannell, Bill; Cook, Stephen (Technical Monitor)

    2001-01-01

    NASA's has established long term goals for access-to-space. The third generation launch systems are to be fully reusable and operational around 2025. The goals for the third generation launch system are to significantly reduce cost and improve safety over current systems. The Advanced Space Transportation Program (ASTP) Office at the NASA's Marshall Space Flight Center in Huntsville, AL has the agency lead to develop space transportation technologies. Within ASTP, under the Hypersonics Investment Area, third generation technologies are being pursued. The Hypersonics Investment Area's primary objective is to mature vehicle technologies to enable substantial increases in the design and operating margins of third generation RLVs (current Space Shuttle is considered the first generation RLV) by incorporating advanced propulsion systems, materials, structures, thermal protection systems, power, and avionics technologies. The paper describes the system process, tools and concepts used to determine the technology benefits. Preliminary results will be presented along with the current technology investments that are being made by ASTP's Hypersonics Investment Area.

  10. Home - Defense Technology Security Administration

    Science.gov Websites

    , engineering, and math (STEM) focused Girl Scout troops 2210 and 5064 into the Mark Center to showcase their to welcome science, technology, engineering, and math (STEM) focused Girl Scout troops 2210 and 5064

  11. Defense Drawdowns: Analysis with Implications

    DTIC Science & Technology

    2012-03-21

    increment of budget and personnel reductions, shared evenly across the services.”135 By 1994, with training, readiness and quality of life his top defense...security, this Administration is committed to achieving the reforms in military life as well as the public support for our Armed Forces which will...strengths in technology that spawned our great industrial base and that have given us the quality of life we enjoy today. What if free people could

  12. NASA Technology Area 07: Human Exploration Destination Systems Roadmap

    NASA Technical Reports Server (NTRS)

    Kennedy, Kriss J.; Alexander, Leslie; Landis, Rob; Linne, Diane; Mclemore, Carole; Santiago-Maldonado, Edgardo; Brown, David L.

    2011-01-01

    This paper gives an overview of the National Aeronautics and Space Administration (NASA) Office of Chief Technologist (OCT) led Space Technology Roadmap definition efforts. This paper will given an executive summary of the technology area 07 (TA07) Human Exploration Destination Systems (HEDS). These are draft roadmaps being reviewed and updated by the National Research Council. Deep-space human exploration missions will require many game changing technologies to enable safe missions, become more independent, and enable intelligent autonomous operations and take advantage of the local resources to become self-sufficient thereby meeting the goal of sustained human presence in space. Taking advantage of in-situ resources enhances and enables revolutionary robotic and human missions beyond the traditional mission architectures and launch vehicle capabilities. Mobility systems will include in-space flying, surface roving, and Extra-vehicular Activity/Extravehicular Robotics (EVA/EVR) mobility. These push missions will take advantage of sustainability and supportability technologies that will allow mission independence to conduct human mission operations either on or near the Earth, in deep space, in the vicinity of Mars, or on the Martian surface while opening up commercialization opportunities in low Earth orbit (LEO) for research, industrial development, academia, and entertainment space industries. The Human Exploration Destination Systems (HEDS) Technology Area (TA) 7 Team has been chartered by the Office of the Chief Technologist (OCT) to strategically roadmap technology investments that will enable sustained human exploration and support NASA s missions and goals for at least the next 25 years. HEDS technologies will enable a sustained human presence for exploring destinations such as remote sites on Earth and beyond including, but not limited to, LaGrange points, low Earth orbit (LEO), high Earth orbit (HEO), geosynchronous orbit (GEO), the Moon, near

  13. Emerging electro-optical technologies for defense applications

    NASA Astrophysics Data System (ADS)

    Venkateswarlu, Ronda; Ser, W.; Er, Meng H.; Chan, Philip

    1999-11-01

    Technological breakthroughs in the field of imaging and non- imaging sensor sand the related signal processors helped the military users to achieve 'force multiplication'. Present day 'smart-weapon systems' are being converted to 'brilliant-weapon systems' to bridge the gap until the most potent new 'fourth generation systems' come on line based on nanotechnology. The recent military tactics have evolved to take advantage of ever improving technologies to improve the quality and performance over time. The drive behind these technologies is to get a first-pass-mission-success against the target with negligible collateral damage, protecting property and the lives of non-combatants. These technologies revolve around getting target information, detection, designation, guidance, aim-point selection, and mission accomplishment. The effectiveness of these technologies is amply demonstrated during recent wars. This paper brings out the emerging trends in visible/IR/radar smart-sensors and the related signal processing technologies that lead to brilliant guided weapon systems. The purpose of this paper is to give an overview to the readers about futuristic systems. This paper also addresses various system configurations including sensor-fusion.

  14. Ballistic Missile Defense. Past and Future

    DTIC Science & Technology

    2010-04-01

    the Author” at the end of this book . x • Jacques S. Gansler even nuclear) are more likely than ballistic missile attacks, we should not waste ...Portions of this book may be quoted or reprinted without permission, provided that a standard source credit line is included...This book was published by the Center for Technology and National Security Policy, National Defense University, Fort Lesley J

  15. Technology Empowerment: Security Challenges.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  16. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  17. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  18. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  19. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  20. 22 CFR 120.44 - Foreign defense article or defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... defense service means any article or service described on the U.S. Munitions List of non-U.S. origin... U.S. and foreign origin defense articles and defense services described on the U.S. Munitions List...

  1. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  2. Awareness and Using of Medical Students About Mobile Health Technology in Clinical Areas

    PubMed Central

    Ehteshami, Asghar; Hachesu, Peyman Rezaei; Esfahani, Mahtab Kasayi

    2013-01-01

    CONFLICT OF INTEREST: NONE DECLARED Introduction Necessity of data transmission and getting contact with specialists is so evident in impassable regions. In order to solve such problems, there are different solutions one of which is mobile health technology. Being small and user-friendly, easy to enter data and having low expense are some of its advantages. This study aims to define the association between awareness of medical students in clinical stage about mobile health technology application and the rate of their using this technology in educational hospital of Isfahan in 2011. Method The study is a cross-sectional analytical application research. Sixty medical students were selected as samples from a society of 240 medical students. A researcher-made questionnaire was used. The questionnaire included 21 multiple choice and 15 yes no questions, which were corrected to reach a score. A researcher-made checklist with 5-fold Likert scale was used to define the rate of applying such technology. The reliability of questionnaire was confirmed through a test–retest. The collected data were analyzed with the help of SPSS software in descriptive and deductive statistics level. Findings The highest percentage of awareness about mobile health technology among medical students in the clinical stage of Azzahra educational hospital is 45.6 in nature areas, and their lowest percentage of awareness is 17.8 in the infrastructure area. In addition, their mean awareness of all areas is 54.4. The highest percentage of using mobile health technology by medical students is 14.6 in the education area, and their lowest percentage of usage is 6.8 in the treatment area. Their mean usage of all areas is 9.4 as well. Conclusion The rate of awareness and application of mobile health technology is not favorable. Except for treatment, there is no significant association between the rate of awareness and application of mobile health technology. PMID:24058250

  3. A New Direction for China’s Defense Industry

    DTIC Science & Technology

    2005-01-01

    behave like government ministries.31 In the reform of civilian ministries in China, the depth of such reorganizations could typically be seen via...of self-reliance in defense production, importing foreign technology is seen as essential to ena- bling China eventually to achieve independence in...goal is seen as involving the importation of technology and technical expertise for the production of state-of-the-art military equipment. As

  4. Revitalized militarily critical technologies program

    NASA Astrophysics Data System (ADS)

    Wick, Raymond V.

    2005-04-01

    The Department of Defense (DoD) Militarily Critical Technologies Program (MCTP) provides a systematic, ongoing assessment and analysis of goods and technologies to determine those that would permit significant advances in the development, production and use of military capabilities of potential adversaries and those that are being developed worldwide that have the potential to significantly enhance or degrade US military capabilities in the future. The program's objective is to characterize the technologies, including quantitative values and parameters, and assess worldwide technology capabilities. The MCTP is composed of two sets of documents, the well known and often referenced one, the MCTL, and a second one, a more recently added list called the Developing Science and Technologies List (DSTL). Both are products of the MCTP process, however, the later is primarily used by DDR&E and other government organizations and agencies to aid in the prioritization and understanding of new technologies being developed worldwide. Technologies are selected for the MCTL and the DSTL through the deliberation and consensus of Technology Working Groups (TWGs). TWGs continually screen technologies and nominate items to be added or removed from the MCTL and the DSTL as appropriate. Working within an informal structure, TWG members are composed of government, industry and academia subject matter experts, who strive to produce precise and objective analyses across each technology areas. This process and details of the current MCTP are outlined in this poster paper. This paper focuses on the solid state laser technology area, using it as an example of the MCTP's product of assessing, identifying, and quantifying militarily critical technology parameters.

  5. Sandia technology engineering and science accomplishments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1993-03-01

    Sandia is a DOE multiprogram engineering and science laboratory with major facilities at Albuquerque, New Mexico, and Livermore, California, and a test range near Tonapah, Nevada. We have major research and development responsibilities for nuclear weapons, arms control, energy, the environment, economic competitiveness, and other areas of importance to the needs of the nation. Our principal mission is to support national defense policies by ensuring that the nuclear weapon stockpile meets the highest standards of safety, reliability, security, use control, and military performance. Selected unclassified technical activities and accomplishments are reported here. Topics include advanced manufacturing technologies, intelligent machines, computationalmore » simulation, sensors and instrumentation, information management, energy and environment, and weapons technology.« less

  6. Prophage-mediated defense against viral attack and viral counter-defense

    PubMed Central

    Dedrick, Rebekah M.; Jacobs-Sera, Deborah; Guerrero Bustamante, Carlos A.; Garlena, Rebecca A.; Mavrich, Travis N.; Pope, Welkin H.; Reyes, Juan C Cervantes; Russell, Daniel A.; Adair, Tamarah; Alvey, Richard; Bonilla, J. Alfred; Bricker, Jerald S.; Brown, Bryony R.; Byrnes, Deanna; Cresawn, Steven G.; Davis, William B.; Dickson, Leon A.; Edgington, Nicholas P.; Findley, Ann M.; Golebiewska, Urszula; Grose, Julianne H.; Hayes, Cory F.; Hughes, Lee E.; Hutchison, Keith W.; Isern, Sharon; Johnson, Allison A.; Kenna, Margaret A.; Klyczek, Karen K.; Mageeney, Catherine M.; Michael, Scott F.; Molloy, Sally D.; Montgomery, Matthew T.; Neitzel, James; Page, Shallee T.; Pizzorno, Marie C.; Poxleitner, Marianne K.; Rinehart, Claire A.; Robinson, Courtney J.; Rubin, Michael R.; Teyim, Joseph N.; Vazquez, Edwin; Ware, Vassie C.; Washington, Jacqueline; Hatfull, Graham F.

    2017-01-01

    Temperate phages are common and prophages are abundant residents of sequenced bacterial genomes. Mycobacteriophages are viruses infecting mycobacterial hosts including Mycobacterium tuberculosis and Mycobacterium smegmatis, encompass substantial genetic diversity, and are commonly temperate. Characterization of ten Cluster N temperate mycobacteriophages reveals at least five distinct prophage-expressed viral defense systems that interfere with infection of lytic and temperate phages that are either closely-related (homotypic defense) or unrelated (heterotypic defense). Target specificity is unpredictable, ranging from a single target phage to one-third of those tested. The defense systems include a single-subunit restriction system, a heterotypic exclusion system, and a predicted (p)ppGpp synthetase, which blocks lytic phage growth, promotes bacterial survival, and enables efficient lysogeny. The predicted (p)ppGpp synthetase coded by the Phrann prophage defends against phage Tweety infection, but Tweety codes for a tetrapeptide repeat protein, gp54, that acts as a highly effective counter-defense system. Prophage-mediated viral defense offers an efficient mechanism for bacterial success in host-virus dynamics, and counter-defense promotes phage co-evolution. PMID:28067906

  7. Insights from human studies into the host defense against candidiasis.

    PubMed

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    PubMed

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  9. The Defense and Economic Cooperation Agreement--U.S. Interests and Turkish Needs.

    DTIC Science & Technology

    1982-05-07

    the Office of Manage - ment and Budget, the Secretaries of State and Defense, and other interested parties. Acting Comptroller General of the United...had mixed results from such endeavors in the past and better management , planning, and economic conditions will be neces- sary if the current projects...sutticiency in military equipment, new technologies, and entry into the NATO arms market . Tbe Department of Defense (DOD) estimated that at least

  10. Ballistic missile defense effectiveness

    NASA Astrophysics Data System (ADS)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  11. A brief survey of Department of Defense Telemedicine.

    PubMed

    Zimnik, P R

    1996-01-01

    This paper describes current telemedical projects sponsored by the Department of Defense (DoD) and provides points of contact for further communication. The scope and scale of these projects demonstrate the DoD commitment to the development and deployment of telemedicine and advanced medical information technologies in health care delivery.

  12. Utilizing an Intelligent Tutoring System in Tactical Action Officer Sandbox

    DTIC Science & Technology

    2014-06-01

    Office of Naval Research Future Naval Capabilities, the Defense Technology Area Plan from 2005 and the Department of Defense Science and Technology ...LEFT BLANK v ABSTRACT The Office of Naval Research Future Naval Capabilities, the Defense Technology Area Plan from 2005 and the Department...of Defense Science and Technology Priorities for FY13-17 all share a focus on systems to promote warfighter performance. The goal of these systems is

  13. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  14. Who should pay for biomedical-engineering technology development?

    NASA Astrophysics Data System (ADS)

    Varnado, Samuel G.

    1994-12-01

    It is an enigma that the introduction of technology has led to improvements in productivity in practically every area of endeavor except the field of medicine. This paper asserts that properly applied technology, based on a systems engineering approach, can help reduce the cost while maintaining the quality of health care delivery. Achieving this goal will require more cooperation and coordination at the Federal level to insure that a focused systems approach is used in applying and developing technology that will lead to cost reduction. It is further asserted that much of the technology that could help reduce costs resides in the DoD and the DOE and has not historically been of prime interest to the NIH. Several dual use applications are presented that show how defense related technology can benefit the field of medicine.

  15. 32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...

  16. 32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...

  17. 32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...

  18. 32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...

  19. 32 CFR 37.875 - Should my TIA include a provision concerning foreign access to technology?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Should my TIA include a provision concerning foreign access to technology? 37.875 Section 37.875 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms...

  20. Information Literacy Education on College of Technology at Kyushu Area

    NASA Astrophysics Data System (ADS)

    Kozono, Kazutake; Ikeda, Naomitsu; Irie, Hiroki; Fujimoto, Yoichi; Oshima, Shunsuke; Murayama, Koichi; Taguchi, Hirotsugu

    Recently, the importance of an engineering education increases by the development of the information technology (IT) . Development of the information literacy education is important to deal with new IT in the education on college of technology. Our group investigated the current state of information literacy education on college of technology at Kyushu area and the secondary education. In addition, we investigated about the talent whom the industrial world requested. From these investigation results, this paper proposed cooperation with the elementary and secondary education, enhancement of intellectual property education, introduction of information ethics education, introduction of career education and enhancement of PBL to information literacy education on college of technology.

