Sample records for layer based defense

  1. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    DTIC Science & Technology

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  2. SEADE: Countering the Futility of Network Security

    DTIC Science & Technology

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  3. Rationality Validation of a Layered Decision Model for Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Huaqiang; Alves-Foss, James; Zhang, Du

    2007-08-31

    We propose a cost-effective network defense strategy built on three key: three decision layers: security policies, defense strategies, and real-time defense tactics for countering immediate threats. A layered decision model (LDM) can be used to capture this decision process. The LDM helps decision-makers gain insight into the hierarchical relationships among inter-connected entities and decision types, and supports the selection of cost-effective defense mechanisms to safeguard computer networks. To be effective as a business tool, it is first necessary to validate the rationality of model before applying it to real-world business cases. This paper describes our efforts in validating the LDMmore » rationality through simulation.« less

  4. The counter effects of the accident at Fukushima Dai-ichi nuclear power station

    NASA Astrophysics Data System (ADS)

    Murakami, Kenta

    2017-01-01

    The counter effects of the accident at the Fukushima Dai-ichi Nuclear Power Station are discussed in this paper. Though decommission and remediation have been conducted in the facility and surrounding area, ninety thousand residences near the facility are still under the evacuation order. Four nuclear power units have already restarted under the new regulatory framework, but two of them in Fukui prefecture stop the operation due to the provisional disposition declared by Ohtsu district court in Shiga prefecture. Reinforcement of the latter layer of the defense in depth has been improved in many ways. The improvement of decision-making process is very important in latter layers of the defense in depth, in contrast the plant behaviors are automatically decided based on their design in the prior layers.

  5. KSC-2009-5237

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – Public Affairs Officer Tracy Young moderates a post-launch news conference for the media about the Space Tracking and Satellite System – Demonstrator spacecraft. Seated at center is Omar Baez, NASA launch manager, and Rear Adm. Joseph Horn, deputy director, with the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft was launched by NASA for the U.S. Missile Defense Agency. Photo credit: NASA/Jim Grossmann

  6. KSC-2009-5238

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – At a post-launch news conference for the media about launch of the Space Tracking and Satellite System – Demonstrator spacecraft, NASA Launch Manager Omar Baez, at center, responds to a question. At right is Rear Adm. Joseph Horn, deputy director, with the U.S. Missile Defense Agency. At left, Public Affairs Officer Tracy Young moderates. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft was launched by NASA for the U.S. Missile Defense Agency. Photo credit: NASA/Jim Grossmann

  7. KSC-2009-5239

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – At a post-launch news conference for the media about launch of the Space Tracking and Satellite System – Demonstrator spacecraft, Rear Adm. Joseph Horn, deputy director with the U.S. Missile Defense Agency, answers a question. NASA Launch Manager Omar Baez is at center. At left, Public Affairs Officer Tracy Young moderates. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft was launched by NASA for the U.S. Missile Defense Agency. Photo credit: NASA/Jim Grossmann

  8. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  9. Large Scale Portability of Hospital Information System Software

    PubMed Central

    Munnecke, Thomas H.; Kuhn, Ingeborg M.

    1986-01-01

    As part of its Decentralized Hospital Computer Program (DHCP) the Veterans Administration installed new hospital information systems in 169 of its facilities during 1984 and 1985. The application software for these systems is based on the ANS MUMPS language, is public domain, and is designed to be operating system and hardware independent. The software, developed by VA employees, is built upon a layered approach, where application packages layer on a common data dictionary which is supported by a Kernel of software. Communications between facilities are based on public domain Department of Defense ARPA net standards for domain naming, mail transfer protocols, and message formats, layered on a variety of communications technologies.

  10. KSC-2009-5235

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – Smoke billows around the United Launch Alliance Delta II rocket as it launches into space carrying the Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  11. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  12. KSC-2009-5233

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps through a mantle of smoke as it lifts off from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  13. KSC-2009-5236

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – From Hangar AE at Cape Canaveral Air Force Station in Florida, Garrett Lee Skrobot, who is NASA's mission manager for the Space Tracking and Surveillance System – Demonstrator, oversees the launch. The STSS-Demo spacecraft launched at 8:20:22 a.m. EDT aboard a United Launch Alliance Delta II rocket. It was launched by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Kim Shiflett

  14. KSC-2009-5230

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps from Launch Pad 17-B at Cape Canaveral Air Force Station amid clouds of smoke. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  15. KSC-2009-5232

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps through a mantle of smoke as it lifts off from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  16. KSC-2009-5229

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft emerges from a blanket of smoke after liftoff from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the Missile Defense System. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Tony Gray-Tim Powers

  17. KSC-2009-5234

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – Fire erupts across Launch Pad 17-B at Cape Canaveral Air Force Station as the United Launch Alliance Delta II rocket lifts off with the Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  18. KSC-2009-5231

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft lifts off through a cloud of smoke from Launch Pad 17-B at Cape Canaveral Air Force Station aboard a United Launch Alliance Delta II rocket. It was launched by NASA for the U.S. Missile Defense Agency. Launch was at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Regina Mitchell-Tom Farrar

  19. KSC-2009-5228

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps from Launch Pad 17-B at Cape Canaveral Air Force Station amid clouds of smoke. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Tony Gray-Tim Powers

  20. KSC-2009-5227

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft emerges from a blanket of smoke after liftoff from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. Photo credit: NASA/Tony Gray-Tim Powers

  1. Root assays to study pattern-triggered immunity in plant-nematode interactions

    USDA-ARS?s Scientific Manuscript database

    Plants employ extracellular immune receptors to perceive conserved pathogen-associated molecular patterns (PAMPs), triggering the first layer of defense known as pattern-triggered immunity (PTI). The understanding of PTI is mainly based on the studies focusing on leaves. Plants are vulnerable to att...

  2. KSC-2009-5055

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers place the first segments of the transportation canister around the base of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  3. High-Purity Glasses Based on Arsenic Chalcogenides

    DTIC Science & Technology

    2001-06-01

    Chemical interaction of chalcogenides and some impurities (CS 2, TeO2 ) with the quartz glass at high temperature leads to the thin layers formation...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO1 1523 TITLE: High-Purity Glasses Based on Arsenic Chalcogenides...Materials Vol. 3, No. 2, June 2001, p. 341 - 349 HIGH-PURITY GLASSES BASED ON ARSENIC CHALCOGENIDES M. F. Churbanov, I. V. Scripachev, G. E. Snopatin, V. S

  4. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  5. KSC-2009-5208

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – Approaching rain clouds at dawn hover over Central Florida's east coast, effectively causing the scrub of the Space Tracking and Surveillance System - Demonstrator spacecraft from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 24. Photo credit: NASA/Jack Pfaller

  6. KSC-2009-5068

    NASA Image and Video Library

    2009-08-27

    CAPE CANAVERAL, Fla. – The enclosed Space Tracking and Surveillance System – Demonstrators, or STSS-Demo, spacecraft arrives on Cape Canaveral Air Force Station's Launch Pad 17-B. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jack Pfaller

  7. The accident at TEPCO's Fukushima-Daiichi Nuclear Power Station: What went wrong and what lessons are universal?

    NASA Astrophysics Data System (ADS)

    Omoto, Akira

    2013-12-01

    After a short summary of the nuclear accident at the Fukushima Daiichi Nuclear Power Station, this paper discusses “what went wrong” by illustrating the problems of the specific layers of defense-in-depth (basic strategy for assuring nuclear safety) and “what lessons are universal.” Breaches in the multiple layers of defense were particularly significant in respective protection (a) against natural disasters (first layer of defense) as well as (b) against severe conditions, specifically in this case, a complete loss of AC/DC power and isolation from the primary heat sink (fourth layer of defense). Confusion in crisis management by the government and insufficient implementation of offsite emergency plans revealed problems in the fifth layer of defense. By taking into consideration managerial and safety culture that might have relevance to this accident, in the author's view, universal lessons are as follows: Resilience: the need to enhance organizational capabilities to respond, monitor, anticipate, and learn in changing conditions, especially to prepare for the unexpected. This includes increasing distance to cliff edge by knowing where it exists and how to increase safety margin. Responsibility: the operator is primarily responsible for safety, and the government is responsible for protecting public health and environment. For both, their right decisions are supported by competence, knowledge, and an understanding of the technology, as well as humble attitudes toward the limitations of what we know and what we can learn from others. Social license to operate: the need to avoid, as much as possible regardless of its probability of occurrence, the reasonably anticipated environmental impact (such as land contamination), as well as to build public confidence/trust and a renewed liability scheme.

  8. KSC-2009-5225

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket carrying the Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps into the sky from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Sandra Joseph- Kevin O'Connell

  9. KSC-2009-5221

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps from Launch Pad 17-B at Cape Canaveral Air Force Station amid clouds of smoke. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Sandra Joseph- Kevin O'Connell

  10. KSC-2009-5220

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft aboard races into the sky leaving a trail of fire and smoke after liftoff from Launch Pad 17-B at Cape Canaveral Air Force Station. It was launched by NASA for the U.S. Missile Defense Agency at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Alan Ault

  11. KSC-2009-5191

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – The mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station rolls back to reveal the United Launch Alliance Delta II rocket that will launch the Space Tracking and Surveillance System - Demonstrator into orbit. It is being launched by NASA for the Missile Defense System. The hour-long launch window opens at 8 a.m. EDT today. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Dimitri Gerondidakis

  12. KSC-2009-5067

    NASA Image and Video Library

    2009-08-27

    CAPE CANAVERAL, Fla. – The enclosed Space Tracking and Surveillance System – Demonstrators, or STSS-Demo, spacecraft leaves the Astrotech payload processing facility on its way to Cape Canaveral Air Force Station's Launch Pad 17-B. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jack Pfaller

  13. KSC-2009-5193

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – The mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station has been rolled back to reveal the United Launch Alliance Delta II rocket ready to launch the Space Tracking and Surveillance System - Demonstrator into orbit. It is being launched by NASA for the Missile Defense System. The hour-long launch window opens at 8 a.m. EDT today. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Dimitri Gerondidakis

  14. KSC-2009-5226

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. –The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft leaps from Launch Pad 17-B at Cape Canaveral Air Force Station amid clouds of smoke. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Tony Gray-Tim Powers

  15. KSC-2009-5223

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket carrying the Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft rises from a mantle of smoke as it lifts off from Launch Pad 17-B at Cape Canaveral Air Force Station. STSS-Demo was launched at 8:20:22 a.m. EDT by NASA for the U.S. Missile Defense Agency. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Sandra Joseph- Kevin O'Connell

  16. KSC-2009-5192

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – The mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station has been rolled back to reveal the United Launch Alliance Delta II rocket that will launch the Space Tracking and Surveillance System - Demonstrator into orbit. It is being launched by NASA for the Missile Defense System. The hour-long launch window opens at 8 a.m. EDT today. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Dimitri Gerondidakis

  17. KSC-2009-5219

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft lifts off through a cloud of smoke from Launch Pad 17-B at Cape Canaveral Air Force Station aboard a United Launch Alliance Delta II rocket. It was launched by NASA for the U.S. Missile Defense Agency. Launch was at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Alan Ault

  18. KSC-2009-5215

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – Under a cloud-streaked sky, the Space Tracking and Surveillance System – Demonstrator, or STSS-Demo, waits through the countdown to liftoff Launch Pad 17-B at Cape Canaveral Air Force Station aboard a United Launch Alliance Delta II rocket. STSS-Demo is being launched by NASA for the U.S. Missile Defense Agency. Liftoff is at 8:20 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Jack Pfaller

  19. KSC-2009-5216

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – Under a cloud-streaked sky, the Space Tracking and Surveillance System – Demonstrator, or STSS-Demo, waits through the countdown to liftoff Launch Pad 17-B at Cape Canaveral Air Force Station aboard a United Launch Alliance Delta II rocket. STSS-Demo is being launched by NASA for the U.S. Missile Defense Agency. Liftoff was at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Jack Pfaller

  20. KSC-2009-5209

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – On Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the Space Tracking and Surveillance System - Demonstrator spacecraft is bathed in light under a dark, cloudy sky. Rain over Central Florida's east coast caused the scrub of the launch. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 24. Photo credit: NASA/Jack Pfaller

  1. KSC-2009-5070

    NASA Image and Video Library

    2009-08-27

    CAPE CANAVERAL, Fla. – The enclosed Space Tracking and Surveillance System – Demonstrators, or STSS-Demo, spacecraft is being lifted into the mobile service tower on Cape Canaveral Air Force Station's Launch Pad 17-B. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jack Pfaller

  2. KSC-2009-5217

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft lifts off through a cloud of smoke from Launch Pad 17-B at Cape Canaveral Air Force Station aboard a United Launch Alliance Delta II rocket. It was launched by NASA for the U.S. Missile Defense Agency. Launch was at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Jack Pfaller

  3. KSC-2009-5210

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – On Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the Space Tracking and Surveillance System Demonstrator spacecraft waits for launch under dark, cloudy sky. Rain over Central Florida's east coast caused the scrub of the launch. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 24. Photo credit: NASA/Jack Pfaller

  4. Dual properties of a hydrogen oxidation Ni-catalyst entrapped within a polymer promote self-defense against oxygen.

    PubMed

    Oughli, Alaa A; Ruff, Adrian; Boralugodage, Nilusha Priyadarshani; Rodríguez-Maciá, Patricia; Plumeré, Nicolas; Lubitz, Wolfgang; Shaw, Wendy J; Schuhmann, Wolfgang; Rüdiger, Olaf

    2018-02-28

    The Ni(P 2 N 2 ) 2 catalysts are among the most efficient non-noble-metal based molecular catalysts for H 2 cycling. However, these catalysts are O 2 sensitive and lack long term stability under operating conditions. Here, we show that in a redox silent polymer matrix the catalyst is dispersed into two functionally different reaction layers. Close to the electrode surface is the "active" layer where the catalyst oxidizes H 2 and exchanges electrons with the electrode generating a current. At the outer film boundary, insulation of the catalyst from the electrode forms a "protection" layer in which H 2 is used by the catalyst to convert O 2 to H 2 O, thereby providing the "active" layer with a barrier against O 2 . This simple but efficient polymer-based electrode design solves one of the biggest limitations of these otherwise very efficient catalysts enhancing its stability for catalytic H 2 oxidation as well as O 2 tolerance.

  5. Asteroid, Lunar and Planetary Regolith Management A Layered Engineering Defense

    NASA Technical Reports Server (NTRS)

    Wagner, Sandra

    2014-01-01

    During missions on asteroid and lunar and planetary surfaces, space systems and crew health may be degraded by exposure to dust and dirt. Furthermore, for missions outside the Earth-Moon system, planetary protection must be considered in efforts to minimize forward and backward contamination. This paper presents an end-to-end approach to ensure system reliability, crew health, and planetary protection in regolith environments. It also recommends technology investments that would be required to implement this layered engineering defense.

  6. From detection to deflection: Mitigation techniques for hidden global threats of natural space objects with short warning time

    NASA Astrophysics Data System (ADS)

    Hussein, Alaa; Rozenheck, Oshri; Entrena Utrilla, Carlos Manuel

    2016-09-01

    Throughout recorded history, hundreds of Earth impacts have been reported, with some catastrophic localized consequences. Based on the International Space University (ISU) Planetary Defense project named READI, we address the impact event problem by giving recommendations for the development of a planetary defense program. This paper reviews the current detection and tracking techniques and gives a set of recommendations for a better preparation to shield Earth from asteroid and cometary impacts. We also extend the use of current deflection techniques and propose a new compilation of those to deflect medium-sized potentially hazardous objects (PHOs). Using an array of techniques from high-energy lasers to defensive missiles, we present a set of protective layers to defend our planet. The paper focused on threats with a short warning period from discovery to impact with Earth, within few years.

  7. KSC-2009-5060

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is moved toward the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft, at left. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  8. KSC-2009-5050

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers observe as the SV1-SV2 spacecraft is lifted for weighing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  9. KSC-2009-5048

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1-SV2 spacecraft is ready to be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  10. KSC-2009-5059

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is lifted to be placed on the top of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  11. KSC-2009-5049

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers observe as the SV1-SV2 spacecraft is lifted for weighing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  12. KSC-2009-5066

    NASA Image and Video Library

    2009-08-27

    CAPE CANAVERAL, Fla. – The enclosed Space Tracking and Surveillance System – Demonstrators, or STSS-Demo, spacecraft moves out of the Astrotech payload processing facility. It is being moved to Cape Canaveral Air Force Station's Launch Pad 17-B. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jack Pfaller

  13. KSC-2009-5057

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers maneuver one of the second-row segments of the transportation canister that will be placed around the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  14. KSC-2009-5021

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. –At the Astrotech payload processing facility in Titusville, Fla., the SV1 spacecraft is lowered onto the SV2 for mating. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  15. KSC-2009-5023

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1 spacecraft is lowered onto the SV2 for mating. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  16. KSC-2009-5053

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1-SV2 spacecraft sits on the rotation stand after weighing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  17. KSC-2009-5042

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers begin center of gravity testing, weighing and balancing on the SV1-SV2 spacecraft. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  18. KSC-2009-5061

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is moved toward the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft, at bottom left. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  19. KSC-2009-5056

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers place the second row of segments of the transportation canister around the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  20. KSC-2009-5020

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1 spacecraft is lowered toward the SV2 for mating. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  1. KSC-2009-5065

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers attach the upper segment of the transportation canister to the lower segments around the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  2. KSC-2009-5025

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers check the mating of the SV1 spacecraft onto the SV2. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  3. KSC-2009-5194

    NASA Image and Video Library

    2009-09-23

    CAPE CANAVERAL, Fla. – The mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station has been rolled back as the countdown proceeds to launch of the United Launch Alliance Delta II rocket with the Space Tracking and Surveillance System - Demonstrator spacecraft aboard. It is being launched by NASA for the Missile Defense System. The hour-long launch window opens at 8 a.m. EDT today. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Dimitri Gerondidakis

  4. KSC-2009-5051

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1-SV2 spacecraft is lifted for weighing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  5. KSC-2009-5012

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the SV1 and SV2 spacecraft are ready for mating for launch. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  6. KSC-2009-5054

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft is under a protective cover before being encased in the transportation canister. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  7. KSC-2009-5218

    NASA Image and Video Library

    2009-09-25

    CAPE CANAVERAL, Fla. – The United Launch Alliance Delta II rocket with Space Tracking and Surveillance System - Demonstrator, or STSS-Demo, spacecraft aboard races into the sky leaving a trail of fire and smoke after liftoff from Launch Pad 17-B at Cape Canaveral Air Force Station. It was launched by NASA for the U.S. Missile Defense Agency. Launch was at 8:20:22 a.m. EDT. The STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. Photo credit: NASA/Jack Pfaller

  8. KSC-2009-5058

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers maneuver one of the second-row segments of the transportation canister that will be placed around the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  9. KSC-2009-5013

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers prepare to lift the SV1 and mate it to the SV2 spacecraft for the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  10. FORMERLY USED DEFENSE SITES

    EPA Science Inventory

    This data layer represents point locations for Formerly Used Defense Sites (FUDS) located in California, Arizona and Nevada. The original data was extracted from the U.S. Army Corp of Engineer's FUDSIS database. Each site has information about it's inventory status and...

  11. 3D critical layers in fully-developed turbulent flows

    NASA Astrophysics Data System (ADS)

    Saxton-Fox, Theresa; McKeon, Beverley

    2016-11-01

    Recent work has shown that 3D critical layers drive self-sustaining behavior of exact coherent solutions of the Navier-Stokes equations (Wang et al. 2007; Hall and Sherwin 2010; Park and Graham 2015). This study investigates the role of 3D critical layers in fully-developed turbulent flows. 3D critical layer effects are identified in instantaneous snapshots of turbulent boundary layers in both experimental and DNS data (Wu et al. 2014). Additionally, a 3D critical layer effect is demonstrated to appear using only a few resolvent response modes from the resolvent analysis of McKeon and Sharma 2010, with phase relationships appropriately chosen. Connections are sought to the thin shear layers observed in turbulent boundary layers (Klewicki and Hirschi 2004; Eisma et al. 2015) and to amplitude modulation observations (Mathis et al. 2009; Duvvuri and McKeon 2014). This research is made possible by the Department of Defense through the National Defense & Engineering Graduate Fellowship (NDSEG) Program and by the Air Force Office of Scientific Research Grant # FA9550-12-1-0060. The support of the Center for Turbulence Research (CTR) summer program at Stanford is gratefully acknowledged.

  12. KSC-2009-5032

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers remove a cover from around the mated SV1 and SV2 spacecraft before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  13. KSC-2009-5033

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are largely uncovered before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  14. KSC-2009-5062

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is lowered toward the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. It will be installed onto the lower segments already in place. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  15. KSC-2009-5028

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers remove covers around the mated SV1 and SV2 spacecraft before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  16. KSC-2009-5039

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are on a rotation stand for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  17. KSC-2009-5047

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., an overhead crane with a scale is being attached to the SV1-SV2 spacecraft, which will be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  18. KSC-2009-5041

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers check the SV1-SV2 spacecraft that will undergo center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  19. KSC-2009-5030

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers remove covers around the mated SV1 and SV2 spacecraft before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  20. KSC-2009-5045

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., an overhead crane with a scale is being attached to the SV1-SV2 spacecraft, which will be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  1. KSC-2009-5027

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. –At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are being prepared for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  2. KSC-2009-5063

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is lowered over the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. It will be installed onto the lower segments already in place. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  3. KSC-2009-5052

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers observe as the SV1-SV2 spacecraft is lowered again onto the rotation stand after weighing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  4. KSC-2009-5015

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., a crane moves the SV1 spacecraft, which will be mated with the SV2 at right. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  5. KSC-2009-5017

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., a crane moves the SV1 spacecraft, toward the SV2 at right. The two spacecraft , which will be mated, are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  6. KSC-2009-5195

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – The two halves of the fairing are moved into the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida. The two-part fairing will be placed around the Space Tracking and Surveillance System – Demonstrator spacecraft for protection during launch. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  7. KSC-2009-5018

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers help guide the movement of the SV1 spacecraft as it is moved toward the SV2 at right. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  8. KSC-2009-5016

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers help guide the movement of the SV1 spacecraft as it is moved toward the SV2 behind it. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  9. KSC-2009-5040

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., a canister and protective cover are being prepared for placement around the SV1-SV2 spacecraft. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  10. KSC-2009-5022

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers observe as the SV1 spacecraft is lowered onto the SV2 for mating. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  11. KSC-2009-5024

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., a worker checks the mating of the SV1 spacecraft onto the SV2. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  12. KSC-2009-5036

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are being prepared for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  13. KSC-2009-5026

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are being prepared for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  14. KSC-2009-5046

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., an overhead crane with a scale is being attached to the SV1-SV2 spacecraft, which will be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  15. KSC-2009-5019

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers help guide the movement of the SV1 spacecraft as it is moved toward the SV2 at right. The two spacecraft are part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  16. KSC-2009-5043

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., an overhead crane with a scale is being moved to attach to the SV1-SV2 spacecraft, which will be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  17. KSC-2009-5038

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft are placed on a rotation stand for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  18. KSC-2009-5044

    NASA Image and Video Library

    2009-08-20

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., an overhead crane with a scale is being moved to attach to the SV1-SV2 spacecraft, which will be weighed. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  19. KSC-2009-5031

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers remove covers around the mated SV1 and SV2 spacecraft before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  20. KSC-2009-5029

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., workers remove covers around the mated SV1 and SV2 spacecraft before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  1. KSC-2009-5064

    NASA Image and Video Library

    2009-08-22

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the upper segment of the transportation canister is lowered over the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, spacecraft. It will be installed onto the lower segments already in place. The STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Kim Shiflett

  2. Army Networks: Opportunities Exist to Better Utilize Results from Network Integration Evaluations

    DTIC Science & Technology

    2013-08-01

    monitor operations; a touch screen-based mission command planning tool; and an antenna mast . The Army will field only one of these systems in capability...Office JTRS Joint Tactical Radio System NIE Network Integration Evaluation OSD Office of the Secretary of Defense SUE System under Evaluation...command systems . A robust transport layer capable of delivering voice, data, imagery, and video to the tactical edge (i.e., the forward battle lines

  3. Identification of defense-related genes newly-associated with tomato flower abscission

    USDA-ARS?s Scientific Manuscript database

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense res...

  4. The knottin-like Blufensin family regulates genes involved in nuclear import and the secretory pathway in barley-powdery mildew interactions

    USDA-ARS?s Scientific Manuscript database

    Plants have evolved complex regulatory mechanisms to control a multi-layered defense response to microbial attack. Both temporal and spatial gene expression are tightly regulated in response to pathogen ingress, modulating both positive and negative control of defense. BLUFENSINs, small knottin-like...

  5. Co-Expression analysis of miRNAs and target NBS-LRR genes in Cucumis sativus

    USDA-ARS?s Scientific Manuscript database

    Plants react against their biological enemies by activating the innate immune system. Their defense system comprises of various R-protein, which usually contain NBS-LRR domain. MicroRNAs (miRNAs) are important molecules of 2nd layer of plant defense and play pivotal role behind the scene. To support...

  6. KSC-2009-5035

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the top of the mated SV1 and SV2 remains covered. The spacecraft are being prepared for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  7. KSC-2009-5014

    NASA Image and Video Library

    2009-08-03

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., a crane is attached to the SV1 spacecraft, part of the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, Program. The SV1 will be lifted and moved to mate with the SV2 on another stand nearby. STSS-Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. The spacecraft is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  8. KSC-2009-5034

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., the mated SV1 and SV2 spacecraft retain the covers on the top which are being removed before center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  9. KSC-2009-5037

    NASA Image and Video Library

    2009-08-19

    CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility in Titusville, Fla., this closeup shows part of the mated SV1 and SV2 spacecraft, which is being prepared for center of gravity testing, weighing and balancing. The two spacecraft are known as the Space Tracking and Surveillance System – Demonstrators, or STSS Demo, which is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detecting, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-04886 (10 SEPT 09) Photo credit: NASA/Jim Grossmann

  10. Selected wheat seed defense proteins exhibit competitive binding to model microbial lipid interfaces.

    PubMed

    Sanders, Michael R; Clifton, Luke A; Neylon, Cameron; Frazier, Richard A; Green, Rebecca J

    2013-07-17

    Puroindolines (Pins) and purothionins (Pths) are basic, amphiphilic, cysteine-rich wheat proteins that play a role in plant defense against microbial pathogens. This study examined the co-adsorption and sequential addition of Pins (Pin-a, Pin-b, and a mutant form of Pin-b with Trp-44 to Arg-44 substitution) and β-purothionin (β-Pth) model anionic lipid layers using a combination of surface pressure measurements, external reflection FTIR spectroscopy, and neutron reflectometry. Results highlighted differences in the protein binding mechanisms and in the competitive binding and penetration of lipid layers between respective Pins and β-Pth. Pin-a formed a blanket-like layer of protein below the lipid surface that resulted in the reduction or inhibition of β-Pth penetration of the lipid layer. Wild-type Pin-b participated in co-operative binding with β-Pth, whereas the mutant Pin-b did not bind to the lipid layer in the presence of β-Pth. The results provide further insight into the role of hydrophobic and cationic amino acid residues in antimicrobial activity.

  11. Conjugation of the Dark Quencher QSY 7 to Various Synthetic Cannabinoids for Use in Fluorescence-Based Detection Platforms

    DTIC Science & Technology

    2015-02-01

    much more potent than traditional cannabis. 12,17 Cannabis sativa contains tetrahydrocannabinol ( THC ) as the active psychotropic ingredient and...0.52 nM for CB1 and CB2, respectively, which is approximately 164 and 46 times, respectively, tighter than THC for the same receptors. 12,17 This...spectrometry QD quantum dot SC synthetic cannabinoid TEA triethylamine THC tetrahydrocannabinol TLC thin layer chromatography 18 1 DEFENSE

  12. Gut immunity: Its development and reasons and opportunities for modulation in monogastric production animals

    USDA-ARS?s Scientific Manuscript database

    The intestine must perform the critical role of nutrient acquisition whilst preventing the passage of undesirable microbes or microbial products from the external environment to sterile body compartments. Various components contribute to antimicrobial defenses in the intestine. The mucus layer(s),...

  13. Blue Marble Eastern Hemisphere

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Drawing on data from multiple satellite missions (not all collected at the same time), a team of NASA scientists and graphic artists created layers of global data for everything from the land surface, to polar sea ice, to the light reflected by the chlorophyll in the billions of microscopic plants that grow in the ocean. They wrapped these layers around a globe, set it against a black background, and simulated the hazy edge of the Earth's atmosphere (the limb) that appears in astronaut photography of the Earth. The land surface layer is based on photo-like surface reflectance observations (reflected sunlight) measured by the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA's Terra satellite in July 2004. The sea ice layer near the poles comes from Terra MODIS observations of daytime sea ice observed between August 28 and September 6, 2001. The ocean layer is a composite. In shallow water areas, the layer shows surface reflectances observed by Terra MODIS in July 2004. In the open ocean, the photo-like layer is overlaid with observations of the average ocean chlorophyll content for 2004. NASA's Aqua MODIS collected the chlorophyll data. The cloud layer shows a single-day snapshot of clouds observed by Terra MODIS across the planet on July 29, 2001. City lights on Earth's night side are visualized from data collected by the Defense Meteorological Satellite Program mission between 1994-1995. The topography layer is based on radar data collected by the Space Shuttle Endeavour during an 11-day mission in February of 2000. Topography over Antarctica comes from the Radarsat Antarctic Mapping Project, version 2.