  1. Technology and the Evolution of the Strategic Air Command and the Air Force Space Command.

    DTIC Science & Technology

    1990-04-01

    agree for the most part that technology is having a major effect upon national security and that it should be encouraged and even pushed in the key areas... effecting defense. (7 :7 ) America’s leadership is linked directly to its ability to adapt to technological innovations which have improved its...naviq,.tion, propulsion systems, electronic warfare systems, Ladars, and cockpit controls and displays much work still needs to be done. Pave Pillar is

  2. 32 CFR 37.895 - How is the final performance report to be sent to the Defense Technical Information Center?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms Related to Other Administrative Matters Financial and Programmatic Reporting § 37.895...

  3. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    PubMed

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  4. Defense without aggression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, H.

    1988-09-01

    In introducing this group of articles on nonoffensive defense the author notes that the prospect of nuclear disarmament in Europe is boosting ideas, which have been around for a decade, from theory to politics. This special section of articles looks at an emerging theory that may reduce reliance on nuclear weapons by bringing stability to the conventional standoff in central Europe. The idea is to rearrange conventional forces so that they can defend but not attack. Under such monikers as nonoffensive defense (the main term used in these articles), nonprovocative defense, defensive defense, reasonable sufficiency, and mutual defensive superiority, thesemore » proposals suggest that nations can restructure weapons, personnel, and strategy to assure their own military security without posing a threat to other nations. 5 refs.« less

  5. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    DTIC Science & Technology

    2016-04-28

    Page 1 GAO- 16 -339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense...Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century , the Department of Defense (DOD) has been...81, § 232 (a) (2011). 2 GAO- 16 -339R Ballistic Missile Defense baselines, we analyzed the testing goals for selected elements, which are

  6. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  7. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  8. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  9. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  10. 32 CFR 552.94 - Area access procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Area access procedures. 552.94 Section 552.94 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND... on DA Form 1594 (Daily Staff Journal or Duty Officer's Log). (c) Permit holders must call or visit...

  11. In-Space Assembly and Construction Technology Project Summary: Infrastructure Operations Area of the Operations Technology Program

    NASA Technical Reports Server (NTRS)

    Bush, Harold

    1991-01-01

    Viewgraphs describing the in-space assembly and construction technology project of the infrastructure operations area of the operation technology program are presented. Th objective of the project is to develop and demonstrate an in-space assembly and construction capability for large and/or massive spacecraft. The in-space assembly and construction technology program will support the need to build, in orbit, the full range of spacecraft required for the missions to and from planet Earth, including: earth-orbiting platforms, lunar transfer vehicles, and Mars transfer vehicles.

  12. Cross-currents in French Defense and U.S. Interests (Strategic Perspectives, no. 10)

    DTIC Science & Technology

    2012-04-01

    defense in- vestments, particularly in advanced technologies, have synergistic benefits for French civilian markets . Hence, issues related to defense...coalition with the French (Operation Odyssey Dawn) to NATO drew strong support from Norway , Denmark, Belgium, Italy, and Canada; these Allies were...collaboration with British, Spanish, and Italian partners) directly competes with France’s Rafale in third-party markets such as India.32 More- over

  13. A two-dimensional neuropsychology of defense: fear/anxiety and defensive distance.

    PubMed

    McNaughton, Neil; Corr, Philip J

    2004-05-01

    We present in this paper a picture of the neural systems controlling defense that updates and simplifies Gray's "Neuropsychology of Anxiety". It is based on two behavioural dimensions: 'defensive distance' as defined by the Blanchards and 'defensive direction'. Defensive direction is a categorical dimension with avoidance of threat corresponding to fear and approach to threat corresponding to anxiety. These two psychological dimensions are mapped to underlying neural dimensions. Defensive distance is mapped to neural level, with the shortest defensive distances involving the lowest neural level (periaqueductal grey) and the largest defensive distances the highest neural level (prefrontal cortex). Defensive direction is mapped to separate parallel streams that run across these levels. A significant departure from prior models is the proposal that both fear and anxiety are represented at all levels. The theory is presented in a simplified form that does not incorporate the interactions that must occur between non-adjacent levels of the system. It also requires expansion to include the dimension of escapability of threat. Our current development and these proposed future extensions do not change the core concepts originally proposed by Gray and, we argue, demonstrate their enduring value.

  14. Harnessing the Prokaryotic Adaptive Immune System as a Eukaryotic Antiviral Defense

    PubMed Central

    Price, Aryn A.; Grakoui, Arash; Weiss, David S.

    2016-01-01

    Clustered, regularly interspaced, short palindromic repeats - CRISPR associated (CRISPR-Cas) systems are sequence specific RNA-directed endonuclease complexes that bind and cleave nucleic acids. These systems evolved within prokaryotes as adaptive immune defenses to target and degrade nucleic acids derived from bacteriophages and other foreign genetic elements. The antiviral function of these systems has now been exploited to combat eukaryotic viruses throughout the viral life cycle. Here we discuss current advances in CRISPR-Cas9 technology as a eukaryotic antiviral defense. PMID:26852268

  15. Section 847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors

    DTIC Science & Technology

    2016-03-31

    847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors M A R C H 3 1 , 2 0 1 6 Report No. DODIG-2016-070...Senior Defense Officials Seeking Employment with Defense Contractors Visit us at www.dodig.mil March 31, 2016 Objectives The objectives of our project...description of future duties from a Defense contractor . • Some ethics officials issued nonspecific post-Government employment guidance as a Section 847

  16. DNA Sequencing Technologies within the Chemical and Biological Defense Enterprise: How to Position the Department of Defense to Maximize the Use of These Emerging Technologies - JUPITR

    DTIC Science & Technology

    2015-07-01

    sharing, the Pathosphere.org open-system architecture is now deployed and available on the Amazon cloud . The site has over 100 users from...SUPPLEMENTARY NOTES 14. ABSTRACT: To generate accurate and actionable disease data that can be integrated into the broader Department of Defense...PREFACE The work described in this report was authorized under the Joint United States Forces Korea Portal and Integrated Threat Recognition

  17. Intelligent systems for strategic power infrastructure defense

    NASA Astrophysics Data System (ADS)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  18. Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. May-June 08

    DTIC Science & Technology

    2008-06-01

    of a new commissary. The lifestyle center will incorporate retail areas with brand-name stores, casual dining and a six-screen cinema . There also...with their Republic of Korea counterparts. Yama Sakura. Yama Sakura is a bilateral US and Japanese Ground Self-Defense Force exercise focus- ing on... Japanese Ground Self-Defense Force readiness and interoperability. Key focus areas for fires elements in previous years have included joint targeting

  19. Teaching Psychological Defense Mechanisms: "The Defense Mechanisms Game."

    ERIC Educational Resources Information Center

    Waugh, Charles G.

    1980-01-01

    Presents the rules for an educational game in which students reinforce psychology lecture material by creating and dramatizing defense mechanisms such as reaction formation, displacement, and fantasy. Provides definitions and examples of the various defense mechanisms that can be portrayed. (JP)

  20. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    PubMed

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  1. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  2. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  3. Sanitization and Disposal of Excess Information Technology Equipment

    DTIC Science & Technology

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  4. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  5. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  6. Department of Defense Information Enterprise: Strategic Plan 2010-2012

    DTIC Science & Technology

    2010-04-01

    migrate from circuit-based technology to a converged (voice, video , and data) IP network and UC services environment. Ensure the optimal...Kevin Coleman, “Cyber Attacks on Supply Chain Systems,” Defense Tech, April 15, 2009 8 Lolita C. Baldor, “Federal Web Sites Knocked Out by Cyber Attack

  7. Defense Logistics: DOD Needs to Take Additional Actions to Address Challenges in Supply Chain Management

    DTIC Science & Technology

    2011-07-01

    Jack E. Edwa appendix III. t rds Director, Defense Capabilities and Managemen Page 36 GAO-11-569 Defense Logistics List of Committees...Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302... operations . DOD faces asset visibility challenges due, in part, to a lack of interoperability among information technology

  8. Defense Human Resources Activity > PERSEREC

    Science.gov Websites

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  9. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  10. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense...

  11. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  12. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    DTIC Science & Technology

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  13. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    DTIC Science & Technology

    2016-06-01

    of and replace. DOD maintains weapon systems (e.g., aircraft and ships) and equipment (e.g., generators and radars) that require regular and...including helicopters, combat vehicles, air defense systems, ships, fighter and bomber aircraft , intercontinental ballistic missiles, jet aircraft ...Defense for Acquisition, Technology, and Logistics. 19In the depot maintenance context, an end item can be a weapon system, such as an aircraft , ship

  14. An Approach to Establishing System Benefits for Technologies In NASA's Spaceliner Investment Area

    NASA Technical Reports Server (NTRS)

    Hueter, Uwe; Pannell, Bill; Lyles, Garry M. (Technical Monitor)

    2001-01-01

    NASA's has established long term goals for access-to-space. The third generation launch systems are to be fully reusable and operational around 2025. The goals for the third generation launch system are to significantly reduce cost and improve safety over current systems. The Advanced Space Transportation Program Office (ASTP) at the NASA's Marshall Space Flight Center in Huntsville, AL has the agency lead to develop space transportation technologies. Within ASTP, under the Spaceliner Investment Area, third generation technologies are being pursued. The Spaceliner Investment Area's primary objective is to mature vehicle technologies to enable substantial increases in the design and operating margins of third generation RLVs (current Space Shuttle is considered the first generation RLV) by incorporating advanced propulsion systems, materials, structures, thermal protection systems, power, and avionics technologies. Advancements in design tools and better characterization of the operational environment will result in reduced design and operational variabilities leading to improvements in margins. Improvements in operational efficiencies will be obtained through the introduction of integrated vehicle health management, operations and range technologies. Investments in these technologies will enable the reduction in the high operational costs associated with today's vehicles by allowing components to operate well below their design points resulting in improved component operating life, reliability, and safety which in turn reduces both maintenance and refurbishment costs. The introduction of advanced technologies may enable horizontal takeoff by significantly reducing the takeoff weight and allowing use of existing infrastructure. This would be a major step toward the goal of airline-like operation. These factors in conjunction with increased flight rates, resulting from reductions in transportation costs, will result in significant improvements of future vehicles. The

  15. What really bothers China about THAAD? 'WHY CHINA BOTHERS ABOUT THAAD MISSILE DEFENSE'

    DOE PAGES

    Sankaran, Jaganath; Fearey, Bryan Leo

    2017-02-07

    The United States has announced that it will deploy Terminal High Altitude Area Defense (THAAD) missile defense system to the Republic of Korea. Here, China has objected as it fears encirclement. The United States should continue to engage with China via official and other channels to mitigate concerns and avoid misperceptions.

  16. What really bothers China about THAAD? 'WHY CHINA BOTHERS ABOUT THAAD MISSILE DEFENSE'

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sankaran, Jaganath; Fearey, Bryan Leo

    The United States has announced that it will deploy Terminal High Altitude Area Defense (THAAD) missile defense system to the Republic of Korea. Here, China has objected as it fears encirclement. The United States should continue to engage with China via official and other channels to mitigate concerns and avoid misperceptions.

  17. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  18. Strategic Defense Initiative Organization adaptive structures program overview

    NASA Astrophysics Data System (ADS)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  19. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  20. Cotton Defense Induction Patterns Under Spatially, Temporally and Quantitatively Varying Herbivory Levels.

    PubMed

    Eisenring, Michael; Meissle, Michael; Hagenbucher, Steffen; Naranjo, Steven E; Wettstein, Felix; Romeis, Jörg

    2017-01-01

    In its defense against herbivores, cotton ( Gossypium sp.) relies in part on the production of a set of inducible, non-volatile terpenoids. Under uniform damage levels, in planta allocation of induced cotton terpenoids has been found to be highest in youngest leaves, supporting assumptions of the optimal defense theory (ODT) which predicts that plants allocate defense compounds to tissues depending on their value and the likelihood of herbivore attack. However, our knowledge is limited on how varying, and thus more realistic, damage levels might affect cotton defense organization. We hypothesized that the allocation of terpenoids and densities of terpenoid-storing glands in leaves aligns with assumptions of the ODT, even when plants are subjected to temporally, spatially and quantitatively varying caterpillar ( Heliothis virescens ) damage. As expected, cotton plants allocated most of their defenses to their youngest leaves regardless of damage location. However, defense induction in older leaves varied with damage location. For at least 14 days after damage treatments ended, plants reallocated defense resources from previously young leaves to newly developed leaves. Furthermore, we observed a positive hyperbolic relationship between leaf damage area and both terpenoid concentrations and gland densities, indicating that cotton plants can fine-tune defense allocation. Although it appears that factors like vascular constraints and chemical properties of individual defense compounds can affect defense levels, our results overall demonstrate that induced defense organization of cotton subjected to varying damage treatments is in alignment with key assumptions of the ODT.

  1. Cotton Defense Induction Patterns Under Spatially, Temporally and Quantitatively Varying Herbivory Levels

    PubMed Central

    Eisenring, Michael; Meissle, Michael; Hagenbucher, Steffen; Naranjo, Steven E.; Wettstein, Felix; Romeis, Jörg

    2017-01-01

    In its defense against herbivores, cotton (Gossypium sp.) relies in part on the production of a set of inducible, non-volatile terpenoids. Under uniform damage levels, in planta allocation of induced cotton terpenoids has been found to be highest in youngest leaves, supporting assumptions of the optimal defense theory (ODT) which predicts that plants allocate defense compounds to tissues depending on their value and the likelihood of herbivore attack. However, our knowledge is limited on how varying, and thus more realistic, damage levels might affect cotton defense organization. We hypothesized that the allocation of terpenoids and densities of terpenoid-storing glands in leaves aligns with assumptions of the ODT, even when plants are subjected to temporally, spatially and quantitatively varying caterpillar (Heliothis virescens) damage. As expected, cotton plants allocated most of their defenses to their youngest leaves regardless of damage location. However, defense induction in older leaves varied with damage location. For at least 14 days after damage treatments ended, plants reallocated defense resources from previously young leaves to newly developed leaves. Furthermore, we observed a positive hyperbolic relationship between leaf damage area and both terpenoid concentrations and gland densities, indicating that cotton plants can fine-tune defense allocation. Although it appears that factors like vascular constraints and chemical properties of individual defense compounds can affect defense levels, our results overall demonstrate that induced defense organization of cotton subjected to varying damage treatments is in alignment with key assumptions of the ODT. PMID:28270830

  2. Connecting the Force from Space: The IRIS Joint Capability Technology Demonstration

    DTIC Science & Technology

    2010-01-01

    the Joint in Joint Capability Technology Demonstration, we have two sponsors, both U.S. Strategic Command and the Defense Information Systems...Capability Technology Demonstration will provide an excellent source of data on space-based Internet Protocol net- working. Operational... Internet Routing in Space Joint Capability Technology Demonstration Operational Manager, Space and Missile Defense Battle Lab, Colorado Springs

  3. Defense.gov - Special Report

    Science.gov Websites

    FORUM - U.S. Defense Secretary Robert M. Gates addresses the audience as Canadian Minister of National issues that Defense Secretary Robert M. Gates and Canadian Defense Minister Peter MacKay discussed during a bilateral meeting here today. Story | Transcript U.S., Canadian Defense Chiefs Answer Afghanistan

  4. Ponderosa pine resin defenses and growth: metrics matter.

    PubMed

    Hood, Sharon; Sala, Anna

    2015-11-01

    Bark beetles (Coleoptera: Curculionidae, Scolytinae) cause widespread tree mortality in coniferous forests worldwide. Constitutive and induced host defenses are important factors in an individual tree's ability to survive an attack and in bottom-up regulation of bark beetle population dynamics, yet quantifying defense levels is often difficult. For example, in Pinus spp., resin flow is important for resistance to bark beetles but is extremely variable among individuals and within a season. While resin is produced and stored in resin ducts, the specific resin duct metrics that best correlate with resin flow remain unclear. The ability and timing of some pine species to produce induced resin is also not well understood. We investigated (i) the relationships between ponderosa pine (Pinus ponderosa Lawson & C. Lawson) resin flow and axial resin duct characteristics, tree growth and physiological variables, and (ii) if mechanical wounding induces ponderosa pine resin flow and resin ducts in the absence of bark beetles. Resin flow increased later in the growing season under moderate water stress and was highest in faster growing trees. The best predictors of resin flow were nonstandardized measures of resin ducts, resin duct size and total resin duct area, both of which increased with tree growth. However, while faster growing trees tended to produce more resin, models of resin flow using only tree growth were not statistically significant. Further, the standardized measures of resin ducts, density and duct area relative to xylem area, decreased with tree growth rate, indicating that slower growing trees invested more in resin duct defenses per unit area of radial growth, despite a tendency to produce less resin overall. We also found that mechanical wounding induced ponderosa pine defenses, but this response was slow. Resin flow increased after 28 days, and resin duct production did not increase until the following year. These slow induced responses may allow

  5. Assessing the Effects of Organizational Changes within the Office of the Secretary of Defense on the Nuclear Mission

    DTIC Science & Technology

    2016-09-01

    School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial...chemical and biological defense programs for OSD and his/her official title was changed to Assistant to the Secretary of Defense for Nuclear, Chemical...weapons program was no longer the true 27 focus in this office. The current title of this office is Assistant Secretary of Defense for Nuclear

  6. Behavioral Sabotage of Plant Defenses by Insect Folivores.

    PubMed

    Dussourd, David E

    2017-01-31

    Plant susceptibility to herbivore attack is determined not just by the suite of defenses present in different tissues of the plant, but also by the capabilities of the herbivore for tolerating, circumventing, or disarming the defenses. This article reviews the elaborate behaviors exhibited by leaf-chewing insects that appear to function specifically to deactivate hostplant defenses. Shortcomings in our understanding and promising areas for future research are highlighted. Behaviors covered include vein cutting, trenching, girdling, leaf clipping, and application of fluids from exocrine glands. Many of these behaviors have a widespread distribution, having evolved independently in multiple insect lineages. Insects utilizing the behaviors include significant agricultural, horticultural, and forestry pests, as well as numerous species important in natural ecosystems. Behavioral, ecological, and phylogenetic studies have documented the importance of the behaviors and their ancient history, but the molecular analysis of how the behaviors affect plant physiology has scarcely begun.

  7. 32 CFR 37.110 - What type of instruments are technology investment agreements (TIAs)?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false What type of instruments are technology... SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS General § 37.110 What type of instruments are technology investment agreements (TIAs)? TIAs are assistance instruments...

  8. 76 FR 33166 - Defense Federal Acquisition Regulation Supplement (DFARS); Warranty Tracking of Serialized Items...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-08

    ... Acquisition, Technology and Logistics dated February 6, 2007, which required definition of the requirements to... Defense for Acquisition, Technology and Logistics issued a policy memorandum dated February 6, 2007, which... Changes Required During the final rule development, DoD restructured the layout of the rule to reduce...

  9. Gun threats against and self-defense gun use by California adolescents.

    PubMed

    Hemenway, David; Miller, Matthew

    2004-04-01

    To assess hostile gun use against and self-defense gun use by adolescents. We use random-digit-dial telephone survey data collected from approximately 5800 California adolescents, aged 12 through 17 years, between November 1, 2000, and October 31, 2001. The prevalence and correlates of reported hostile gun use against and self-defense gun use by adolescents, as well as qualitative information about these 2 types of gun uses. Correlates include age, sex, ethnicity, smoking, alcoholic binge drinking, threatening others, parents knowing their adolescent's whereabouts in the afternoon after school, attending school, area urbanization and poverty level, and living in a household with a gun. Approximately 4% of the adolescents reported ever having been threatened with a gun; only 0.3% reported using a gun in self-defense. Boys, smokers, adolescents who threatened others, and adolescents whose parents knew little about their whereabouts in the afternoon after school were more likely to report being threatened with a gun. Most episodes of self-defense gun use seem to be hostile interactions between adolescents with weapons. Far more California adolescents are threatened with a gun than use a gun in self-defense. Self-defense gun use is rare; many of the reported self-defense gun uses seem to be armed confrontations.

  10. 76 FR 67154 - Science and Technology Reinvention Laboratory Personnel Management Demonstration Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... DEPARTMENT OF DEFENSE Office of the Secretary Science and Technology Reinvention Laboratory... to eight legacy Science and Technology Reinvention Laboratory (STRL) Personnel Management Demonstration (demo) Project Plans resulting from section 1107(c) of the National Defense Authorization Act...

  11. Needed: Reincarnation of National Defense Education Act of 1958

    NASA Astrophysics Data System (ADS)

    Harris, Mary M.; Miller, James R.

    2005-06-01

    This paper reviews the historical and current response of the United States to threats to its world leadership in scientific endeavors, with particular attention to the National Defense Education Act of 1958. The current status of the United States in mathematics, science, and engineering education is reviewed with respect to K-12 student achievement, K-12 teacher quality, numbers of degrees granted, and other indicators of international competitiveness. Concluding that we are a nation in peril, recommendations are made to enhance the likelihood that the United States will retain its preeminent position in science and technology and, therefore, provide for the national defense and economic wellbeing of citizens in an information age and global economy.

  12. 32 CFR 644.25 - Withdrawal of Public Domain for Defense Purposes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... public domain land, water, or land and water, or restrictions on use of areas in the Continental Shelf, aggregating an area of more than 5,000 acres for any one defense project, shall be by Act of Congress. Upon... (annual rental) basis. (6) Map(s) indicating the exterior boundaries of the project; excepted areas, if...

  13. 32 CFR 644.25 - Withdrawal of Public Domain for Defense Purposes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... public domain land, water, or land and water, or restrictions on use of areas in the Continental Shelf, aggregating an area of more than 5,000 acres for any one defense project, shall be by Act of Congress. Upon... (annual rental) basis. (6) Map(s) indicating the exterior boundaries of the project; excepted areas, if...

  14. 32 CFR 644.25 - Withdrawal of Public Domain for Defense Purposes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... public domain land, water, or land and water, or restrictions on use of areas in the Continental Shelf, aggregating an area of more than 5,000 acres for any one defense project, shall be by Act of Congress. Upon... (annual rental) basis. (6) Map(s) indicating the exterior boundaries of the project; excepted areas, if...

  15. 32 CFR 644.25 - Withdrawal of Public Domain for Defense Purposes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... public domain land, water, or land and water, or restrictions on use of areas in the Continental Shelf, aggregating an area of more than 5,000 acres for any one defense project, shall be by Act of Congress. Upon... (annual rental) basis. (6) Map(s) indicating the exterior boundaries of the project; excepted areas, if...

  16. 32 CFR 644.25 - Withdrawal of Public Domain for Defense Purposes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... public domain land, water, or land and water, or restrictions on use of areas in the Continental Shelf, aggregating an area of more than 5,000 acres for any one defense project, shall be by Act of Congress. Upon... (annual rental) basis. (6) Map(s) indicating the exterior boundaries of the project; excepted areas, if...

  17. 75 FR 32639 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... elements of the Department of Homeland Security concerned with the analysis of intelligence information... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG67 Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...

  18. An Analysis of Second-Tier Arms Producing Countries’ Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    DTIC Science & Technology

    2008-03-01

    38  39  ......................... 40  ......................... 42  42  Offsets in the Global Arms Market ...The Global Arms Market Structure .................................................. Increasing Globalization of Defense Industry...109  Overcapacity of the Defense Industry in a Declining Market ........................... 109 Economies of Scale

  19. WHAT PEOPLE CAN DO ABOUT RURAL CIVIL DEFENSE, NOTES FOR SPEAKERS AND WRITERS.

    ERIC Educational Resources Information Center

    Department of Agriculture, Washington, DC.

    CIVIL DEFENSE PREPAREDNESS IS A FACTOR RURAL PEOPLE NEED TO CONSIDER IN ALL THEIR FARM, HOME, AND BUSINESS PLANNING. NUCLEAR WEAPONS AND THE POSSIBILITY OF NUCLEAR ATTACK ARE FACTS THAT AMERICANS CANNOT IGNORE. THIS DOCUMENT PRESENTS THE BASIC ELEMENTS OF A CIVIL DEFENSE PROGRAM FOR PEOPLE IN RURAL AREAS WHICH INCLUDE--(1) THE DANGERS OF FALLOUT,…

  20. The US commercial space launch program and the Department of Defense dilemma

    NASA Astrophysics Data System (ADS)

    Clapp, William G.

    1994-08-01

    A scenario by which the United States might regain its lost advantage in launching commercial satellites is developed using the Ariane space commercial launch company as a benchmark. Ariane's advantages are identified and low-cost recommendations for countering them are presented The four areas selected for analysis inidentifying an American strategy are launch vehicle: (1) payload characteristics; (2) delivery costs; (3) selection process; and (4) technology. Several of the recommendations require Department of Defense funding even though the primary beneficiary appears to be the commercial space sector. But this will ensure that the military has affordable access to space and it is part of a dual purpose strategy whereby government spending benefits both the public and private sector. There is also a brief discussion of other foreign launch vehicle competition.

  1. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board of Visitors AGENCY: Department of Defense (DoD). ACTION... (5 U.S.C. 552b, as amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it...

  2. Third NASA Advanced Composites Technology Conference, volume 1, part 1

    NASA Technical Reports Server (NTRS)

    Davis, John G., Jr. (Compiler); Bohon, Herman L. (Compiler)

    1993-01-01

    This document is a compilation of papers presented at the Third NASA Advanced Composites Technology (ACT) Conference. The ACT Program is a major multi-year research initiative to achieve a national goal of technology readiness before the end of the decade. Conference papers recorded results of research in the ACT Program in the specific areas of automated fiber placement, resin transfer molding, textile preforms, and stitching as these processes influence design, performance, and cost of composites in aircraft structures. Papers sponsored by the Department of Defense on the Design and Manufacturing of Low Cost Composites (DMLCC) are also included in Volume 2 of this document.

  3. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... Sunshine Act of 1976 (5 U.S.C. 552b), and 41 CFR 102- 3.65, the Department of Defense announces that it is...

  4. 77 FR 30361 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaty With the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-22

    ... DEPARTMENT OF DEFENSE Defense Acquisitions Regulations System 48 CFR Parts 225 and 252 RIN 0750... United Kingdom (DFARS 2012-D034) AGENCY: Defense Acquisition Regulations System; Department of Defense... Acquisition Regulations System, Attn: (Insert case manager's name), OUSD (AT&L) DPAP/DARS, Room 3B855, 3060...

  5. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    PubMed

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  6. Reinforcing Consent as a "Private Facts" Defense.

    ERIC Educational Resources Information Center

    Haberman, David A.

    To delineate the ideas of newsworthiness and consent as they apply to journalism and private facts lawsuits (those in which plaintiffs seek to stop publication of facts about themselves), this paper covers key areas of dispute. Various sections of the paper discuss (1) the definition of newsworthiness, (2) consent as a legal defense, (3) the…

  7. Area- and energy-efficient CORDIC accelerators in deep sub-micron CMOS technologies

    NASA Astrophysics Data System (ADS)

    Vishnoi, U.; Noll, T. G.

    2012-09-01

    The COordinate Rotate DIgital Computer (CORDIC) algorithm is a well known versatile approach and is widely applied in today's SoCs for especially but not restricted to digital communications. Dedicated CORDIC blocks can be implemented in deep sub-micron CMOS technologies at very low area and energy costs and are attractive to be used as hardware accelerators for Application Specific Instruction Processors (ASIPs). Thereby, overcoming the well known energy vs. flexibility conflict. Optimizing Global Navigation Satellite System (GNSS) receivers to reduce the hardware complexity is an important research topic at present. In such receivers CORDIC accelerators can be used for digital baseband processing (fixed-point) and in Position-Velocity-Time estimation (floating-point). A micro architecture well suited to such applications is presented. This architecture is parameterized according to the wordlengths as well as the number of iterations and can be easily extended for floating point data format. Moreover, area can be traded for throughput by partially or even fully unrolling the iterations, whereby the degree of pipelining is organized with one CORDIC iteration per cycle. From the architectural description, the macro layout can be generated fully automatically using an in-house datapath generator tool. Since the adders and shifters play an important role in optimizing the CORDIC block, they must be carefully optimized for high area and energy efficiency in the underlying technology. So, for this purpose carry-select adders and logarithmic shifters have been chosen. Device dimensioning was automatically optimized with respect to dynamic and static power, area and performance using the in-house tool. The fully sequential CORDIC block for fixed-point digital baseband processing features a wordlength of 16 bits, requires 5232 transistors, which is implemented in a 40-nm CMOS technology and occupies a silicon area of 1560 μm2 only. Maximum clock frequency from circuit

  8. Student Drivers Will Find This Defensive Course Difficult

    ERIC Educational Resources Information Center

    Nation's Schools, 1972

    1972-01-01

    Map and description of 40-acre defensive driving range being built for secondary school driver education programs in the Burke County Public Schools of North Carolina. Features include a beginner course, streets, driveways, expressway, gravel road, a driver education building, and an emergency skid area. (Author/DN)

  9. Network speech systems technology program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  10. Application of System and Integration Readiness Levels to Department of Defense Research and Development

    DTIC Science & Technology

    2016-07-01

    etc., and all of the IRL1n rather than a technology-centric approach that included TR L1 with all its interfaces. The inter- face -centric approach...Acquisition Research Journal , 23(3), In Print. The average of the SRL vector, equation (4), describes how mature the sys- tem is. The Sauser approach...Application of System and Integration Readiness Levels to Department of Defense Research and Development. Defense Acquisition Research Journal , 23(3), In

  11. Ballistic Missile Defense Final Programmatic Environmental Impact Statement

    DTIC Science & Technology

    1994-10-01

    included: the need for BMD; budget allocations; procedural problems related to NEPA; nuclear weapon dangers; arms reductions; and potential contravention...2-26 2.6.2 TECHNOLOGY ALTERNATIVES ........................... 2-26 2.6.2.1 Directed Energy Weapons ..................... 2-26 2.6.2.2 Nuclear ...national defense strategy of mutually assured destruction to keep conflicts from escalating beyond conventional warfare to nuclear war. In 1955, the

  12. Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System Not Ready for Production Decision (REDACTED)

    DTIC Science & Technology

    2012-09-07

    Average Procurement Unit Cost CMDS Cruise Missile Defense Systems CPD Capability Production Document EMD Engineering and Manufacturing...Defense for Acquisition, Technology and Logistics also determined that continuing test and evaluation of the two JLENS Engineering and Manufacturing...Program (Category ID) that was established in January 1996 and, during the audit, was in the Engineering and Manufacturing Development (EMD) phase of

  13. Critical Technology Accessibility

    ERIC Educational Resources Information Center

    National Academies Press, 2006

    2006-01-01

    In 2003, the Defense Intelligence Agency asked the NRC to form a standing committee to help develop study topics about technology warning. One issue that was identified was the growing dependence on foreign suppliers of critical technology as a result of the increase in globalization of economic activity. Two important questions emerged for study:…

  14. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  15. Technology Applications Report.