  14. Blue Marble Western Hemisphere

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Drawing on data from multiple satellite missions (not all collected at the same time), a team of NASA scientists and graphic artists created layers of global data for everything from the land surface, to polar sea ice, to the light reflected by the chlorophyll in the billions of microscopic plants that grow in the ocean. They wrapped these layers around a globe, set it against a black background, and simulated the hazy edge of the Earth's atmosphere (the limb) that appears in astronaut photography of the Earth. The land surface layer is based on photo-like surface reflectance observations (reflected sunlight) measured by the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA's Terra satellite in July 2004. The sea ice layer near the poles comes from Terra MODIS observations of daytime sea ice observed between August 28 and September 6, 2001. The ocean layer is a composite. In shallow water areas, the layer shows surface reflectances observed by Terra MODIS in July 2004. In the open ocean, the photo-like layer is overlaid with observations of the average ocean chlorophyll content for 2004. NASA's Aqua MODIS collected the chlorophyll data. The cloud layer shows a single-day snapshot of clouds observed by Terra MODIS across the planet on July 29, 2001. City lights on Earth's night side are visualized from data collected by the Defense Meteorological Satellite Program mission between 1994-1995. The topography layer is based on radar data collected by the Space Shuttle Endeavour during an 11-day mission in February of 2000. Topography over Antarctica comes from the Radarsat Antarctic Mapping Project, version 2.

  15. Self-defensive antibiotic-loaded layer-by-layer coatings: Imaging of localized bacterial acidification and pH-triggering of antibiotic release.

    PubMed

    Albright, Victoria; Zhuk, Iryna; Wang, Yuhao; Selin, Victor; van de Belt-Gritter, Betsy; Busscher, Henk J; van der Mei, Henny C; Sukhishvili, Svetlana A

    2017-10-01

    Self-defensive antibiotic-loaded coatings have shown promise in inhibiting growth of pathogenic bacteria adhering to biomaterial implants and devices, but direct proof that their antibacterial release is triggered by bacterially-induced acidification of the immediate environment under buffered conditions remained elusive. Here, we demonstrate that Staphylococcus aureus and Escherichia coli adhering to such coatings generate highly localized acidification, even in buffered conditions, to activate pH-triggered, self-defensive antibiotic release. To this end, we utilized chemically crosslinked layer-by-layer hydrogel coatings of poly(methacrylic acid) with a covalently attached pH-sensitive SNARF-1 fluorescent label for imaging, and unlabeled-antibiotic (gentamicin or polymyxin B) loaded coatings for antibacterial studies. Local acidification of the coatings induced by S. aureus and E. coli adhering to the coatings was demonstrated by confocal-laser-scanning-microscopy via wavelength-resolved imaging. pH-triggered antibiotic release under static, small volume conditions yielded high bacterial killing efficiencies for S. aureus and E. coli. Gentamicin-loaded films retained their antibacterial activity against S. aureus under fluid flow in buffered conditions. Antibacterial activity increased with the number of polymer layers in the films. Altogether, pH-triggered, self-defensive antibiotic-loaded coatings become activated by highly localized acidification in the immediate environment of an adhering bacterium, offering potential for clinical application with minimized side-effects. Polymeric coatings were created that are able to uptake and selectively release antibiotics upon stimulus by adhering bacteria in order to understand the fundamental mechanisms behind pH-triggered antibiotic release as a potential way to prevent biomaterial-associated infections. Through fluorescent imaging studies, this work importantly shows that adhering bacteria produce highly localized pH changes even in buffer. Accordingly such coatings only demonstrate antibacterial activity by antibiotic release in the presence of adhering bacteria. This is clinically important, because ad libitum releasing antibiotic coatings usually show a burst release and have often lost their antibiotic content when bacteria adhere. Copyright © 2017 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

  16. KSC-2009-5198

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, workers check the progress of the fairing being moved toward the Space Tracking and Surveillance System – Demonstrator spacecraft for encapsulation. The fairing is a two-part molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  17. KSC-2009-5199

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the Space Tracking and Surveillance System – Demonstrator spacecraft (foreground) is waiting for encapsulation in the fairing, behind it at left. The fairing is a two-part molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  18. KSC-2009-5201

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, workers help guide the fairing (at right) into place around the Space Tracking and Surveillance System – Demonstrator spacecraft for encapsulation. The fairing is a two-part molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  19. KSC-2009-5205

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the second half of the fairing is being moved toward the Space Tracking and Surveillance System – Demonstrator spacecraft. The fairing is a two-part molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  20. KSC-2009-5202

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the first half of the two-part fairing is in place around the Space Tracking and Surveillance System – Demonstrator spacecraft. The fairing is a molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  1. KSC-2009-5196

    NASA Image and Video Library

    2009-09-12

    CAPE CANAVERAL, Fla. – Inside the mobile service tower on Launch Pad 17-B at Cape Canaveral Air Force Station in Florida, the Space Tracking and Surveillance System – Demonstrator spacecraft is waiting for encapsulation in the fairing. The fairing is a two-part molded structure that fits flush with the outside surface of the rocket and forms an aerodynamically smooth nose cone, protecting the spacecraft during launch and ascent. STSS Demo is a space-based sensor component of a layered Ballistic Missile Defense System designed for the overall mission of detection, tracking and discriminating ballistic missiles. STSS is capable of tracking objects after boost phase and provides trajectory information to other sensors. It will be launched by NASA for the Missile Defense Agency between 8 and 8:58 a.m. EDT Sept. 18. Approved for Public Release 09-MDA-4934 (09-22-09) Photo credit: NASA/Cory Huston

  2. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    DTIC Science & Technology

    2016-06-01

    2014.13 We obtained documentary and testimonial evidence from senior officials in the Office of the Deputy Chief Management Officer to determine the...reviews. OSD Organizational Delayering Initiative This review of OSD-related organizations is intended to reduce layers of management and staff. As...Defense Program IGCA Inherently Governmental / Commercial Activities ODCMO Office of the Deputy Chief Management Officer OSD Office of the

  3. Value Proposition of Department of Defense Domestic Technology Transfer

    DTIC Science & Technology

    2010-01-15

    Directorate NASA Langley Research Center and Boundary Layer Research, Inc., Everett, WA CRADA/PLA Complete Trivalent Chromium Pretreatment Naval Air...Dynamics Directorate NASA Langley Research Center and Boundary Layer Research, Inc., Everett, WA CRADA/PLA Trivalent Chromium Processes Naval Air...Warfare Systems Center, Pacific Various CRADA On-Hold Safety Welding Cart Air Force Training Device Design and Engineering Center Spika Welding

  4. 2010 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP) Risk Reduction and Mitigation in the Defense Industrial Base

    DTIC Science & Technology

    2010-04-28

    Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL

  5. The Aegis BMD Global Enterprise: A High End Maritime Partnership

    DTIC Science & Technology

    2016-04-13

    have been dealing with ballistic-missile defense through the alliance’s Active Layered Theatre Ballistic Missile Defence (ALTBMD) program and, since...Defense Agency (MDA) budgets.18 The twenty-fifth test— designated Flight Test Mission (FTM) 15—occurred on 15 April 2011, when the MDA conducted the...original design , which focused on short- and medium-range threats. The LV-2 had flown in two previous BMD live-fire tests but had not been hit—until FTM

  6. Simultaneous measurement of aero-optical distortion and turbulent structure in a heated boundary layer

    NASA Astrophysics Data System (ADS)

    Saxton-Fox, Theresa; McKeon, Beverley; Smith, Adam; Gordeyev, Stanislav

    2014-11-01

    This study examines the relationship between turbulent structures and the aero-optical distortion of a laser beam passing through a turbulent boundary layer. Previous studies by Smith et al. (AIAA, 2014--2491) have found a bulk convection velocity of 0 . 8U∞ for aero-optical distortion in turbulent boundary layers, motivating a comparison of the distortion with the outer boundary layer. In this study, a turbulent boundary layer is developed over a flat plate with a moderately-heated section of length 25 δ . Density variation in the thermal boundary layer leads to aero-optical distortion, which is measured with a Malley probe (Smith et al., AIAA, 2013--3133). Simultaneously, 2D PIV measurements are recorded in a wall-normal, streamwise plane centered on the Malley probe location. Experiments are run at Reθ = 2100 and at a Mach number of 0.03, with the heated wall 10 to 20°C above the free stream temperature. Correlations and conditional averages are carried out between Malley probe distortion angles and flow features in the PIV vector fields. Aero-optical distortion in this study will be compared to distortion in higher Mach number flows studied by Gordeyev et al. (J. Fluid Mech., 2014), with the aim of extending conclusions into compressible flows. This research is made possible by the Department of Defense through the National Defense & Engineering Graduate Fellowship (NDSEG) Program and by the Air Force Office of Scientific Research Grant # FA9550-12-1-0060.

  7. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    DTIC Science & Technology

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  8. Techniques for the Detection of Faulty Packet Header Modifications

    DTIC Science & Technology

    2014-03-12

    layer approaches to check if packets are being altered by middleboxes and were primarily developed as network neutrality analysis tools. Switzerland works...local and metropolitan area networks –specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications...policy or position of the Department of Defense or the U.S. Government. Understanding, measuring, and debugging IP networks , particularly across

  9. Directed Energy Technology Working Group Report (IDA/OSD R&M (Institute for Defense Analyses/Office of the Secretary of Defense Reliability and Maintainability) Study).

    DTIC Science & Technology

    1983-08-01

    Missile (SLBM) Defense Scenario ............................................ B-1 C Space-Based Anti-Ballistic Missile ( ABM ) Defense Scenario...Ballistic Missile (SLBM) Defense Scenario, and at Strategic Space-Based Anti-Ballistic Missile ( ABM ) Defense Scenario. These case studies are provided...of flight. 3.5.3 Spaced-Based ABM Defense Scenario In this scenario, an orbiting battle station is operating as an element of GBMD System, and it is

  10. The Relative Roles of Passive Surface Forces and Active Ion Transport in the Modulation of Airway Surface Liquid Volume and Composition

    PubMed Central

    Tarran, Robert; Grubb, Barbara R.; Gatzy, John T.; Davis, C. William; Boucher, Richard C.

    2001-01-01

    Two hypotheses have been proposed recently that offer different views on the role of airway surface liquid (ASL) in lung defense. The “compositional” hypothesis predicts that ASL [NaCl] is kept low (<50 mM) by passive forces to permit antimicrobial factors to act as a chemical defense. The “volume” hypothesis predicts that ASL volume (height) is regulated isotonically by active ion transport to maintain efficient mechanical mucus clearance as the primary form of lung defense. To compare these hypotheses, we searched for roles for: (1) passive forces (surface tension, ciliary tip capillarity, Donnan, and nonionic osmolytes) in the regulation of ASL composition; and (2) active ion transport in ASL volume regulation. In primary human tracheobronchial cultures, we found no evidence that a low [NaCl] ASL could be produced by passive forces, or that nonionic osmolytes contributed substantially to ASL osmolality. Instead, we found that active ion transport regulated ASL volume (height), and that feedback existed between the ASL and airway epithelia to govern the rate of ion transport and volume absorption. The mucus layer acted as a “reservoir” to buffer periciliary liquid layer height (7 μm) at a level optimal for mucus transport by donating or accepting liquid to or from the periciliary liquid layer, respectively. These data favor the active ion transport/volume model hypothesis to describe ASL physiology. PMID:11479349

  11. The Missile Defense Agency's space tracking and surveillance system

    NASA Astrophysics Data System (ADS)

    Watson, John; Zondervan, Keith

    2008-10-01

    The Ballistic Missile Defense System (BMDS) is a layered system incorporating elements in space. In addition to missile warning systems at geosynchronous altitudes, an operational BMDS will include a low Earth orbit (LEO) system-the Space Tracking and Surveillance System (STSS). It will use infrared sensing technologies synergistically with the Space Based Infrared Systems (SBIRS) and will provide a seamless adjunct to radars and sensors on the ground and in airborne platforms. STSS is being designed for a future operational capability to defend against evolving threats. STSS development is divided into phases, commencing with a two-satellite demonstration constellation scheduled for launch in 2008. The demonstration satellites will conduct a menu of tests and experiments to prove the system concept, including the ground segment. They will have limited operational capability within the integrated BMDS. Data from the demonstration satellites will be received and processed by the Missile Defense Space Experiment Center (MDSEC), a part of the Missile Defense Integration and Operations Center (MDIOC). MDA launched in 2007 into LEO a satellite (NFIRE) designed to make near-field multispectral measurements of boosting targets and to demonstrate laser communication, the latter in conjunction with the German satellite TerraSAR-X. The gimbaled, lightweight laser terminal has demonstrated on orbit a 5.5 gbps rate in both directions. The filter passbands of NFIRE are similar to the STSS demonstrator track sensor. While providing useful phenomenology during its time on orbit, NFIRE will also serve as a pathfinder in the development of STSS operations procedures.

  12. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (JUL 2014) (a) The...

  13. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  14. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  15. 48 CFR 652.228-70 - Defense Base Act-Covered Contractor Employees.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Defense Base Act-Covered....228-70 Defense Base Act—Covered Contractor Employees. As prescribed in 628.309-70(a), insert the following provision: Defense Base Act—Covered Contractor Employees (JUN 2006) (a) Bidders/offerors shall...

  16. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  17. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  18. 48 CFR 652.228-70 - Defense Base Act-Covered Contractor Employees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Defense Base Act-Covered....228-70 Defense Base Act—Covered Contractor Employees. As prescribed in 628.309-70(a), insert the following provision: Defense Base Act—Covered Contractor Employees (JUN 2006) (a) Bidders/offerors shall...

  19. SJL-1, a C-type lectin, acts as a surface defense molecule in Japanese sea cucumber, Apostichopus japonicus.

    PubMed

    Ono, Keisuke; Suzuki, Takuya Alan; Toyoshima, Youichi; Suzuki, Tomoya; Tsutsui, Shigeyuki; Odaka, Tomoyuki; Miyadai, Toshiaki; Nakamura, Osamu

    2018-05-01

    The surface defense molecules of aquatic invertebrates against infectious microorganisms have remained largely unexplored. In the present study, hemagglutinins were isolated from an extract of body surface layer of Japanese sea cucumber, Apostichopus japonicus, by affinity chromatography with fixed rabbit erythrocyte membranes. The N-terminal sequence of a 15-kDa agglutinin was almost identical with that of SJL-1, a C-type lectin formerly identified in this species. Because cDNA sequence and tissue distribution of SJL-1 have not been reported, we performed cDNA sequencing, gene expression analysis, and western blotting and immunohistochemical evaluation with anti-recombinant SJL-1 (rSJL-1) antibodies. The hemagglutinin gene was transcribed mainly in the integument, tentacles, and respiratory tree. Western blotting revealed that SJL-I is present in a body surface rinse, indicating that SJL-1 is secreted onto the body surface. SJL-1-positive cells scattered beneath the outermost layer of the integument were detected by immunohistochemistry. Furthermore, rSJL-1 agglutinated Gram-positive and Gram-negative bacteria, and yeast. These results indicate that SJL-1 acts as a surface defense molecule in A. japonicus. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Plant Immunity

    USDA-ARS?s Scientific Manuscript database

    Plants are faced with defending themselves against a multitude of pathogens, including bacteria, fungi, viruses, nematodes, etc. Immunity is multi-layered and complex. Plants can induce defenses when they recognize small peptides, proteins or double-stranded RNA associated with pathogens. Recognitio...

  1. DefenseLink Special: Travels with Gates, April 2007

    Science.gov Websites

    leg of a three-day trip to Moscow, Warsaw and Berlin to discuss U.S. plans to base a missile defense U.S. plan to base missile defense assets in Eastern Europe. "We've made some very far-reaching to discuss the proposed U.S. plan to base missile defenses in Eastern Europe, Defense Secretary

  2. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  3. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  4. 48 CFR 652.228-71 - Worker's Compensation Insurance (Defense Base Act)-Services.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Insurance (Defense Base Act)-Services. 652.228-71 Section 652.228-71 Federal Acquisition Regulations System... Clauses 652.228-71 Worker's Compensation Insurance (Defense Base Act)—Services. As prescribed in 628.309-70(b), insert the following clause: Workers' Compensation Insurance (Defense Base Act)—Services (JUN...

  5. 48 CFR 652.228-71 - Worker's Compensation Insurance (Defense Base Act)-Services.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Insurance (Defense Base Act)-Services. 652.228-71 Section 652.228-71 Federal Acquisition Regulations System... Clauses 652.228-71 Worker's Compensation Insurance (Defense Base Act)—Services. As prescribed in 628.309-70(b), insert the following clause: Workers' Compensation Insurance (Defense Base Act)—Services (JUN...

  6. 48 CFR 652.228-71 - Worker's Compensation Insurance (Defense Base Act)-Services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Insurance (Defense Base Act)-Services. 652.228-71 Section 652.228-71 Federal Acquisition Regulations System... Clauses 652.228-71 Worker's Compensation Insurance (Defense Base Act)—Services. As prescribed in 628.309-70(b), insert the following clause: Workers' Compensation Insurance (Defense Base Act)—Services (JUN...

  7. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  8. 48 CFR 652.228-71 - Worker's Compensation Insurance (Defense Base Act)-Services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Insurance (Defense Base Act)-Services. 652.228-71 Section 652.228-71 Federal Acquisition Regulations System... Clauses 652.228-71 Worker's Compensation Insurance (Defense Base Act)—Services. As prescribed in 628.309-70(b), insert the following clause: Workers' Compensation Insurance (Defense Base Act)—Services (JUN...

  9. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  10. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  11. 48 CFR 652.228-71 - Worker's Compensation Insurance (Defense Base Act)-Services.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Insurance (Defense Base Act)-Services. 652.228-71 Section 652.228-71 Federal Acquisition Regulations System... Clauses 652.228-71 Worker's Compensation Insurance (Defense Base Act)—Services. As prescribed in 628.309-70(b), insert the following clause: Workers' Compensation Insurance (Defense Base Act)—Services (JUN...

  12. 48 CFR 652.228-74 - Defense Base Act insurance rates-Limitation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Defense Base Act insurance....228-74 Defense Base Act insurance rates—Limitation. As prescribed in 628.309-70(c), insert the following provision: Defense Base Act Insurance Rates—Limitation (JUN 2006) (a) The Department of State has...

  13. Ground-Based Midcourse Defense (GMD) Sea-Based X-Band Radar (SBX) Placement and Operation, Adak, Alaska

    DTIC Science & Technology

    2005-08-03

    Finding of No Significant Impact and the Environmental Assessment for Theater Missile Defense Ground- Based Radar Testing Program at Fort Devens ...2000 "* Record of Decision for Site Preparation Activities at the Missile Defense System Test Bed at Fort Greely, Alaska, 2001 "* Record of Decision...to Establish a Ground-Based Midcourse Defense Initial Defensive Operations Capability at Fort Greely, Alaska, 2003 These documents are available at the

  14. Effect of truncated cone roughness element density on hydrodynamic drag

    NASA Astrophysics Data System (ADS)

    Womack, Kristofer; Schultz, Michael; Meneveau, Charles

    2017-11-01

    An experimental study was conducted on rough-wall, turbulent boundary layer flow with roughness elements whose idealized shape model barnacles that cause hydrodynamic drag in many applications. Varying planform densities of truncated cone roughness elements were investigated. Element densities studied ranged from 10% to 79%. Detailed turbulent boundary layer velocity statistics were recorded with a two-component LDV system on a three-axis traverse. Hydrodynamic roughness length (z0) and skin-friction coefficient (Cf) were determined and compared with the estimates from existing roughness element drag prediction models including Macdonald et al. (1998) and other recent models. The roughness elements used in this work model idealized barnacles, so implications of this data set for ship powering are considered. This research was supported by the Office of Naval Research and by the Department of Defense (DoD) through the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  15. Military Knowledge Handbook for Commanders (Selected Section)

    DTIC Science & Technology

    1988-03-28

    8217 Accession For NTIS GRA&I DTIC TAB 0l Unannoun ed 0] ju,.it . " t ation Distri’muti on/ Availabilit %Codes Dist cSpeial GRAPHICS DISCLAIMER...cloud layers, the energy of ray radiation on the ground will increase due to reflection effect of the cloud layers. Water surface, ice, accumulated... water flow can direct the radioactive fallout into defense works and water sources to worsen contaminations; radioactive fallout can easily be retained in

  16. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  17. Deep Structures of The Angola Margin

    NASA Astrophysics Data System (ADS)

    Moulin, M.; Contrucci, I.; Olivet, J.-L.; Aslanian, D.; Géli, L.; Sibuet, J.-C.

    1 Ifremer Centre de Brest, DRO/Géosciences Marines, B.P. 70, 29280 Plouzané cedex (France) mmoulin@ifremer.fr/Fax : 33 2 98 22 45 49 2 Université de Bretagne Occidentale, Institut Universitaire Europeen de la Mer, Place Nicolas Copernic, 29280 Plouzane (France) 3 Total Fina Elf, DGEP/GSR/PN -GEOLOGIE, 2,place de la Coupole-La Defense 6, 92078 Paris la Defense Cedex Deep reflection and refraction seismic data were collected in April 2000 on the West African margin, offshore Angola, within the framework of the Zaiango Joint Project, conducted by Ifremer and Total Fina Elf Production. Vertical multichannel reflection seismic data generated by a « single-bubble » air gun array array (Avedik et al., 1993) were recorded on a 4.5 km long, digital streamer, while refraction and wide angle reflection seismic data were acquired on OBSs (Ocean Bottom Seismometers). Despite the complexity of the margin (5 s TWT of sediment, salt tectonics), the combination of seismic reflection and refraction methods results in an image and a velocity model of the ground structures below the Aptian salt layer. Three large seismic units appear in the reflection seismic section from the deep part on the margin under the base of salt. The upper seismic unit is layered with reflectors parallel to the base of the salt ; it represents unstructured sediments, filling a basin. The middle unit is seismically transparent. The lower unit is characterized by highly energetic reflectors. According to the OBS refraction data, these two units correspond to the continental crust and the base of the high energetic unit corresponds to the Moho. The margin appears to be divided in 3 domains, from east to west : i) a domain with an unthinned, 30 km thick, continental crust ; ii) a domain located between the hinge line and the foot of the continental slope, where the crust thins sharply, from 30 km to less than 7 km, this domain is underlain by an anormal layer with velocities comprising between 7,2 and 7,4 km/s. The maximum thickness of this layer is located where the crust shows the strongest thinning at the foot of the continental slope ; and iii) a transitional domain, 160 km wide, with an average crustal thickness of 6 km. Moreover, no tilted blocks nor detachment faults are observed on the reflection seismic sections. The consequences of these observations on the models of crustal thinning classically used in the litterature are examined. Avedik, F., V. Renard, J-P. Allenou, B. Morvan, "Single bubble" air gun for deep exploration, Geophysics, 58, 366-382, 1993.

  18. FUDS

    EPA Science Inventory

    This data layer represents point locations for Formerly Used Defense Sites (FUDS) located in California, Arizona and Nevada. The original data was extracted from the U.S. Army Corp of Engineer's FUDSIS database. Each site has information about it's inventory status and ...

  19. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  20. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... subcontractor responsibilities to obtain workers' compensation insurance or to qualify as a self-insurer, and...

  1. Surface protection in bio-shields via a functional soft skin layer: Lessons from the turtle shell.

    PubMed

    Shelef, Yaniv; Bar-On, Benny

    2017-09-01

    The turtle shell is a functional bio-shielding element, which has evolved naturally to provide protection against predator attacks that involve biting and clawing. The near-surface architecture of the turtle shell includes a soft bi-layer skin coating - rather than a hard exterior - which functions as a first line of defense against surface damage. This architecture represents a novel type of bio-shielding configuration, namely, an inverse structural-mechanical design, rather than the hard-coated bio-shielding elements identified so far. In the current study, we used experimentally based structural modeling and FE simulations to analyze the mechanical significance of this unconventional protection architecture in terms of resistance to surface damage upon extensive indentations. We found that the functional bi-layer skin of the turtle shell, which provides graded (soft-softer-hard) mechanical characteristics to the bio-shield exterior, serves as a bumper-buffer mechanism. This material-level adaptation protects the inner core from the highly localized indentation loads via stress delocalization and extensive near-surface plasticity. The newly revealed functional bi-layer coating architecture can potentially be adapted, using synthetic materials, to considerably enhance the surface load-bearing capabilities of various engineering configurations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Experimental characterization of broadband electrostatic noise due to plasma compression

    NASA Astrophysics Data System (ADS)

    Dubois, Ami M.; Thomas, Edward, Jr.; Amatucci, William E.; Ganguli, Gurudas

    2015-11-01

    For a wide variety of laboratory and space plasma environments, theory states that plasmas are unstable to transverse shear flows over a very broad frequency range, where the shear scale length (LE) compared to the ion gyro-radius (ρi) determines the character of the shear-driven instability that may prevail. During active periods in the Earth's magnetosphere, such sheared flows are intensified and broadband electrostatic noise (BEN) is often observed by satellites traversing natural boundary layers. An interpenetrating magnetized plasma configuration is used to create a transverse velocity shear profile similar to that found at natural space plasma boundary layers. The continuous variation and the associated transition of the instability regimes driven by the shear flow mechanism are demonstrated in a single laboratory experiment. For the first time, broadband wave emission, which is correlated to increasing/decreasing stress (i.e., ρi/LE) on a plasma boundary layer, is found under controlled and repeatable conditions. This result provides evidence that the compression/relaxation of a plasma boundary layer leads to a BEN signature and holds out the promise for understanding the cause and effect of the in situ observation of BEN by satellites. This project was supported with funding from the U.S. Department of Energy, the Defense Threat Reduction Agency, and NRL Base Funds.

  3. Simple preparation of plant epidermal tissue for laser microdissection and downstream quantitative proteome and carbohydrate analysis

    PubMed Central

    Falter, Christian; Ellinger, Dorothea; von Hülsen, Behrend; Heim, René; Voigt, Christian A.

    2015-01-01

    The outwardly directed cell wall and associated plasma membrane of epidermal cells represent the first layers of plant defense against intruding pathogens. Cell wall modifications and the formation of defense structures at sites of attempted pathogen penetration are decisive for plant defense. A precise isolation of these stress-induced structures would allow a specific analysis of regulatory mechanism and cell wall adaption. However, methods for large-scale epidermal tissue preparation from the model plant Arabidopsis thaliana, which would allow proteome and cell wall analysis of complete, laser-microdissected epidermal defense structures, have not been provided. We developed the adhesive tape – liquid cover glass technique (ACT) for simple leaf epidermis preparation from A. thaliana, which is also applicable on grass leaves. This method is compatible with subsequent staining techniques to visualize stress-related cell wall structures, which were precisely isolated from the epidermal tissue layer by laser microdissection (LM) coupled to laser pressure catapulting. We successfully demonstrated that these specific epidermal tissue samples could be used for quantitative downstream proteome and cell wall analysis. The development of the ACT for simple leaf epidermis preparation and the compatibility to LM and downstream quantitative analysis opens new possibilities in the precise examination of stress- and pathogen-related cell wall structures in epidermal cells. Because the developed tissue processing is also applicable on A. thaliana, well-established, model pathosystems that include the interaction with powdery mildews can be studied to determine principal regulatory mechanisms in plant–microbe interaction with their potential outreach into crop breeding. PMID:25870605

  4. Simple preparation of plant epidermal tissue for laser microdissection and downstream quantitative proteome and carbohydrate analysis.

    PubMed

    Falter, Christian; Ellinger, Dorothea; von Hülsen, Behrend; Heim, René; Voigt, Christian A

    2015-01-01

    The outwardly directed cell wall and associated plasma membrane of epidermal cells represent the first layers of plant defense against intruding pathogens. Cell wall modifications and the formation of defense structures at sites of attempted pathogen penetration are decisive for plant defense. A precise isolation of these stress-induced structures would allow a specific analysis of regulatory mechanism and cell wall adaption. However, methods for large-scale epidermal tissue preparation from the model plant Arabidopsis thaliana, which would allow proteome and cell wall analysis of complete, laser-microdissected epidermal defense structures, have not been provided. We developed the adhesive tape - liquid cover glass technique (ACT) for simple leaf epidermis preparation from A. thaliana, which is also applicable on grass leaves. This method is compatible with subsequent staining techniques to visualize stress-related cell wall structures, which were precisely isolated from the epidermal tissue layer by laser microdissection (LM) coupled to laser pressure catapulting. We successfully demonstrated that these specific epidermal tissue samples could be used for quantitative downstream proteome and cell wall analysis. The development of the ACT for simple leaf epidermis preparation and the compatibility to LM and downstream quantitative analysis opens new possibilities in the precise examination of stress- and pathogen-related cell wall structures in epidermal cells. Because the developed tissue processing is also applicable on A. thaliana, well-established, model pathosystems that include the interaction with powdery mildews can be studied to determine principal regulatory mechanisms in plant-microbe interaction with their potential outreach into crop breeding.

  5. The Diffusion of Military Technologies to Foreign Nations: Arms Transfers Can Preserve the Defense Technological and Industrial Base

    DTIC Science & Technology

    1995-06-01

    required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense

  6. Identification of defense-related genes newly-associated with tomato flower abscission.

    PubMed

    Meir, Shimon; Philosoph-Hadas, Sonia; Sundaresan, Srivignesh; Selvaraj, K S Vijay; Burd, Shaul; Ophir, Ron; Kochanek, K S Bettina; Reid, Michael S; Jiang, Cai-Zhong; Lers, Amnon

    2011-04-01

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense responses. We identified four different defense-related genes, including: Cysteine-type endopeptidase, α-Dioxygenase 1 (α-DOX1), HopW-1-1-Interacting protein2 (WIN2), and Stomatal-derived factor-2 (SDF2), that are newly-associated with the late stage of the abscission process. The late expression of these genes, induced at 8-14 h after flower removal when pedicel abscission was already in progress, was AZ-specific, and was inhibited by treatments that prevented pedicel abscission, including 1-methylcyclopropene pretreatment or IAA application. This information supports the activation of different defense responses and strategies at the late abscission stages, which may enable efficient protection of the exposed tissue toward different environmental stresses.

  7. High average power scaleable thin-disk laser

    DOEpatents

    Beach, Raymond J.; Honea, Eric C.; Bibeau, Camille; Payne, Stephen A.; Powell, Howard; Krupke, William F.; Sutton, Steven B.