    DTIC Science & Technology

    1992-08-01

    And when business produce spinoffs. Publications in- is looking for technological inno- clude the SDI High Technology Up- vations, the Strategic ...SDI ~ES Strategic { Defense W J. Initiative - Applications Report ------ ---- ul MthV, DISTR’hM-f1o-N SiTAI Approveed0. public release; 19980309...301AUST19 Accession Number: 3992 Publication Date: Aug 01. 1992 Title: Technology Applications Report 1992 Corporate Author Or Publisher: Strategic

  16. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    DTIC Science & Technology

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  17. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    DTIC Science & Technology

    1992-06-01

    Beardsley Headquarters Air Force Logistics Command Wright- Patterson AFB, Ohio Don Carson TASC Arlington, VA William Clark Defense Systems Management...Vice Chairman Senate EDWARD M. KENNEDY Massachusetts ERNEST F. HOLLINGS South Carolina CLAIBORNE PELL Rhode Island ORRIN G. HATCH Utah...President TASC Julius Harwood Consultant William W. Kaufmann Senior Fellow The Brookings Institution General P.X. Kelley USMC (Ret.) James L

  18. Counterproliferation strategy: The influence of technology, budget, and arms control on theater missile defenses. Strategic research project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parlier, G.H.

    1996-05-20

    This paper describes the historical evolution of the theater missile threat during World War II and the Persian Gulf War, and analyzes current technological challenges, budgetary pressures, and arms control restraints which constrain the development and deployment of effective theater missile defenses. The impact of these trends on strategic concepts as outlined in the National Military Strategy and their implications for attaining national policy objectives is assessed. A systems approach is used to described analyze, and evaluate the effectiveness of emerging counterproliferation strategy within the framework of an ends-ways-means strategy formulation paradigm. I conclude that current trends will lead tomore » a self-deterring strategy: resources are inadequate to support the ways we intend to achieve our national objectives. Recommendations are made to eliminate unacceptable risk and enhance the concept of `extended conventional deterrence` consistent with U.S. national values and security interests for our role in a new world order.« less

  19. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  20. mHealth Application Areas and Technology Combinations.

    PubMed

    Abaza, Haitham; Marschollek, Michael

    2017-01-01

    With the continuous and enormous spread of mobile technologies, mHealth has evolved as a new subfield of eHealth. While eHealth is broadly focused on information and communication technologies, mHealth seeks to explore more into mobile devices and wireless communication. Since mobile phone penetration has exceeded other infrastructure in low and middle-income countries (LMICs), mHealth is seen as a promising component to provide pervasive and patient-centered care. The aim of our research work for this paper is to examine the mHealth literature to identify application areas, target diseases, and mHealth service and technology types that are most appropriate for LMICs. Based on the 2011 WHO mHealth report, a combination of search terms, all including the word "mHealth", was identified. A literature review was conducted by searching the PubMed and IEEE Xplore databases. Articles were included if they were published in English, covered an mHealth solution/intervention, involved the use of a mobile communication device, and included a pilot evaluation study. Articles were excluded if they did not provide sufficient detail on the solution covered or did not focus on clinical efficacy/effectiveness. Cross-referencing was also performed on included articles. 842 articles were retrieved and analyzed, 255 of which met the inclusion criteria. North America had the highest number of applications (n=74) followed by Europe (n=50), Asia (n=44), Africa (n=25), and Australia (n=9). The Middle East (n=5) and South America (n=3) had the least number of studies. The majority of solutions addressed diabetes (n=51), obesity (n=25), CVDs (n=24), HIV (n=18), mental health (n=16), health behaviors (n=16), and maternal and child's health (MCH) (n=11). Fewer solutions addressed asthma (n=7), cancer (n=5), family health planning (n=5), TB (n=3), malaria (n=2), chronic obtrusive pulmonary disease (COPD) (n=2), vision care (n=2), and dermatology (n=2). Other solutions targeted stroke, dental

  1. Report of the Defense Science Board Task Force on Military Applications of New-Generation Computing Technologies.

    DTIC Science & Technology

    1984-12-01

    1980’s we are seeing enhancement of breadth, power, and accessibility of computers in many dimensions: o Pov~erfu1, costly fragile mainframes for...During the 1980’s we are seeing enhancement of breadth, power and accessibility of computers in many dimensions. (1) Powerful, costly, fragile mainframes... X A~ ’ EMORANDlUM FOR THE t-RAIRMAN, DEFENSE<. ’ ’...’"" S!B.FECT: Defense Science Board T is F- Supercomputei Applicai io, Yoi are requested to

  2. Worldwide missile defense and the war on terrorism

    NASA Astrophysics Data System (ADS)

    Kane, Francis X.

    2002-07-01

    At the end of a long developmental road, dating back nearly a half-century, we are on the verge of having a defense against ballistic missiles. Starting some fifty years ago, we have initiated, and halted various programs to explore technology for missile defense. The reason for the go and stop program was the theological debate on deterrence. The issue was whether we would deter the Soviets from attacking us if we were to deploy a defense against their ballistic missiles. Our assessment was it would not, because they would expand their offensive. If you watched the President on TV after 9/11, you could sense the depth of his reaction. He is determined that it won't happen again. Furthermore, he must be conscious that this attack was the first time in nearly two centuries when an enemy caused damage in the US. He has created a new national effort to insure that it doesn't happen again. The efforts devoted to this objective are many, complex, and innovative. I will try to cover the most important activities, then describe how they are integrated to reach that objective in dynamic circumstances, of a long war.

  3. ’Point of Injury’ Sampling Technology for Battlefield Molecular Diagnostics

    DTIC Science & Technology

    2012-03-17

    Injury" Sampling Technology for Battlefield Molecular Diagnostics March 17,2012 Sponsored by Defense Advanced Research Projects Agency (DOD) Defense...Contract: April 25, 2011 Short Title of Work: "Point of Injury" Sampling Technology for Battlefield Molecular Diagnostics " Contract Expiration Date...SBIR PHASE I OPTION REPORT: Point of Injury, Sampling Technology for Battlefield Molecular Diagnostics . W31P4Q-1 l-C-0222 (UNCLASSIFIED) P.I

  4. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    PubMed Central

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  5. Stimulating Innovation and Accelerating the Development of Complex and Slowly Maturing Technologies Through Advanced Technology Prize Competitions

    DTIC Science & Technology

    2007-06-15

    technology prize competitions have been used since the 18th century to spur innovation and advance the development of complex and slowly maturing disruptive ... technologies The Defense Advanced Research Projects Agency (DARPA) has used advanced technology competitions in 2004 and 2005 to rapidly accelerate the

  6. Addressing Human Factors Gaps in Cyber Defense

    DTIC Science & Technology

    2016-09-23

    Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the

  7. Sustaining U.S. Leadership in the Asia-Pacific Region: Why a Strategy of Direct Defense Against Antiaccess and Area Denial Threats Is Desirable and Feasible

    DTIC Science & Technology

    2015-01-01

    War II. To date, neither Russia nor China has fielded an operational fifth-generation fighter similar to the U.S. F-22 or F-35.11 In a direct ... Direct Defense Against Antiaccess and Area Denial Threats Is Desirable and Feasible David Ochmanek A mid the seemingly unrelenting welter of security...military forces have, from the perspec- tive of the United States, been moving in an unfavorable direction over the past decade or more. This realization

  8. DOE planning workshop advanced biomedical technology initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-06-01

    The Department of Energy has mad major contributions in the biomedical sciences with programs in medical applications and instrumentation development, molecular biology, human genome, and computational sciences. In an effort to help determine DOE`s role in applying these capabilities to the nation`s health care needs, a planning workshop was held on January 11--12, 1994. The workshop was co-sponsored by the Department`s Office of Energy Research and Defense Programs organizations. Participants represented industry, medical research institutions, national laboratories, and several government agencies. They attempted to define the needs of the health care industry. identify DOE laboratory capabilities that address these needs,more » and determine how DOE, in cooperation with other team members, could begin an initiative with the goals of reducing health care costs while improving the quality of health care delivery through the proper application of technology and computational systems. This document is a report of that workshop. Seven major technology development thrust areas were considered. Each involves development of various aspects of imaging, optical, sensor and data processing and storage technologies. The thrust areas as prioritized for DOE are: (1) Minimally Invasive Procedures; (2) Technologies for Individual Self Care; (3) Outcomes Research; (4) Telemedicine; (5) Decision Support Systems; (6) Assistive Technology; (7) Prevention and Education.« less

  9. 32 CFR 21.680 - Technology investment agreements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  10. 32 CFR 21.680 - Technology investment agreements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  11. 32 CFR 21.680 - Technology investment agreements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  12. 32 CFR 21.680 - Technology investment agreements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  13. 32 CFR 21.680 - Technology investment agreements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  14. Air Attack on America?: Vulnerabilities, Capabilities, and Implications of the Air Defense of the United States

    DTIC Science & Technology

    2013-06-01

    E. Forewarned is Forearmed: A History of the Royal Observer Corps. London, England: William Hodge & Company, Limited, 1948. Yanarella, Ernest J. The...Institute of Technology, Wright- Patterson AFB, Ohio with a Master’s of Science in Operations Analysis. In July 2012, Major Diehl entered the School of...minds of the planners, were for defense of bases 9 William “Billy” Mitchell, Winged Defense (Tuscaloosa, AL

  15. Defense AT and L. Volume 37, Number 6

    DTIC Science & Technology

    2008-12-01

    identifiers. Defense AT&L (ISSN 1547-5476), formerly Program Manager, is published bimonthly by the DAU Press and is free to all U.S. and foreign national...12th grade participated in museum programs designed to make science, technology, and aerospace fun and interesting for all ages. Working with...careers on the base. At the college level, certification programs, cooperative education (co-op) internships, and edu- cational partnerships all

  16. Acquiring the Data Needed to Support Defense Transformation

    DTIC Science & Technology

    2010-04-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Center for Technology and National Security Policy (CTNSP) National Defense University (NDU) Fort...Lesley J. McNair, Washington, DC USA 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR...makers (see Table 1 below), there is a need to collect and organize the data of interest. It is anticipated that all of the stakeholders will be

  17. Assessing Wide Area Multilateration and ADS-B as alternative surveillance technology

    DOT National Transportation Integrated Search

    2005-09-26

    The Helicopter In-Flight Tracking System (HITS) program evaluated both Wide Area Multilateration (WAM) and Automatic Dependent Surveillance Broadcast (ADS-B) as alternative surveillance technologies for both the terminal and en route domains in t...

  18. Adaptation of existing infrared technologies to unanticipated applications

    NASA Astrophysics Data System (ADS)

    Peng, Philip

    2005-01-01

    Radiation thermometry is just but one of many applications, both potential and realized, of infrared technology. During the SARS (Severe Acute Respiratory Syndromes) global crisis in 2003, the technology was utilized as a preliminary screening method for infected persons as a defense against a major outbreak, as the primary symptom of this disease is elevated body temperature. ATC timely developed a product designed specifically for mass volume crowd screening of febrile individuals. For this application, the machine must register temperature of subjects rapidly and efficiently, with a certain degree of accuracy, and function for extended periods of time. The equipment must be safe to use, easily deployed, and function with minimum maintenance needed. The ATIR-303 model satisfies all of the above and other pre-requisite conditions amicably. Studies on the correlation between the maximum temperature registered among individual's facial features, as measured under the conditions of usage, and the core temperature of individuals were performed. The results demonstrated that ATIR-303 is very suitable for this application. Other applications of the infrared technology in various areas, like medical diagnosis, non-destructive testing, security, search and rescue, and others, are also interest areas of ATC. The progress ATC has achieved in these areas is presented also.

  19. An Economic Analysis of Acquisition Opportunities for the United States Department of Defense Within the Japanese Defense Industrial Base

    DTIC Science & Technology

    2002-12-01

    defense firms would be required to automatically provide any Japanese developments to the U.S. at no cost. This process was labeled as " flowback " of...Furthermore, Japan had to pay for everything it got (and had to provide " flowback " of derived technologies at no cost). And to add insult to injury, the...program that the Japanese had wanted to conduct indigenously and U.S. demands for free flowback further eroded any potential Japanese proprietary

  20. Strategy alternatives for homeland air and cruise missile defense.

    PubMed

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  1. 75 FR 71647 - Defense Federal Acquisition Regulation Supplement; Discussions Prior to Contract Award (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Deputy Under Secretary of Defense (Acquisition, Technology, and Logistics) to revise the DoD source... misunderstood requirements. DoD notes the potential disadvantages of this proposed change in increased time to...

  2. 75 FR 53705 - Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...

  3. Department of Defense Space Technology Guide

    DTIC Science & Technology

    2001-01-01

    Projected Applications, which summarizes a more detailed range of near -term experiments , demonstrations and developmental activities – Opportunities for...upon new, even smaller classes of spacecraft known generically as microsatellites. Near -term microsat experiments and technology demonstrations are...Additional projects with sensors hosted on both operational and experimental spacecraft to measure and characterize the upper atmosphere Experiment ACTD

  4. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... December 16, 2013 Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  5. Department of Defense Tri-Service Precision Machine-Tool Program. Quarterly report, February--April 1978

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1978-06-01

    Following a planning period during which the Lawrence Livermore Laboratory and the Department of Defense managing sponsor, the USAF Materials Laboratory, agreed on work statements, the Department of Defense Tri-Service Precision Machine-Tool Program began in February 1978. Milestones scheduled for the first quarter have been met. Tasks and manpower requirements for two basic projects, precision-machining commercialization (PMC) and a machine-tool task force (MTTF), were defined. Progress by PMC includes: (1) documentation of existing precision machine-tool technology by initiation and compilation of a bibliography containing several hundred entries: (2) identification of the problems and needs of precision turning-machine builders and ofmore » precision turning-machine users interested in developing high-precision machining capability; and (3) organization of the schedule and content of the first seminar, to be held in October 1978, which will bring together representatives from the machine-tool and optics communities to address the problems and begin the process of high-precision machining commercialization. Progress by MTTF includes: (1) planning for the organization of a team effort of approximately 60 to 80 international experts to contribute in various ways to project objectives, namely, to summarize state-of-the-art cutting-machine-tool technology and to identify areas where future R and D should prove technically and economically profitable; (2) preparation of a comprehensive plan to achieve those objectives; and (3) preliminary arrangements for a plenary session, also in October, when the task force will meet to formalize the details for implementing the plan.« less

  6. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    DTIC Science & Technology

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  7. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 219 and Appendix I to Chapter 2 RIN 0750-AH59 Defense Federal Acquisition Regulation Supplement; Extension of the Department of... Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is issuing this final rule...

  8. An advanced wide area chemical sensor testbed

    NASA Astrophysics Data System (ADS)

    Seeley, Juliette A.; Kelly, Michael; Wack, Edward; Ryan-Howard, Danette; Weidler, Darryl; O'Brien, Peter; Colonero, Curtis; Lakness, John; Patel, Paras

    2005-11-01

    In order to meet current and emerging needs for remote passive standoff detection of chemical agent threats, MIT Lincoln Laboratory has developed a Wide Area Chemical Sensor (WACS) testbed. A design study helped define the initial concept, guided by current standoff sensor mission requirements. Several variants of this initial design have since been proposed to target other applications within the defense community. The design relies on several enabling technologies required for successful implementation. The primary spectral component is a Wedged Interferometric Spectrometer (WIS) capable of imaging in the LWIR with spectral resolutions as narrow as 4 cm-1. A novel scanning optic will enhance the ability of this sensor to scan over large areas of concern with a compact, rugged design. In this paper, we shall discuss our design, development, and calibration process for this system as well as recent testbed measurements that validate the sensor concept.

  9. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Loan of Army/Defense Logistics Agency (DLA) owned... of Army/Defense Logistics Agency (DLA) owned property for use at national and State conventions. (a... will be submitted to the appropriate CONUS Army Commander of the area in which the convention will be...

  10. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Loan of Army/Defense Logistics Agency (DLA) owned... of Army/Defense Logistics Agency (DLA) owned property for use at national and State conventions. (a... will be submitted to the appropriate CONUS Army Commander of the area in which the convention will be...

  11. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Loan of Army/Defense Logistics Agency (DLA) owned... of Army/Defense Logistics Agency (DLA) owned property for use at national and State conventions. (a... will be submitted to the appropriate CONUS Army Commander of the area in which the convention will be...

  12. Defense Contract Management Agency

    Science.gov Websites

    , May 24. Click the photo above for more information. Members of the Defense Contract Management Agency for more information. Members of the Defense Contract Management Agency International Region conduct Skip to main content (Press Enter). Toggle navigation Defense Contract Management Agency Search

  13. Recognizing Plant Defense Priming.

    PubMed

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. 3 CFR - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export... Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act Memorandum for the...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  15. 1985 science and technology posture hearing with the Director of the Office of Science and Technology Policy. Hearing before the Committee on Science and Technology, 99th Congress, First Session, No. 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1985-01-01

    Presidential Science Adviser Dr. George Keyworth, Director of the Office of Science and Technology Policy, gave his annual (1985) report on US Science and Technology posture at a hearing of the Committee on Science and Technology of the US House of Representatives (99th Congress) on 5 Feb. 1985. He spoke of critical choices in three areas, i.e., how to reduce nuclear weapons, thereby to enhance the national security, how to ensure US technological superiority in the face of rapidly growing international competition, and how to accomplish the foregoing while reducing government deficits. US government support for Research and Development willmore » total $60 billion this year, $20 billion of which are for non-defense programs, and $8 billion for basic research. He emphasized the importance of the latter to the nation's economic wellbeing, and the need to make every research dollar count in the face of rising costs and soaring deficits. Dr. Keyworth urges aggressive US efforts to maintain its world leadership in science and technology.« less

  16. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    PubMed Central

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  17. Project management lessons learned on SDIO's Delta Star and Single Stage Rocket Technology programs

    NASA Technical Reports Server (NTRS)

    Klevatt, Paul L.

    1992-01-01

    The topics are presented in viewgraph form and include the following: a Delta Star (Delta 183) Program Overview, lessons learned, and rapid prototyping and the Single Stage Rocket Technology (SSRT) Program. The basic objective of the Strategic Defense Initiative Programs are to quickly reduce key uncertainties to a manageable range of parameters and solutions, and to yield results applicable to focusing subsequent research dollars on high payoff areas.

  18. Dilemmas of Japanese Defense.

    ERIC Educational Resources Information Center

    Kiyoshi, Nasu

    1978-01-01

    Traces Japan's attitude toward and preparation for national defense from the 1930s to 1978. Topics discussed include Japan's indifference to defense since World War II, America's responsibility to defend Japan in case of military attack, the possibility of a Soviet attack on Japan, and public opinion about defense in Japan. Journal availability:…

  19. Three applications of backscatter x-ray imaging technology to homeland defense

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2005-05-01

    A brief review of backscatter x-ray imaging and a description of three systems currently applying it to homeland defense missions (BodySearch, ZBV and ZBP). These missions include detection of concealed weapons, explosives and contraband on personnel, in vehicles and large cargo containers. An overview of the x-ray imaging subsystems is provided as well as sample images from each system. Key features such as x-ray safety, throughput and detection are discussed. Recent trends in operational modes are described that facilitate 100% inspection at high throughput chokepoints.

  20. Third NASA Advanced Composites Technology Conference, volume 1, part 2

    NASA Technical Reports Server (NTRS)

    Davis, John G., Jr. (Compiler); Bohon, Herman L. (Compiler)

    1993-01-01

    This document is a compilation of papers presented at the Third NASA Advanced Composites Technology (ACT) Conference held at Long Beach, California, 8-11 June 1992. The ACT Program is a major multi-year research initiative to achieve a national goal of technology readiness before the end of the decade. Conference papers recorded results of research in the ACT Program in the specific areas of automated fiber placement, resin transfer molding, textile preforms, and stitching as these processes influence design, performance, and cost of composites in aircraft structures. Papers sponsored by the Department of Defense on the Design and Manufacturing of Low Cost Composites (DMLCC) are also included in Volume 2 of this document.

  1. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Loan of Army/Defense Logistics Agency (DLA... § 621.1 Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State... will be submitted to the appropriate CONUS Army Commander of the area in which the convention will be...

  2. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Loan of Army/Defense Logistics Agency (DLA... § 621.1 Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State... will be submitted to the appropriate CONUS Army Commander of the area in which the convention will be...

  3. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  4. 76 FR 9680 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-22

    ... Subjects in 48 CFR Part 217 Government procurement. Mary Overstreet, Editor, Defense Acquisition... Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...: Final rule. SUMMARY: DoD is adopting without change an interim rule amending the Defense Federal...

  5. An observational study of defensible space in the neighbourhood park

    NASA Astrophysics Data System (ADS)

    Marzukhi, M. A.; Afiq, M. A.; Zaki, S. Ahmad; Ling, O. H. L.

    2018-02-01

    The planning of neighborhood park is important to provide space for interaction, leisure, and recreation among residents in any neighbourhood area. However, on an almost daily basis, newspapers report inappropriate incidents such as snatch theft, robbery and street attack that occurred in the neighborhood park. These cases reflect the significance of physical planning and design of neighborhood park that directly affect the safety and comfort of the users. Thus, this study attempts to engage with the defensible space concept in ensuring the security elements be applied in the planning of the recreational area. This study adopts a qualitative method form of research that is retrofitted to an observational study. The observational study is significant for revealing the condition of a neighbourhood park in the ‘real-world,’ in which direct observation is conducted on Taman Tasik Puchong Perdana. The observer focused on four elements or variables of defensible space concept including the provision of facilities in the neighborhood park, territoriality, surveillance, image and milieu. The findings revealed that the planning of Taman Tasik Puchong Perdana does not deliberate the defensible space elements, which may contribute to the crime activities in the park. In these circumstances, the planning of neighbourhood park needs to include proposals for the implementation of defensible space in response to the challenges underpinned by crime problems. Besides, the awareness among the residents needs to be emphasized with the support from local authorities and other organizations to manage and sustain the safety environment in the neighborhood park.

  6. Developing Information Technology for Vocational Education in Contiguous Destitute Areas Significance, Problems, and Countermeasures: The Case of the Wuling Mountain Area

    ERIC Educational Resources Information Center

    Wang, Jie; Xu, Fenghua

    2014-01-01

    Using the Wuling Mountain area as a case study, the authors discuss the significance as well as five problems of developing information technology for vocational education in contiguous destitute areas. Recommendations are provided at the end of the article. [Translated by Michelle LeSourd.

  7. 32 CFR 37.1375 - Technology investment agreements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Technology investment agreements. 37.1375... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1375 Technology investment agreements. A special class of assistance instruments used to increase involvement of...

  8. 32 CFR 37.1375 - Technology investment agreements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Technology investment agreements. 37.1375... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1375 Technology investment agreements. A special class of assistance instruments used to increase involvement of...

  9. 32 CFR 37.1375 - Technology investment agreements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Technology investment agreements. 37.1375... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1375 Technology investment agreements. A special class of assistance instruments used to increase involvement of...

  10. 32 CFR 37.1375 - Technology investment agreements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Technology investment agreements. 37.1375... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1375 Technology investment agreements. A special class of assistance instruments used to increase involvement of...

  11. 32 CFR 37.1375 - Technology investment agreements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Technology investment agreements. 37.1375... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1375 Technology investment agreements. A special class of assistance instruments used to increase involvement of...

  12. West European and East Asian perspectives on defense, deterrence, and strategy. Volume 2. Western European perspectives on defense, deterrence, and strategy. Technical report, 1 December 1982-15 May 1984

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pfaltzgraff, R.L.; Davis, J.K.; Dougherty, J.E.

    1984-05-16

    A survey of contemporary West European perspectives on defense, deterrence, and strategy, with special emphasis on the role of nuclear weapons deployed in, or assigned to, the NATO area. Changes have occurred during the past decade in the relative military strength of NATO and the Warsaw Pact, particularly as a result of the substantial growth in Soviet nuclear-capable systems and conventional forces assigned to Europe, and the momentum manifested by the Soviet Union in its deployments of intercontinental ballistic missiles. There has also been a substantial shift in West European thinking and attitudes about security and strategy. Together, these trendsmore » have created a need to reassess the posture of NATO forces generally, and especially nuclear weapons, both in a broader Euro-strategic framework and on the Central Front in the 1980s. The survey is on such issues as the future of the British and French national strategic nuclear forces; the role of the U.S.-strategic nuclear forces in the deterrence of conflict in Europe; the prospects of raising the nuclear threshold by the deployment of new conventional technologies; the impact of strategic defense initiatives on U.S.-NATO security; and the modernization of NATO intermediate-range nuclear capabilities, especially in light of the continuing deployment of the Soviet Union of new generation Euro-strategic forces targeted against Western Europe.« less

  13. Exemplar Practices for Department of Defense Technology Transfer

    DTIC Science & Technology

    2013-01-01

    2):176–183. Ruegg, R. 2000. “Delivering Public Benefits with Private-Sector Efficiency.” In Advanced Technology Program : Assessing Outcomes, edited ...The literature identified the following critical factors for a successful technology transfer program : an effective ORTA, engaged researchers, well...experts, and stakeholders. These interviews were held between June and September 2012. Programs and processes identified during the discussions

  14. Mixed waste focus area alternative technologies workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borduin, L.C.; Palmer, B.A.; Pendergrass, J.A.

    1995-05-24

    This report documents the Mixed Waste Focus Area (MWFA)-sponsored Alternative Technology Workshop held in Salt Lake City, Utah, from January 24--27, 1995. The primary workshop goal was identifying potential applications for emerging technologies within the Options Analysis Team (OAT) ``wise`` configuration. Consistent with the scope of the OAT analysis, the review was limited to the Mixed Low-Level Waste (MLLW) fraction of DOE`s mixed waste inventory. The Los Alamos team prepared workshop materials (databases and compilations) to be used as bases for participant review and recommendations. These materials derived from the Mixed Waste Inventory Report (MWIR) data base (May 1994), themore » Draft Site Treatment Plan (DSTP) data base, and the OAT treatment facility configuration of December 7, 1994. In reviewing workshop results, the reader should note several caveats regarding data limitations. Link-up of the MWIR and DSTP data bases, while representing the most comprehensive array of mixed waste information available at the time of the workshop, requires additional data to completely characterize all waste streams. A number of changes in waste identification (new and redefined streams) occurred during the interval from compilation of the data base to compilation of the DSTP data base with the end result that precise identification of radiological and contaminant characteristics was not possible for these streams. To a degree, these shortcomings compromise the workshop results; however, the preponderance of waste data was linked adequately, and therefore, these analyses should provide useful insight into potential applications of alternative technologies to DOE MLLW treatment facilities.« less

  15. 2011 Congressional Report on Defense Business Operations

    DTIC Science & Technology

    2011-04-30

    of information if it does not display a currently valid OMB control number. 1 . REPORT DATE 30 APR 2011 2 . REPORT TYPE 3. DATES COVERED 00-00...amended CongressionalReport 1 DefenseBusinessOperations 2 CongressionalReport Chapter 2 : Process Improvements Chapter 2 highlights enterprise...systems are developed through the construct of the Department’s five core business areas: 1 . Human Resources Management (HRM) 2 . Weapons Systems

  16. The Effect of Defense R&D Expenditures on Military Capability and Technological Spillover

    DTIC Science & Technology

    2013-03-01

    ix List of Figures Page Figure 1. Decision Tree for Sectoring R&D Units...approach, often called sectoring , categorizes R&D activities by funding source, and the functional approach categorizes R&D activities by their objective...economic objectives (defense, and control and care of environment) (OECD, 2002). Figure 1 shows the decision tree for sectoring R&D units and

  17. Defensive aids suite prototype for light armored vehicles

    NASA Astrophysics Data System (ADS)

    Cantin, Andre; Fortin, Jean; Venter, Johan; Philip, Brian G.; Hagen, Russell; Krieger, Dietmar; Greenley, Mike

    2001-09-01

    The Defence Research Establishment Valcartier has initiated in 1998 R&D work to investigate and to demonstrate key technologies required for future Defensive Aid Suite to protect Light Armoured Vehicles. A basic Defensive Aid Suite demonstrator (Phase I) was built and integrated into the LAV vetronics by Litton Systems Canada and his consortium. The Defensive Aid Suite consisted of a 2-band HARLIDTM-based laser detection head, a processor capable to control and deploy countermeasures and a DAS touch-screen display all integrated in a Light Armored Vehicle. The crew was able to select the operation mode for direct fire or smoke deployment by pushing one of the pair of buttons available at the bottom of the display. This system was successfully demonstrated in October 1999 during an international trial. This article gives an overview of the results obtained in the field as well as some of the lessons learnt. It also describes laboratory and field measurements made on the Laser Warning Receiver unit itself. The results of the DAS tactical use and of Human factor evaluation will illustrate its performance within typical laser threat scenarios. This work will serve as the basis for the recommendation of a future DAS demonstrator (Phase II) integrating more sensors and countermeasures.

  18. Control of Carbon Assimilation and Partitioning by Jasmonate: An Accounting of Growth-Defense Tradeoffs.

    PubMed

    Havko, Nathan E; Major, Ian T; Jewell, Jeremy B; Attaran, Elham; Browse, John; Howe, Gregg A

    2016-01-15

    Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA) is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA), which is a key indicator of leaf construction costs and leaf life span.

  19. Technology as a Craft of Deceit.

    ERIC Educational Resources Information Center

    Thompson, Mark E.

    This essay briefly presents the evolution of technology and the resulting warnings that many prominent writers have offered in defense of an analytic inquiry into man's interaction with technology. Various ways in which technology has been used to manipulate people are described, e.g., Vietnam, Watergate, the CIA, the Tuskegee Study, Subliminal…

  20. Heterogeneous Air Defense Battery Location: A Game Theoretic Approach

    DTIC Science & Technology

    In the air defense context of a missile-and-interceptor engagement, a challenge for the defender is that surface to air interceptor missile batteries ...often must be located to protect high-value targets dispersed over a vast area, subject to an attacker observing the disposition of batteries prior

  1. The growth of materials processing in space - A history of government support for new technology

    NASA Technical Reports Server (NTRS)

    Mckannan, E. C.