    2002-01-01

    Using a thin disk laser gain element with an undoped cap layer enables the scaling of lasers to extremely high average output power values. Ordinarily, the power scaling of such thin disk lasers is limited by the deleterious effects of amplified spontaneous emission. By using an undoped cap layer diffusion bonded to the thin disk, the onset of amplified spontaneous emission does not occur as readily as if no cap layer is used, and much larger transverse thin disks can be effectively used as laser gain elements. This invention can be used as a high average power laser for material processing applications as well as for weapon and air defense applications.

  8. 77 FR 8837 - Termination of the Department of Defense Web-Based TRICARE Assistance Program Demonstration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Termination of the Department of Defense Web-Based..., entitled Web-Based TRICARE Assistance Program (TRIAP). The demonstration project uses existing health care support contracts (HCSC) to allow web-based behavioral health and related services including non-medical...

  9. Office of Economic Adjustment | U.S. Department of Defense

    Science.gov Websites

    Reuse Compatible Use Defense Contractor Transitions Federal Assistance Coordination Mission Change contractor or manufacturer is making cuts or closing. Explore BRAC Icon Base Realignment and Closure A contact information. What We Do Base Closure Base Realignment Base Reuse Compatible Use Defense Contractor

  10. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  11. Object recognition using deep convolutional neural networks with complete transfer and partial frozen layers

    NASA Astrophysics Data System (ADS)

    Kruithof, Maarten C.; Bouma, Henri; Fischer, Noëlle M.; Schutte, Klamer

    2016-10-01

    Object recognition is important to understand the content of video and allow flexible querying in a large number of cameras, especially for security applications. Recent benchmarks show that deep convolutional neural networks are excellent approaches for object recognition. This paper describes an approach of domain transfer, where features learned from a large annotated dataset are transferred to a target domain where less annotated examples are available as is typical for the security and defense domain. Many of these networks trained on natural images appear to learn features similar to Gabor filters and color blobs in the first layer. These first-layer features appear to be generic for many datasets and tasks while the last layer is specific. In this paper, we study the effect of copying all layers and fine-tuning a variable number. We performed an experiment with a Caffe-based network on 1000 ImageNet classes that are randomly divided in two equal subgroups for the transfer from one to the other. We copy all layers and vary the number of layers that is fine-tuned and the size of the target dataset. We performed additional experiments with the Keras platform on CIFAR-10 dataset to validate general applicability. We show with both platforms and both datasets that the accuracy on the target dataset improves when more target data is used. When the target dataset is large, it is beneficial to freeze only a few layers. For a large target dataset, the network without transfer learning performs better than the transfer network, especially if many layers are frozen. When the target dataset is small, it is beneficial to transfer (and freeze) many layers. For a small target dataset, the transfer network boosts generalization and it performs much better than the network without transfer learning. Learning time can be reduced by freezing many layers in a network.

  12. 75 FR 76428 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ..., country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other... to populate and maintain personal data elements in DoD Component networks and systems, such as.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  13. Cross-Country Evidence on the Impact of Shifting Economic and Strategic Landscapes on the Global Defense Industrial Base

    DTIC Science & Technology

    2010-11-04

    aspects of the defense industrial base for US and European contractors, as demand in their domestic markets for these products lessens. Increased...Cold War, the defense industrial base in the US has witnessed many changes and continues to face new challenges. The purpose of this study is to...evaluate the evolution of the US and global defense industrial base in response to the shifting economic and strategic landscape. Specifically, it examines

  14. Characteristics of contaminant deposition onto a cylindrical body surrounded by porous clothing

    NASA Astrophysics Data System (ADS)

    Cho, Minki; Lee, Jinwon; Jung, Hyunsuk; Lee, Haewan; Pohang Univ of Sci; Tech Team; AgencyDefense Development Team

    2014-11-01

    In order to characterize the deposition pattern of air-borne contaminants on a human body protected by a garment, the air flow through the clothing and in the air gap between the clothing and the skin was numerically solved, and the deposition of the suspended contaminants on the skin was obtained over a wide variety of conditions-wind speed, human motion and clothing conditions. The penetrating air flow was sensitive to the pressure inside the air gap, for which a simple model was successfully formulated. Also the profile of the non-uniform deposition velocity or the Sherwood number could be well modeled based on the developing concentration boundary layer inside the air gap. The boundary layer thickness grew vary rapidly, nearly proportional to the square of the distance from the front stagnation point, which is much different from any other boundary layer studied in many engineering fields before. A rather universal function for the distribution of deposition speed over a cylindrical body was obtained, which remained valid for a very wide range of conditions. The characteristics for non-uniform and/or periodic external wind due to human motion were also analyzed. This study is supported by Agency for Defense Development.

  15. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  16. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  17. 32 CFR 236.7 - DIB participant eligibility requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false DIB participant eligibility requirements. 236.7 Section 236.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY...

  18. 32 CFR 236.7 - DIB participant eligibility requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false DIB participant eligibility requirements. 236.7 Section 236.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY...

  19. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  20. 32 CFR 236.7 - DIB participant eligibility requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false DIB participant eligibility requirements. 236.7 Section 236.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY...

  1. LES Modeling of Supersonic Combustion at SCRAMJET Conditions

    NASA Astrophysics Data System (ADS)

    Vane, Zachary; Lacaze, Guilhem; Oefelein, Joseph

    2016-11-01

    Results from a series of large-eddy simulations (LES) of the Hypersonic International Flight Research Experiment (HIFiRE) are examined with emphasis placed on the coupled performance of the wall and combustion models. The test case of interest corresponds to the geometry and conditions found in the ground based experiments performed in the HIFiRE Direct Connect Rig (HDCR) in dual-mode operation. In these calculations, the turbulence and mixing characteristics of the high Reynolds number turbulent boundary layer with multi-species fuel injection are analyzed using a simplified chemical model and combustion closure to predict the heat release measured experimentally. These simulations are then used to identify different flame regimes in the combustor section. Concurrently, the performance of an equilibrium wall-model is evaluated in the vicinity of the fuel injectors and in the flame-holding cavity where regions of boundary layer and thermochemical non-equilibrium are present. Support for this research was provided by the Defense Advanced Research Projects Agency (DARPA).

  2. Transcriptomic Profiling of Soybean in Response to High-Intensity UV-B Irradiation Reveals Stress Defense Signaling

    PubMed Central

    Yoon, Min Young; Kim, Moon Young; Shim, Sangrae; Kim, Kyung Do; Ha, Jungmin; Shin, Jin Hee; Kang, Sungtaeg; Lee, Suk-Ha

    2016-01-01

    The depletion of the ozone layer in the stratosphere has led to a dramatic spike in ultraviolet B (UV-B) intensity and increased UV-B light levels. The direct absorption of high-intensity UV-B induces complex abiotic stresses in plants, including excessive light exposure, heat, and dehydration. However, UV-B stress signaling mechanisms in plants including soybean (Glycine max [L.]) remain poorly understood. Here, we surveyed the overall transcriptional responses of two soybean genotypes, UV-B-sensitive Cheongja 3 and UV-B-resistant Buseok, to continuous UV-B irradiation for 0 (control), 0.5, and 6 h using RNA-seq analysis. Homology analysis using UV-B-related genes from Arabidopsis thaliana revealed differentially expressed genes (DEGs) likely involved in UV-B stress responses. Functional classification of the DEGs showed that the categories of immune response, stress defense signaling, and reactive oxygen species (ROS) metabolism were over-represented. UV-B-resistant Buseok utilized phosphatidic acid-dependent signaling pathways (based on subsequent reactions of phospholipase C and diacylglycerol kinase) rather than phospholipase D in response to UV-B exposure at high fluence rates, and genes involved in its downstream pathways, such as ABA signaling, mitogen-activated protein kinase cascades, and ROS overproduction, were upregulated in this genotype. In addition, the DEGs for TIR-NBS-LRR and heat shock proteins are positively activated. These results suggest that defense mechanisms against UV-B stress at high fluence rates are separate from the photomorphogenic responses utilized by plants to adapt to low-level UV light. Our study provides valuable information for deep understanding of UV-B stress defense mechanisms and for the development of resistant soybean genotypes that survive under high-intensity UV-B stress. PMID:28066473

  3. Ground-Based Missile Defense (National Missile Defense): Is It Feasible?

    DTIC Science & Technology

    2004-03-19

    Westview Press), 191. 47 Ibid. 192. 48 Dr. Nicholas Berry, National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia...153. 18 19 BIBLIOGRAPHY Berry, Nicholas. National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia, Center for

  4. 75 FR 69644 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ..., organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other mobile, other.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all records is restricted to and...

  5. 44 CFR 321.2 - Selection of the mobilization base.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... of Defense shall select, for its mobilization base, facilities which produce or are capable of... items which would be so urgent to the defense of this country that utmost effort must be exerted to...

  6. 44 CFR 321.2 - Selection of the mobilization base.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... of Defense shall select, for its mobilization base, facilities which produce or are capable of... items which would be so urgent to the defense of this country that utmost effort must be exerted to...

  7. 44 CFR 321.2 - Selection of the mobilization base.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... of Defense shall select, for its mobilization base, facilities which produce or are capable of... items which would be so urgent to the defense of this country that utmost effort must be exerted to...

  8. 44 CFR 321.2 - Selection of the mobilization base.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... of Defense shall select, for its mobilization base, facilities which produce or are capable of... items which would be so urgent to the defense of this country that utmost effort must be exerted to...

  9. Identifying and Mitigating the Impact of the Budget Control Act on High Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks

    DTIC Science & Technology

    2016-04-30

    Ü~åÖÉ= - 351 - products, similar to those found in a bill of material. Figure 3 provides an example of the relationship between sectors , sub- sectors ...defense aircraft. Defense aircraft are divided in three main sub- sectors : fixed-wing, rotary wing, and unmanned systems. The fixed-wing sub- sector ...Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks Lirio Avilés, Engineer, MIBP, OUSD(AT&L) Sally

  10. The S-layer Protein DR_2577 Binds Deinoxanthin and under Desiccation Conditions Protects against UV-Radiation in Deinococcus radiodurans

    PubMed Central

    Farci, Domenica; Slavov, Chavdar; Tramontano, Enzo; Piano, Dario

    2016-01-01

    Deinococcus radiodurans has the puzzling ability to withstand over a broad range of extreme conditions including high doses of ultraviolet radiation and deep desiccation. This bacterium is surrounded by a surface layer (S-layer) built of a regular repetition of several proteins, assembled to form a paracrystalline structure. Here we report that the deletion of a main constituent of this S-layer, the gene DR_2577, causes a decrease in the UVC resistance, especially in desiccated cells. Moreover, we show that the DR_2577 protein binds the carotenoid deinoxanthin, a strong protective antioxidant specific of this bacterium. A further spectroscopical characterization of the deinoxanthin-DR_2577 complex revealed features which could suggest a protective role of DR_2577. We propose that, especially under desiccation, the S-layer shields the bacterium from incident ultraviolet light and could behave as a first lane of defense against UV radiation. PMID:26909071

  11. The S-layer Protein DR_2577 Binds Deinoxanthin and under Desiccation Conditions Protects against UV-Radiation in Deinococcus radiodurans.

    PubMed

    Farci, Domenica; Slavov, Chavdar; Tramontano, Enzo; Piano, Dario

    2016-01-01

    Deinococcus radiodurans has the puzzling ability to withstand over a broad range of extreme conditions including high doses of ultraviolet radiation and deep desiccation. This bacterium is surrounded by a surface layer (S-layer) built of a regular repetition of several proteins, assembled to form a paracrystalline structure. Here we report that the deletion of a main constituent of this S-layer, the gene DR_2577, causes a decrease in the UVC resistance, especially in desiccated cells. Moreover, we show that the DR_2577 protein binds the carotenoid deinoxanthin, a strong protective antioxidant specific of this bacterium. A further spectroscopical characterization of the deinoxanthin-DR_2577 complex revealed features which could suggest a protective role of DR_2577. We propose that, especially under desiccation, the S-layer shields the bacterium from incident ultraviolet light and could behave as a first lane of defense against UV radiation.

  12. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  13. Avian Nanostructured Tissues as Models for New Defensive Coatings and Photonic Crystal Fibers

    DTIC Science & Technology

    2012-03-31

    promiscuous binding capacity of chitin , the chemical backbone of the arthropod cuticle (Kumar 2000). This polysaccharide binds many proteins and other...properties. The greater refractive index contrast between light and dark layers afforded by chitin may allow Arthropoda to attain brighter and more 71

  14. Spatial repellents on strips of camouflage netting reduce mosquito collections in a field environment

    USDA-ARS?s Scientific Manuscript database

    Barrier treatments can be effective in reducing host seeking mosquito vectors and provide an additional layer of passive defense, reducing disease risk. Devices designed to release spatial repellents or direct application of spatial repellents to artificial surfaces can serve as efficient barriers r...

  15. Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.

    ERIC Educational Resources Information Center

    Adams, Shawn

    1998-01-01

    Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…

  16. 75 FR 69645 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ..., pager, Defense Switched Network (DSN) phone, other fax, other mobile, other pager, city, zip code, post... system may used to populate and maintain persona data elements in DoD component networks and systems.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  17. Stress, Chemical Defense Agents and Cholinergic Receptors

    DTIC Science & Technology

    1989-11-30

    reasons: I) Bused on the observations of Dam et al. (1982), i.e., low-dose oxotremorine activation of cerebral glucose utilization in cortical layers IVNb...QNB Lower: Localization of the binding of 2.0 nM ( H]- Oxotremorine -M The highest levels of binding for both radioligands are observed in the cerebral

  18. Pericarp strength of sunflower and its value for plant defense against the sunflower moth, Homoeosoma electellum

    USDA-ARS?s Scientific Manuscript database

    Sunflower pericarps provide a barrier against seed-feeding by larvae of the sunflower moth, Homoeosoma electellum. Pericarp hardening is thought to be accelerated by a phytomelanin layer beneath the hypodermis, but among germplasm with phytomelanin, broad variation in sunflower pericarp strength exi...

  19. Defense on the Move: Ant-Based Cyber Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less

  20. Defense.gov - Special Report - Travels With Gates

    Science.gov Websites

    Force Base, Ala. Story» Warfighter Care at Center of 2010 Budget Considerations MAXWELL AIR FORCE BASE , Ala., April 15, 2009 – Defense Secretary Robert M. Gates met at Maxwell Air Force Base, Ala., with the U.S. Air Force Air War College on Maxwell Air Force Base, Ala., listen to Defense Secretary Robert

  1. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Year 1992 and 1993

    DTIC Science & Technology

    1993-05-25

    OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FISCAL YEARS 1992 AND 1993...ASSISTANT SECRETARY OF DEFENSE (INSTALLATIONS) SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Years...1992 and 1993 (Report No. 93-100) We are providing this final summary report for your information and use. The audit was required by Public Law

  2. The role of serpin and cystatin antiproteases in mucosal innate immunity and their defense against HIV.

    PubMed

    Aboud, Lindsay; Ball, Terry Blake; Tjernlund, Annelie; Burgener, Adam

    2014-01-01

    Antiproteases play diverse roles in nature, from regulating protease activity to innate defense against microorganisms. Recently, antiproteases have been shown to play important roles in HIV pathogenesis including, inhibiting HIV binding and replication and reducing activation and inflammation of susceptible cells. They have also been implicated as one of the initial host responders, in plasma, to control replication of HIV. More recently, antiproteases expressed at the mucosal surface have been linked to reduced susceptibility to HIV infection in HIV-exposed sero-negative individuals. These factors are expressed in the epithelial layer of the female genital tract, thus at the frontline of defense against mucosal infection. This review focuses on the specific antimicrobial roles of antiproteases, focusing on serpins and cystatins, with an emphasis on their known and potential roles in HIV infection. Their potential as therapeutic interventions to combat HIV is also discussed. © 2013 John Wiley & Sons Ltd.

  3. Ground-Based Midcourse Defense (GMD) Initial Defensive Operations Capability (IDOC) at Vandenberg Air Force Base Environmental Assessment

    DTIC Science & Technology

    2003-08-28

    Zielinski , EDAW, Inc., concerning utilities supply and demand for Vandenberg Air Force Base, 1 August. Rush, P., 2002. Personal communication between...Pernell W. Rush, Technical Sergeant, Water Utilities/Water Treatment NCO, USAF 30th CES/CEOIU, Vandenberg Air Force Base, and James E. Zielinski ... Dave Savinsky, Environmental Consultant, 30 CES/CEVC, Vandenberg Air Force Base, on the Preliminary Draft Ground-Based Midcourse Defense (GMD

  4. 32 CFR 318.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 318.4 Section 318.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE... administrative, technical, and physical safeguards shall be established, based on the media (e.g., paper...

  5. 32 CFR 318.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 318.4 Section 318.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE... administrative, technical, and physical safeguards shall be established, based on the media (e.g., paper...

  6. 32 CFR 191.4 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 191.4 Section 191.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS THE DOD... Department of Defense. (e) Prohibit discrimination based on race, color, religion, sex, national origin...

  7. 32 CFR 191.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 191.4 Section 191.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS THE DOD... Department of Defense. (e) Prohibit discrimination based on race, color, religion, sex, national origin...

  8. 32 CFR 191.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 191.4 Section 191.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS THE DOD... Department of Defense. (e) Prohibit discrimination based on race, color, religion, sex, national origin...

  9. 32 CFR 191.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 191.4 Section 191.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS THE DOD... Department of Defense. (e) Prohibit discrimination based on race, color, religion, sex, national origin...

  10. 32 CFR 191.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 191.4 Section 191.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS THE DOD... Department of Defense. (e) Prohibit discrimination based on race, color, religion, sex, national origin...

  11. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    NASA Astrophysics Data System (ADS)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  12. 32 CFR 174.15 - Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993. 174.15 Section 174.15 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CLOSURES AND REALIGNMENT REVITALIZING BASE CLOSURE COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT...

  13. 32 CFR 174.15 - Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993. 174.15 Section 174.15 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CLOSURES AND REALIGNMENT REVITALIZING BASE CLOSURE COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT...

  14. 32 CFR 174.15 - Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993. 174.15 Section 174.15 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CLOSURES AND REALIGNMENT REVITALIZING BASE CLOSURE COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT...

  15. 32 CFR 174.15 - Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993. 174.15 Section 174.15 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CLOSURES AND REALIGNMENT REVITALIZING BASE CLOSURE COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT...

  16. 32 CFR 174.15 - Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Indemnification under Section 330 of the National Defense Authorization Act for Fiscal Year 1993. 174.15 Section 174.15 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CLOSURES AND REALIGNMENT REVITALIZING BASE CLOSURE COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT...

  17. The role of defense mechanisms in borderline and antisocial personalities.

    PubMed

    Presniak, Michelle D; Olson, Trevor R; Macgregor, Michael Wm

    2010-03-01

    We examined whether borderline personality disorder (BPD) and antisocial personality disorder (APD) could be differentiated based on defense mechanisms as measured by observer (Defense-Q; MacGregor, Olson, Presniak, & Davidson, 2008) and self-report (Defense Style Questionnaire; Andrews, Singh, & Bond, 1993) measures. We conducted 2 studies whereby nonclinical participants were divided into borderline and antisocial groups based on scores from the Personality Assessment Inventory (Morey, 1991). Multivariate analysis of variance results revealed significant overall group differences in defense use. Univariate analyses further showed group differences on several individual defenses (e.g., acting out, denial, and turning against self). Together, the findings suggest that in BPD, the defenses may emphasize interpersonal dependency and a tendency to direct aggression toward the self; whereas in APD, the defenses may emphasize egocentricity, interpersonal exploitation, and a tendency to direct aggression toward others. Overall, this study demonstrates important differences in defense use between borderline and antisocial personality groups across both observer and self-report measures.

  18. Infection with the gastrointestinal nematode Ostertagia ostertagi affects mucus biosynthesis in the abomasum of cattle

    USDA-ARS?s Scientific Manuscript database

    The mucus layer in the gastrointestinal (GI) tract is considered to be the first line of defense to the external environment. Alteration in mucus components has been reported to occur during intestinal nematode infection in ruminants, but the role of mucus in the response to abomasal parasites remai...

  19. Empowering Marine Corps System Administrators: Taxonomy of Training

    DTIC Science & Technology

    2004-03-01

    of Systems and Engineering Management Graduate School of Engineering and Management Air Force Institute of Technology Air University Air...Information Assurance ................................................................................ 16 2.8 Attacks, Social Engineering & Online Users... drawbridge , outer castle walls, inner castle walls and the keep. No single form of defense is foolproof, thus each layer compensates for deficiencies

  20. 32 CFR 37.1285 - Expenditure-based award.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... purposes for which the award was made. Most Federal Government grants and cooperative agreements are... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT...-based award. A Federal Government contract or assistance award for which the amounts of interim payments...

  1. Joint Light Tactical Vehicle (JLTV)

    DTIC Science & Technology

    2013-12-01

    BY - Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Production Estimate QR - Quantity Related Qty - Quantity RDT&E - Research, Development , Test, and Evaluation SAR - Selected Acquisition Report Sch - Schedule... Development Estimate) Defense Acquisition Executive (DAE) Approved Acquisition Program Baseline (APB) dated October 23, 2012 Approved APB Defense

  2. Department of Defense Research, Development, Test, and Evaluation (RDT and E): Appropriations Structure

    DTIC Science & Technology

    2016-12-13

    Task Force on Defense Science and Technology Base for the 21st Century, June 1998. Appropriations Structure of Defense RDT&E Congressional Research...Technology Base for the 21st Century, June 1998. 22 Ibid, p. 45. Appropriations Structure of Defense RDT&E Congressional Research Service 18 Applied...funding streams. Among the many other factors that may affect the effectiveness of the performance of RDT&E are: organizational structures and

  3. 32 CFR 395.5 - Relationships.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) ORGANIZATIONAL CHARTERS DEFENSE LEGAL SERVICES AGENCY § 395.5 Relationships. (a) In performance of assigned... concerned, evaluation of their performance and/or other action that may be necessary based on professional...

  4. The tear film and ocular mucins.

    PubMed

    Davidson, Harriet J; Kuonen, Vanessa J

    2004-01-01

    Abstract The trilaminar tear film, composed of the lipid, aqueous and mucin layers, has many functions including defending the ocular surface. The aqueous layer has several soluble antimicrobial factors that protect the ocular surface. Ocular mucins have recently been studied with regard to their role in the defense of the eye as well as in dry eye syndromes. To date, 15 mucin genes have been identified, and six of these mucin genes are localized to or secreted by ocular glands or epithelia. Understanding the production, secretion and function of ocular mucins will aid in the treatment of dry eye syndromes and ocular surface microbial infections.

  5. A protective effect of the laminated layer on Echinococcus granulosus survival dependent on upregulation of host arginase.

    PubMed

    Amri, Manel; Touil-Boukoffa, Chafia

    2015-09-01

    The role of nitric oxide (NO) in host defense against Echinococcus granulosus larvae was previously reported. However, NO production by NOS2 (inducible NO synthase) is counteracted by the expression of Arginase. In the present study, our aim is to evaluate the involvement of the laminated layer (external layer of parasitic cyst) in Arginase induction and the protoscoleces (living and infective part of the cyst) survival. Our in vitro results indicate that this cystic compound increases the Arginase activity in macrophages. Moreover, C-type lectin receptors (CLRs) with specificity for mannan and the TGF-β are implicated in this effect as shown after adding Mannan and Anti-TGFβ. Interestingly, the laminated layer increases protoscoleces survival in macrophages-parasite co-cultures. Our results indicate that the laminated layer protects E. granulosus against the NOS2 protective response through Arginase pathway, a hallmark of M2 macrophages. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. 38 CFR 3.311 - Claims based on exposure to ionizing radiation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Department of Defense. (ii) Hiroshima and Nagasaki occupation claims. In all claims based on participation in... requested from the Department of Defense. (iii) Other exposure claims. In all other claims involving... Department of Defense is consistent with the claim that the veteran was present where and when the claimed...

  7. Effect of Cilia Beat Frequency on Muco-ciliary Clearance

    PubMed Central

    Sedaghat, M.H.; Shahmardan, M.M.; Norouzi, M.; Heydari, M.

    2016-01-01

    Background: The airway surface liquid (ASL), which is a fluid layer coating the interior epithelial surface of the bronchi and bronchiolesis, plays an important defensive role against foreign particles and chemicals entering lungs. Objective: Numerical investigation has been employed to solve two-layer model consisting of mucus layer as a viscoelastic fluid and periciliary liquid layer as a Newtonian fluid to study the effects of cilia beat frequency (CBF) at various amounts of mucus properties on muco-ciliary transport problem. Methods: Hybrid finite difference-lattice Boltzmann-method (FB-LBM) has been used to solve the momentum equations and to simulate cilia forces, and also the PCL-mucus interface more accurately, immersed boundary method (IBM) has been employed. The main contribution of the current study is to use an Oldroyd-B model as the constitutive equation of mucus. Results: Our results show that increasing CBF and decreasing mucus viscosity ratio have great effects on mucus flow, but the effect of viscosity ratio is more significant. The results also illustrate that the relation between cilia beat frequency and mean mucus velocity is almost linear and it has similar behavior at different values of viscosity ratio. Conclusion: Numerical investigation based on hybrid IB-FD-LBM has been used to study the effect of CBF at various mounts of mucus viscosity ratio on the muco-ciliary clearance. The results showed that the effect of viscosity ratio on the muco-ciliary transport process is more significant compared with CBF. PMID:28144596

  8. Cost and Time Overruns for Major Defense Acquisition Programs: An Annotated Brief

    DTIC Science & Technology

    2011-04-30

    Logistics Management) • Director, Strategic Systems Programs Office • Deputy Director, Acquisition Career Management, US Army • Defense Business...acquisition and industrial base issues and their impact on the transatlantic defense market. Before joining CSIS, he worked as a freelance defense

  9. Coordinate expression of AOS genes and JA accumulation: JA is not required for initiation of closing layer in wound healing tubers

    USDA-ARS?s Scientific Manuscript database

    Wounding induces a series of coordinated physiological responses essential for protection and healing of the damaged tissue. Wound-induced formation of jasmonic acid (JA) is important in defense responses in leaves, but comparatively little is known about the induction of JA biosynthesis and its ro...

  10. 32 CFR 516.23 - Litigation reports.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Litigation reports. 516.23 Section 516.23 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND... the action and any defense thereto are based. Where possible, support facts by reference to documents...

  11. Modeling of HgCdTe focal plane array spectral inhomogeneities

    NASA Astrophysics Data System (ADS)

    Mouzali, Salima; Lefebvre, Sidonie; Rommeluère, Sylvain; Ferrec, Yann; Primot, Jérôme

    2015-06-01

    Infrared focal plane arrays (IRFPA) are widely used to perform high quality measurements such as spectrum acquisition at high rate, ballistic missile defense, gas detection, and hyperspectral imaging. For these applications, the fixed pattern noise represents one of the major limiting factors of the array performance. This sensor imperfection refers to the nonuniformity between pixels, and is partially caused by disparities of the cut-off wavenumbers. In this work, we focus particularly on mercury cadmium telluride (HgCdTe), which is the most important material of IR cooled detector applications. Among the many advantages of this ternary alloy is the tunability of the bandgap energy with Cadmium composition, as well as the high quantum efficiency. In order to predict and understand spectral inhomogeneities of HgCdTe-based IRFPA, we propose a modeling approach based on the description of optical phenomena inside the pixels. The model considers the p-n junctions as a unique absorbent bulk layer, and derives the sensitivity of the global structure to both Cadmium composition and HgCdTe layer thickness. For this purpose, HgCdTe optical and material properties were necessary to be known at low temperature (80K), in our operating conditions. We therefore achieved the calculation of the real part of the refractive index using subtracti

  12. 48 CFR 28.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... operations under service contracts and projects in connection with the national defense or with war... work in connection therewith at the site or on the project. (b) The Defense Base Act (42 U.S.C. 1651 et... should be covered) or (ii) contracts exclusively for materials or supplies. (c) When the Defense Base Act...

  13. 48 CFR 28.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... operations under service contracts and projects in connection with the national defense or with war... work in connection therewith at the site or on the project. (b) The Defense Base Act (42 U.S.C. 1651 et... should be covered) or (ii) contracts exclusively for materials or supplies. (c) When the Defense Base Act...

  14. 48 CFR 28.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... operations under service contracts and projects in connection with the national defense or with war... work in connection therewith at the site or on the project. (b) The Defense Base Act (42 U.S.C. 1651 et... should be covered) or (ii) contracts exclusively for materials or supplies. (c) When the Defense Base Act...

  15. 48 CFR 28.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... operations under service contracts and projects in connection with the national defense or with war... work in connection therewith at the site or on the project. (b) The Defense Base Act (42 U.S.C. 1651 et... should be covered) or (ii) contracts exclusively for materials or supplies. (c) When the Defense Base Act...

  16. 32 CFR 37.300 - What is the difference between an expenditure-based and fixed-support TIA?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false What is the difference between an expenditure-based and fixed-support TIA? 37.300 Section 37.300 National Defense Department of Defense OFFICE OF THE... and Fixed-Support Technology Investment Agreements § 37.300 What is the difference between an...