    1983-01-01

    Development of a given technology for national defense and large systems developments when the task is too large or risky for entrepreneurs, yet is clearly in the best interest of the nation are discussed. Advanced research to identify areas of interest was completed. Examples of commercial opportunities are the McDonnell-Douglas Corporation purification process for pharmaceutical products and the Microgravity Research Associates process for growing gallium arsenide crystals in space.

  2. Empowering self-defense training.

    PubMed

    Thompson, Martha E

    2014-03-01

    The purpose of self-defense training is to expand people's options, yet it is often framed as a solely physical, and limiting, response to violence. I draw on my own experience as a self-defense instructor and that of others in the self-defense movement to argue that an empowerment approach to self-defense training contributes to the anti-violence movement in multiple ways: providing a pathway to increase women's and girls' safety and their potential for becoming powerful and effective social change agents right now, providing an informed and embodied understanding of violence, and offering comprehensive options to recognize, prevent, and interrupt violence.

  3. Historical Perspectives: A Review and Evaluation of 76 Studies of the Defense Research Enterprise, 1945-2015

    DTIC Science & Technology

    2016-08-01

    MANAGEMENT FELLOW U.S. DEPARTMENT OF DEFENSE This report summarizes recommendations from 76 prior studies of the Department of Defense Research...Enterprise. A brief summary and evaluation of each study is provided, and recommendations are grouped according to management areas. Enduring themes...Prominent Trends in Historical Recommendations .................................................................................. 5 Knowledge Management

  4. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory... 102-3.50(d), the Department of Defense gives notice that it is renewing the charter for the Board of...: Jim Freeman, Deputy Committee Management Officer for the Department of Defense, 703-601-6128...

  5. In Defense of Japan

    DTIC Science & Technology

    2018-01-03

    national elections. The party majority gives Abe the potential to formally amend Article 9 of the Japanese constitution to authorize the Japanese Self ...Pacific. Japanese Constitution; Article 9; The United States and Japan Bi-lateral defense treaty; Collective Self Defense; Pacifism; Japanese Self ...involvement in collective self -defense (CSD). Factors leading up to this decision are a rapidly evolving strategic and political environment in

  6. Annual Defense Department Report FY 1973

    DTIC Science & Technology

    1972-02-22

    program of combatting Sickle- Cell Anemia. Finally, as we approach an all-volunteer force we will continually assess our recruiting and retention programs...GNP devoted to Defense continues to decline -- from 7.0% in FY 1972 to 6.4% in FY 1973. This is a 22 year low. 59 We also are requesting a suplemental ...complement Total Force Planning. Some of these initiatives will fall in areas where the U.S. bears the primary responsibility, while others stem from

  7. Research Technology

    NASA Image and Video Library

    2002-08-01

    A new, world-class laboratory for research into future space transportation technologies is under construction at the Marshall Space Flight Center (MSFC) in Huntsville, AL. The state-of-the-art Propulsion Research Laboratory will serve as a leading national resource for advanced space propulsion research. Its purpose is to conduct research that will lead to the creation and development of irnovative propulsion technologies for space exploration. The facility will be the epicenter of the effort to move the U.S. space program beyond the confines of conventional chemical propulsion into an era of greatly improved access to space and rapid transit throughout the solar system. The Laboratory is designed to accommodate researchers from across the United States, including scientists and engineers from NASA, the Department of Defense, the Department of Energy, universities, and industry. The facility, with 66,000 square feet of useable laboratory space, will feature a high degree of experimental capability. Its flexibility will allow it to address a broad range of propulsion technologies and concepts, such as plasma, electromagnetic, thermodynamic, and propellantless propulsion. An important area of emphasis will be development and utilization of advanced energy sources, including highly energetic chemical reactions, solar energy, and processes based on fission, fusion, and antimatter. The Propulsion Research Laboratory is vital for developing the advanced propulsion technologies needed to open up the space frontier, and will set the stage of research that could revolutionize space transportation for a broad range of applications.

  8. Water extracts from winery by-products as tobacco defense inducers.

    PubMed

    Benouaret, Razik; Goujon, Eric; Trivella, Aurélien; Richard, Claire; Ledoigt, Gérard; Joubert, Jean-Marie; Mery-Bernardon, Aude; Goupil, Pascale

    2014-10-01

    Water extracts from winery by-products exhibited significant plant defense inducer properties. Experiments were conducted on three marc extracts containing various amounts of polyphenols and anthocyanins. Infiltration of red, white and seed grape marc extracts into tobacco leaves induced hypersensitive reaction-like lesions with cell death evidenced by Evans Blue staining. The infiltration zones and the surrounding areas revealed accumulation of autofluorescent compounds under UV light. Leaf infiltration of the three winery by-product extracts induced defense gene expression. The antimicrobial PR1, β-1,3-glucanase PR2, and chitinase PR3 target genes were upregulated locally in tobacco plants following grape marc extract treatments. The osmotin PR5 transcripts accumulated as well in red marc extract treated-tobacco leaves. Overall, the winery by-product extracts elicited an array of plant defense responses making the grape residues a potential use of high value compounds.

  9. After Globalization Future Security in a Technology Rich World

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency,more » and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important

  10. Validation of the Comprehensive Assessment of Defense Style (CADS): mothers' and children's responses to the stresses of missile attacks.

    PubMed

    Wolmer, L; Laor, N; Cicchetti, D V

    2001-06-01

    This study furthers the validation of the Comprehensive Assessment of Defense Style (CADS) as a measure of children's defensive behavior. Participants were 81 mothers who assessed the defense style (CADS) of their 8- to 10-year-old children, as well as their own defense style and level of object relations. Five years earlier, the mothers had rated their children's symptom level and personality after the missile attacks during the Gulf War. The original factor structure of the CADS was replicated for the most part. Self-oriented and other-oriented defenses were related to the children's early personality and symptomatic reaction, as well as to their mother's defense style and level of object relations. The CADS factors correlated with the defenses of the Defense Mechanisms Manual. The results provide further validation of the CADS and suggest possible areas of implementation, such as longitudinal examination of defenses, psychopathology screening, and therapeutic improvement.

  11. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority...

  12. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    NASA Astrophysics Data System (ADS)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  13. Quantum cascade lasers for defense and security

    NASA Astrophysics Data System (ADS)

    Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.

    2013-10-01

    Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.

  14. Defense AT and L. Volume 41, Number 6

    DTIC Science & Technology

    2012-12-01

    own specialty. To paraphrase Abraham Maslow : If all you have is a hammer, everything looks like a nail. Systems engineers are supposed to take a...technology, and logistics face in the austere times we have entered. We will have to provide the ser- vices and products our warfighters need and...understanding of: (1) the constraints we must live within; (2) a willingness to prioritize our needs and accept less than we Defense AT&L: November–December

  15. A Future North American Defense Arrangement: Applying a Canadian Defense Policy Process Model

    DTIC Science & Technology

    2005-04-01

    American defense policy outlined by Hays, Vallance and Van Tassel in their comprehensive text entitled American Defense Policy. What is Canadian...outputs, lenses and feedback within an international and domestic environment. Adapted From Hays, Vallance , Van Tassel American Defence Policy, 1997...10th ed. (Springfield, Massachusetts: Merriam-Webster, Inc), 901. 2 Peter L Hays, B.J. Vallance , A.R. Van Tassel, eds., American Defense Policy, 7th

  16. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Status of GAO Recommendations to the Department of Defense (Fiscal Years 2001-2007)

    DTIC Science & Technology

    2008-12-11

    Name-Brand, Fast - Food Restaurants 5 GAO-01-943 Defense Manufacturing Technology Program: More Joint Projects and Tracking of Results Could...Oversight of Contractors under Foreign Influence Is Sufficient 6 2 GAO-05-456 Interagency Contracting: Franchise Funds Provide Convenience, but Value to

  18. NASA Space Technology Draft Roadmap Area 13: Ground and Launch Systems Processing

    NASA Technical Reports Server (NTRS)

    Clements, Greg

    2011-01-01

    This slide presentation reviews the technology development roadmap for the area of ground and launch systems processing. The scope of this technology area includes: (1) Assembly, integration, and processing of the launch vehicle, spacecraft, and payload hardware (2) Supply chain management (3) Transportation of hardware to the launch site (4) Transportation to and operations at the launch pad (5) Launch processing infrastructure and its ability to support future operations (6) Range, personnel, and facility safety capabilities (7) Launch and landing weather (8) Environmental impact mitigations for ground and launch operations (9) Launch control center operations and infrastructure (10) Mission integration and planning (11) Mission training for both ground and flight crew personnel (12) Mission control center operations and infrastructure (13) Telemetry and command processing and archiving (14) Recovery operations for flight crews, flight hardware, and returned samples. This technology roadmap also identifies ground, launch and mission technologies that will: (1) Dramatically transform future space operations, with significant improvement in life-cycle costs (2) Improve the quality of life on earth, while exploring in co-existence with the environment (3) Increase reliability and mission availability using low/zero maintenance materials and systems, comprehensive capabilities to ascertain and forecast system health/configuration, data integration, and the use of advanced/expert software systems (4) Enhance methods to assess safety and mission risk posture, which would allow for timely and better decision making. Several key technologies are identified, with a couple of slides devoted to one of these technologies (i.e., corrosion detection and prevention). Development of these technologies can enhance life on earth and have a major impact on how we can access space, eventually making routine commercial space access and improve building and manufacturing, and weather

  19. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Oehmen, Christopher S.

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less

  20. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    PubMed

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  1. FY 1992/FY 1993 Budget Descriptive Summaries for the Office of the Secretary of Defense

    DTIC Science & Technology

    1991-02-01

    UNCLASSIFIED AD-A235 927 TC FY 1992/FY 1993 BUDGET DESCRIPTIVE SUMMARIES FOR THE OFFICE OF THE SECRETARY OF DEFENSE FEBRUARY 1991 Dist. A. per...Institute", to be sponsored by the Director of the Office of Science and Technology Policy. The Institute is required to survey the views of US industry...National Critical.Technologies Panel, chaired by the Director of the Office of Science and Technology Policy, and to analyze worldwide trends. The

  2. Defense Acquisition Reform, 19602009: An Elusive Goal

    DTIC Science & Technology

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany , France, United Kingdom, and Italy).11 Major weapon systems...and to a lesser extent, Germany ) compared with that of the United States was an im- portant reason for Japan’s higher rate of productivity growth...professions and areas of expertise. DoD vetted prospects from non-defense businesses such as insurance and cruise lines, from organized labor, and

  3. 32 CFR 1602.5 - Area office staff.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Area office staff. 1602.5 Section 1602.5....5 Area office staff. The compensated employees, civilian and military, of the Selective Service System employed in an area office will be referred to as the area office staff. ...

  4. 32 CFR 1602.5 - Area office staff.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Area office staff. 1602.5 Section 1602.5....5 Area office staff. The compensated employees, civilian and military, of the Selective Service System employed in an area office will be referred to as the area office staff. ...

  5. 32 CFR 1602.5 - Area office staff.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Area office staff. 1602.5 Section 1602.5....5 Area office staff. The compensated employees, civilian and military, of the Selective Service System employed in an area office will be referred to as the area office staff. ...

  6. 32 CFR 1602.5 - Area office staff.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Area office staff. 1602.5 Section 1602.5....5 Area office staff. The compensated employees, civilian and military, of the Selective Service System employed in an area office will be referred to as the area office staff. ...

  7. 32 CFR 1602.5 - Area office staff.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Area office staff. 1602.5 Section 1602.5....5 Area office staff. The compensated employees, civilian and military, of the Selective Service System employed in an area office will be referred to as the area office staff. ...

  8. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    PubMed

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  9. 75 FR 32416 - Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board AGENCY: Department of Defense (DoD). ACTION: Notice of advisory committee meeting. SUMMARY: The Defense Science Board Task Force on the Survivability of DoD Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons...

  10. Peeling the onion: an heuristic overview of hit-to-kill missile defense in the 21st century

    NASA Astrophysics Data System (ADS)

    LaCroix, Len; Kurzius, Shelby

    2005-03-01

    Researchers engaged in the development of infrared detector technologies may well benefit from a broader understanding of their products from the perspective of the end-user. An appreciation of how this technology is to be used by system designers, many of whom possess only a rudimentary understanding of quantum physics, is highly germane. Answers to questions like: "What device technology will be employed," "How will the device be used?" and "What are the impacts on signal-to-noise?" are of critical importance. In this paper, some of the fundamentals of hit-to-kill missile defense technology are examined in a largely non-mathematical context. From its "Star Wars" inception during the Reagan administration, to today"s Missile Defense Agency, the core requirement of missile defense has not changed - find the threat and destroy it before it reaches its destination. This fundamental requirement, while conceptually straightforward, is extraordinarily difficult to satisfy, and is almost exclusively dependent on our ability to detect and designate a relatively small, very fast-moving, room-temperature object, at great distances, and usually in a severe environment of shock and vibration further clouded by error and uncertainty. With an obvious bias toward passive IR detection and associated focal plane array characteristics, the flight of a fictitious interceptor is followed from launch to impact. At various points along the interceptor"s trajectory, a "peel the onion" approach is utilized to expose increasingly detailed layers of behavior, including the eventual release of the kinetic kill vehicle, and its autonomous flight to a body-to-body impact with its target. Various sources of error and their impact on the success of the mission are examined, and an overall understanding of the key features of the infrared seeker and its critical role in missile defense are ultimately developed.

  11. Concept of defensive medicine and litigation among Sudanese doctors working in obstetrics and gynecology.

    PubMed

    Ali, AbdelAziem A; Hummeida, Moawia E; Elhassan, Yasir A M; Nabag, Wisal O M; Ahmed, Mohammed Ahmed A; Adam, Gamal K

    2016-02-09

    Obstetrics and gynaecology always has reputation for being a highly litigious. The field of obstetrics and gynaecology is surrounded by different circumstances that stimulate the doctors to practice defensive medicine. This study was directed to assess the extent and the possible effect of defensive medicine phenomenon (in term of knowledge and prevalence) on medical decision making among different grades of obstetric and gynaecologic Sudanese doctors, and to determine any experience of medical litigations with respect to sources and factors associated with it (in term of area of work, characteristics of the area at which the doctors worked, professionalism, hospitals systems…ect). A total of 117 doctors were approached, their distribution according to job description was as follow: consultants (42.7%, 50\\117) registrars (34.2%, 40\\117) and specialists (23.1%, 27\\117). The majority 89.7% had the impression that litigation against doctors are increasing and 27.6% had a direct experience of litigation. In this study less than one half (42.7%) of the surveyed doctors knew the concept of defensive medicine and 71.8% reported practicing one or another form of defensive medicine. The different sources of the litigations reported by the doctors included: maternal death (n = 15), perinatal death (n = 5), other {misdiagnosis, intra-uterine fetal death, uterine perforation, rupture uterus} (n = 4), fetal distress (n = 3), injury to viscera (n = 3) and shoulder dystocia (n = 2). In this study the experience of medical litigation was significantly observed among those who worked in area of blame culture (90.6% Vs 56.5%, P = 0.000). In logistic regression model, there was no significant difference between those who knew the concept of defence medicine and those who didn't. There should be strategic plan to reduce the practice of defensive medicine and medical litigation against doctors.