  17. The RNA silencing enzyme RNA polymerase v is required for plant immunity.

    PubMed

    López, Ana; Ramírez, Vicente; García-Andrade, Javier; Flors, Victor; Vera, Pablo

    2011-12-01

    RNA-directed DNA methylation (RdDM) is an epigenetic control mechanism driven by small interfering RNAs (siRNAs) that influence gene function. In plants, little is known of the involvement of the RdDM pathway in regulating traits related to immune responses. In a genetic screen designed to reveal factors regulating immunity in Arabidopsis thaliana, we identified NRPD2 as the OVEREXPRESSOR OF CATIONIC PEROXIDASE 1 (OCP1). NRPD2 encodes the second largest subunit of the plant-specific RNA Polymerases IV and V (Pol IV and Pol V), which are crucial for the RdDM pathway. The ocp1 and nrpd2 mutants showed increases in disease susceptibility when confronted with the necrotrophic fungal pathogens Botrytis cinerea and Plectosphaerella cucumerina. Studies were extended to other mutants affected in different steps of the RdDM pathway, such as nrpd1, nrpe1, ago4, drd1, rdr2, and drm1drm2 mutants. Our results indicate that all the mutants studied, with the exception of nrpd1, phenocopy the nrpd2 mutants; and they suggest that, while Pol V complex is required for plant immunity, Pol IV appears dispensable. Moreover, Pol V defective mutants, but not Pol IV mutants, show enhanced disease resistance towards the bacterial pathogen Pseudomonas syringae DC3000. Interestingly, salicylic acid (SA)-mediated defenses effective against PsDC3000 are enhanced in Pol V defective mutants, whereas jasmonic acid (JA)-mediated defenses that protect against fungi are reduced. Chromatin immunoprecipitation analysis revealed that, through differential histone modifications, SA-related defense genes are poised for enhanced activation in Pol V defective mutants and provide clues for understanding the regulation of gene priming during defense. Our results highlight the importance of epigenetic control as an additional layer of complexity in the regulation of plant immunity and point towards multiple components of the RdDM pathway being involved in plant immunity based on genetic evidence, but whether this is a direct or indirect effect on disease-related genes is unclear.

  18. Department of Defense high power laser program guidance

    NASA Astrophysics Data System (ADS)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  19. Impact of Contract Bundling and Consolidation on Defense Acquisition System and Defense Industrial Base: The Case of the U.S. Department of the Navy

    DTIC Science & Technology

    2012-04-27

    Department of the Navy 27 April 2012 by Max V. Kidalov, J.D., LL.M., Assistant Professor Graduate School of Business & Public Policy Naval...Consolidation on Defense Acquisition System and Defense Industrial Base: The Case of the U.S. Department of the Navy 5a. CONTRACT NUMBER 5b. GRANT...examining Department of the Navy (DoN) bundled and consolidated contracts for fiscal year (FY) 2010, the record year for bundling and consolidation in

  20. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    DTIC Science & Technology

    2006-06-01

    Giordano THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...Gray Approved by: John Arquilla Thesis Advisor Frank Giordano Second Reader Gordon McCormick Chairman, Department of Defense...Frank Giordano for all their help in guiding me down the path of swarming, counterinsurgency and applications for air base defense in irregular

  1. Small Business Manufacturing--An Important Component of the U.S. Defense Industrial Base

    DTIC Science & Technology

    1993-04-01

    Armed Forces in 1993, Mr. Williams is assigned to the Assistant Secretary of the Army (Financial Management ) in the Pentagon. - ii - SMALL BUSINESS ...AD-A276 756 1993 Executive Research Project RS1 Small Business Manufacturing -- An Important Component of the U.S. Defense Industrial Base Mr...paper comprises a review of the contribution of the small - and medium-sized manufacturing business sector to the US defense industrial base, the state

  2. The Civil-Military Gap in the United States. Does It Exist, Why, and Does It Matter?

    DTIC Science & Technology

    2007-01-01

    and/or the general public. Based on this framework, our analysis then compares the char- acteristics of military and civilian respondents using a...armed forces, three major force structure reviews (1990 Base Force, 1993 Bottom-Up Review, 1997 Quadrennial Defense Review) took place in the space...Defense Planning in a Decade of Change: Lessons from the Base Force, Bottom-Up Review, and Quadrennial Defense Review, Santa Monica, CA: RAND

  3. Chemical Warfare: Many Unanswered Questions.

    DTIC Science & Technology

    1983-04-29

    of Defense DSB Defense Science Board GAO U.S. General Accounting Office IDA Institute for Defense Analyses JCS Joint Chiefs of Staff SIPRI Stockholm...Defense Science Board in 1980, DOD specifically asked it to review intelligence data on chemical warfare, and DSB’s 1981 report accordingly presents its...Defense Science Board report suggests, however, that its com- - ments are based on a composite of intelligence information on Soviet chemical warfare

  4. Morphological Changes in Skin Glands During Development in Rhinella Arenarum (Anura: Bufonidae).

    PubMed

    Regueira, Eleonora; Dávila, Camila; Hermida, Gladys N

    2016-01-01

    Avoiding predation is critical to survival of animals; chemical defenses represent a common strategy among amphibians. In this study, we examined histologically the morphology of skin glands and types of secretions related to chemical skin defense during ontogeny of Rhinella arenarum. Prior to metamorphic climax the epidermis contains typical bufonid giant cells producing a mucous substance supposedly involved in triggering a flight reaction of the tadpole school. An apical layer of alcianophilic mucus covers the epidermis, which could produce the unpleasant taste of bufonid tadpoles. Giant cells disappear by onset of metamorphic climax, when multicellular glands start developing, but the apical mucous layer remains. By the end of climax, neither the granular glands of the dorsum nor the parotoid regions are completely developed. Conversely, by the end of metamorphosis the mucous glands are partially developed and secrete mucus. Adults have at least three types of granular glands, which we designate type A (acidophilic), type B (basophilic) and ventral (mucous). Polymorphic granular glands distribute differently in the body: dorsal granular glands between warts and in the periphery of parotoids contain protein; granular glands of big warts and in the central region of parotoids contain catecholamines, lipids, and glycoconjugates, whereas ventral granular glands produce acidic glycoconjugates. Mucous glands produce both mucus and proteins. Results suggest that in early juveniles the chemical skin defense mechanisms are not functional. Topographical differences in adult skin secretions suggest that granular glands from the big warts in the skin produce similar toxins to the parotoid glands. © 2015 Wiley Periodicals, Inc.

  5. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  6. 32 CFR 204.5 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Fees. 204.5 Section 204.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS USER FEES § 204.5 Fees. (a) General. (1) All fees shall be based on full cost to the U.S. Government or market...

  7. 32 CFR Appendix G to Part 516 - Figures

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense directives, 32 CFR § 97.6(c), and Army regulations, 32 CFR §§ 516.34-516.40. The.... She may not testify as an opinion or expert witness. This limitation is based on Department of Defense...

  8. 32 CFR Appendix G to Part 516 - Figures

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense directives, 32 CFR § 97.6(c), and Army regulations, 32 CFR §§ 516.34-516.40. The.... She may not testify as an opinion or expert witness. This limitation is based on Department of Defense...

  9. 44 CFR 321.3 - Maintaining the mobilization base.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... funds available by the Department of Defense, the Department of Energy, and the Maritime Administration...

  10. 44 CFR 321.3 - Maintaining the mobilization base.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... funds available by the Department of Defense, the Department of Energy, and the Maritime Administration...

  11. 44 CFR 321.3 - Maintaining the mobilization base.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... funds available by the Department of Defense, the Department of Energy, and the Maritime Administration...

  12. 44 CFR 321.3 - Maintaining the mobilization base.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... funds available by the Department of Defense, the Department of Energy, and the Maritime Administration...

  13. Department of Defense Ecosystem Management Policy Evaluation

    DTIC Science & Technology

    2002-08-01

    HQ Naval Facilities Engineering Command, DC • Tom Hillard, Fort Stewart, GA • Manual Joia , MCLB Barstow, CA • John Krupovage, Tinker AFB, OK...studies can follow single or multiple-case designs . Multiple cases strengthen the results and increase confidence in those results (Tellis 1997...groups having responsibility for maintaining their designated data layers (range, fish and wildlife, threatened and endangered species, forestry

  14. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  15. How Intrusion Detection Can Improve Software Decoy Applications

    DTIC Science & Technology

    2003-03-01

    THIS PAGE INTENTIONALLY LEFT BLANK 41 V. DISCUSSION Military history suggests it is best to employ a layered, defense-in...database: alert, postgresql , user=snort dbname=snort # output database: log, unixodbc, user=snort dbname=snort # output database: log, mssql, dbname...Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington. PA, April 1980. URL http://csrc.nist.gov/publications/ history /ande80

  16. Casting and Splinting

    DTIC Science & Technology

    2017-08-21

    mcludmg suggost1ons klr reducing lite burden, to the Department ar Defense. Executive Service Director> lte (07,IJ4-0188). Respondents should be...Orthoglass) Casting Material );;:- Fiberglass , .... • \\ \\ General Principles )- Measure out dry material at extremity being treated ~Plaster...shrinks slightly when wet; If too long can fold ends back ~Can be measured on contralateral extremity > Apply 2-3 layers of webril, avoid wrinkles

  17. Ballistic Missile Defense System (BMDS)

    DTIC Science & Technology

    2015-12-01

    Assessment and Program Evaluation CARD - Cost Analysis Requirements Description CDD - Capability Development Document CLIN - Contract Line Item Number CPD...Estimate RDT&E - Research, Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...BMDS December 2015 SAR March 23, 2016 16:29:09 UNCLASSIFIED 5 Mission and Description Mission and Description To develop, test, and field a layered

  18. Connections between density, wall-normal velocity, and coherent structure in a heated turbulent boundary layer

    NASA Astrophysics Data System (ADS)

    Saxton-Fox, Theresa; Gordeyev, Stanislav; Smith, Adam; McKeon, Beverley

    2015-11-01

    Strong density gradients associated with turbulent structure were measured in a mildly heated turbulent boundary layer using an optical sensor (Malley probe). The Malley probe measured index of refraction gradients integrated along the wall-normal direction, which, due to the proportionality of index of refraction and density in air, was equivalently an integral measure of density gradients. The integral output was observed to be dominated by strong, localized density gradients. Conditional averaging and Pearson correlations identified connections between the streamwise gradient of density and the streamwise gradient of wall-normal velocity. The trends were suggestive of a process of pick-up and transport of heat away from the wall. Additionally, by considering the density field as a passive marker of structure, the role of the wall-normal velocity in shaping turbulent structure in a sheared flow was examined. Connections were developed between sharp gradients in the density and flow fields and strong vertical velocity fluctuations. This research is made possible by the Department of Defense through the National Defense & Engineering Graduate Fellowship (NDSEG) Program and by the Air Force Office of Scientific Research Grant # FA9550-12-1-0060.

  19. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYS 1993 and 1994

    DTIC Science & Technology

    1994-02-14

    Jl%«~~ /&■ OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FYS 1993 AND...COMPTROLLER) AUDITOR GENERAL, DEPARTMENT OF THE ARMY SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYs...Therefore, we are publishing this report in final form. We appreciate the courtesies and cooperation extended to the audit staff. If you have any

  20. Exploratory Analysis of Supply Chains in the Defense Industrial Base

    DTIC Science & Technology

    2012-04-01

    Instruments Industry Group 382: Laboratory Apparatus and Analytical, Optical, Measuring, and Controlling Instruments 3821 Laboratory Apparatus and Furniture ...I N S T I T U T E F O R D E F E N S E A N A LY S E S Exploratory Analysis of Supply Chains in the Defense Industrial Base James R. Dominy...contract DASW01-04-C-0003, AH-7-3315, “Exploratory Analysis of Supply Chains in the Defense Industrial Base,” for the Director, Industrial Policy. The

  1. 9th Annual Systems Engineering Conference: Volume-1 Monday Tutorial

    DTIC Science & Technology

    2006-10-26

    Joint Integrating Concepts (JIC) • Forceable Entry Ops • Undersea Superiority • Global Strike Ops • Sea-Basing Ops • Air & Missile Defense • JC2 • Joint...Forceable Entry Ops o Undersea Superiority o Global Strike Ops o Sea-Basing Ops o Air & Missile Defense o JC2 o Joint Logistics Includes an illustrative... Undersea Superiority • Global Strike Ops • Sea-Basing Ops • Air & Missile Defense • JC2 • Joint Logistics Universal Joint Task List (UJTL) • Strategic

  2. 75 FR 15693 - Extension of Web-Based TRICARE Assistance Program Demonstration Project

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Extension of Web-Based TRICARE Assistance Program Demonstration Project AGENCY: Department of Defense (DoD). ACTION: Notice of a Web-Based TRICARE Assistance... States Code, Section 1092, entitled Web-Based TRICARE Assistance Program. This demonstration was...

  3. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  4. The Navy Biofuel Initiative Under the Defense Production Act

    DTIC Science & Technology

    2012-06-22

    Market for Biomass -Based Diesel Fuel in the Renewable Fuel Standard (RFS), by Brent D. Yacobucci, The Market for Biomass -Based Diesel Fuel in the...defense.17 During the 1970s, DOE directed a synthetic fuels program toward commercializing coal liquefaction, coal gasification , and oil shale... Biomass : Background and Policy, by Anthony Andrews and Jeffrey Logan. The Navy Biofuel Initiative Under the Defense Production Act Congressional

  5. Defense.gov Special Report: Travels With Hagel

    Science.gov Websites

    . November 2014 Defense Secretary Chuck Hagel is on a five-day trip to meet with the men and women of the enterprise on Minot Air Force Base, N.D. Story Hagel Begins a Five-day Domestic Trip Defense Secretary Chuck Hagel was scheduled to visit Minot Air Force Base, N.D., in the first stop of a five-day trip to "

  6. 32 CFR 37.400 - Must I use competitive procedures to award TIAs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Must I use competitive procedures to award TIAs? 37.400 Section 37.400 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD... competitive procedures to award TIAs? DoD policy is to award TIAs using merit-based, competitive procedures...

  7. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  8. Spatial Homogeneity of Bacterial Communities Associated with the Surface Mucus Layer of the Reef-Building Coral Acropora palmata.

    PubMed

    Kemp, Dustin W; Rivers, Adam R; Kemp, Keri M; Lipp, Erin K; Porter, James W; Wares, John P

    2015-01-01

    Coral surface mucus layer (SML) microbiota are critical components of the coral holobiont and play important roles in nutrient cycling and defense against pathogens. We sequenced 16S rRNA amplicons to examine the structure of the SML microbiome within and between colonies of the threatened Caribbean reef-building coral Acropora palmata in the Florida Keys. Samples were taken from three spatially distinct colony regions--uppermost (high irradiance), underside (low irradiance), and the colony base--representing microhabitats that vary in irradiance and water flow. Phylogenetic diversity (PD) values of coral SML bacteria communities were greater than surrounding seawater and lower than adjacent sediment. Bacterial diversity and community composition was consistent among the three microhabitats. Cyanobacteria, Bacteroidetes, Alphaproteobacteria, and Proteobacteria, respectively were the most abundant phyla represented in the samples. This is the first time spatial variability of the surface mucus layer of A. palmata has been studied. Homogeneity in the microbiome of A. palmata contrasts with SML heterogeneity found in other Caribbean corals. These findings suggest that, during non-stressful conditions, host regulation of SML microbiota may override diverse physiochemical influences induced by the topographical complexity of A. palmata. Documenting the spatial distribution of SML microbes is essential to understanding the functional roles these microorganisms play in coral health and adaptability to environmental perturbations.

  9. Resistance to Botrytis cinerea in sitiens, an Abscisic Acid-Deficient Tomato Mutant, Involves Timely Production of Hydrogen Peroxide and Cell Wall Modifications in the Epidermis1[C][W][OA

    PubMed Central

    Asselbergh, Bob; Curvers, Katrien; França, Soraya C.; Audenaert, Kris; Vuylsteke, Marnik; Van Breusegem, Frank; Höfte, Monica

    2007-01-01

    Plant defense mechanisms against necrotrophic pathogens, such as Botrytis cinerea, are considered to be complex and to differ from those that are effective against biotrophs. In the abscisic acid-deficient sitiens tomato (Solanum lycopersicum) mutant, which is highly resistant to B. cinerea, accumulation of hydrogen peroxide (H2O2) was earlier and stronger than in the susceptible wild type at the site of infection. In sitiens, H2O2 accumulation was observed from 4 h postinoculation (hpi), specifically in the leaf epidermal cell walls, where it caused modification by protein cross-linking and incorporation of phenolic compounds. In wild-type tomato plants, H2O2 started to accumulate 24 hpi in the mesophyll layer and was associated with spreading cell death. Transcript-profiling analysis using TOM1 microarrays revealed that defense-related transcript accumulation prior to infection was higher in sitiens than in wild type. Moreover, further elevation of sitiens defense gene expression was stronger than in wild type 8 hpi both in number of genes and in their expression levels and confirmed a role for cell wall modification in the resistant reaction. Although, in general, plant defense-related reactive oxygen species formation facilitates necrotrophic colonization, these data indicate that timely hyperinduction of H2O2-dependent defenses in the epidermal cell wall can effectively block early development of B. cinerea. PMID:17573540

  10. NAD Acts as an Integral Regulator of Multiple Defense Layers1[OPEN

    PubMed Central

    Patrit, Oriane; Tcherkez, Guillaume; Gakière, Bertrand

    2016-01-01

    Pyridine nucleotides, such as NAD, are crucial redox carriers and have emerged as important signaling molecules in stress responses. Previously, we have demonstrated in Arabidopsis (Arabidopsis thaliana) that the inducible NAD-overproducing nadC lines are more resistant to an avirulent strain of Pseudomonas syringae pv tomato (Pst-AvrRpm1), which was associated with salicylic acid-dependent defense. Here, we have further characterized the NAD-dependent immune response in Arabidopsis. Quinolinate-induced stimulation of intracellular NAD in transgenic nadC plants enhanced resistance against a diverse range of (a)virulent pathogens, including Pst-AvrRpt2, Dickeya dadantii, and Botrytis cinerea. Characterization of the redox status demonstrated that elevated NAD levels induce reactive oxygen species (ROS) production and the expression of redox marker genes of the cytosol and mitochondrion. Using pharmacological and reverse genetics approaches, we show that NAD-induced ROS production functions independently of NADPH oxidase activity and light metabolism but depends on mitochondrial respiration, which was increased at higher NAD. We further demonstrate that NAD primes pathogen-induced callose deposition and cell death. Mass spectrometry analysis reveals that NAD simultaneously induces different defense hormones and that the NAD-induced metabolic profiles are similar to those of defense-expressing plants after treatment with pathogen-associated molecular patterns. We thus conclude that NAD triggers metabolic profiles rather similar to that of pathogen-associated molecular patterns and discuss how signaling cross talk between defense hormones, ROS, and NAD explains the observed resistance to pathogens. PMID:27621425

  11. 76 FR 12073 - Extension of Web-Based TRICARE Assistance Program Demonstration Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Extension of Web-Based TRICARE Assistance Program Demonstration Program AGENCY: Department of Defense. ACTION: Notice of a Two Year Extension of the Web-Based..., entitled Web-Based TRICARE Assistance Program. This demonstration was effective August 1, 2009, as...

  12. Flexible graphene bio-nanosensor for lactate.

    PubMed

    Labroo, Pratima; Cui, Yue

    2013-03-15

    The development of a flexible nanosensor for detecting lactate could expand opportunities for using graphene, both in fundamental studies for a variety of device platforms and in practical applications. Graphene is a delicate single-layer, two-dimensional network of carbon atoms with ultrasensitive sensing capabilities. Lactic acid is important for clinical analysis, sports medicine, and the food industry. Recently, wearable and flexible bioelectronics on plastics have attracted great interest for healthcare, sports and defense applications due to their advantages of being light-weight, bendable, or stretchable. Here, we demonstrate for the first time the development of a flexible graphene-based bio-nanosensor to detect lactate. Our results show that flexible lactate biosensors can be fabricated on a variety of plastic substrates. The sensor can detect lactate sensitively from 0.08 μM to 20 μM with a fast steady-state measuring time of 2s. The sensor can also detect lactate under different mechanical bending conditions, the sensor response decreased as the bending angle and number of bending repetitions increased. We anticipate that these results could open exciting opportunities for fundamental studies of flexible graphene bioelectronics by using other bioreceptors, as well as a variety of wearable, implantable, real-time, or on-site applications in fields ranging from clinical analysis to defense. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Impact Interaction of Projectile with Conducting Wall at the Presence of Electric Current

    NASA Astrophysics Data System (ADS)

    Chemerys, Volodymyr T.; Raychenko, Aleksandr I.; Karpinos, Boris S.

    2002-07-01

    The paper introduces with schemes of possible electromagnetic armor augmentation. The interaction of projectile with a main wall of target after penetration across the pre-defense layer is of interest here. The same problem is of interest for the current-carrying elements of electric guns. The theoretical analysis is done in the paper for the impact when the kinetic energy of projectile is enough to create the liquid layer in the crater of the wall's metal. Spherical head of projectile and right angle of inclination have been taken for consideration. The solution of problem for the liquid layer of metal around the projectile head has resulted a reduction of the resistant properties of wall material under current influence, in view of electromagnetic pressure appearance, what is directed towards the wall likely the projectile velocity vector.

  14. Research on Network Defense Strategy Based on Honey Pot Technology

    NASA Astrophysics Data System (ADS)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  15. Costs of defense and a test of the carbon-nutrient balance and growth-differentiation balance hypotheses for two co-occurring classes of plant defense.

    PubMed

    Massad, Tara Joy; Dyer, Lee A; Vega C, Gerardo

    2012-01-01

    One of the goals of chemical ecology is to assess costs of plant defenses. Intraspecific trade-offs between growth and defense are traditionally viewed in the context of the carbon-nutrient balance hypothesis (CNBH) and the growth-differentiation balance hypothesis (GDBH). Broadly, these hypotheses suggest that growth is limited by deficiencies in carbon or nitrogen while rates of photosynthesis remain unchanged, and the subsequent reduced growth results in the more abundant resource being invested in increased defense (mass-balance based allocation). The GDBH further predicts trade-offs in growth and defense should only be observed when resources are abundant. Most support for these hypotheses comes from work with phenolics. We examined trade-offs related to production of two classes of defenses, saponins (triterpenoids) and flavans (phenolics), in Pentaclethra macroloba (Fabaceae), an abundant tree in Costa Rican wet forests. We quantified physiological costs of plant defenses by measuring photosynthetic parameters (which are often assumed to be stable) in addition to biomass. Pentaclethra macroloba were grown in full sunlight or shade under three levels of nitrogen alone or with conspecific neighbors that could potentially alter nutrient availability via competition or facilitation. Biomass and photosynthesis were not affected by nitrogen or competition for seedlings in full sunlight, but they responded positively to nitrogen in shade-grown plants. The trade-off predicted by the GDBH between growth and metabolite production was only present between flavans and biomass in sun-grown plants (abundant resource conditions). Support was also only partial for the CNBH as flavans declined with nitrogen but saponins increased. This suggests saponin production should be considered in terms of detailed biosynthetic pathway models while phenolic production fits mass-balance based allocation models (such as the CNBH). Contrary to expectations based on the two defense hypotheses, trade-offs were found between defenses and photosynthesis, indicating that studies of plant defenses should include direct measures of physiological responses.

  16. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  17. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  18. 5 CFR 9901.515 - Competitive examining procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....515 Section 9901.515 Administrative Personnel DEPARTMENT OF DEFENSE HUMAN RESOURCES MANAGEMENT AND LABOR RELATIONS SYSTEMS (DEPARTMENT OF DEFENSE-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF DEFENSE... status, or other prohibited criteria, and will be based solely on job-related factors. These policies...

  19. 13 CFR 120.380 - Program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...

  20. 13 CFR 120.380 - Program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...

  1. 13 CFR 120.380 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...

  2. 13 CFR 120.380 - Program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...

  3. 13 CFR 120.380 - Program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...

  4. The group dynamics of women's self-defense training.

    PubMed

    Brecklin, Leanne R; Middendorf, Rena K

    2014-03-01

    The current study examines the role of group interaction in a women's self-defense class. Study methods included individual interviews with women who had completed a college-based women-only self-defense course as well as supplemental observation of group behavior during a mock "attack" simulation class. The unique relationship that develops among women's self-defense classmates seems to improve overall learning and performance due to the group collaboration and vicarious experiences. Results demonstrated that women's self-defense courses offer participants a beneficial and supportive group atmosphere.

  5. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 3

    DTIC Science & Technology

    2008-03-01

    describes essentials for requirements development and management. In addi- tion to providing training, eLearning and consulting services, she speaks at and...information, support sense- making, enable collaborative decision making, and effect changes in the physical environment. For example, the Global ...across layers, which enables effective use of resources and helps enforce security and confiden- tiality policies. Global Data Space DDS provides a

  6. A Layered Social and Operational Network Analysis

    DTIC Science & Technology

    2007-03-01

    organizations, networks and individuals” (OPOTUS, 2006: 5). These transnational threats, which compromise the security of the US , consist of...The focus of criminal groups is money ; the trafficking of 2-7 drugs or people, the money laundering , and the corruption are a means to generate...assassination is used (National Defense University, 1999:250). 2-8 Economic and industrial espionage, bank fraud, financial market manipulation, and

  7. Analysis-Driven Design of Representations For Sensing-Action Systems

    DTIC Science & Technology

    2017-10-01

    from the Defense Technical Information Center (DTIC) (http://www.dtic.mil). AFRL-RY-WP-TR-2017-0196 HAS BEEN REVIEWED AND IS APPROVED FOR...Layered Sensing Exploitation Division This report is published in the interest of scientific and technical information exchange, and its...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  8. Species of Concern (SOC) on Department of Defense Installations

    DTIC Science & Technology

    2002-07-15

    HODI, RUUR, SYAL , OEMLERIA CERASIFORMIS/DISPORUM HOOKERI, POLYSTICHUM, SMILACINA RACEMOSA, HYDROPHYLLUM TENUIPES, ADENOCAULON BICOLOR, TELLIMA...SPECIES: ACCI, SYAL ,RHAI,COCO. HERBS:POMU,POMU,DRAR,TROV,SMST,DIHO,VAHE,ACRU,RUUR,ADBI,LICO ,GATR,DSCH,TEGR.* SOC on DOD Installations FINAL – July...SITE. ORGANIC LAYER OVERSOIL. ASSOC. W/GASH, POMU, COCO, RHDI, ACTAEA RUBRA, SYAL .* OLD GROWTH PSME. UNDERSTORY OF CORYLUS CORNUTA, ACMA, ACCI. GROUND

  9. SHELL MICROSTRUCTURE OF GASTROPODS FROM LAKE TANGANYIKA, AFRICA: ADAPTATION, CONVERGENT EVOLUTION, AND ESCALATION.

    PubMed

    West, Kelly; Cohen, Andrew

    1996-04-01

    Gastropod shells from Lake Tanganyika, with their heavy calcification, coarse noded ribbing, spines, apertural lip thickening and repair scars, resemble marine shells more closely than they resemble other lacustrine shells. This convergence between Tanganyikan and marine gastropod shells, however, is not just superficial. Scanning electron microscope (SEM) studies reveal that the Tanganyikan shells are primarily layers of crossed-lamellar crystal architecture (that is, needle-like aragonite crystals arranged into laths that are packed into sheets such that the aragonite needles of adjacent laths are never parallel). The number of crossed-lamellar layers can vary from one to four between different Tanganyikan gastropod species. In species with two or more crossed-lamellar layers, the orientation of the lamellae is offset by approximately 90° between the different layers. The number of crossed-lamellar layers in the shell wall is positively correlated with shell strength and with predation resistance. Three and four crossed-lamellar layers in the shell wall evolved several times independently within the endemic thiarid gastropod radiation in Lake Tanganyika. Repeated origins of three and four crossed-lamellar layers suggest that they may be specific adaptations by Tanganyikan gastropods to strengthen their shells as a defense against shell-crushing predators. © 1996 The Society for the Study of Evolution.

  10. Involvement of metabolites in early defense mechanism of oil palm (Elaeis guineensis Jacq.) against Ganoderma disease.

    PubMed

    Nusaibah, S A; Siti Nor Akmar, A; Idris, A S; Sariah, M; Mohamad Pauzi, Z

    2016-12-01

    Understanding the mechanism of interaction between the oil palm and its key pathogen, Ganoderma spp. is crucial as the disease caused by this fungal pathogen leads to a major loss of revenue in leading palm oil producing countries in Southeast Asia. Here in this study, we assess the morphological and biochemical changes in Ganoderma disease infected oil palm seedling roots in both resistant and susceptible progenies. Rubber woodblocks fully colonized by G. boninense were applied as a source of inoculum to artificially infect the roots of resistant and susceptible oil palm progenies. Gas chromatography-mass spectrometry was used to measure an array of plant metabolites in 100 resistant and susceptible oil palm seedling roots treated with pathogenic Ganoderma boninense fungus. Statistical effects, univariate and multivariate analyses were used to identify key-Ganoderma disease associated metabolic agitations in both resistant and susceptible oil palm root tissues. Ganoderma disease related defense shifts were characterized based on (i) increased antifungal activity in crude extracts, (ii) increased lipid levels, beta- and gamma-sitosterol particularly in the resistant progeny, (iii) detection of heterocyclic aromatic organic compounds, benzo [h] quinoline, pyridine, pyrimidine (iv) elevation in antioxidants, alpha- and beta-tocopherol (iv) degraded cortical cell wall layers, possibly resulting from fungal hydrolytic enzyme activity needed for initial penetration. The present study suggested that plant metabolites mainly lipids and heterocyclic aromatic organic metabolites could be potentially involved in early oil palm defense mechanism against G. boninense infection, which may also highlight biomarkers for disease detection, treatment, development of resistant variety and monitoring. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  11. 76 FR 50186 - Surplus Properties

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... Report, as approved, and following screening with Federal agencies and Department of Defense components... DEPARTMENT OF DEFENSE Department of the Army Surplus Properties AGENCY: Department of the Army, Do... have been determined surplus to the United States needs in accordance with the Defense Base Closure and...

  12. 32 CFR 552.214 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Procedures. 552.214 Section 552.214 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL... services to the participants. (b) Based on the Commander's concerns for discipline, mission accomplishment...

  13. 32 CFR 552.214 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Procedures. 552.214 Section 552.214 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL... services to the participants. (b) Based on the Commander's concerns for discipline, mission accomplishment...

  14. 32 CFR 552.214 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Procedures. 552.214 Section 552.214 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL... services to the participants. (b) Based on the Commander's concerns for discipline, mission accomplishment...

  15. 32 CFR 552.214 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Procedures. 552.214 Section 552.214 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL... services to the participants. (b) Based on the Commander's concerns for discipline, mission accomplishment...

  16. 32 CFR 552.214 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Procedures. 552.214 Section 552.214 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL... services to the participants. (b) Based on the Commander's concerns for discipline, mission accomplishment...

  17. 75 FR 71420 - Department of the Navy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-23

    ...) Brunswick, Maine. The DoN is required to close NAS Brunswick per Public Law 101-510, the Defense Base... with Public Law 101-510, the Defense Base closure and Realignment Act of 1990, as amended in 2005. NAS...

  18. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  19. Defense Simulation Internet: next generation information highway.

    PubMed

    Lilienthal, M G

    1995-06-01

    The Department of Defense has been engaged in the Defense Modeling and Simulation Initiative (DMSI) to provide advanced distributed simulation warfighters in geographically distributed localities. Lessons learned from the Defense Simulation Internet (DSI) concerning architecture, standards, protocols, interoperability, information sharing, and distributed data bases are equally applicable to telemedicine. Much of the vision and objectives of the DMSI are easily translated into the vision for world wide telemedicine.

  20. [Nephrology-part 3: Urinary tract infections].

    PubMed

    Fünfstück, Reinhard; Stein, Günter; Naber, Kurt G; Hacker, Jörg; Marget, Walter

    2003-07-15

    Urinary tract infections are one of the most common bacterial infectious diseases in humans. Depending on the localization and the effectiveness of pathogenetic factors, various clinical pictures (lower urinary tract infection, pyelonephritis, asymptomatic bacteriuria) have to be differentiated. There are virulence factors of microorganisms on the one hand and defense mechanisms on the other, which influence the manifestation and the course of disease. The process of bacterial attachment to the epithelial cells of the boundary layer, the internalization and invasion of bacteria could be important for acute and chronic disease. Disturbances of local defense mechanisms, such as increased urinary glucose concentration in diabetes or variations of Tamm-Horsfall protein and defensin levels, may influence the course of infection. On the basis of microbiological and laboratory findings as well as the results of clinical and ultrasound procedures, the decision on the therapeutic strategy should be made. There are different treatment recommendations for acute uncomplicated and complicated cases as well as for chronic diseases. Future investigations should focus on effective therapeutic options for special immunocompromised patients in relation to the microbiological aspects and defense mechanisms of the host.

  1. The Structure of the Human Vaginal Stratum Corneum and its Role in Immune Defense

    PubMed Central

    Anderson, Deborah J.; Marathe, Jai; Pudney, Jeffrey

    2014-01-01

    The superficial layers of the human vaginal epithelium, which form an interface between host and environment, are comprised of dead flattened cells that have undergone a terminal cell differentiation program called cornification. This entails extrusion of nuclei and intercellular organelles, and the depletion of functional DNA and RNA precluding the synthesis of new proteins. As a consequence, the terminally differentiated cells do not maintain robust intercellular junctions and have a diminished capacity to actively respond to microbial exposure, yet the vaginal stratum corneum (SC) mounts an effective defense against invasive microbial infections. The vaginal SC in reproductive aged women is comprised of loosely connected glycogen-filled cells which are permeable to bacterial and viral microbes as well as molecular and cellular mediators of immune defense. We propose here that the vaginal SC provides a unique microenvironment that maintains vaginal health by fostering endogenous lactobacillii and retaining critical mediators of acquired and innate immunity. A better understanding of the molecular and physicochemical properties of the vaginal SC could promote the design of more effective topical drugs and microbicides. PMID:24661416

  2. Molecular effects of resistance elicitors from biological origin and their potential for crop protection

    PubMed Central

    Wiesel, Lea; Newton, Adrian C.; Elliott, Ian; Booty, David; Gilroy, Eleanor M.; Birch, Paul R. J.; Hein, Ingo

    2014-01-01

    Plants contain a sophisticated innate immune network to prevent pathogenic microbes from gaining access to nutrients and from colonizing internal structures. The first layer of inducible response is governed by the plant following the perception of microbe- or modified plant-derived molecules. As the perception of these molecules results in a plant response that can provide efficient resistance toward non-adapted pathogens they can also be described as “defense elicitors.” In compatible plant/microbe interactions, adapted microorganisms have means to avoid or disable this resistance response and promote virulence. However, this requires a detailed spatial and temporal response from the invading pathogens. In agricultural practice, treating plants with isolated defense elicitors in the absence of pathogens can promote plant resistance by uncoupling defense activation from the effects of pathogen virulence determinants. The plant responses to plant, bacterial, oomycete, or fungal-derived elicitors are not, in all cases, universal and need elucidating prior to the application in agriculture. This review provides an overview of currently known elicitors of biological rather than synthetic origin and places their activity into a molecular context. PMID:25484886

  3. Molecular effects of resistance elicitors from biological origin and their potential for crop protection.

    PubMed

    Wiesel, Lea; Newton, Adrian C; Elliott, Ian; Booty, David; Gilroy, Eleanor M; Birch, Paul R J; Hein, Ingo

    2014-01-01

    Plants contain a sophisticated innate immune network to prevent pathogenic microbes from gaining access to nutrients and from colonizing internal structures. The first layer of inducible response is governed by the plant following the perception of microbe- or modified plant-derived molecules. As the perception of these molecules results in a plant response that can provide efficient resistance toward non-adapted pathogens they can also be described as "defense elicitors." In compatible plant/microbe interactions, adapted microorganisms have means to avoid or disable this resistance response and promote virulence. However, this requires a detailed spatial and temporal response from the invading pathogens. In agricultural practice, treating plants with isolated defense elicitors in the absence of pathogens can promote plant resistance by uncoupling defense activation from the effects of pathogen virulence determinants. The plant responses to plant, bacterial, oomycete, or fungal-derived elicitors are not, in all cases, universal and need elucidating prior to the application in agriculture. This review provides an overview of currently known elicitors of biological rather than synthetic origin and places their activity into a molecular context.

  4. On effectiveness of network sensor-based defense framework

    NASA Astrophysics Data System (ADS)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  5. Expeditionary Air Base Defense: Historical Cases and Modern Implications

    DTIC Science & Technology

    2017-06-01

    and redesigning is based on peacetime criteria. Seventh Air Force Base Defense Study Group, 1967 The Dien Bien Phu case study offered many...Freedom in 2004-2012. Analysis of these case studies reveals several themes of expeditionary air base defense in the modern era, including: the...IRAQ AND AFGHANISTAN……………………….48 6 ANALYSIS OF CASE STUDIES ………………………………………………62 7 CONCLUSIONS ……………………………………………………………..…67

  6. 44 CFR 351.27 - The Department of Defense.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false The Department of Defense..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS RADIOLOGICAL EMERGENCY PLANNING AND PREPAREDNESS Interagency Assignments § 351.27 The Department of Defense. (a) Determine appropriate planning bases for Department of...

  7. 44 CFR 351.27 - The Department of Defense.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false The Department of Defense..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS RADIOLOGICAL EMERGENCY PLANNING AND PREPAREDNESS Interagency Assignments § 351.27 The Department of Defense. (a) Determine appropriate planning bases for Department of...

  8. 44 CFR 351.27 - The Department of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false The Department of Defense..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS RADIOLOGICAL EMERGENCY PLANNING AND PREPAREDNESS Interagency Assignments § 351.27 The Department of Defense. (a) Determine appropriate planning bases for Department of...

  9. 44 CFR 351.27 - The Department of Defense.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false The Department of Defense..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS RADIOLOGICAL EMERGENCY PLANNING AND PREPAREDNESS Interagency Assignments § 351.27 The Department of Defense. (a) Determine appropriate planning bases for Department of...

  10. 32 CFR 770.4 - Hunting regulations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Hunting regulations. 770.4 Section 770.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS RULES RULES..., Virginia § 770.4 Hunting regulations. All persons possessing the proper State, Federal and Base licenses...

  11. 32 CFR 770.4 - Hunting regulations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Hunting regulations. 770.4 Section 770.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS RULES RULES..., Virginia § 770.4 Hunting regulations. All persons possessing the proper State, Federal and Base licenses...

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Somayaji, Anil B.; Amai, Wendy A.; Walther, Eleanor A.

    This reports describes the successful extension of artificial immune systems from the domain of computer security to the domain of real time control systems for robotic vehicles. A biologically-inspired computer immune system was added to the control system of two different mobile robots. As an additional layer in a multi-layered approach, the immune system is complementary to traditional error detection and error handling techniques. This can be thought of as biologically-inspired defense in depth. We demonstrated an immune system can be added with very little application developer effort, resulting in little to no performance impact. The methods described here aremore » extensible to any system that processes a sequence of data through a software interface.« less

  13. DefenseLink.mil - Special Report - Travels With Gates

    Science.gov Websites

    relationship between the U.S. and Thailand is based on shared democratic principles. Defense Dept. photo by U.S military-to-military relationship is based on shared democratic principles. more» Secretary, Chairman

  14. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  15. Spin measurement in an undoped Si/SiGe double quantum dot incorporating a micromagnet

    NASA Astrophysics Data System (ADS)

    Wu, Xian; Ward, Daniel; Prance, Jonathan; Kim, Dohun; Shi, Zhan; Mohr, Robert; Gamble, John; Savage, Donald; Lagally, Max; Friesen, Mark; Coppersmith, Susan; Eriksson, Mark

    2014-03-01

    We present measurements on a double dot formed in an accumulation-mode undoped Si/SiGe heterostructure. The double dot incorporates a proximal micromagnet to generate a stable magnetic field difference between the quantum dots. The gate design incorporates two layers of gates, and the upper layer of gates is split into five different sections to decrease crosstalk between different gates. A novel pattern of the lower layer gates enhances the tunability of tunnel rates. We will describe our attempts to create a singlet-triplet qubit in this device. This work was supported in part by ARO(W911NF-12-0607), NSF(DMR-1206915), and the United States Department of Defense. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressly or implied, of the US Government. Now works at Lancaster University, UK.

  16. 44 CFR 351.27 - The Department of Defense.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true The Department of Defense. 351.27 Section 351.27 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT... Assignments § 351.27 The Department of Defense. (a) Determine appropriate planning bases for Department of...

  17. 44 CFR 321.5 - Retention of industrial facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... properties, owned by the Department of Defense, the Department of Energy, and the Maritime Administration... Reserve for the Department of Defense) of the department and agencies to the extent the capacity of said...

  18. 44 CFR 321.5 - Retention of industrial facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... properties, owned by the Department of Defense, the Department of Energy, and the Maritime Administration... Reserve for the Department of Defense) of the department and agencies to the extent the capacity of said...

  19. 44 CFR 321.5 - Retention of industrial facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... properties, owned by the Department of Defense, the Department of Energy, and the Maritime Administration... Reserve for the Department of Defense) of the department and agencies to the extent the capacity of said...

  20. 48 CFR 32.305 - Loan guarantees for terminated contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... losses and to ensure the loans will be self-liquidating from the proceeds of defense production contracts... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.305... financing based on the borrower's recoverable investment in defense production contracts, may also apply to...

  1. 48 CFR 32.305 - Loan guarantees for terminated contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... losses and to ensure the loans will be self-liquidating from the proceeds of defense production contracts... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.305... financing based on the borrower's recoverable investment in defense production contracts, may also apply to...

  2. 48 CFR 32.305 - Loan guarantees for terminated contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... losses and to ensure the loans will be self-liquidating from the proceeds of defense production contracts... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.305... financing based on the borrower's recoverable investment in defense production contracts, may also apply to...

  3. 48 CFR 32.305 - Loan guarantees for terminated contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... losses and to ensure the loans will be self-liquidating from the proceeds of defense production contracts... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.305... financing based on the borrower's recoverable investment in defense production contracts, may also apply to...

  4. 48 CFR 32.305 - Loan guarantees for terminated contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... losses and to ensure the loans will be self-liquidating from the proceeds of defense production contracts... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.305... financing based on the borrower's recoverable investment in defense production contracts, may also apply to...

  5. 75 FR 70916 - Surplus Properties; Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... DEPARTMENT OF DEFENSE Department of the Army Surplus Properties; Notice AGENCY: Department of the... agencies and Department of Defense components. This Notice amends the Notice published in the Federal... with the Defense Base Closure and Realignment Act of 1990, Public Law 101-510, as amended, and the 2005...

  6. Capsicum annuum homeobox 1 (CaHB1) is a nuclear factor that has roles in plant development, salt tolerance, and pathogen defense.

    PubMed

    Oh, Sang-Keun; Yoon, Joonseon; Choi, Gyung Ja; Jang, Hyun A; Kwon, Suk-Yoon; Choi, Doil

    2013-12-06

    Homeodomain-leucine zipper (HD-Zip) family proteins are unique to plants, but little is known about their role in defense responses. CaHB1 is a nuclear factor in peppers, belonging to subfamily II of HD-Zip proteins. Here, we determined the role of CaHB1 in the defense response. CaHB1 expression was induced when pepper plants were challenged with Phytophthora capsici, a plant pathogen to which peppers are susceptible, or environmental stresses such as drought and salt stimuli. CaHB1 was also highly expressed in pepper leaves following application of SA, whereas ethephon and MeJA had a moderate effect. To further investigate the function of CaHB1 in plants, we performed gain-of-function study by overexpression of CaHB1 in tomato. CaHB1-transgenic tomatoes showed significant growth enhancement including increased leaf thickness and enlarged cell size (1.8-fold larger than control plants). Microscopic analysis revealed that leaves from CaHB1-transgenic plants had thicker cell walls and cuticle layers than those from controls. Moreover, CaHB1-transgenic plants displayed enhanced resistance against Phytophthora infestans and increased tolerance to salt stress. Additionally, RT-PCR analysis of CaHB1-transgenic tomatoes revealed constitutive up-regulation of multiple genes involved in plant defense and osmotic stress. Therefore, our findings suggest roles for CaHB1 in development, salt stress, and pathogen defense. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. NAD Acts as an Integral Regulator of Multiple Defense Layers.

    PubMed

    Pétriacq, Pierre; Ton, Jurriaan; Patrit, Oriane; Tcherkez, Guillaume; Gakière, Bertrand

    2016-11-01

    Pyridine nucleotides, such as NAD, are crucial redox carriers and have emerged as important signaling molecules in stress responses. Previously, we have demonstrated in Arabidopsis (Arabidopsis thaliana) that the inducible NAD-overproducing nadC lines are more resistant to an avirulent strain of Pseudomonas syringae pv tomato (Pst-AvrRpm1), which was associated with salicylic acid-dependent defense. Here, we have further characterized the NAD-dependent immune response in Arabidopsis. Quinolinate-induced stimulation of intracellular NAD in transgenic nadC plants enhanced resistance against a diverse range of (a)virulent pathogens, including Pst-AvrRpt2, Dickeya dadantii, and Botrytis cinerea Characterization of the redox status demonstrated that elevated NAD levels induce reactive oxygen species (ROS) production and the expression of redox marker genes of the cytosol and mitochondrion. Using pharmacological and reverse genetics approaches, we show that NAD-induced ROS production functions independently of NADPH oxidase activity and light metabolism but depends on mitochondrial respiration, which was increased at higher NAD. We further demonstrate that NAD primes pathogen-induced callose deposition and cell death. Mass spectrometry analysis reveals that NAD simultaneously induces different defense hormones and that the NAD-induced metabolic profiles are similar to those of defense-expressing plants after treatment with pathogen-associated molecular patterns. We thus conclude that NAD triggers metabolic profiles rather similar to that of pathogen-associated molecular patterns and discuss how signaling cross talk between defense hormones, ROS, and NAD explains the observed resistance to pathogens. © 2016 American Society of Plant Biologists. All Rights Reserved.

  8. Investigating an approach to the alliance based on interpersonal defense theory.

    PubMed

    Westerman, Michael A; Muran, J Christopher

    2017-09-01

    Notwithstanding consistent findings of significant relationships between the alliance and outcome, questions remain to be answered about the relatively small magnitude of those correlations, the mechanisms underlying the association, and how to conceptualize the alliance construct. We conducted a preliminary study of an approach to the alliance based on interpersonal defense theory, which is an interpersonal reconceptualization of defense processes, to investigate the promise of this alternative approach as a way to address the outstanding issues. We employed qualitative, theory-building case study methodology, closely examining alliance processes at four time points in the treatment of a case in terms of a case formulation based on interpersonal defense theory. The results suggested that our approach made it possible to recognize key processes in the alliance and that it helps explain how the alliance influences outcome. Our analyses also provided a rich set of concrete illustrations of the alliance phenomena identified by the theory. The findings suggest that an approach to the alliance based on interpersonal defense theory holds promise. However, although the qualitative method we employed has advantages, it also has limitations. We offer suggestions about how future qualitative and quantitative investigations could build on this study.

  9. The Forgotten Tundra: America’s Greatest Terrorist Threat

    DTIC Science & Technology

    2013-02-15

    threats that use Canada’s progressive immigration laws as a means of furthering their cause. Each year Canada accepts over 260,000 new immigrants to its...system, immigration laws , infrequent prosecutions and light sentences had turned the country into “a favored destination for terrorists”.10 In a 2003...other federal, state, local and tribal law enforcement entities along the northern border. These law enforcement officers form a layered defense

  10. Navy Lasers, Railgun, and Hypervelocity Projectile: Background and Issues for Congress

    DTIC Science & Technology

    2016-03-18

    1 Railgun is also spelled as rail gun ; EMRG is also abbreviated as EM railgun; hypervelocity is also...controlled Gatling gun . Employing all these measures reflects a long-standing Navy approach of creating a multi-layered defense against enemy...fact that Navy surface ships can use surface-to-air missiles (SAMs) and their Close-in Weapon System (CIWS) Gatling guns to shoot down only a certain

  11. Dr. John H. Hopps Jr. Defense Research Scholars Program

    DTIC Science & Technology

    2014-12-16

    Summer 2011) Post -Graduation Plans • Employed as a mechanical engineer at Allegion. • Applying to graduate programs in industrial design and mechanical...Summer 2010) • Multi-Layer Mirror Design for Ultra-Soft X-Rays, Ecole Polytechnique (Summer 2011) Post -Graduation Plans • Post Baccalaureate Research...the year off to work while others planned on strengthening their applications by broadening their research skills in post baccalaureate programs

  12. Investigations of Flow Over a Hemisphere Using Numerical Simulations (Postprint)

    DTIC Science & Technology

    2015-06-22

    ranging from missile defense, remote sensing , and imaging . An important aspect of these applications is determining the effective beam-on-target...Stokes (URANS), detached eddy simulation (DES), and hybrid RANS/LES. The numerical results were compared with the experiment conducted at Auburn...turret. Using the DES and hybrid RANS/LES turbulence models, Loci-Chem was able to capture the unsteady flow structures, such as the shear layer

  13. Using EPIC to Find Conflicts, Inconsistencies, and Gaps in Department of Defense Policies

    DTIC Science & Technology

    2013-01-01

    documentation; or deliver preliminary findings. All RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality...responsibilities and the products that result from their execution. Once the high -level frame- work was defined, successive lower layers were developed to further...Lead or Chief Engineer Component Acquisition Executive ( CAE ) Managers Configuration Steering Board Materiel developer Contractor Milestone Decision

  14. Development of Adaptive Coping From Mid to Late Life: A 70-Year Longitudinal Study of Defense Maturity and Its Psychosocial Correlates.

    PubMed

    Martin-Joy, John S; Malone, Johanna C; Cui, Xing-Jia; Johansen, Pål-Ørjan; Hill, Kevin P; Rahman, M Omar; Waldinger, Robert J; Vaillant, George E

    2017-09-01

    The present study examines changes in defense maturity from mid to late life using data from an over 70-year longitudinal study. A sample of 72 men was followed beginning in late adolescence. Participants' childhoods were coded for emotional warmth. Defense mechanisms were coded by independent raters using the Q-Sort of Defenses (, Ego mechanisms of defense: A guide for clinicians and researchers 217-233) based on interview data gathered at approximately ages 52 and 75. We examined psychosocial correlates of defenses at midlife, late life, and changes in defense from mid to late life. Overall, defenses grew more adaptive from midlife to late life. However, results differed on the basis of the emotional warmth experienced in the participants' childhoods. In midlife, men who experienced warm childhoods used more adaptive (mature) defenses; yet by late life, this difference in defensive maturity had disappeared. Men who experienced less childhood warmth were more likely to show an increase in adaptive defenses during the period from mid to late life.

  15. Application of the Prunus spp. Cyanide Seed Defense System onto Wheat: Reduced Insect Feeding and Field Growth Tests.

    PubMed

    Mora, Carlos A; Halter, Jonas G; Adler, Cornel; Hund, Andreas; Anders, Heidrun; Yu, Kang; Stark, Wendelin J

    2016-05-11

    Many crops are ill-protected against insect pests during storage. To protect cereal grains from herbivores during storage, pesticides are often applied. While pesticides have an undoubtable functionality, increasing concerns are arising about their application. In the present study, we investigated a bioinspired cyanogenic grain coating with amygdalin as cyanogenic precursor mimicking the feeding-triggered release of hydrogen cyanide (HCN) found for example in bitter almonds. The multilayer coating consisted of biodegradable polylactic acid with individual layers containing amygdalin or β-glucosidase which is capable of degrading amygdalin to HCN. This reaction occurred only when the layers were ruptured, e.g., by a herbivore attack. Upon feeding coated cyanogenic wheat grains to Tenebrio molitor (mealworm beetle), Rhizopertha dominica (lesser grain borer), and Plodia interpunctella (Indianmeal moth), their reproduction as well as consumption rate were significantly reduced, whereas germination ability increased compared to noncoated grains. In field experiments, we observed an initial growth delay compared to uncoated grains which became negligible at later growth stages. The here shown strategy to artificially apply a naturally occurring defense mechanisms could be expanded to other crops than wheat and has the potential to replace certain pesticides with the benefit of complete biodegradability and increased safety during storage.

  16. 77 FR 43405 - Final Standard Review Plan, Branch Technical Position 7-19 on Guidance for Evaluation of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... Digital Computer-Based Instrumentation and Control Systems.'' This BTP is to be cited as the acceptance criteria for Diversity and Defense-in-Depth in Digital Computer-Based Instrumentation and Control Systems... Evaluation of Diversity and Defense-in-Depth in Digital Computer-Based Instrumentation and Control Systems...

  17. 76 FR 36095 - Defense Transportation Regulation, Part IV

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-21

    ... with the Defense Personal Property Program (DP3) Phase III Domestic Small Shipments (dS2) and... Regulation, Part IV Web site at http://www.transcom.mil/dtr/part-iv/phaseiii.cfm . All identified changes... based on completion of Defense Personal Property System (DPS) Phase III programming projected for FY15...

  18. An Analysis of Second-Tier Arms Producing Countries’ Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    DTIC Science & Technology

    2008-03-01

    38  39  ......................... 40  ......................... 42  42  Offsets in the Global Arms Market ...The Global Arms Market Structure .................................................. Increasing Globalization of Defense Industry...109  Overcapacity of the Defense Industry in a Declining Market ........................... 109 Economies of Scale

  19. 32 CFR 842.120 - Asserting the claim.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Asserting the claim. 842.120 Section 842.120 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE CLAIMS AND LITIGATION... include the facts and legal basis for liability. Bases for liability could include local foreign law, US...

  20. Discrete Event Simulation of a Suppression of Enemy Air Defenses (SEAD) Mission

    DTIC Science & Technology

    2008-03-01

    component-based DES developed in Java® using the Simkit simulation package. Analysis of ship self air defense system selection ( Turan , 1999) is another...Institute of Technology, Wright-Patterson AFB OH, March 2003 (ADA445279 ) Turan , Bulent. A Comparative Analysis of Ship Self Air Defense (SSAD) Systems

  1. 75 FR 29728 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... personal identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mrs. Cindy Allard at (703... Headquarters Services, 1155 Defense Pentagon, Washington, DC 20301-1155. The Office of the Secretary of Defense... Assistant Secretary of Defense, PAE (February 22, 1993; 58 FR 10227). Reason: Based on review of DPAE 02...

  2. Deterrence and Space-Based Missile Defense

    DTIC Science & Technology

    2009-01-01

    8. Curt Weldon , “Charting a New Course on Missile Defense,” in Spacepower for a New Millen­ nium: Space and U.S. National Security, ed. Peter L...Stimson Center, 2003), 4. 45. See Baker Spring , “The Enduring Features of the Debate over Missile Defense,” Backgrounder no. 1972, Heritage Foundation

  3. 76 FR 20633 - Record of Decision (ROD) for the Base Closure and Realignment (BRAC) 2005 Actions at Fort...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-13

    ... DEPARTMENT OF DEFENSE Department of the Army Record of Decision (ROD) for the Base Closure and... decision on how to implement property disposal in accordance with the Defense Base Closure and Realignment Act of 1990 (the Base Closure Act), Public Law 101-510, as amended, following the closure of Fort...

  4. 75 FR 65463 - Record of Decision (ROD) for the Implementation of the Base Closure and Realignment (BRAC) 2005...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... DEPARTMENT OF DEFENSE Department of the Army Record of Decision (ROD) for the Implementation of the Base Closure and Realignment (BRAC) 2005 Actions at Fort Monroe, VA AGENCY: Department of the Army... Defense Base Closure and Realignment Act of 1990 (the Base Closure Act), Public Law 101-510, as amended...

  5. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    PubMed

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  6. Coevolutionary arms race versus host defense chase in a tropical herbivore–plant system

    PubMed Central

    Coley, Phyllis D.; Ghabash, Gabrielle; Nicholls, James A.; Donoso, David A.; Stone, Graham N.; Pennington, R. Toby; Kursar, Thomas A.

    2017-01-01

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore–host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead “chase” hosts based on the herbivore’s own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution. PMID:28827317

  7. Japan’s Territorial Disputes: CNA Maritime Asia Project: Workshop Three

    DTIC Science & Technology

    2013-06-01

    strengthen, their exercise programs with the Japan Self -Defense Forces (JSDF). These exercises prepare both militaries to deter the use of force and, if...around the islands should be noted. After Lee’s visit, Korea mobilized its air defenses when it claimed a Japanese Self -Defense Force helicopter...lock incidents reported by Japan’s Maritime Self -Defense Force, the first against a destroyer-based helicopter and the second against the frigate

  8. Reappraising Defense Organization: An Analysis Based on the Defense Organization Study of 1977-1980,

    DTIC Science & Technology

    1983-01-01

    and Mabel Jobe. Although I am responsible for what appears in these pages, including any errors or omissions, their efforts have contributed...provide planning and military advice to him, the President, and the Congress.ś " The Defense Resource Management Study, directed by Donald B. Rice ...Government Printing Office, 1978). 8. Donald B. Rice , Defense Resource Management Study, Final Report (Washington, DC: US Government Printing Office, 1979

  9. Quantifying Permafrost Extent, Condition, and Degradation at Department of Defense Installations in the Arctic

    NASA Astrophysics Data System (ADS)

    Edlund, C. A.

    2017-12-01

    The Department of Defense (DoD) is planning over $500M in military construction on Eielson Air Force Base (AFB) within the next three fiscal years. This construction program will expand the footprint of facilities and change the storm water management scheme, which will have second order effects on the underlying permafrost layer. These changes in permafrost will drive engineering decision making at local and regional levels, and help shape the overall strategy for military readiness in the Arctic. Although many studies have attempted to predict climate change induced permafrost degradation, very little site-specific knowledge exists on the anthropogenic effects to permafrost at this location. In 2016, the permafrost degradation rates at Eielson AFB were modeled using the Geophysics Institute Permafrost Laboratory (GIPL) 2.1 model and limited available geotechnical and climate data. Model results indicated a degradation of the discontinuous permafrost layer at Eielson AFB of up to 7 meters in depth over the next century. To further refine an understanding of the geophysics at Eielson AFB and help engineers and commanders make more informed decisions on engineering and operations in the arctic, this project established two permafrost monitoring stations near the future construction sites. Installation of the stations occurred in July 2017. Permafrost was located and characterized using two Electrical Resistivity Tomography surveys, as well as direct frost probe measurements. Using this data, the research team optimized the placement location and depth of two long term ground temperature monitoring stations, and then installed the stations for data collection. The data set generated by these stations are the first of their kind at Eielson AFB, and represent the first systematic effort in the DoD to quantify permafrost condition before, during, and after construction and other anthropogenic activities in order to fully understand the effects of that activity in the future.

  10. Holding the Edge: Maintaining the Defense Technology Base. Summary

    DTIC Science & Technology

    1989-04-01

    Arizona CLAIBORNE PELL GEORGE E. BROWN, JR. Rhode Island California TED STEVENS JOHN D. DINGELL Alaska Michigan ORRIN G. HATCH DON SUNDQUIST Utah Tennessee...acknowledged. JON IBBONS Director Defense Technology Base Advisory Panel Walter B. Laberge , Chair Vice President of Corporate Development Lockheed Corp

  11. 2005 Base Closure and Realignment Commission Report

    EPA Pesticide Factsheets

    The 2005 Defense Base Closure and Realignment Commission is proud to present its Final Report for your consideration. As required by law, the Commission thoroughly and objectively reviewed the domestic installation closure and realignment recommendations proposed by the Secretary of Defense on May 13, 2005.