  12. Quantification of moving target cyber defenses

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Cybenko, George

    2015-05-01

    Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential "game-changers" in an effort to increase the attacker's workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.

  13. 76 FR 1408 - Notification of an Open Meeting of the National Defense University Board of Visitors (BOV)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ... future agenda will include discussion on Defense transformation, faculty development, facilities, information technology, curriculum development, post 9/11 initiatives as well as other operational issues and...

  14. On limiting technology by negotiated agreement

    NASA Astrophysics Data System (ADS)

    Carnesale, Albert

    1983-10-01

    The substance of my remarks tonight will be far narrower in scope than the prescribed title of my talk would indicate. This reflects two considerations: first, this topical meeting is focused on technologies associated with nuclear weapons systems; and, second, President Reagan recently (i.e., on March 23, 1983) called for ``a program to counter the awesome Soviet missile threat with measures that are defensive.'' In light of these considerations, I will concentrate tonight on the case of anti-ballistic missile (ABM) systems as an example of a countinuing effort to limit technology by negotiated agreement? Why limit ABM systems? After all, such systems are defensive in nature, not offensive. Defensive systems are intended to protect people and the things of value to them. It is the offensive systems that cause death and destruction. Why don't we just go ahead and deploy the best available ABM system, and develop and test even better systems for deployment in the future?

  15. Control of Carbon Assimilation and Partitioning by Jasmonate: An Accounting of Growth–Defense Tradeoffs

    PubMed Central

    Havko, Nathan E.; Major, Ian T.; Jewell, Jeremy B.; Attaran, Elham; Browse, John; Howe, Gregg A.

    2016-01-01

    Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA) is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA), which is a key indicator of leaf construction costs and leaf life span. PMID:27135227

  16. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms... changed only by amendments made pursuant to section 38 of the Arms Export Control Act (22 U.S.C. 2778...

  17. 32 CFR 552.25 - Entry regulations for certain Army training areas in Hawaii.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in Hawaii. 552.25 Section 552.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE... Regulations for Certain Army Training Areas in Hawaii § 552.25 Entry regulations for certain Army training areas in Hawaii. (a) Purpose. (1) This regulation establishes procedures governing the entry onto...

  18. Overview of nanotechnology and its applicability to the Department of Defense

    NASA Astrophysics Data System (ADS)

    Hernandez, Allison; Stevens, Rick; Thorson, Kevin; Whaley, Gregory J.

    2005-08-01

    Advances in a wide variety of nanotechnologies are expected to substantially benefit future military weapon systems. The technology development cycle for military platforms requires a given technology to reach a defined state of maturity before its use in a deployable system. Nanotechnologies such as quantum dots and carbon nanotubes, while showing great promise of performance benefits, are still considered too immature for immediate use. Defense contractors are in active research of applications of nanoscale engineered materials and devices and are beginning to engage nanotechnology suppliers for future military platforms.

  19. Optimal Defense Strategies in an Idealized Microbial Food Web under Trade-Off between Competition and Defense

    PubMed Central

    Våge, Selina; Storesund, Julia E.; Giske, Jarl; Thingstad, T. Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of “Keystone Predation” (KP) and “Killing-the-Winner” (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean. PMID:24999739

  20. Sandia National Laboratories: Employee & Retiree Resources: Emergency

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  1. Sandia National Laboratories: Research: Laboratory Directed Research &

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  2. Sandia National Laboratories: Sandia National Laboratories: Missions:

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  3. Sandia National Laboratories: About Sandia: Community Involvement:

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  4. Sandia National Laboratories: Research: Research Foundations: Nanodevices

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  5. Sandia National Laboratories: Sandia inks pact with Fire and Rescue

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  6. Sandia National Laboratories: Cooperative Research and Development

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  7. Defense Business Board

    Science.gov Websites

    Assessment on the Creation of an Under Secretary of Defense for Business Management & Information OUR Defense team for 2017. View Study Best Practices for Real Property Management Best Practices for Real Property Management There is now an opportunity to modernize the management of the Department's real

  8. The Anatomy of Self-Defense

    ERIC Educational Resources Information Center

    Sparks Stein, Pamela; Richardson, April D.; Challman, Sandra D.

    2008-01-01

    The following study describes a creative application of anatomical principles in the instruction of self-defense. Undergraduates at the University of Kentucky were invited to a special lecture that featured a series of self-defense moves introduced by a local police officer. Following a demonstration of each self-defense tactic, the students were…

  9. Study of flood defense structural measures priorities using Compromise Programming technique

    NASA Astrophysics Data System (ADS)

    Lim, D.; Jeong, S.

    2017-12-01

    Recent climate change of global warming has led to the frequent occurrence of heavy regional rainfalls. As such, inundation vulnerability increases in urban areas with high population density due to the low runoff carrying capacity. This study selects a sample area (Janghang-eup, the Republic of Korea), which is one of the most vulnerable areas to flooding, analyzing the urban flood runoff model (XP-SWMM) and using the MCDM (Multi-Criteria Decision Making) technique to establish flood protection structural measures. To this end, we compare the alternatives and choose the optimal flood defense measure: our model is utilized with three flood prevention structural measures; (i) drainage pipe construction; (ii) water detention; and (iii) flood pumping station. Dividing the target area into three small basins, we propose flood evaluations for an inundation decrease by studying the flooded area, the maximum inundation depth, the damaged residential area, and the construction cost. In addition, Compromise Programming determines the priority of the alternatives. As a consequent, this study suggests flood pumping station for Zone 1 and drainage pipe construction for Zone 2 and Zone 3, respectively, as the optimal flood defense alternative. Keywords : MCDM; Compromise Programming; Urban Flood Prevention; This research was supported by a grant [MPSS-DP-2013-62] through the Disaster and Safety Management Institute funded by Ministry of Public Safety and Security of Korean government.

  10. Potential means of support for materials processing in space. A history of government support for new technology

    NASA Technical Reports Server (NTRS)

    Mckannan, E. C.

    1983-01-01

    Development of a given technology for national defense and large systems developments when the task is too large or risky for entrepreneurs, yet is clearly in the best interest of the nation are discussed. Advanced research to identify areas of interest was completed. Examples of commercial opportunities are the McDonnell-Douglas Corporation purification process for pharmaceutical products and the Microgravity Research Associates process for growing gallium arsenide crystals in space.

  11. Identifying psychotic defenses in a clinical interview.

    PubMed

    Berney, Sylvie; de Roten, Yves; Beretta, Véronique; Kramer, Ueli; Despland, Jean-Nicolas

    2014-05-01

    The Defense Mechanisms Rating Scales (DMRS), one of the most widely used and validated instruments in the study of defense mechanisms, does not include psychotic defenses. The Psychotic-DMRS (P-DMRS) has been developed to include 6 psychotic defense mechanisms: psychotic denial, autistic withdrawal, distortion, delusional projection, fragmentation, and concretization. We discuss psychotic defenses, including the difference between psychotic defenses and psychotic symptoms. Six clinical illustrations demonstrate how the 6 P-DMRS defenses can be identified in patients' narratives selected from the transcripts of dynamic interviews. Implications with respect to patient evaluation and treatment are discussed. © 2014 Wiley Periodicals, Inc.

  12. Cooled variable-area radial turbine technology program

    NASA Technical Reports Server (NTRS)

    Large, G. D.; Meyer, L. J.

    1982-01-01

    The objective of this study was a conceptual evaluation and design analyses of a cooled variable-area radial turbine capable of maintaining nearly constant high efficiency when operated at a constant speed and pressure ratio over a range of flows corresponding to 50- to 100-percent maximum engine power. The results showed that a 1589K (2400 F) turbine was feasible that would satisfy a 4000-hour duty cycle life goal. The final design feasibility is based on 1988 material technology goals. A peak aerodynamic stage total efficiency of 0.88 was predicted at 100 percent power. Two candidate stators were identified: an articulated trailing-edge and a locally movable sidewall. Both concepts must be experimentally evaluated to determine the optimum configuration. A follow-on test program is proposed for this evaluation.

  13. Good neighbors make good defenses: associational refuges reduce defense investment in African savanna plants.

    PubMed

    Coverdale, Tyler C; Goheen, Jacob R; Palmer, Todd M; Pringle, Robert M

    2018-06-25

    Intraspecific variation in plant defense phenotype is common and has wide-ranging ecological consequences. Yet prevailing theories of plant defense allocation, which primarily account for interspecific differences in defense phenotype, often fail to predict intraspecific patterns. Furthermore, although individual variation in defense phenotype is often attributed to ecological interactions, few general mechanisms have been proposed to explain the ubiquity of variable defense phenotype within species. Here, we show experimentally that associational refuges and induced resistance interact to create predictable intraspecific variation in defense phenotype in African savanna plants. Physically defended species from four families (Acanthaceae, Asparagaceae, Cactaceae, and Solanaceae) growing in close association with spinescent Acacia trees had 39-78% fewer spines and thorns than did isolated conspecifics. For a subset of these species, we used a series of manipulative experiments to show that this variability is maintained primarily by a reduction in induced responses among individuals that seldom experience mammalian herbivory, whether due to association with Acacia trees or to experimental herbivore exclusion. Unassociated plants incurred 4- to 16-fold more browsing damage than did associated individuals and increased spine density by 16-38% within one month following simulated browsing. In contrast, experimental clipping induced no net change in spine density among plants growing beneath Acacia canopies or inside long-term herbivore exclosures. Associated and unassociated individuals produced similar numbers of flowers and seeds, but seedling recruitment and survival were vastly greater in refuge habitats, suggesting a net fitness benefit of association. We conclude that plant-plant associations consistently decrease defense investment in this system by reducing both the frequency of herbivory and the intensity of induced responses, and that inducible responses

  14. Streamlining Administrative Procedures at the Defense Language Institute: The Strategic Impact Model in Action

    ERIC Educational Resources Information Center

    Oded, Yaniv; Su, Bude

    2010-01-01

    Performance at the Defense Language Institute was examined through the prism of human performance technology and the strategic impact model. This examination revealed performance deficiencies in the administrative realm that required mainly a noninstructional intervention. A systematic analysis showed that digitizing administrative procedures…

  15. Report on DoD Civilians Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies

    DTIC Science & Technology

    1990-01-03

    Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies References: (a) DoD Instruction 7730.29, subject as above, June 25...b). B. APPLICABILITY This Instruction applies to the Office of the Secretary of Defense (OSD), the Inspector General of the Department of Defense (IG...direct hire civilians employed by the Office of the Secretary of Defense and other Defense organizations for submission to the Department of Labor. 2

  16. Defense Acquisitions: Assessments of Selected Major Weapon Programs

    DTIC Science & Technology

    2006-03-01

    also continue to reduce DOD’s buying power, as less capability will be provided for the money invested. In the larger context, DOD needs to make...Brilliant Antiarmor Submunition BAMS Broad Area Maritime Surveillance CDA Commander’s Digital Assistant CEC Cooperative Engagement Capability CMUP...Defense (DOD) maximize its return on investment and provide the warfighter with needed capabilities at the best value for the taxpayer. Since 1990

  17. Host plant invests in growth rather than chemical defense when attacked by a specialist herbivore.

    PubMed

    Arab, Alberto; Trigo, José Roberto

    2011-05-01

    Plant defensive compounds may be a cost rather than a benefit when plants are attacked by specialist insects that may overcome chemical barriers by strategies such as sequestering plant compounds. Plants may respond to specialist herbivores by compensatory growth rather than chemical defense. To explore the use of defensive chemistry vs. compensatory growth we studied Brugmansia suaveolens (Solanaceae) and the specialist larvae of the ithomiine butterfly Placidina euryanassa, which sequester defensive tropane alkaloids (TAs) from this host plant. We investigated whether the concentration of TAs in B. suaveolens was changed by P. euryanassa damage, and whether plants invest in growth, when damaged by the specialist. Larvae feeding during 24 hr significantly decreased TAs in damaged plants, but they returned to control levels after 15 days without damage. Damaged and undamaged plants did not differ significantly in leaf area after 15 days, indicating compensatory growth. Our results suggest that B. suaveolens responds to herbivory by the specialist P. euryanassa by investing in growth rather than chemical defense.

  18. 3D Visualization of Urban Area Using Lidar Technology and CityGML

    NASA Astrophysics Data System (ADS)

    Popovic, Dragana; Govedarica, Miro; Jovanovic, Dusan; Radulovic, Aleksandra; Simeunovic, Vlado

    2017-12-01

    3D models of urban areas have found use in modern world such as navigation, cartography, urban planning visualization, construction, tourism and even in new applications of mobile navigations. With the advancement of technology there are much better solutions for mapping earth’s surface and spatial objects. 3D city model enables exploration, analysis, management tasks and presentation of a city. Urban areas consist of terrain surfaces, buildings, vegetation and other parts of city infrastructure such as city furniture. Nowadays there are a lot of different methods for collecting, processing and publishing 3D models of area of interest. LIDAR technology is one of the most effective methods for collecting data due the large amount data that can be obtained with high density and geometrical accuracy. CityGML is open standard data model for storing alphanumeric and geometry attributes of city. There are 5 levels of display (LoD0, LoD1, LoD2, LoD3, LoD4). In this study, main aim is to represent part of urban area of Novi Sad using LIDAR technology, for data collecting, and different methods for extraction of information’s using CityGML as a standard for 3D representation. By using series of programs, it is possible to process collected data, transform it to CityGML and store it in spatial database. Final product is CityGML 3D model which can display textures and colours in order to give a better insight of the cities. This paper shows results of the first three levels of display. They consist of digital terrain model and buildings with differentiated rooftops and differentiated boundary surfaces. Complete model gives us a realistic view of 3D objects.

  19. 32 CFR Appendix D to Part 552 - Unauthorized Activities in Fort Lewis Maneuver Areas

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Areas D Appendix D to Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... Appendix D to Part 552—Unauthorized Activities in Fort Lewis Maneuver Areas Civilian paramilitary...-detecting, including recovery of ammunition residue of fragments, archaeological or cultural artifacts, or...

  20. 32 CFR Appendix D to Part 552 - Unauthorized Activities in Fort Lewis Maneuver Areas

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Areas D Appendix D to Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Pt. 552, App. D Appendix D to Part 552—Unauthorized Activities in Fort Lewis Maneuver Areas Civilian paramilitary...

  1. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    DTIC Science & Technology

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  2. 78 FR 23675 - Importation of Defense Articles and Defense Services-U.S. Munitions Import List (2011R-20P)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... No. ATF-50F; AG Order No. 3383-2013] RIN 1140-AA46 Importation of Defense Articles and Defense... pursuant to the Arms Export Control Act (AECA) and Executive Order 13637 to designate defense articles and... whether the Secretary of State controls such defense articles or defense services for purposes of export...

  3. Machine Tool Technology. Tutoring Strategies for Metal Workers.

    ERIC Educational Resources Information Center

    Anoka-Hennepin Technical Coll., Minneapolis, MN.

    This tutoring strategies course designed to prepare tutors in a machine tool technology program was developed during a project to retrain defense industry workers at risk of job loss or dislocation because of conversion of the defense industry. Course contents are as follows: why you are here; qualifications of a tutor; what's in it for tutors,…

  4. 75 FR 55575 - Office of the Secretary: Notification of an Open Meeting of the National Defense University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-13

    ... future agenda will include discussion on Defense transformation, faculty development, facilities, information technology, curriculum development, post 9/11 initiatives as well as other operational issues and...