  12. Defense.gov Special Report: Travels with Hagel - July 2013

    Science.gov Websites

    troops at the Stone Bay facility at Marine Corps Base Camp Lejeune in North Carolina. Story Hagel Joint Base Charleston, S.C. Story Hagel Announces Cuts to Headquarters Staffs Pentagon leaders will Defense Chuck Hagel holds a town hall meeting at Joint Base Charleston, S.C. Also available in high

  13. Defense.gov - Special Report - Travels With Gates

    Science.gov Websites

    . Defense Secretary Robert M. Gates re-enlists soldiers deployed on Field Operating Base Airborne in the province of Kandahar. Story» Gates Develops 'To Do' List From Two-Day Afghan Visit FORWARD OPERATING BASE momentum. Story» Gates Assures 10th Mountain Soldiers of Continued Support FORWARD OPERATING BASE AIRBORNE

  14. Defense.gov Special Report: Travels With Hagel

    Science.gov Websites

    institution in ways that we've never had to." Story Hagel Discusses Transitions at Marine Corps Base Base Defense Secretary Chuck Hagel opened his final domestic trip with a stop at Whiteman Air Force Base, home of the 509th Bomb Wing -- the world's only B-2 Spirit stealth bomber unit, where he told

  15. Picking up the shield: Incorporating defense into strategic nuclear doctrine. Research report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruotsala, M.G.

    Picking up the Shield is an interesting and enlightening account of the evolution of strategic nuclear doctrine. It puts the offense-defense relationship into a historical perspective that lends important insight into the ongoing debate over strategic defenses. Although this debate centers on the active defenses contemplated by the strategic defense initiative, Lt Col Michael G. Ruotsala makes the point that passive defenses are also an important component of strategic defense. He sees the inherent passive defenses of the Triad as being a key to maintaining offense-oriented deterrence, and he makes a good case for survivable Peacekeeper basing and a smallmore » mobile intercontinental ballistic missile (ICBM) to enhance deterrence and pave the way for active defense. Although the future may hold a strategic defense with new, even revolutionary, weapons, any future program will embody old concepts of offense and defense. For the foreseeable future, offensive strategic forces will continue to play a dominant role in US defense policy. However, strategic defenses are consistent with US strategic doctrine. More important for deterrence, defenses are consistent with Soviet doctrine. Clearly, complementing roles for both the offense and defense are critical for developing a doctrine that enhances deterrence of a nuclear exchange between the United States and the Soviet Union. It is also clear that Picking up the Shield makes a significant contribution to understanding the challenge we face as we incorporate defense into strategic nuclear doctrine.« less

  16. The RNA Silencing Enzyme RNA Polymerase V Is Required for Plant Immunity

    PubMed Central

    López, Ana; Ramírez, Vicente; García-Andrade, Javier; Flors, Victor; Vera, Pablo

    2011-01-01

    RNA–directed DNA methylation (RdDM) is an epigenetic control mechanism driven by small interfering RNAs (siRNAs) that influence gene function. In plants, little is known of the involvement of the RdDM pathway in regulating traits related to immune responses. In a genetic screen designed to reveal factors regulating immunity in Arabidopsis thaliana, we identified NRPD2 as the OVEREXPRESSOR OF CATIONIC PEROXIDASE 1 (OCP1). NRPD2 encodes the second largest subunit of the plant-specific RNA Polymerases IV and V (Pol IV and Pol V), which are crucial for the RdDM pathway. The ocp1 and nrpd2 mutants showed increases in disease susceptibility when confronted with the necrotrophic fungal pathogens Botrytis cinerea and Plectosphaerella cucumerina. Studies were extended to other mutants affected in different steps of the RdDM pathway, such as nrpd1, nrpe1, ago4, drd1, rdr2, and drm1drm2 mutants. Our results indicate that all the mutants studied, with the exception of nrpd1, phenocopy the nrpd2 mutants; and they suggest that, while Pol V complex is required for plant immunity, Pol IV appears dispensable. Moreover, Pol V defective mutants, but not Pol IV mutants, show enhanced disease resistance towards the bacterial pathogen Pseudomonas syringae DC3000. Interestingly, salicylic acid (SA)–mediated defenses effective against PsDC3000 are enhanced in Pol V defective mutants, whereas jasmonic acid (JA)–mediated defenses that protect against fungi are reduced. Chromatin immunoprecipitation analysis revealed that, through differential histone modifications, SA–related defense genes are poised for enhanced activation in Pol V defective mutants and provide clues for understanding the regulation of gene priming during defense. Our results highlight the importance of epigenetic control as an additional layer of complexity in the regulation of plant immunity and point towards multiple components of the RdDM pathway being involved in plant immunity based on genetic evidence, but whether this is a direct or indirect effect on disease-related genes is unclear. PMID:22242006

  17. 77 FR 34941 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-12

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, DoD. ACTION: Notice of a... computer matching program are the Department of Veterans Affairs (VA) and the Defense Manpower Data Center... identified as DMDC 01, entitled ``Defense Manpower Data Center Data Base,'' last published in the Federal...

  18. 32 CFR Appendix G to Part 516 - Figures

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS... Department of Defense directives, 32 CFR § 97.6(c), and Army regulations, 32 CFR §§ 516.34-516.40. The.... She may not testify as an opinion or expert witness. This limitation is based on Department of Defense...

  19. 77 FR 19127 - Defense Federal Acquisition Regulation Supplement; Inflation Adjustment of Threshold for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ...-AH65 Defense Federal Acquisition Regulation Supplement; Inflation Adjustment of Threshold for..., and to adjust the threshold, as appropriate. 10 U.S.C. 2253(a)(2) is based on section 101(b) of the Fiscal Year 1986 Department of Defense Appropriations Act (Pub. L. 99-190). The threshold was previously...

  20. Detection technique of targets for missile defense system

    NASA Astrophysics Data System (ADS)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  1. A strong and deformable in-situ magnesium nanocomposite igniting above 1000 °C.

    PubMed

    Tekumalla, Sravya; Nandigam, Yogesh; Bibhanshu, Nitish; Rajashekara, Shabadi; Yang, Chen; Suwas, Satyam; Gupta, Manoj

    2018-05-04

    Magnesium has been trending of late in automobile, aerospace, defense, sports, electronic and biomedical sectors as it offers an advantage in light-weighting. In aluminum, titanium, and steel dominated aerospace and defense sectors, applications of Mg were banned/restricted until recently due to perceived easy ignition and inability to self-extinguish immediately. Strength is generally inversely related to ductility, weak texture and unrelated to ignition resistance, making it challenging to optimize all four concurrently in a material. We address this challenge by designing a low density (~1.76 g.cm -3 ) in-situ Mg nanocomposite. It is a resultant of a sequence of in-situ reactions during melt processing and extrusion. The in-situ formed Y 2 O 3 nanoparticles exhibit coherency with matrix and lead to development of large amount of elastic and plastic strain fields around them. These nanoparticles and secondary phases (Mg 2 Ca and Mg 2 Y) are responsible for the nanocomposite's high tensile strength (~343 MPa). A weak texture mediated tensile ductility of 30% and compressive failure strain of 44% is observed. Further, the ignition temperature increased to 1045 °C (near the boiling point of Mg)  due to the formation of protective surficial oxide layers aided by the presence of insulating Y 2 O 3 nanoparticles, rendering the nanocomposite outperform other traditional commercial Mg-based materials.

  2. Implementation of evidence-based humanitarian programs in military-led missions: part I. Qualitative gap analysis of current military and international aid programs.

    PubMed

    Reaves, Erik J; Schor, Kenneth W; Burkle, Frederick M

    2008-12-01

    A recent Department of Defense instruction mandates country-specific assessments, identification of interventions, and development of guidance for Department of Defense to plan, train, and prepare for the provision of humanitarian assistance in stability operations. It also directs the use of outcome-based measures of effectiveness and the establishment of processes facilitating transparency of information. Whereas this would align military-led projects closer to the standards of the international aid community, how this process will be developed and implemented within the military has not yet been determined. To begin developing an evidence-based program for military-led humanitarian aid, we conducted a qualitative gap analysis comparing information from a Web search of Department of Defense medical after-action reports, lessons learned, and expert interviews with the internationally accepted standards in humanitarian assistance impact assessment. There is a major gap in the ability of the Department of Defense to assess the impact of humanitarian assistance in stability operations compared with international development standards. Of the 1000 Department of Defense after-action reports and lessons learned reviewed, only 7 (0.7%) reports refer to, but do not discuss, impact assessment or outcome-based measures of effectiveness. This investigation shows that the Department of Defense humanitarian assistance operations are, historically, recorded without documentation using quantifiable health data identifying which aid activities contributed directly to desired outcomes or favorable public opinion, and rarely are analyzed for effectiveness. As humanitarian assistance operations assume an ever greater role in US military strategy, it is imperative that we investigate useful impact assessment models to meet mission directives and, more important, to maximize coordination in a necessarily integrated and cooperative development environment. These findings provide baseline knowledge for the implementation of an evidence-based impact assessment process to validate future Department of Defense humanitarian assistance operations.

  3. National Defense on the High Frontier.

    ERIC Educational Resources Information Center

    Graham, Daniel O.

    1983-01-01

    A new American defense policy based on satellites which can track down and destroy Soviet missiles is less expensive and more workable than is commonly believed. Such a policy would provide a greater margin of safety than the present policy of deterence based on mutually assured destruction. (IS)

  4. 77 FR 29616 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...

  5. Electronic nanobiosensors based on two-dimensional materials

    NASA Astrophysics Data System (ADS)

    Ping, Jinglei

    Atomically-thick two-dimensional (2D) nanomaterials have tremendous potential to be applied as transduction elements in biosensors and bioelectronics. We developed scalable methods for synthesis and large-area transfer of two-dimensional nanomaterials, particularly graphene and metal dichalcogenides (so called ``MX2'' materials). We also developed versatile fabrication methods for large arrays of field-effect transistors (FETs) and micro-electrodes with these nanomaterials based on either conventional photolithography or innovative approaches that minimize contamination of the 2D layer. By functionalizing the FETs with a computationally redesigned water-soluble mu-opioid receptor, we created selective and sensitive biosensors suitable for detection of the drug target naltrexone and the neuropeptide enkephalin at pg/mL concentrations. We also constructed DNA-functionalized biosensors and nano-particle decorated biosensors by applying related bio-nano integration techniques. Our methodology paves the way for multiplexed nanosensor arrays with all-electronic readout suitable for inexpensive point-of-care diagnostics, drug-development and biomedical research. With graphene field-effect transistors, we investigated the graphene/solution interface and developed a quantitative model for the effect of ionic screening on the graphene carrier density based on theories of the electric double layer. Finally, we have developed a technique for measuring low-level Faradaic charge-transfer current (fA) across the graphene/solution interface via real-time charge monitoring of graphene microelectrodes in ionic solution. This technique enables the development of flexible and transparent pH sensors that are promising for in vivo applications. The author acknowledges the support from the Defense Advanced Research Projects Agency (DARPA) and the U. S. Army Research Office under Grant Number W911NF1010093.

  6. HF radar signatures of the cusp and low-latitude boundary layer

    NASA Technical Reports Server (NTRS)

    Baker, K. B.; Dudeney, J. R.; Greenwald, R. A.; Pinnock, M.; Newell, P. T.; Rodger, A. S.; Mattin, N.; Meng, C.-I.

    1995-01-01

    Continuous ground-based observations of ionospheric and magnetospheric regions are critical to the Geospace Environmental Modeling (GEM) program. It is therefore important to establish clear intercalibrations between different ground-based instruments and satellites in order to clearly place the ground-based observations in context with the corresponding in situ satellite measurements. HF-radars operating at high latitudes are capable of observing very large spatial regions of the ionosphere on a nearly continuous basis. In this paper we report on an intercalibration study made using the Polar Anglo-American Conjugate Radar Experiment radars located at Goose Bay, Labrador, and Halley Station, Antarctica, and the Defense Meteorological Satellite Program (DMSP) satellites. The DMSP satellite data are used to provide clear identifications of the ionospheric cusp and the low-latitude boundary layer (LLBL). The radar data for eight cusp events and eight LLBL events have been examined in order to determine a radar signature of these ionospheric regions. This intercalibraion indicates that the cusp is always characterized by wide, complex Doppler power spectra, whereas the LLBL is usually found to have spectra dominated by a single component. The distribution of spectral widths in the cusp is of a generally Gaussian form with a peak at about 220 m/s. The distribution of spectral widths in the LLBL is more like an exponential distribution, with the peak of the distribution occurring at about 50 m/s. There are a few cases in the LLBL where the Doppler power spectra are strikingly similar to those observed in the cusp.

  7. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 2

    DTIC Science & Technology

    2006-02-01

    dielectric film between hydrophobic and hydrophilic states to shape liquid into an optical lens . Wait, there’s more. Electrowetting (you’re still...I’ll have a Double-Layer Super Twist Nematic Latte, pronto. My favorite technical word is Electrowetting . I am not kidding. This is a legitimate...word and is a promising technolo- gy for optical switching networks and focusing lasers. Electrowetting (stop giggling) uses electrical fields to modify

  8. Chemical, Biological, Radiological, and Nuclear Response Enterprise: A Way Ahead

    DTIC Science & Technology

    2012-03-12

    Defense Support to Civilian Authorities (DSCA). After years of struggle and dozens of ill-fated attempts in response to a federally declared disaster of...support of civil authorities during major disasters as one of the primary Active Component Federal DOD response options. Lastly, it will consider...struggle and dozens of ill-fated attempts in response to a federally declared disaster of significant magnitude, the DOD has now developed a layered

  9. Report of the Defense Science Board Task Group on Independent Research and Development

    DTIC Science & Technology

    1967-02-01

    been in existence for several years, was apparently rejuvenated . Shortly thereafter, the Minuteman pro- gram came into being. Let us, with a ten-year...the vehicle skin into the boun- dary layer: transpiration cooling. Here there were problems of injection control, to assure proper distribution of...13526QSection 3.5 Date: MAR 8 2011 The interaction of electromagnetic vave vith plasmas, labelled EM propagation, has seen a renewed emphasis in

  10. Fabrication and characterization of epoxy/silica functionally graded composite material

    NASA Astrophysics Data System (ADS)

    Misra, N.; Kapusetti, G.; Pattanayak, D. K.; Kumar, A.

    2011-09-01

    Increased use of composites in aerospace and defense application induces the search for heat resistant material. In present study silica reinforced epoxy functionally graded material using quartz fabric is prepared with different thickness. The gradation in silica : epoxy matrix is maintained with one side pure epoxy to opposite side pure silica. Thermal and mechanical behaviour of the composites were studied. It was found that the temperature gradient of 350°C to 950°C could be maintained for 2 to 5 min if the thickness of insulating silica layer is increased from 0.5 mm to 16 mm. Mechanical properties such as flexural modulus and strength of FGM composites were also evaluated. Strength and modulus decreased with increase of insulating layer.

  11. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  12. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    PubMed Central

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  13. Military display market: third comprehensive edition

    NASA Astrophysics Data System (ADS)

    Desjardins, Daniel D.; Hopper, Darrel G.

    2002-08-01

    Defense displays comprise a niche market whose continually high performance requirements drive technology. The military displays market is being characterized to ascertain opportunities for synergy across platforms, and needs for new technology. All weapons systems are included. Some 382,585 displays are either now in use or planned in DoD weapon systems over the next 15 years, comprising displays designed into direct-view, projection-view, and virtual- image-view applications. This defense niche market is further fractured into 1163 micro-niche markets by the some 403 program offices who make decisions independently of one another. By comparison, a consumer electronics product has volumes of tens-of-millions of units for a single fixed design. Some 81% of defense displays are ruggedized versions of consumer-market driven designs. Some 19% of defense displays, especially in avionics cockpits and combat crewstations, are custom designs to gain the additional performance available in the technology base but not available in consumer-market-driven designs. Defense display sizes range from 13.6 to 4543 mm. More than half of defense displays are now based on some form of flat panel display technology, especially thin-film-transistor active matrix liquid crystal display (TFT AMLCD); the cathode ray tube (CRT) is still widely used but continuing to drop rapidly in defense market share.

  14. Economic Darwinism in the Defense Industry: An Analysis of Corporate Responses

    DTIC Science & Technology

    1993-12-01

    development laboratories. Tomorrow’s defense industrial base will depend not only on government policies and DoD spending levels, but on the financial strength...subsidiary of GM, exclusion of GM’s non -Hughes defense related revenue would omit nearly $1 billion in GM defense revenue, also placing it among the top...Strength The final factor that determines if the expansion strategy is to be pursued is the financial strength of the company. This section of the

  15. 26 CFR 301.6114-1 - Treaty-based return positions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... substantial probability of successful defense if challenged. (3) Examples. The application of section 6114 and... petroleum tax would lack a substantial probability of successful defense if challenged, and Z must disclose... nonresident alien is not attributable to a permanent establishment or a fixed base of operations in the United...

  16. 26 CFR 301.6114-1 - Treaty-based return positions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substantial probability of successful defense if challenged. (3) Examples. The application of section 6114 and... petroleum tax would lack a substantial probability of successful defense if challenged, and Z must disclose... nonresident alien is not attributable to a permanent establishment or a fixed base of operations in the United...

  17. 26 CFR 301.6114-1 - Treaty-based return positions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... substantial probability of successful defense if challenged. (3) Examples. The application of section 6114 and... petroleum tax would lack a substantial probability of successful defense if challenged, and Z must disclose... nonresident alien is not attributable to a permanent establishment or a fixed base of operations in the United...

  18. 26 CFR 301.6114-1 - Treaty-based return positions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... substantial probability of successful defense if challenged. (3) Examples. The application of section 6114 and... petroleum tax would lack a substantial probability of successful defense if challenged, and Z must disclose... nonresident alien is not attributable to a permanent establishment or a fixed base of operations in the United...

  19. 26 CFR 301.6114-1 - Treaty-based return positions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... substantial probability of successful defense if challenged. (3) Examples. The application of section 6114 and... petroleum tax would lack a substantial probability of successful defense if challenged, and Z must disclose... nonresident alien is not attributable to a permanent establishment or a fixed base of operations in the United...

  20. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  1. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  2. Defense.gov Special Report: Travels With Fox

    Science.gov Websites

    2014 U.S. Army War College, Carlisle Barracks, Pa. U.S. Air War College, Maxwell Air Force Base, Ala Deputy Defense Secretary Christine H. Fox told airmen at the Air War College at Maxwell Air Force Base Base Travel Locations Travel Location: U.S. Naval War College, Newport, R.I. U.S. Army War College

  3. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    PubMed

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10-12 participants) and have a minimal duration of at least 3 days in order to be effective. Several systematic reviews evaluated the impact of CST on clinicians' communication skills [9-11]. Effectiveness of CST can be assessed by two main approaches: participant-based and patient-based outcomes. Measures can be self-reported, but, according to Gysels et al. [10], behavioral assessment of patient-physician interviews [12] is the most objective and reliable method for measuring change after training. Based on 22 studies on participants' outcomes, Merckaert et al. [9] reported an increase of communication skills and participants' satisfaction with training and changes in attitudes and beliefs. The evaluation of CST remains a challenging task and variables mediating skills improvement remain unidentified. We recently thus conducted a study evaluating the impact of CST on clinicians' defenses by comparing the evolution of defenses of clinicians participating in CST with defenses of a control group without training [13]. Defenses are unconscious psychological processes which protect from anxiety or distress. Therefore, they contribute to the individual's adaptation to stress [14]. Perry refers to the term "defensive functioning" to indicate the degree of adaptation linked to the use of a range of specific defenses by an individual, ranging from low defensive functioning when he or she tends to use generally less adaptive defenses (such as projection, denial, or acting out) to high defensive functioning when he or she tends to use generally more adaptive defenses (such as altruism, intellectualization, or introspection) [15, 16]. Although several authors have addressed the emotional difficulties of oncology clinicians when facing patients and their need to preserve themselves [7, 17, 18], no research has yet been conducted on the defenses of clinicians. For example, repeated use of less adaptive defenses, such as denial, may allow the clinician to avoid or reduce distress, but it also diminishes his ability to respond to the patient's emotions, to identify and to respond adequately to his needs, and to foster the therapeutic alliance. Results of the above-mentioned study [13] showed two groups of clinicians: one with a higher defensive functioning and one with a lower defensive functioning prior to CST. After the training, a difference in defensive functioning between clinicians who participated in CST and clinicians of the control group was only showed for clinicians with a higher defensive functioning. Some clinicians may therefore be more responsive to CST than others. To further address this issue, the present study aimed to evaluate the relationship between the level of adherence to an "ideally conducted interview", as defined by the teachers of the CST, and the level of the clinician' defensive functioning. We hypothesized that, after CST, clinicians with a higher defensive functioning show a greater adherence to the "ideally conducted interview" than clinicians with a lower defensive functioning.

  4. Development of the monitoring technique on the damage of piles using the biggest shaking table "E-defense"

    NASA Astrophysics Data System (ADS)

    Hayashi, Kazuhiro; Hachimori, Wataru; Kaneda, Shogo; Tamura, Shuji; Saito, Taiki

    2017-10-01

    In case of earthquake damage to buildings, the damage to a superstructure is visible, but the damage to a foundation structure, e.g. the underground pile, is difficult to detect. In this study, the authors aim to develop a monitoring technique for pile damage due to earthquakes. The world's biggest shaking table, E-Defense, was used to reproduce damage to RC pile models embedded in the soil inside a large scale shear box (8m in diameter and 6.5m in height). The diameter of the RC pile model was 154mm. It consisted of mortar (27.2N/mm2 in compressive strength), 6 main reinforcements (6.35mm in diameter) and shear reinforcement hard steel wire (2mm in diameter at intervals of 20mm). The natural period of the superstructure above the pile models is around 0.12sec. The soil consisted of 2 layers. The lower layer is Albany sand of 80% relative density while the upper layer is only 2m from the surface ground and is Kaketsu sand of 60% relative density. Primary four excitations were scaled from JMA Kobe waves in notification at different amplitudes. The maximum acceleration of each wave is 31gal, 67gal, 304gal, and 458gal, respectively. In the test result, reinforcing steels at the pile head of the RC model yielded when the maximum acceleration was 304gal. After that, mortar of the pile head peeled off and a bending shear failure occurred when the maximum acceleration was 458gal. The peak frequency of rotational spectrum on the foundation did not change in elastic range in the piles. However, the peak frequency fell after the plastic hinge occurred.

  5. Defense Base Realignment and Closure Budget Data for MCGuire Air Force Base, New Jersey

    DTIC Science & Technology

    1995-08-04

    The overall audit objective was to determine the accuracy of Defense base realignment and closure military construction budget data. This report provides the results of the audit of two projects, valued at $22.4 miilion, for the realignment of McGuire Air Force Base, New Jersey. The audit also assessed the adequacy of the management control program as it applied to the overall audit objective.

  6. Cost of space-based laser ballistic missile defense.

    PubMed

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  7. Cost of space-based laser ballistic missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Field, G.; Spergel, D.

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to bemore » used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ration. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems. 28 references, 2 tables.« less

  8. 32 CFR 842.121 - Referring a claim to the US Attorney.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Referring a claim to the US Attorney. 842.121 Section 842.121 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE CLAIMS AND... to the US Attorney. Only HQ USAF/JACC authorizes referral of a claim to the US Attorney. The base SJA...

  9. A Population-Based Twin Study of Parentally Reported Tactile and Auditory Defensiveness in Young Children

    ERIC Educational Resources Information Center

    Goldsmith, H. H.; Van Hulle, C. A.; Arneson, C. L.; Schreiber, J. E.; Gernsbacher, M. A.

    2006-01-01

    Some adults and children exhibit defensive behaviors to tactile or auditory stimulation. These symptoms occur not only in subsets of children with ADHD, autism, and Fragile X syndrome, but also in the apparent absence of accompanying disorders. Relatively little research explores the correlates and antecedents of sensory defensiveness. Using a…

  10. Generation of memory B cells and their reactivation.

    PubMed

    Inoue, Takeshi; Moran, Imogen; Shinnakasu, Ryo; Phan, Tri Giang; Kurosaki, Tomohiro

    2018-05-01

    The successful establishment of humoral memory response depends on at least two layers of defense. Pre-existing protective antibodies secreted by long-lived plasma cells act as a first line of defense against reinfection ("constitutive humoral memory"). Previously, a second line of defense in which pathogen-experienced memory B cells are rapidly reactivated to produce antibodies ("reactive humoral memory"), was considered as simply a back-up system for the first line (particularly for re-infection with homologous viruses). However, in the case of re-infection with similar but different strains of viruses, or in response to viral escape mutants, the reactive humoral memory plays a crucial role. Here, we review recent progress in our understanding of how memory B cells are generated in the pre-GC stage and during the GC reaction, and how these memory B cells are robustly reactivated with the help of memory Tfh cells to generate the secondary antibody response. In addition, we discuss how these advances may be relevant to the quest for a vaccine that can induce broadly reactive antibodies against influenza and HIV. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Does self-defense training prevent sexual violence against women?

    PubMed

    Hollander, Jocelyn A

    2014-03-01

    Self-defense classes are offered across the nation as a strategy for reducing women's vulnerability to sexual assault. Yet there has been little systematic research assessing the effectiveness of these classes. In this article, I use data from a mixed methods study of a 10-week, university-based, feminist self-defense class to examine the effectiveness of self-defense training over a 1-year follow-up period. My analyses indicate that women who participate in self-defense training are less likely to experience sexual assault and are more confident in their ability to effectively resist assault than similar women who have not taken such a class.

  12. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  13. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  14. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  15. Conceptual design of a space-based O2 laser for defense

    NASA Astrophysics Data System (ADS)

    Takehisa, K.

    2016-10-01

    A new concept of a space-based-laser (SBL) defense system is proposed. It is based on a chemical oxygen laser (COL) which has been investigated to achieve its oscillation 1-3). A COL is suitable as a high energy laser (HEL) directed energy weapon (DEW) 4) because it could produce a giant pulse of 0.1 ms which can damage a target by a single shot without producing plasma during the propagation. However since the beam cannot propagate for a long distance due to the absorption in air, it should be used in space considering the capability of operation without electric power supply. Therefore a new SBL defense system using a COL is proposed in order to destroy a ballistic missile in its boost phase. It is based on an SBL at geostationary Earth orbit (GEO) with the altitude of 36,000 km. Since the beam needs to propagate for a long distance, the focused beam diameter is 8 m even if the initial beam diameter is 8 m. Therefore an 8 m-diameter focusing mirror, carried by a high altitude airship (HAA) flying at the altitude of more than 20 km, could be used to focus the beam at the target. Although such a large focusing mirror is necessary, the focused spot size can be <1 cm at 30 km away. Thus, much less than 100 kJ pulse can cause a fatal damage. Unlike a conventional SBL defense system based on SBLs and/or relay-mirror satellites in low Earth orbit (LEO), the new defense system needs only a single SBL and a single relay mirror HAA (RM HAA) to intercept a ballistic missile if the enemy is a small country since the HAA can always stay close to the enemy's missile site. Another concept of the defense system is also proposed, which is based on a COL equipped with anther HAA because a COL can be lightweight. These geostationary defense systems can also intercept a submarine-launched ballistic missile (SLBM) if the submarine's location is monitored.

  16. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.

    2011-02-01

    For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less

  17. Trial-Based Thought Record (TBTR): preliminary data on a strategy to deal with core beliefs by combining sentence reversion and the use of analogy with a judicial process.

    PubMed

    Oliveira, Irismar Reis de

    2008-03-01

    To propose the Trial-Based Thought Record, a modified, 7-column thought record addressing core beliefs by sentence reversion and the analogy to a trial. Clients (n = 30) participated in a simulation of a trial and exhibited shifts in their adherence to core beliefs and in the intensity of corresponding emotions after each step (investigation, prosecutor s plea, defense attorney s plea, prosecutor s second plea, defense attorney s second plea, and jury verdict) during a session. Significant mean reductions existed between percent values after investigation (taken as baseline) and defense attorney s plea (p < 0.001), and after the jury s verdict, either in beliefs (p < 0.001) or in intensity of emotions (p < 0.001). Significant differences also emerged between the defense attorney s first and second pleas (p = 0.009) and between the defense attorney s second plea and jury s verdict concerning core beliefs (p = 0.005) and emotions (p = 0.02). Trial-Based Thought Record may at least temporarily help patients constructively reduce attachment to negative core beliefs and corresponding emotions.

  18. 32 CFR 736.3 - Sale of personal property.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Bidders Control Office, Defense Reutilization and Marketing Office, Federal Center Building, Battle Creek... Marketing Office, Defense Logistics Agency, Battle Creek, Michigan. (2) Retail sales at fixed prices based...

  19. 32 CFR 736.3 - Sale of personal property.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Bidders Control Office, Defense Reutilization and Marketing Office, Federal Center Building, Battle Creek... Marketing Office, Defense Logistics Agency, Battle Creek, Michigan. (2) Retail sales at fixed prices based...

  20. 32 CFR 736.3 - Sale of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Bidders Control Office, Defense Reutilization and Marketing Office, Federal Center Building, Battle Creek... Marketing Office, Defense Logistics Agency, Battle Creek, Michigan. (2) Retail sales at fixed prices based...

  1. 32 CFR 736.3 - Sale of personal property.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Bidders Control Office, Defense Reutilization and Marketing Office, Federal Center Building, Battle Creek... Marketing Office, Defense Logistics Agency, Battle Creek, Michigan. (2) Retail sales at fixed prices based...

  2. 32 CFR 736.3 - Sale of personal property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Bidders Control Office, Defense Reutilization and Marketing Office, Federal Center Building, Battle Creek... Marketing Office, Defense Logistics Agency, Battle Creek, Michigan. (2) Retail sales at fixed prices based...

  3. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  4. Defense Mechanisms and Utilization in Cancer Patients Undergoing Radiation Therapy: A Pilot Study.

    PubMed

    Porcerelli, John H; Cramer, Phebe; Porcerelli, Daniel J; Arterbery, V Elayne

    2017-06-01

    A group of 49 patients who had been diagnosed with cancer during the preceding year and who were receiving radiation therapy were assessed for their use of defense mechanisms, as well as for their level of psychological distress. In addition, their utilization of medical services was determined. It was predicted that the use of services that were under the patients' control-namely, requesting extra outpatient visits and making trips to the emergency department-would be related to the patients' use of defense mechanisms, whereas a treatment option not under the patients' control-overnight hospitalization based on physicians' assessment of condition-would not be related to defense use. The findings confirmed the hypotheses. Outpatient visits were strongly predicted by defense use, whereas hospitalization was determined by psychological distress. However, emergency department visits were determined by both defense use and psychological distress. In addition, an interaction between defense and distress was found to predict hospitalization.