  5. Bayesian performance metrics and small system integration in recent homeland security and defense applications

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Kostrzewski, Andrew; Patton, Edward; Pradhan, Ranjit; Shih, Min-Yi; Walter, Kevin; Savant, Gajendra; Shie, Rick; Forrester, Thomas

    2010-04-01

    In this paper, Bayesian inference is applied to performance metrics definition of the important class of recent Homeland Security and defense systems called binary sensors, including both (internal) system performance and (external) CONOPS. The medical analogy is used to define the PPV (Positive Predictive Value), the basic Bayesian metrics parameter of the binary sensors. Also, Small System Integration (SSI) is discussed in the context of recent Homeland Security and defense applications, emphasizing a highly multi-technological approach, within the broad range of clusters ("nexus") of electronics, optics, X-ray physics, γ-ray physics, and other disciplines.

  6. A Framework for Managing Inter-Site Storage Area Networks using Grid Technologies

    NASA Technical Reports Server (NTRS)

    Kobler, Ben; McCall, Fritz; Smorul, Mike

    2006-01-01

    The NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independent collaborating institutions using Storage Area Network Routers (SAN Routers). We present a framework for managing inter-site distributed SANs that uses Grid Technologies to balance the competing needs to control local resources, share information, delegate administrative access, and manage the complex trust relationships between the participating sites.

  7. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    DTIC Science & Technology

    2015-06-01

    Defense. (University of California Press, Berkeley and Los Angeles , 1967). 22 but due to the Soviet Union basis system, it is not as efficient in...Making for Defense. University of California Press, Berkeley and Los Angeles , 1967. Hitch, Charles Johnston and Roland N. McKean. The Economics of...loss of defense is not an instantaneous phenomenon. This phenomenon has led to human disorder, blind and continuous personnel downsizing, reform of the

  8. The Evolution of the Contract Type Used in Defense Acquisition with a Focus on Major Defense Weapon Systems

    DTIC Science & Technology

    2012-09-01

    III. THE DEFENSE MARKETPLACE A. DEFENSE INDUSTRY OVERVIEW The market of the defense industry in the United States is different than the commercial...marketplace in a number of respects. Lorell, Lowell, Kennedy, and Levaux (2000) defined the uniqueness of the U.S. defense market in two ways. First...the U.S. defense market for weapon systems is characterized by a single buyer (Lorell et al., 2000, p. 13). “The second distinguishing feature of

  9. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances

  10. 32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Areas D Appendix D to Subpart M of Part 552 National Defense Department of Defense (Continued.... D Appendix D to Subpart M of Part 552—Unauthorized Activities in Maneuver Training Areas 1. Fort... metal-detecting, including recovery of ammunition residue or fragments, archaeological or cultural...

  11. Defense Institution Building: An Assessment

    DTIC Science & Technology

    2016-01-01

    collectively responsible for national-level defense oversight, governance, and management. Study Objectives and Research Questions The objectives of...Defense Studies , in this case) posts a per- manent representative with the command to help recruit for resident courses, suggest courses to be...foreign military officers to conduct study and research on security-related topics Program 2 Defense institutions/ education and training

  12. Report to the Congress on the Strategic Defense Initiative 1990

    DTIC Science & Technology

    1990-05-01

    thermoacoustic drivers, pulse tube coolers, and sorption coolers. High efficiency is 7-4 I Technology Base expected from the magnetic cooler work, currently in...generated by SDI research, the degree to which certain types of defensive systems discourage an adversary from attempting to overwhelm them with additional...energy interceptor that has replaced earlier approaches. Nevertheless, development of an earlier approach known as SBI (referring to a specific type of

  13. Multi-Objective Optimization of System Capability Satisficing in Defense Acquisition

    DTIC Science & Technology

    2012-01-01

    of System Capability Satisficing in Defense Acquisition 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Stevens Institute of Technology,School of Systems...Report (SAR) 18. NUMBER OF PAGES 27 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT

  14. An Aerospace and Defense Industry Market Index for 1950-2012 and the Connection With Defense Spending

    DTIC Science & Technology

    2012-04-30

    select few financial measures, and by their infrequent production, have limited value in supporting the Defense Department’s knowledge refresh on the...their bread and butter business of defense production. The stable relationship that existed prior to the 1990s between defense production and

  15. Transportation Science and Technology Strategy.

    DOT National Transportation Integrated Search

    1997-09-01

    The report, released by the National Science Technology Council (NSTC), is a comprehensive strategic plan developed by the Departments of Transportation, Defense, Energy, and Commerce, the Environmental Protection Agency, the National Aeronautics and...

  16. Active-passive bistatic surveillance for long range air defense

    NASA Astrophysics Data System (ADS)

    Wardrop, B.; Molyneux-Berry, M. R. B.

    1992-06-01

    A hypothetical mobile support receiver capable of working within existing and future air defense networks as a means to maintain essential surveillance functions is considered. It is shown how multibeam receiver architecture supported by digital signal processing can substantially improve surveillance performance against chaff and jamming threats. A dual-mode support receiver concept is proposed which is based on the state-of-the-art phased-array technology, modular processing in industry standard hardware and existing networks.

  17. Emerging technologies for bioweapons defense.

    PubMed

    Nguyen, Sinh; Rosen, Joseph M; Koop, C Everett

    2005-01-01

    The Global War on Terrorism (GWOT) has changed the way we think about national security. The tragic events of Sept.11 have shown us that world of the 21(st) century is clearly a dangerous place. Terrorism, more than ever, affects the very lives of each and every citizens of our country. Al Qaida has proven that it is able to use simple rudimentary methods to invoke strategic economic losses to our society with our own domestic resources as its weapons. The dawn of the new century has brought forth a new kind of asymmetric war where guerilla fighters are armed not with rifles but with technology at the touch of a keyboard. Warfare as we know it has changed and just as the military has its "transformation", medicine so too must have its own transformation in order to protect our citizen against the ever changing threat of bioterrorism. Virtual Reality and its applications can play a vital role in developing new countermeasures to minimize the catastrophic effects of a potential bioterror attack.

  18. Role of the Department of Defense in the Research and Development of Alternative Fuels

    DTIC Science & Technology

    2015-06-12

    most cost effective defense against another oil embargo than subsidizing synthetic fuels .”57 Again, the political and budgetary climate effectively......to develop technologies that will decrease the nation’s need for fossil fuel . The market demand for fuel -efficient cars sharply increased within the

  19. The conservation and management of migratory and resident birds and their habitats on Department of Defense lands

    Treesearch

    Joe Hautzenroder

    2005-01-01

    Managing over 25 million acres of land on hundreds of installations, the United States Department of Defense (DoD) plays a key role in Partners in Flight (PIF). Department of Defense lands represent a critical network of habitats for neotropical migratory birds, offering these birds migratory stopover areas for resting and feeding, and suitable sites for nesting and...

  20. Metropolitian area network services comprised of virtual local area networks running over hybrid fiber-coax and asynchronous transfer mode technologies

    NASA Astrophysics Data System (ADS)

    Biedron, William S.

    1995-11-01

    Since 1990 there has been a rapid increase in the demand for communication services, especially local and wide area network (LAN/WAN) oriented services. With the introduction of the DFB laser transmitter, hybrid-fiber-coax (HFC) cable plant designs, ATM transport technologies and rf modems, new LAN/WAN services can now be defined and marketed to residential and business customers over existing cable TV systems. The term metropolitan area network (MAN) can be used to describe this overall network. This paper discusses the technical components needed to provision these services as well as provides some perspectives on integration issues. Architecture at the headend and in the backbone is discussed, as well as specific service definitions and the technology issues associated with each. The TCP/IP protocol is suggested as a primary protocol to be used throughout the MAN.

  1. Defense Primer: A Guide for New Members

    DTIC Science & Technology

    2017-03-03

    1 President’s Constitutional Authority with Regard to the Armed Forces ................................... 1 The Department of Defense ...primers to give Members of Congress an overview of key aspects of the Department of Defense and how Congress exercises authority over it. A consolidated...for New Members Congressional Research Service 2 The Department of Defense CRS In Focus IF10543, Defense Primer: The Department of Defense , by

  2. Healthcare Information Technology (HIT) in an Anti-Access (A2) and Area Denial (AD) Environment

    DTIC Science & Technology

    2014-03-01

    OFFICE OF THE COMMAND SURGEON, AIR COMBAT COMMAND FELLOWSHIP PAPER HEALTHCARE INFORMATION TECHNOLOGY (HIT) IN AN ANTI-ACCESS (A2) AND AREA...expeditionary responses. A light and lean medical response that utilizes emerging technology , specifically HIT, enhances the AFMS’ readiness posture and...expeditionary medical capability. The new USAF reality in an A2/AD environment is impeded access, very little if any technological dominance

  3. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... in its smallest dimension) that enter or pass through an open storage area shall be protected with...

  4. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... in its smallest dimension) that enter or pass through an open storage area shall be protected with...

  5. Defense pattern of Chinese cork oak across latitudinal gradients: influences of ontogeny, herbivory, climate and soil nutrients

    PubMed Central

    Wang, Xiao-Fei; Liu, Jian-Feng; Gao, Wen-Qiang; Deng, Yun-Peng; Ni, Yan-Yan; Xiao, Yi-Hua; Kang, Feng-Feng; Wang, Qi; Lei, Jing-Pin; Jiang, Ze-Ping

    2016-01-01

    Knowledge of latitudinal patterns in plant defense and herbivory is crucial for understanding the mechanisms that govern ecosystem functioning and for predicting their responses to climate change. Using a widely distributed species in East Asia, Quercus variabilis, we aim to reveal defense patterns of trees with respect to ontogeny along latitudinal gradients. Six leaf chemical (total phenolics and total condensed tannin concentrations) and physical (cellulose, hemicellulose, lignin and dry mass concentration) defensive traits as well as leaf herbivory (% leaf area loss) were investigated in natural Chinese cork oak (Q. variabilis) forests across two ontogenetic stages (juvenile and mature trees) along a ~14°-latitudinal gradient. Our results showed that juveniles had higher herbivory values and a higher concentration of leaf chemical defense substances compared with mature trees across the latitudinal gradient. In addition, chemical defense and herbivory in both ontogenetic stages decreased with increasing latitude, which supports the latitudinal herbivory-defense hypothesis and optimal defense theory. The identified trade-offs between chemical and physical defense were primarily determined by environmental variation associated with the latitudinal gradient, with the climatic factors (annual precipitation, minimum temperature of the coldest month) largely contributing to the latitudinal defense pattern in both juvenile and mature oak trees. PMID:27252112

  6. Defense pattern of Chinese cork oak across latitudinal gradients: influences of ontogeny, herbivory, climate and soil nutrients

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Fei; Liu, Jian-Feng; Gao, Wen-Qiang; Deng, Yun-Peng; Ni, Yan-Yan; Xiao, Yi-Hua; Kang, Feng-Feng; Wang, Qi; Lei, Jing-Pin; Jiang, Ze-Ping

    2016-06-01

    Knowledge of latitudinal patterns in plant defense and herbivory is crucial for understanding the mechanisms that govern ecosystem functioning and for predicting their responses to climate change. Using a widely distributed species in East Asia, Quercus variabilis, we aim to reveal defense patterns of trees with respect to ontogeny along latitudinal gradients. Six leaf chemical (total phenolics and total condensed tannin concentrations) and physical (cellulose, hemicellulose, lignin and dry mass concentration) defensive traits as well as leaf herbivory (% leaf area loss) were investigated in natural Chinese cork oak (Q. variabilis) forests across two ontogenetic stages (juvenile and mature trees) along a ~14°-latitudinal gradient. Our results showed that juveniles had higher herbivory values and a higher concentration of leaf chemical defense substances compared with mature trees across the latitudinal gradient. In addition, chemical defense and herbivory in both ontogenetic stages decreased with increasing latitude, which supports the latitudinal herbivory-defense hypothesis and optimal defense theory. The identified trade-offs between chemical and physical defense were primarily determined by environmental variation associated with the latitudinal gradient, with the climatic factors (annual precipitation, minimum temperature of the coldest month) largely contributing to the latitudinal defense pattern in both juvenile and mature oak trees.

  7. Information Technology Management: DoD Organization Information Assurance Management of Information Technology Goods and Services Acquired Through Interagency Agreements

    DTIC Science & Technology

    2006-02-23

    Information Technology Management Department of Defense Office of Inspector General February 23, 2006 AccountabilityIntegrityQuality DoD...Organization Information Assurance Management of Information Technology Goods and Services Acquired Through Interagency Agreements (D-2006-052) Report...REPORT TYPE 3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management: DoD Organization Information

  8. Acquisition Planning at the Defense Communications Agency.

    DTIC Science & Technology

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  9. Comparative analysis of the application of different Low Power Wide Area Network technologies in power grid

    NASA Astrophysics Data System (ADS)

    Wang, Hao; Sui, Hong; Liao, Xing; Li, Junhao

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but the application principle of different LPWAN technologies in power grid is still not clear. This paper gives a comparative analysis of two mainstream LPWAN technologies including NB-IoT and LoRa, and gives an application suggestion of these two LPWAN technologies, which can guide the planning and construction of LPWAN in power grid.

  10. Defense Primer: DOD Contractors

    DTIC Science & Technology

    2017-02-10

    contractors . A defense contractor , as defined by the Code of Federal Regulations, is “any individual, firm, corporation, partnership, association...158.3, “Definitions”). Within the defense policy community, the term contractor is commonly used in two different contexts. The word can describe

  11. Density-dependent adjustment of inducible defenses.

    PubMed

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C; Laforsch, Christian; Kopp, Michael

    2015-08-03

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators' densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems.

  12. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  13. Nonoffensive defense is overrated

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flanagan, S.J.

    1988-09-01

    Some Western analysts argue that European security would stabilize if nations shifted to forces and doctrines that left them structurally incapable of conducting offensive military actions. Some, including American scholar Gene Sharp, have even called for replacing traditional military forces with plans for civilian-based resistance. Purely defensive postures would be reassuring to neighboring states, all of these theorists say, but such defenses would still be strong enough to defeat an attack if deterrence failed. This defensive-only stance, according to its advocates, is a purer form of deterrence by denial than now exists, since it removes even the possibility of inflictingmore » punishment in retaliation for an attack: it deters only be denying victory. But Mr. Flanagan questions whether such defense actually would serve as a credible deterrent. In addition, the various proposed schemes share some serious weaknesses, which he proceeds to discuss. 5 refs.« less

  14. The First Line of Defense: Higher Education in Wartime and the Development of National Defense Education, 1939-1959

    ERIC Educational Resources Information Center

    Ponte, Dana Adrienne

    2016-01-01

    This study posits that the National Defense Education Act of 1958 (NDEA) represented the culmination of nearly a century-long process through which education was linked to national defense in periods of wartime, and later retained a strategic utility for defense purposes in times of peace. That a defense rationale for federal support of public…

  15. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., entitled ``Contractors Performing Private Security Functions in Areas of Combat Operations or Other... of DoD and other Governmental private security contractors. A clause to cover the interagency...

  16. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  17. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  18. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  19. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  20. DCT-based cyber defense techniques

    NASA Astrophysics Data System (ADS)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.