  5. A two-dimensional neuropsychology of defense: fear/anxiety and defensive distance.

    PubMed

    McNaughton, Neil; Corr, Philip J

    2004-05-01

    We present in this paper a picture of the neural systems controlling defense that updates and simplifies Gray's "Neuropsychology of Anxiety". It is based on two behavioural dimensions: 'defensive distance' as defined by the Blanchards and 'defensive direction'. Defensive direction is a categorical dimension with avoidance of threat corresponding to fear and approach to threat corresponding to anxiety. These two psychological dimensions are mapped to underlying neural dimensions. Defensive distance is mapped to neural level, with the shortest defensive distances involving the lowest neural level (periaqueductal grey) and the largest defensive distances the highest neural level (prefrontal cortex). Defensive direction is mapped to separate parallel streams that run across these levels. A significant departure from prior models is the proposal that both fear and anxiety are represented at all levels. The theory is presented in a simplified form that does not incorporate the interactions that must occur between non-adjacent levels of the system. It also requires expansion to include the dimension of escapability of threat. Our current development and these proposed future extensions do not change the core concepts originally proposed by Gray and, we argue, demonstrate their enduring value.

  6. Artificial Diversity and Defense Security (ADDSec) Final Report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Hamlet, Jason; Stout, William M.S.

    Critical infrastructure systems continue to foster predictable communication patterns and static configurations over extended periods of time. The static nature of these systems eases the process of gathering reconnaissance information that can be used to design, develop, and launch attacks by adversaries. In this research effort, the early phases of an attack vector will be disrupted by randomizing application port numbers, IP addresses, and communication paths dynamically through the use of overlay networks within Industrial Control Systems (ICS). These protective measures convert static systems into "moving targets," adding an additional layer of defense. Additionally, we have developed a framework thatmore » automatically detects and defends against threats within these systems using an ensemble of machine learning algorithms that classify and categorize abnormal behavior. Our proof-of-concept has been demonstrated within a representative ICS environment. Performance metrics of our proof-of-concept have been captured with latency impacts of less than a millisecond, on average.« less

  7. 78 FR 62430 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... National Defense Authorization Act for Fiscal Year 2013. Comments DoD published an interim final rule on May 11, 2012 (77 FR 27615). Fifty comments from twelve respondents were received and reviewed by the... year. Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601) It has been certified that 32...

  8. Missile Defense: Actions Needed to Improve Transparency and Accountability

    DTIC Science & Technology

    2011-04-13

    suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway...Established resource, schedule, test, operational capacity, technical, and contract baselines for several missile defense systems. It reported...Europe as well as the Ground-based Midcourse Defense system. View GAO-11-555T or key components. For more information, contact Cristina T

  9. The Impact of Emerging MEMS-Based Microsystems on US Defense Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    STAPLE,BEVAN D.; JAKUBCZAK II,JEROME F.

    2000-01-20

    This paper examines the impact of inserting Micro-Electro-Mechanical Systems (MEMS) into US defense applications. As specific examples, the impacts of micro Inertial Measurement Units (IMUs), radio frequency MEMS (RF MEMS), and Micro-Opto-Electro-Mechanical Systems (MOEMS) to provide integrated intelligence, communication, and control to the defense infrastructure with increased affordability, functionality, and performance are highlighted.

  10. Defense Environmental Restoration Program Annual Report to Congress for Fiscal Year 1986

    DTIC Science & Technology

    1987-03-16

    LF 01 LANDFILL $3 AND HAROFILL RUFS C SITE LF 02 LANDFILL I RI C SITE LF 03 LANDFILL 2 RI C SITE LU 01 BLDG 2017 -BEA ABANDONED UST FS C SITE tU 02 BLDG...Army Amiunition Plant, Texarkana Hill Air force Base, Ogden Ogden Defense Depot, Ogden Toele Army Depot, Tooele VIFIOIA Defense General Supply Center

  11. 48 CFR 628.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., shall include the contractual obligation for coverage under the Defense Base Act (42 U.S.C. Sections... local workers' compensation laws. (2) Individuals who are self-employed (i.e., they have not incorporated) do not meet the definition of an employee. No Defense Base Act insurance is required when...

  12. 48 CFR 628.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., shall include the contractual obligation for coverage under the Defense Base Act (42 U.S.C. Sections... local workers' compensation laws. (2) Individuals who are self-employed (i.e., they have not incorporated) do not meet the definition of an employee. No Defense Base Act insurance is required when...

  13. 48 CFR 628.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., shall include the contractual obligation for coverage under the Defense Base Act (42 U.S.C. Sections... local workers' compensation laws. (2) Individuals who are self-employed (i.e., they have not incorporated) do not meet the definition of an employee. No Defense Base Act insurance is required when...

  14. 48 CFR 628.305 - Overseas workers' compensation and war-hazard insurance.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., shall include the contractual obligation for coverage under the Defense Base Act (42 U.S.C. Sections... local workers' compensation laws. (2) Individuals who are self-employed (i.e., they have not incorporated) do not meet the definition of an employee. No Defense Base Act insurance is required when...

  15. Military Construction, Veterans Affairs, and Related Agencies: FY2009 Appropriations

    DTIC Science & Technology

    2008-10-09

    Global Presence and Basing Strategy (IGPBS)/Global Defense Posture Realignment ( GDPR ) . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Repealing...Second FY2008 Supplemental (P.L. 110-252) . . . . . . . . . . . . . . . . . . . . 6 Table 3. IGPBS/ GDPR One-Time Implementation Costs...report. CRS-10 17 The DOD Integrated Global Presence and Basing Strategy (IGPBS) has been renamed the Global Defense Posture Realignment ( GDPR ). 18

  16. Defense Small Business Innovation Research Program (SBIR). Volume 3. Air Force Abstracts of Phase 1 Awards 1992

    DTIC Science & Technology

    1992-01-01

    boost plenum which houses the camshaft . The compressed mixture is metered by a throttle to intake valves of the engine. The engine is constructed from...difficulties associated with a time-tagged fault tree . In particular, recent work indicates that the multi-layer perception architecture can give good fdi...Abstract: In the past decade, wastepaper recycling has gained a wider acceptance. Depletion of tree stocks, waste water treatment demands and

  17. Metals Additive Manufacturing. Great Promise in Mitigating Shortages but Some Risks Remain

    DTIC Science & Technology

    2016-11-01

    manufac- tured, shrinking development and delivery cycle times, and yielding improved performance at a lower cost per part. Shapes previously not...make a part. As illustrated in Figure 1, after each pass, a new layer of powder is laid down using a recoater blade and the process continues until...suggested deliberately abandon- ing large production runs and stockpiled inventories. The Defense Logistics Agency (DLA) lists AM as a priority in its R

  18. The Behavior of Systems in the Space Environment

    DTIC Science & Technology

    1991-07-19

    Environment edited by Robert N. DeWitt U.S. Department of Energy , Washington, D.C., U.S.A. Dwight Duston Strategic Defense Initiative Organization, The...originates in a thin layer of the solar chromosphere, contains most of the solar energy in the extreme ultraviolet, but it cannot ionize any major...constituents of the atmosphere, whereas Lyman alpha can ionize only the trace of’nitric oxide. Virtually all the energy delivered in Lyman alpha is dissipated

  19. Economic Feasibility of Installing an Anaerobic Digester on a Department of Defense Installation

    DTIC Science & Technology

    2010-03-01

    permits anaerobic bacteria and enzymes to affect more waste than a lagoon does, as well as preventing a film or layer of scum forming on top of the waste...temperature classifications for anaerobic digestion. The three classes listed are: psychrophilic (4- 20 C), mesophilic (20-45 C), and thermophilic (45-60...operated at 55º C, 30 focusing on an optimum temperature for thermophilic bacteria. Despite previously discussed percentages for total solids in

  20. Process Development for Reactive-Ion Etching of Molybdenum Disulfide (MoS2) Utilizing a Poly(methyl methacrylate) (PMMA) Etch Mask

    DTIC Science & Technology

    2017-10-01

    Mazzoni Oak Ridge Associated Universities (ORAU) Maryland, Belcamp, MD Robert A Burke General Technical Services , LLC, Wall Township, NJ Barbara M...of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services ...solvent, or sonication. However, by using these physical procedures, there is a larger risk that the quality and structural integrity of the 2-D layer may

  1. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    DTIC Science & Technology

    1988-08-01

    Interconnection (OSI) in years. It is felt even more urgent in the past few years, with the rapid evolution of communication technologies and the...services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  2. Review: Potential biotechnological assets related to plant immunity modulation applicable in engineering disease-resistant crops.

    PubMed

    Silva, Marilia Santos; Arraes, Fabrício Barbosa Monteiro; Campos, Magnólia de Araújo; Grossi-de-Sa, Maira; Fernandez, Diana; Cândido, Elizabete de Souza; Cardoso, Marlon Henrique; Franco, Octávio Luiz; Grossi-de-Sa, Maria Fátima

    2018-05-01

    This review emphasizes the biotechnological potential of molecules implicated in the different layers of plant immunity, including, pathogen-associated molecular pattern (PAMP)-triggered immunity (PTI), effector-triggered susceptibility (ETS), and effector-triggered immunity (ETI) that can be applied in the development of disease-resistant genetically modified (GM) plants. These biomolecules are produced by pathogens (viruses, bacteria, fungi, oomycetes) or plants during their mutual interactions. Biomolecules involved in the first layers of plant immunity, PTI and ETS, include inhibitors of pathogen cell-wall-degrading enzymes (CWDEs), plant pattern recognition receptors (PRRs) and susceptibility (S) proteins, while the ETI-related biomolecules include plant resistance (R) proteins. The biomolecules involved in plant defense PTI/ETI responses described herein also include antimicrobial peptides (AMPs), pathogenesis-related (PR) proteins and ribosome-inhibiting proteins (RIPs), as well as enzymes involved in plant defensive secondary metabolite biosynthesis (phytoanticipins and phytoalexins). Moreover, the regulation of immunity by RNA interference (RNAi) in GM disease-resistant plants is also considered. Therefore, the present review does not cover all the classes of biomolecules involved in plant innate immunity that may be applied in the development of disease-resistant GM crops but instead highlights the most common strategies in the literature, as well as their advantages and disadvantages. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  3. US Air Force Air Base Ground Defense Doctrine. Are The Issues Which Arose Concerning Air Base Ground Defense During the Vietnam Conflict Recognized in Current US Air Force Doctrine

    DTIC Science & Technology

    1984-05-01

    Conflict; US efforts to overcome these difficulties_ statistics concerning hostile attacks against air bases and the results thereof (8]; and, a...buses. During the period from � through 1973 the threat to ,air bacses iontinued, as reflected in the air base attack statistics provided ,at...advantage of aI r base vulnerabi lities to gather detailed intelligenrci concerning the air bases. C1 48 -STANDOFF ATTACKS- Based upon the statistics in

  4. Dual properties of a hydrogen oxidation Ni-catalyst entrapped within a polymer promote self-defense against oxygen

    DOE PAGES

    Oughli, Alaa A.; Ruff, Adrian; Boralugodage, Nilusha Priyadarshani; ...

    2018-02-28

    A bio-inspired O 2 sensitive nickel catalyst dispersed in a hydrophobic and redox-silent polymer matrix shows enhanced stability for catalytic H 2 oxidation as well as O 2 tolerance. A simple but efficient electrode design separates the catalyst into two different reaction layers to promote different reactivity on the catalyst. (1) close to the electrode surface, the catalyst can directly exchange electrons with the electrode and generate current from H 2 oxidation; and (2) at the outer film boundary, the electrolyte exposed layer is electrically isolated from the electrode, which enables the H 2 reduced Ni-complex to convert O 2more » to H 2O and thus provides protection to the O 2-sensitive inner reaction layer. This strategy solves one of the biggest limitations of these otherwise outstanding catalysts and could be used to protect other similar catalysts whose wider application is currently limited by sensitivity towards oxygen.« less

  5. Dual properties of a hydrogen oxidation Ni-catalyst entrapped within a polymer promote self-defense against oxygen

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oughli, Alaa A.; Ruff, Adrian; Boralugodage, Nilusha Priyadarshani

    A bio-inspired O 2 sensitive nickel catalyst dispersed in a hydrophobic and redox-silent polymer matrix shows enhanced stability for catalytic H 2 oxidation as well as O 2 tolerance. A simple but efficient electrode design separates the catalyst into two different reaction layers to promote different reactivity on the catalyst. (1) close to the electrode surface, the catalyst can directly exchange electrons with the electrode and generate current from H 2 oxidation; and (2) at the outer film boundary, the electrolyte exposed layer is electrically isolated from the electrode, which enables the H 2 reduced Ni-complex to convert O 2more » to H 2O and thus provides protection to the O 2-sensitive inner reaction layer. This strategy solves one of the biggest limitations of these otherwise outstanding catalysts and could be used to protect other similar catalysts whose wider application is currently limited by sensitivity towards oxygen.« less

  6. A Combination RNAi-Chemotherapy Layer-by-Layer Nanoparticle for Systemic Targeting of KRAS/P53 with Cisplatin to Treat Non-small Cell Lung Cancer

    PubMed Central

    Gu, Li; Deng, Zhou J.; Roy, Sweta; Hammond, Paula T.

    2017-01-01

    Purpose Mutation of the Kirsten ras sarcoma viral oncogene homolog (KRAS) and loss of p53 function are commonly seen in non-small cell lung cancer (NSCLC). Combining therapeutics targeting these tumor defensive pathways with cisplatin in a single nanoparticle platform are rarely developed in clinic. Experimental Design Cisplatin was encapsulated in liposomes which multiple polyelectrolyte layers including siKRAS and miR-34a were built on to generate multifunctional layer-by-layer nanoparticle. Structure, size, and surface charge were characterized, in addition to in vitro toxicity studies. In vivo tumor targeting and therapy was investigated in an orthotopic lung cancer model by microCT, fluorescence imaging, and immunohistochemistry. Results The singular nanoscale formulation, incorporating oncogene siKRAS, tumor suppressor stimulating miR-34a, and cisplatin, has shown enhanced toxicity against lung cancer cell line, KP cell. In vivo, systemic delivery of the nanoparticles indicated a preferential uptake in lung of the tumor-bearing mice. Efficacy studies indicated prolonged survival of mice from the combination treatment. Conclusion The combination RNA-chemotherapy in an LbL formulation provides an enhanced treatment efficacy against NSCLC, indicating promising potential in clinic. PMID:28912139

  7. Novel free ceramides as components of the soldier defense gland of the Formosan subterranean termite (Coptotermes formosanus).

    PubMed

    Ohta, Masaya; Matsuura, Fumito; Henderson, Gregg; Laine, Roger A

    2007-03-01

    Of the lipid extracts of the defense secretion from the Formosan subterranean termite, Coptotermes formosanus Shiraki, on high-performance thin-layer chromatography analysis, no glycolipids or phospholipids were detected, but free fatty acids and three novel ceramides were found (termed TL-1, TL-2, and TL-3). Free fatty acids were confirmed to be lignoceric acid (C24:0) and hexacosanoic acid (C26:0), as described previously [Chen, J., G. Henderson, and R. A. Laine. 1999. Lignoceric acid and hexacosanoic acid: major components of soldier frontal gland secretions of the Formosan subterranean termite (Coptotermes formosanus). J. Chem. Ecol. 25: 817-824]. TL-1, TL-2, and TL-3 were characterized as ceramides differing in hydrophobicity based on results of matrix-assisted laser desorption-ionization time-of-flight mass spectrometry analysis, mild alkaline treatment, GC-MS analysis of fatty acid methylesters, and GC-MS analysis of sphingoid long-chain bases (LCBs) as trimethylsilyl derivatives. Fatty acids in TL-1 and TL-2 were C18:0, C20:0, and C22:0, and those in TL-3 were 2-hydroxy C18:0, C20:0, and C22:0. The most predominant LCB in TL-2 was a novel trihydroxy C(14)-sphingosine, 1,3,9-trihydroxy-2-amino-6-tetradecene. TL-3 contained C(18)-sphinganine and two kinds of novel sphingadienines, 1,3-dihydroxy-2-amino-7,10-hexadecadiene and 1,3-dihydroxy-2-amino-11,14-eicosadiene. Although examination of the biological activities of these novel ceramides was beyond the scope of these studies, because of the minuscule quantities available from termite secretions, it will be interesting in the future to synthesize these molecules for biological testing.

  8. Environmental Assessment of Remove Objects Along Flightline at Davis-Monthan Air Force Base, Arizona

    DTIC Science & Technology

    2005-08-01

    of Defense DRMO Defense Reutilization and Marketing Office EA Environmental Assessment EIAP Environmental Impact Analysis Process EIS...the ADA to advertise that protected species might be available for salvage, facilitating the salvage process for the project area. 3.5 Hazardous...are stored at the Defense Reutilization and Marketing Office (DRMO). Asbestos. AFI 32-1052, Facilities Asbestos Management, provides direction for

  9. A Conceptual Framework for Defense Acquisition Decision Makers: Giving the Schedule its Due

    DTIC Science & Technology

    2014-01-01

    Principles from microeconomic theory and operations research can provide insight into acquisition decisions to produce military capabili- ties in an...models based on economic and operations research principles can yield valuable insight into defense acquisition decisions. This article focuses on models...Department Edmund Conrow (1995) developed an excellent microeconomic framework to investigate the incentives of buyers and sellers in the defense

  10. A Comparative History of Department of Defense Management Reform from 1947 to 2005

    DTIC Science & Technology

    2006-12-01

    type of management reform agenda to improve the Department of Defense business processes and incorporate recent management ideas from the business ...introduce some type of management reform agenda to improve the Department of Defense business processes and incorporate recent management ideas...Steering Group BMMP Business Management Modernization Plan BRAC Base Realignment and Closure C3I Command, Control, Communications, and Intelligence

  11. Public Confidence and the U.S. Military

    DTIC Science & Technology

    2012-03-16

    speech.aspx?id=1672 (accessed January 6, 2012). 24 39 Baldor, Lolita C. “Panetta Faces lawmakers on Defense Cuts,” October 13, 2011 http...20strategy %20is%20based%20on% 20a%20false%20premise%20»%20Center%20For%20Defense%20Studies.webarchive (accessed 5 March, 2012). 48 Lolita Baldor, “Panetta Faces lawmakers on Defense Cuts”, 1.

  12. NASA Blue Marble 2007 West

    NASA Image and Video Library

    2010-03-12

    RELEASE DATE: OCTOBER 9, 2007 Credit: NASA/Goddard Space Flight Center/Reto Stöckli A day’s clouds. The shape and texture of the land. The living ocean. City lights as a beacon of human presence across the globe. This amazingly beautiful view of Earth from space is a fusion of science and art, a showcase for the remote-sensing technology that makes such views possible, and a testament to the passion and creativity of the scientists who devote their careers to understanding how land, ocean, and atmosphere—even life itself—interact to generate Earth’s unique (as far as we know!) life-sustaining environment. Drawing on data from multiple satellite missions (not all collected at the same time), a team of NASA scientists and graphic artists created layers of global data for everything from the land surface, to polar sea ice, to the light reflected by the chlorophyll in the billions of microscopic plants that grow in the ocean. They wrapped these layers around a globe, set it against a black background, and simulated the hazy edge of the Earth’s atmosphere (the limb) that appears in astronaut photography of the Earth. The land surface layer is based on photo-like surface reflectance observations (reflected sunlight) measured by the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Terra satellite in July 2004. The sea ice layer near the poles comes from Terra MODIS observations of daytime sea ice observed between August 28 and September 6, 2001. The ocean layer is a composite. In shallow water areas, the layer shows surface reflectances observed by Terra MODIS in July 2004. In the open ocean, the photo-like layer is overlaid with observations of the average ocean chlorophyll content for 2004. NASA’s Aqua MODIS collected the chlorophyll data. The cloud layer shows a single-day snapshot of clouds observed by Terra MODIS across the planet on July 29, 2001. City lights on Earth’s night side are visualized from data collected by the Defense Meteorological Satellite Program mission between 1994–1995. The topography layer is based on radar data collected by the Space Shuttle Endeavour during an 11-day mission in February of 2000. Topography over Antarctica comes from the Radarsat Antarctic Mapping Project, version 2. Most of the data layers in this visualization are available as monthly composites as part of NASA’s Blue Marble Next Generation image collection. The images in the collection appear in cylindrical projection (rectangular maps), and they are available at 500-meter resolution. The large images provided above are the full-size versions of these globes. In their hope that these images will inspire people to appreciate the beauty of our home planet and to learn about the Earth system, the developers of these images encourage readers to re-use and re-publish the images freely. NASA images by Reto Stöckli, based on data from NASA and NOAA. To learn the history of the Blue Marble go here: earthobservatory.nasa.gov/Features/BlueMarble/BlueMarble_... To learn more about the Blue Marble go here: earthobservatory.nasa.gov/IOTD/view.php?id=8108 NASA Goddard Space Flight Center is home to the nation's largest organization of combined scientists, engineers and technologists that build spacecraft, instruments and new technology to study the Earth, the sun, our solar system, and the universe. Follow us on Twitter Join us on Facebook

  13. Entamoeba histolytica-Induced Mucin Exocytosis Is Mediated by VAMP8 and Is Critical in Mucosal Innate Host Defense.

    PubMed

    Cornick, Steve; Moreau, France; Gaisano, Herbert Y; Chadee, Kris

    2017-10-03

    Intestinal mucus secretion is critical in maintaining mucosal host defense against a myriad of pathogens by preventing direct association with the epithelium. Entamoeba histolytica specifically binds colonic MUC2 mucin and also induces potent hypersecretion from goblet cells; however, characterization of the nature of the mechanisms controlling mucus release remains elusive. In this report, we identify vesicle SNARE vesicle-associated membrane protein 8 (VAMP8) present on mucin granules as orchestrating regulated exocytosis in human goblet cells in response to the presence of E. histolytica VAMP8 was specifically activated during E. histolytica infection, and ablation of VAMP8 led to impaired mucin secretion. As a consequence, loss of VAMP8 increased E. histolytica adherence to epithelial cells associated with enhanced cell death through apoptosis characterized by caspase 3 and 9 cleavages and DNA fragmentation. With the mucosal barrier compromised in Vamp8 -/- animals, E. histolytica induced an aggressive proinflammatory response with elevated levels of interleukin-1 alpha (IL-1α), IL-1β, and tumor necrosis factor alpha (TNF-α) secretion. This report is the first to characterize regulated mucin exocytosis in intestinal goblet cells in response to a pathogen and the downstream consequences of improper mucin secretion in mucosal barrier defense. IMPORTANCE The intestinal tract is exposed to countless substances and pathogens, and yet homeostasis is maintained, in part by the mucus layer that houses the microbiota and spatially separates potential threats from the underlying single layer of epithelium. Despite the critical role of mucus in innate host defense, characterization of the mechanisms by which mucus is secreted from specialized goblet cells in the gut remains elusive. Here, we describe the machinery that regulates mucus secretion as well as the consequence during infection with the colonic pathogen Entamoeba histolytica Abolishment of the key machinery protein VAMP8 abrogated mucus release in cultured human colonic goblet cells and during E. histolytica infection in Vamp8 -/- mice, which showed enhanced amoeba contact and killing of epithelial cells, triggering a potent proinflammatory response. This report highlights the importance of the VAMP8 secretory machinery in facilitating mucus release from intestinal goblet cells and the dire consequences that occur during disease pathogenesis if these pathways are not functional. Copyright © 2017 Cornick et al.

  14. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    DTIC Science & Technology

    2017-12-01

    Political ............................................................................. 55 2. Economic ...the political, economic , social, technological, environmental, and legal forces affecting entry into the defense industrial base...development BBP 1.0 Better Buying Power 1.0 BBP 2.0 Better Buying Power 2.0 BBP 3.0 Better Buying Power 3.0 BEA Bureau of Economic Analysis BLS

  15. 106. Air defense command "master plan", base map," RCA Service ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    106. Air defense command "master plan", base map," RCA Service Company tab no. F-1, sheet 1 of 2, dated 22 October, 1965. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  16. Joint chemical defense for the rear battle: main operating bases in NATO's central region. Student report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salmi, M.D.

    In 1984, the Chiefs of Staff of the US Army and the US Air Force signed a Memorandum of Understanding (MOU) outlining a concept for the joint air defense of overseas air bases. With little previous experience in joint rear-area operations, problems were bound to occur, especially in the area of chemical warfare defense (CWD). The Army bases its CWD doctrine on the concept of maneuver while the Air Force bases its doctrine on being tied to air bases with little or no capability to avoid chemical attacks. Each Service developed its doctrine to support its operational concept. This studymore » compared and contrasted the CWD doctrine of the Army and the Air Force. If found a great deal of commonality exists; however, there are also several problems which could lead to death, injury, and degradation of sortie generation capability.« less

  17. Observation and modelling of fog at Cold Lake, Alberta, Canada

    NASA Astrophysics Data System (ADS)

    Wu, Di; Boudala, Faisal; Weng, Wensong; Taylor, Peter A.; Gultepe, Ismail; Isaac, George A.

    2017-04-01

    Climatological data indicate that the Cold Lake, Alberta airport location (CYOD, 54.4°N, 110.3°W) is often affected by various low cloud and fog conditions. In order to better understand these conditions, Environment and Climate Change Canada (ECCC), in cooperation with the Canadian Department of National Defense (DND), installed a number of specialized instruments. The ground based instruments include a Vaisala PWD22 present weather sensor, a multi-channel microwave profiling radiometer (MWR) and a Jenoptik CHM15k ceilometer. The focus here will be on understanding the micro-physical and dynamical conditions within the boundary layer, on the surface and aloft that lead to the occurrence of fog using a high resolution 1-D boundary-layer model, ground based measurements, Geostationary Operational Environmental Satellite (GOES) data and predictions from the Canadian 2.5 km resolution NWP model (HRDPS - High Resolution Deterministic Prediction System ). Details of the 1-D model will be presented. The condensation of water vapour into droplets and the formation of fog in the Earth's atmospheric boundary layer can involve a complex balance between vertical turbulent mixing of heat and water vapour, cloud micro-physical processes and radiative transfers of heat. It is a phenomenon which has been studied for many years in a variety of contexts. On land, surface cooling via long wave radiation at night is often the trigger and a number of 1-D (one dimensional, height and time dependent) radiative fog models have been developed. Our turbulence closure includes the turbulent kinetic energy equation but we prefer to specify a height, roughness Rossby number and local stability dependent, "master" length scale instead of somewhat empirical dissipation or similar equations. Results show that low cloud and fog can develop, depending on initial profiles of wind, temperature and mixing ratio, land surface interactions and solar radiation. Preliminary analysis of Cold Lake observational data indicates that the surface-based in situ measurements agree well with aviation weather observation METAR reports and are comparable with model simulations. Both the HRDPS model and microwave radiometry data indicate low level fog and cloud formation but the depths and intensities differ considerably depending on environmental conditions. Causes for this are under investigation with the high resolution 1-D boundary-layer model.

  18. Integrated consensus-based frameworks for unmanned vehicle routing and targeting assignment

    NASA Astrophysics Data System (ADS)

    Barnawi, Waleed T.

    Unmanned aerial vehicles (UAVs) are increasingly deployed in complex and dynamic environments to perform multiple tasks cooperatively with other UAVs that contribute to overarching mission effectiveness. Studies by the Department of Defense (DoD) indicate future operations may include anti-access/area-denial (A2AD) environments which limit human teleoperator decision-making and control. This research addresses the problem of decentralized vehicle re-routing and task reassignments through consensus-based UAV decision-making. An Integrated Consensus-Based Framework (ICF) is formulated as a solution to the combined single task assignment problem and vehicle routing problem. The multiple assignment and vehicle routing problem is solved with the Integrated Consensus-Based Bundle Framework (ICBF). The frameworks are hierarchically decomposed into two levels. The bottom layer utilizes the renowned Dijkstra's Algorithm. The top layer addresses task assignment with two methods. The single assignment approach is called the Caravan Auction Algorithm (CarA) Algorithm. This technique extends the Consensus-Based Auction Algorithm (CBAA) to provide awareness for task completion by agents and adopt abandoned tasks. The multiple assignment approach called the Caravan Auction Bundle Algorithm (CarAB) extends the Consensus-Based Bundle Algorithm (CBBA) by providing awareness for lost resources, prioritizing remaining tasks, and adopting abandoned tasks. Research questions are investigated regarding the novelty and performance of the proposed frameworks. Conclusions regarding the research questions will be provided through hypothesis testing. Monte Carlo simulations will provide evidence to support conclusions regarding the research hypotheses for the proposed frameworks. The approach provided in this research addresses current and future military operations for unmanned aerial vehicles. However, the general framework implied by the proposed research is adaptable to any unmanned vehicle. Civil applications that involve missions where human observability would be limited could benefit from the independent UAV task assignment, such as exploration and fire surveillance are also notable uses for this approach.

  19. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control

    PubMed Central

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six (N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports. PMID:29312070

  20. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    PubMed

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buckner, Mark A; Bobrek, Miljko; Farquhar, Ethan

    Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differentialmore » Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.« less

  2. [Psychometric assessment of defense mechanisms: correlation between questionnaire and expert rating. Initial study of validity].

    PubMed

    Reister, G; Fellhauer, R F; Franz, M; Wirth, T; Schellberg, D; Schepank, H; Tress, W

    1993-01-01

    Within the limits of an epidemiological longitudinal field survey on prevalence and course of psychogenic disorders a high-risk-population suffering from medical psychogenic impairment was investigated. The study was conducted in order to verify an etiological multi-level-model of psychogenic disorders in relation to the socialempiric variables "critical life events" and "social support" as well as the depth psychological oriented construct "personality". Besides other instruments a self rating scale based on Vallant's hierarchical model of defense, i.e. the german adaptation of the DSQ (Defense Style Questionnaire) of Bond and coworkers, was used for the accurate measurement of relevant personality parameters. Although defense processes predominantly work unconscious, manifestations of defense mechanisms could be measured indirectly by means of the rating scale. Its essential dimensions separated clinical patients from a group of healthy controls. Furthermore an immature organisation of defense was found to be related to psychogenic impairment. Concerning self- and expert-rating a significant correlation between "immature defense" and the defense mechanisms "schizoid phantasy", "projection" and "acting out" was proved.

  3. Consequences of interspecific variation in defenses and herbivore host choice for the ecology and evolution of Inga, a speciose rainforest tree.

    PubMed

    Coley, Phyllis D; Endara, María-José; Kursar, Thomas A

    2018-06-01

    We summarize work on a speciose Neotropical tree genus, Inga (Fabaceae), examining how interspecific variation in anti-herbivore defenses may have evolved, how defenses shape host choice by herbivores and how they might regulate community composition and influence species radiations. Defenses of expanding leaves include secondary metabolites, extrafloral nectaries, rapid leaf expansion, trichomes, and synchrony and timing of leaf production. These six classes of defenses are orthogonal, supporting independent evolutionary trajectories. Moreover, only trichomes show a phylogenetic signature, suggesting evolutionary lability in nearly all defenses. The interspecific diversity in secondary metabolite profiles does not arise from the evolution of novel compounds, but from novel combinations of common compounds, presumably due to changes in gene regulation. Herbivore host choice is determined by plant defensive traits, not host phylogeny. Neighboring plants escape each other's pests if their defenses differ enough, thereby enforcing the high local diversity typical of tropical forests. Related herbivores feed on hosts with similar defenses, implying that there are phylogenetic constraints placed on the herbivore traits that are associated with host use. Divergence in defensive traits among Inga appears to be driven by herbivore pressure. However, the lack of congruence between herbivore and host phylogeny suggests that herbivores are tracking defenses, choosing hosts based on traits for which they already have adaptations. There is, therefore, an asymmetry in the host-herbivore evolutionary arms race.

  4. Rethinking Defensive Information Warfare

    DTIC Science & Technology

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  5. Change in children's externalizing and internalizing behavior problems: the role of defense mechanisms.

    PubMed

    Cramer, Phebe

    2015-03-01

    This study investigates the relation of defense mechanism to children's externalizing and internalizing behavior problems, as assessed from mothers' report at age 9 and 12 years, based on archival data. The defense mechanisms of denial, projection, and identification were assessed from Thematic Apperception Test stories told by the children at age 9 years, using the Defense Mechanism Manual (Cramer, The development of defense mechanisms: Theory, research and assessment. New York: Springer-Verlag, 1991a; Protecting the self: Defense mechanisms in action. New York: Guilford Press, 2006). The results showed that the use of identification predicted a decrease in externalizing behaviors between age 9 and 12 years. In contrast, change in internalizing behaviors was not predicted by defense use, but the use of projection was related to fewer internalizing behaviors at both ages. These findings are consistent with the idea that behavioral intervention stressing self-regulation can be effective in reducing externalizing problems, but internalizing problems require an intervention that is sensitive to the underlying behavioral inhibition in these children.

  6. Criminal defense in Chinese courtrooms: an empirical inquiry.

    PubMed

    Liang, Bin; He, Ni Phil

    2014-10-01

    Scholars in the field of Chinese criminal procedure law study have long decried the meager legal protection afforded to criminal defendants on trial and the hapless status of Chinese criminal defense attorneys in the courtroom. Unfortunately, very little empirical evidence was available to shed light on how criminal defense was carried out in Chinese courtrooms. Based on observations of 325 actual criminal trials from 55 District People's Courts in J province, this study provides an opportunity to understand the mundane work performed by Chinese criminal defense attorneys. In particular, this study describes how criminal defense attorneys prepare and present their cases (as measured in terms of bail request, overall trial preparation, examination of defendants and witnesses, presentation of evidence, and overall defense strategy), and analyzes the outcomes of their performance. In addition, this study examines the discernible impact of criminal defense work due to types of legal representation utilized (legal aid vs. privately retained attorneys), numbers of attorneys representing the client, and the gender composition of the attorneys. © The Author(s) 2013.

  7. Immune Receptors and Co-receptors in Antiviral Innate Immunity in Plants.

    PubMed

    Gouveia, Bianca C; Calil, Iara P; Machado, João Paulo B; Santos, Anésia A; Fontes, Elizabeth P B

    2016-01-01

    Plants respond to pathogens using an innate immune system that is broadly divided into PTI (pathogen-associated molecular pattern- or PAMP-triggered immunity) and ETI (effector-triggered immunity). PTI is activated upon perception of PAMPs, conserved motifs derived from pathogens, by surface membrane-anchored pattern recognition receptors (PRRs). To overcome this first line of defense, pathogens release into plant cells effectors that inhibit PTI and activate effector-triggered susceptibility (ETS). Counteracting this virulence strategy, plant cells synthesize intracellular resistance (R) proteins, which specifically recognize pathogen effectors or avirulence (Avr) factors and activate ETI. These coevolving pathogen virulence strategies and plant resistance mechanisms illustrate evolutionary arms race between pathogen and host, which is integrated into the zigzag model of plant innate immunity. Although antiviral immune concepts have been initially excluded from the zigzag model, recent studies have provided several lines of evidence substantiating the notion that plants deploy the innate immune system to fight viruses in a manner similar to that used for non-viral pathogens. First, most R proteins against viruses so far characterized share structural similarity with antibacterial and antifungal R gene products and elicit typical ETI-based immune responses. Second, virus-derived PAMPs may activate PTI-like responses through immune co-receptors of plant PTI. Finally, and even more compelling, a viral Avr factor that triggers ETI in resistant genotypes has recently been shown to act as a suppressor of PTI, integrating plant viruses into the co-evolutionary model of host-pathogen interactions, the zigzag model. In this review, we summarize these important progresses, focusing on the potential significance of antiviral immune receptors and co-receptors in plant antiviral innate immunity. In light of the innate immune system, we also discuss a newly uncovered layer of antiviral defense that is specific to plant DNA viruses and relies on transmembrane receptor-mediated translational suppression for defense.

  8. Department of Defense Base Structure Report for Fiscal Year 1991. Supplement

    DTIC Science & Technology

    1990-08-01

    replacement value is estimated at $600 billion.-- Defense installations and properties range from unmanned navigational aid stations of less than a half...REPORTING REQUIREMENT •>ýThe Base Structure Report is prepared bYAthe Department of De-fense• to ( a ) provide information on military installations, (b...support costs and evaluate possible alternatives to reduce such costs.-•-- A written report on DoD base structure is required to be submitted annually

  9. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    DTIC Science & Technology

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  10. Field Biogeochemical Measurements in Support of Remote Sensing Signatures and Characterization of Permafrost Terrain: Integrated Technologies for Delineating Permafrost and Ground-State Conditions

    DTIC Science & Technology

    2015-03-01

    layer serves as a hotspot of microbial activity and abundance in Arctic tundra soils. Microbial Ecology 65:405–414. Liebner, S., J. Harder, and D...and temporal variability of algal community dynamics and productivity in floodplain wetlands along the Tanana River , Alaska. Freshwater Science 33...sciences, water resources, and environmental sciences for the Army, the Department of Defense, civilian agencies, and our nation’s public good. Find

  11. FY 1990/FY 1991 Biennial Budget Descriptive Summaries for the Strategic Defense Initiative Organization

    DTIC Science & Technology

    1989-01-01

    size, weight , power consumption, and radiation hardness, and on software algorithm validity and efficiency. 3. (U) Collection of radar, ctical, and...which have potential to achieve cooling requirements for LWIR sensors with far smaller weight and power penalties. (U) FY1989 Planned Program: o (U...two dollars for every SDI dollar. o (U) Inverted gaili--n arsenide by growing a razor-thin layer of silicon on GaAs and thus cut power loss by two

  12. Defense Department Profit and Contract Finance Policies and Their Effects on Contract and Contractor Performance

    DTIC Science & Technology

    2009-02-01

    cost of capital ( WACC ). WACC is the cost of debt plus the cost of equity both weighted by the market values debt and equity, respectively. The cost...Beta WACC Technical Risk CPFF/CPAF …. FFP/ MYP - Contract Choice (FAR 16.1) Margin – (p = f(NBV, n, α, risk)) Payments (α) FCOM ( = f(NBV, Treasury...projections, layers on the profit and contract financing policy, estimates the levered WACC as the discount rate, and finally calculates the NPV of the

  13. Moral and morale benefits of the Strategic Defense Initiative. Student report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Poston, J.R.

    1986-04-01

    This writer finds strategic defense a moral advance over the present nuclear deterrence policy as well as a probable boost to national and military morale because of the broad-based popular support attendant to the inherent moral suasion. Popular support is nearly inevitable because of the moral superiority of strategic defense over nuclear retaliation, as well as the sheer compulsion of common sense about a protective defense. Criticism of the SDI abounds, but not without adequate answers from proponents. One of the best morale-building supports for those experiencing mixed moral feelings about nuclear deterrence is that strategic defense avoids or pointsmore » to a way out of the moral problems facing nuclear deterrence and its grim companion--nuclear retaliation.« less

  14. Uncertainties in building a strategic defense.

    PubMed

    Zraket, C A

    1987-03-27

    Building a strategic defense against nuclear ballistic missiles involves complex and uncertain functional, spatial, and temporal relations. Such a defensive system would evolve and grow over decades. It is too complex, dynamic, and interactive to be fully understood initially by design, analysis, and experiments. Uncertainties exist in the formulation of requirements and in the research and design of a defense architecture that can be implemented incrementally and be fully tested to operate reliably. The analysis and measurement of system survivability, performance, and cost-effectiveness are critical to this process. Similar complexities exist for an adversary's system that would suppress or use countermeasures against a missile defense. Problems and opportunities posed by these relations are described, with emphasis on the unique characteristics and vulnerabilities of space-based systems.

  15. Standing Committee on Defense Materials, Manufacturing, and Infrastructure

    DTIC Science & Technology

    2012-02-06

    advanced materials and processes used in GE’s aeronautical turbine engines and their marine and industrial derivatives. He oversees Materials...DOD to play technologically to assist the industry in smoothing out “rough edges” of initial production. For example, if DOD chooses to use Defense...to critical and strategic materials availability has not kept pace. In addition, the ability of US industry and the defense industrial base to

  16. World Support Base: Spain

    DTIC Science & Technology

    1987-09-01

    Comments Recommendations Company Reports Def ex AFARMADE (Spanish Association of Arms and Defense Material Makers) CASA ( Construcciones Aeronauticas...of tine avionics and structurai parts for the aircraft. Also, the construction of a factory to bui Id jet engines and a I icense for the... construction of GE’s F404 engine for the F-18 has further enhanced Spain’s defense Industry. The goal of the Spanish defense industrial program Is to reduce

  17. Department of Defense Federal Hazard Communication Training Program

    DTIC Science & Technology

    1988-04-01

    APPLICATION EXERCISE 3A-2 Continued Marilyn works as a supervisor in a plant that uses ammonium nitrate to make gun powder and blasting agents. 3) What...Dimethyl Freehold Products East Base Shop Polysiloxane Maintenance Shop Light Hydraulic Oil Texas Oil Co. Plant Maintenance C-2 Product Name Manufacturer Use ...Defense Federal Hazard Communication Training Program, Student Workbook," when used with "Department of Defense Federal Hazard Communication Training

  18. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    ERIC Educational Resources Information Center

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  19. Daylight Redirecting Window Films

    DTIC Science & Technology

    2013-09-01

    58) • Energy Independence and Security Act of 2007 (P.L. 110-140) • National Defense Authorization Act for FY 2007 (P.L. 109-364) • National Defense...Authorization Act for FY 2008 (P.L. 110-181) • National Defense Authorization Act for FY 2009 (P.L. 10-417) • Executive Order 13423 • Executive...green-house gas equivalents based on national averages Green-house- gas-equivalent conversion factor for national level usage. Embedded

  20. Make or Buy: A Systematic Approach to Department of Defense Sourcing Decisions

    DTIC Science & Technology

    2013-07-30

    Defense-Industrial Initiatives Group at CSIS, where he worked on projects related to U.S. and European technology and industrial bases supporting defense...Prior to joining CSIS, Mr. Ben-Ari was a research associate at George Washington University’s Center for International Science and Technology ...collaborative research and development programs for Gilat Satellite Networks Ltd., an Israeli high- technology company in the field of satellite

  1. Are the Performance Based Logistics Prophets Using Science or Alchemy to Create Life-Cycle Affordability? Using Theory to Predict the Efficacy of Performance Based Logistics

    DTIC Science & Technology

    2013-10-01

    Based Logistics Prophets Using Science or Alchemy to Create Life-Cycle Affordability? Using Theory to Predict the Efficacy of Performance Based...Using Science or Alchemy to Create Life-Cycle Affordability? Using Theory to Predict the Efficacy of Performance Based Logistics 5a. CONTRACT NUMBER 5b...Are the PBL Prophets Using Science or Alchemy to Create Life Cycle Affordability? 328Defense ARJ, October 2013, Vol. 20 No. 3 : 325–348 Defense

  2. IT-Adventures: A Program to Spark IT Interest in High School Students Using Inquiry-Based Learning with Cyber Defense, Game Design, and Robotics

    ERIC Educational Resources Information Center

    Rursch, Julie A.; Luse, Andy; Jacobson, Doug

    2010-01-01

    The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…

  3. Defense Security Service (DSS)

    Science.gov Websites

    employees. May 10, 2018 Correction to DMDC DQI 945 Notice On May 1, 2018, the Defense Manpower Data Center actions initiated based on the DQI notice. However, actions are still required on items 1-5 (see below

  4. 48 CFR 232.1004 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Section 232.1004 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 232.1004..., completion criteria and event values along with the projected expenditure profile in order to negotiate the...

  5. Evolution of Hormone Signaling Networks in Plant Defense.

    PubMed

    Berens, Matthias L; Berry, Hannah M; Mine, Akira; Argueso, Cristiana T; Tsuda, Kenichi

    2017-08-04

    Studies with model plants such as Arabidopsis thaliana have revealed that phytohormones are central regulators of plant defense. The intricate network of phytohormone signaling pathways enables plants to activate appropriate and effective defense responses against pathogens as well as to balance defense and growth. The timing of the evolution of most phytohormone signaling pathways seems to coincide with the colonization of land, a likely requirement for plant adaptations to the more variable terrestrial environments, which included the presence of pathogens. In this review, we explore the evolution of defense hormone signaling networks by combining the model plant-based knowledge about molecular components mediating phytohormone signaling and cross talk with available genome information of other plant species. We highlight conserved hubs in hormone cross talk and discuss evolutionary advantages of defense hormone cross talk. Finally, we examine possibilities of engineering hormone cross talk for improvement of plant fitness and crop production.

  6. Next Generation Nuclear Plant Defense-in-Depth Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This papermore » includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.« less

  7. Interruption of magnesium supply at heading influenced proteome of peripheral layers and reduced grain dry weight of two wheat (Triticum aestivum L.) genotypes.

    PubMed

    Qiu, Huiling; Nadaud, Isabelle; Ledoigt, Gérard; Piquet-Pissaloux, Agnès; Branlard, Gérard

    2016-06-30

    Magnesium (Mg), an indispensable mineral for plant growth, is concentrated in the peripheral layers (PLs) of the mature grain of wheat. The supply of Mg was interrupted from plant heading to maturity and a proteomic approach was used to investigate the PLs at three stages of development. Two genotypes with contrasting concentrations of Mg in the grain were studied: Apache (low Mg) and MgHL (high Mg). The concentration of Mg was significantly reduced in the roots (10-21%), straw (18-50%) and grain (24-10%), respectively. Mg deficiency altered enzymes involved in photosynthesis, glycolysis, respiration, amino acid synthesis, cell division, protein degradation and folding at early stages, especially in MgHL. This latter had smaller grain by reducing grain potential size and dry matter accumulation. By contrast in Apache, few proteins were affected at early stages and proteins related to stress/defense and arginine/proline metabolism were up accumulated resulting in lower number of grains per ear (24.9%). This study showed that Mg in PLs plays an important role in cell division, ATP generation, carbohydrate and amino acid metabolism, and hence may influence grain potential size and assimilates in grain, which determines grain weight. These results should help wheat breeders improve Mg content and hence grain yield. Magnesium (Mg) is an abundant cation and is involved in many cell activities. Its role in determining wheat productivity remains unclear. This study is the first to investigate how Mg deficiency influences the physiological characters of wheat and dry matter in the grain in two genotypes with contrasting Mg content. Moreover, Mg is concentrated in peripheral layers of grain, which are known to play a critical role in grain development. In this study, we investigated proteins in the peripheral layers expressed differentially in three development stages to identify the mechanism by which Mg influences grain development. This study revealed that the supply of Mg influences grain yield and that Mg regulates proteins related to cell metabolism and stress defense in grain. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    PubMed

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  9. Transcriptional effect of an Aframomum angustifolium seed extract on human cutaneous cells using low-density DNA chips.

    PubMed

    Bonnet-Duquennoy, Mathilde; Dumas, Marc; Debacker, Adeline; Lazou, Kristell; Talbourdet, Sylvie; Franchi, Jocelyne; Heusèle, Catherine; André, Patrice; Schnebert, Sylvianne; Bonté, Frédéric; Kurfürst, Robin

    2007-06-01

    Studying photoexposed and photoprotected skin biopsies from young and aged women, it has been found that a specific zone, composed of the basal layers of the epidermis, the dermal epidermal junction, and the superficial dermis, is major target of aging and reactive oxygen species. We showed that this zone is characterized by significant variations at a transcriptional and/or protein levels. Using low-density DNA chip technology, we evaluated the effect of a natural mixture of Aframomum angustifolium seed extract containing labdane diterpenoids on these aging markers. Expression profiles of normal human fibroblasts (NHF) were studied using a customized cDNA macroarray system containing genes covering dermal structure, inflammatory responses, and oxidative stress defense mechanisms. For normal human keratinocyte (NHK) investigations, we chose OLISA technique, a sensitive and quantitative method developed by BioMérieux specifically designed to investigate cell death, proliferation, epidermal structure, differentiation, and oxidative stress defense response. We observed that this extract strongly modified gene expression profiles of treated NHK, but weakly for NHF. This extract regulated antioxidant defenses, dermal-epidermal junction components, and epidermal renewal-related genes. Using low-density DNA chip technology, we identified new potential actions of A. angustifolium seed extract on skin aging.

  10. Nuclear accumulation of the Arabidopsis immune receptor RPS4 is necessary for triggering EDS1-dependent defense.

    PubMed

    Wirthmueller, Lennart; Zhang, Yan; Jones, Jonathan D G; Parker, Jane E

    2007-12-04

    Recognition of specific pathogen molecules inside the cell by nucleotide-binding domain and leucine-rich repeat (NB-LRR) receptors constitutes an important layer of innate immunity in plants. Receptor activation triggers host cellular reprogramming involving transcriptional potentiation of basal defenses and localized programmed cell death. The sites and modes of action of NB-LRR receptors are, however, poorly understood. Arabidopsis Toll/Interleukin-1 (TIR) type NB-LRR receptor RPS4 recognizes the bacterial type III effector AvrRps4. We show that epitope-tagged RPS4 expressed under its native regulatory sequences distributes between endomembranes and nuclei in healthy and AvrRps4-triggered tissues. RPS4 accumulation in the nucleus, mediated by a bipartite nuclear localization sequence (NLS) at its C terminus, is necessary for triggering immunity through authentic activation by AvrRps4 in Arabidopsis or as an effector-independent "deregulated" receptor in tobacco. A strikingly conserved feature of TIR-NB-LRR receptors is their recruitment of the nucleocytoplasmic basal-defense regulator EDS1 in resistance to diverse pathogens. We find that EDS1 is an indispensable component of RPS4 signaling and that it functions downstream of RPS4 activation but upstream of RPS4-mediated transcriptional reprogramming in the nucleus.

  11. Isolation, identification, and quantification of potential defensive compounds in the viceroy butterfly and its larval host-plant, Carolina willow.

    PubMed

    Prudic, Kathleen L; Khera, Smriti; Sólyom, Anikó; Timmermann, Barbara N

    2007-06-01

    The viceroy-monarch and viceroy-queen butterfly associations are classic examples of mimicry. These relationships were originally classified as Batesian, or parasitic, but were later reclassified as Müllerian, or mutalistic, based on predator bioassays. The Müllerian reclassification implies that viceroy is unpalatable because it too is chemically defended like the queen and the monarch. However, unlike the queen and the monarch, the viceroy defensive chemistry has remained uncharacterized. We demonstrate that the viceroy butterfly (Limenitis archippus, Nymphalidae) not only sequesters nonvolatile defensive compounds from its larval host-plant, the Carolina willow (Salix caroliniana, Salicaceae), but also secretes volatile defensive compounds when disturbed. We developed liquid chromatography-mass spectrometry-mass spectrometry methods to identify a set of phenolic glycosides shared between the adult viceroy butterfly and the Carolina willow, and solid phase microextraction and gas chromatography-mass spectrometry methods to identify volatile phenolic compounds released from stressed viceroy butterflies. In both approaches, all structures were characterized based on their mass spectral fragmentation patterns and confirmed with authentic standards. The phenolics we found are known to deter predator attack in other prey systems, including other willow-feeding insect species. Because these compounds have a generalized defensive function at the concentrations we described, our results are consistent with the Müllerian reclassification put forth by other researchers based on bioassay results. It seems that the viceroy butterfly possesses chemical defenses different from its monarch and queen butterfly counterparts (phenolic glycosides vs. cardiac glycosides, respectively), an unusual phenomenon in mimicry warranting future study.

  12. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    PubMed Central

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  13. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    PubMed

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  14. U.S. Army Medical Research Institute of Infectious Diseases

    MedlinePlus

    ... Health Organization. As a reference laboratory for the Department of Defense, we set the standard for identification of biological agents. Our customers in the Army and the Department of Defense know us as a "tech base" organization that ...

  15. 44 CFR 321.1 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME... United States in a defense posture which will enable the nation to defend itself against aggression in...

  16. 44 CFR 321.1 - General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME... United States in a defense posture which will enable the nation to defend itself against aggression in...

  17. 44 CFR 321.1 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME... United States in a defense posture which will enable the nation to defend itself against aggression in...

  18. 44 CFR 321.1 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME... United States in a defense posture which will enable the nation to defend itself against aggression in...

  19. 48 CFR 242.7502 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 242.7502 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT CONTRACT ADMINISTRATION AND AUDIT SERVICES Contractor Accounting Systems and...-materials, or labor-hour contracts, or contracts which provide for progress payments based on costs or on a...

  20. 48 CFR 242.7502 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 242.7502 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT CONTRACT ADMINISTRATION AND AUDIT SERVICES Contractor Accounting Systems and...-materials, or labor-hour contracts, or contracts which provide for progress payments based on costs or on a...

  1. 48 CFR 242.7502 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 242.7502 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT CONTRACT ADMINISTRATION AND AUDIT SERVICES Contractor Accounting Systems and...-materials, or labor-hour contracts, or contracts which provide for progress payments based on costs or on a...

  2. 48 CFR 242.7502 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 242.7502 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT CONTRACT ADMINISTRATION AND AUDIT SERVICES Contractor Accounting Systems and...-materials, or labor-hour contracts, or contracts which provide for progress payments based on costs or on a...

  3. Breaking the Yardstick: The Dangers of Market-based Governance (Defense Horizons, Number 67, May 2009)

    DTIC Science & Technology

    2009-05-01

    the implementation of free market forces, more efficient and effective use of resources can be obtained,” which the Defense Science Board asserted...actually slower, less effective, and costlier. This is, in part, because the Breaking the Yardstick: The Dangers of Market -based Governance by Don...2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Breaking the Yardstick: The Dangers of Market -based Governance

  4. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  5. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    DTIC Science & Technology

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  6. U.S. Special Operations Forces (SOF): Background and Issues for Congress

    DTIC Science & Technology

    2017-01-06

    Defense. The Assistant Secretary of Defense for Special Operations and Low Intensity Conflict ( ASD /SOLIC), a member of the Office of the Secretary of...Defense for Policy (OSD-P), provides civilian oversight over USSOCOM activities. The current ASD /SOLIC is Mr. Michael Lumpkin, a former Navy SEAL...supports U.S. European Command; CCSA is the Army;  Special Operations Command Central (SOCCENT), MacDill Air Force Base, FL; supports U.S

  7. DOD Rapid Innovation Program: Some Technologies Have Transitioned to Military Users, but Steps Can Be Taken to Improve Program Metrics and Outcomes

    DTIC Science & Technology

    2015-05-01

    Abbreviations ASD /R&E Assistant Secretary of Defense for Research and Engineering BAA Broad Agency Announcement DOD Department of Defense...solicitation of proposals; • merit-based selection of the most promising cost-effective proposals for funding through contracts, cooperative ...representatives appointed by the military service acquisition executives, Assistant Secretary of Defense for Research and Engineering ( ASD /R&E), and

  8. California’s Shrinking Defense Contractors: Effects on Small Suppliers,

    DTIC Science & Technology

    1996-01-01

    They did not physically segregate any parts of their operations or set up a separate data management system to do business with prime contractors...of them out of business . * Small defense aerospace suppliers are not making cutting-edge products for commercial customers. Small defense aerospace...are considered critical to their primes’ supplier base are concerned. Most Firms Are Still in Business When we checked with a random sample of small

  9. Air Attack on America?: Vulnerabilities, Capabilities, and Implications of the Air Defense of the United States

    DTIC Science & Technology

    2013-06-01

    E. Forewarned is Forearmed: A History of the Royal Observer Corps. London, England: William Hodge & Company, Limited, 1948. Yanarella, Ernest J. The...Institute of Technology, Wright- Patterson AFB, Ohio with a Master’s of Science in Operations Analysis. In July 2012, Major Diehl entered the School of...minds of the planners, were for defense of bases 9 William “Billy” Mitchell, Winged Defense (Tuscaloosa, AL

  10. The Utilization of Requirement Statement Methodologies in the United States Navy and Their Impact on Systems Acquisition.

    DTIC Science & Technology

    1980-03-01

    RESEARCH LABORATORY (N R L )-------52 C. NATAL AIR DEVELOPMENT CENTER (NADC) -------------. 52 D. FLEET COMBAT DIRECTION SYSTEMS SUPPORT CENTER...DEPARTMENT OF DEFENSE DIRECTIVES 5000.1 A3D 500.2-...................... 61 1. Technology Base-------- -aaaaaaaaaaa1 2. Competitive ip loration of...Alternative Solutions -- - - 62 C. DEPARTMENT OF DEFENSE DIRECTIVE 5000.29------ 64 6 D. DEPARTMENT OF DEFENSE INSTRUCTION 501 .21 65 I. MILITARY STANDARD 1679

  11. The Evaluation of Appropriateness of OMB Circular A-76 Studies on Revenue-Generating Functions in Defense Working Capital Fund Activities

    DTIC Science & Technology

    2002-12-01

    E. ACTIVITY BASED COSTING (ABC) IN THE WORKING CAPITAL FUND ......................................29 F. UNIQUENESS OF DOD IN THE FREE MARKET ...FREE MARKET SYSTEM ECONOMICS AND WORKING CAPITAL FUNDS .....................................35 B. A-76 AND DEFENSE WORKING CAPITAL FUND DIRECT...Capital Fund applies free market economics and how the foundational theories of the Defense Working Capital Fund and the A-76 study parallel each

  12. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less

  13. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less

  14. InGaAs/GaAsSb Type-II superlattice based photodiodes for short wave infrared detection

    NASA Astrophysics Data System (ADS)

    Uliel, Y.; Cohen-Elias, D.; Sicron, N.; Grimberg, I.; Snapi, N.; Paltiel, Y.; Katz, M.

    2017-08-01

    Short Wave Infra-Red (SWIR) photodetectors operating above the response cutoff of InGaAs- based detectors (1.7-2.5 μm) are required for both defense and civil applications. Type II Super-Lattices (T2SL) were recently proposed For near- room temperature SWIR detection as a possible system enabling bandgap adjustment in the required range. The work presented here focuses on a T2SL with alternating nano-layers of InGaAs and GaAsSb lattice-matched to an InP substrate. A near room temperature SWIR cutoff of 2.4 μm was measured. Electrical junctions were realized using Zn diffusion p-doping process. We realized and studied both mesa- and selective diffusion- based p-i-n photodiodes. Dark currents of mesa-based devices were 1.5 mA/cm2 and 32 μA/cm2 at 300 and 230 K respectively. Dark currents were reduced to 1.2 mA/cm2 and 12 μA/cm2 respectively by utilizing the selective diffusion process. The effect of operating voltage is discussed. At 300 K the quantum efficiency was up to 40% at 2.18 μm in mesa devices. D∗ was 1.7 ×1010cm ·√{Hz } /W at 2 μm.

  15. Long-Life Self-Renewing Solar Reflector Stack

    DOEpatents

    Butler, Barry Lynn

    1997-07-08

    A long-life solar reflector includes a solar collector substrate and a base layer bonded to a solar collector substrate. The first layer includes a first reflective layer and a first acrylic or transparent polymer layer covering the first reflective layer to prevent exposure of the first reflective layer. The reflector also includes at least one upper layer removably bonded to the first acrylic or transparent polymer layer of the base layer. The upper layer includes a second reflective layer and a second acrylic or transparent polymer layer covering the second reflective layer to prevent exposure of the second reflective layer. The upper layer may be removed from the base reflective layer to expose the base layer, thereby lengthening the useful life of the solar reflector. A method of manufacturing a solar reflector includes the steps of bonding a base layer to a solar collector substrate, wherein the base reflective layer includes a first reflective layer and a first transparent polymer or acrylic layer covering the first reflective layer; and removably bonding a first upper layer to the first transparent polymer or acrylic layer of the base layer. The first upper layer includes a second reflective layer and a second transparent polymer or acrylic layer covering the second reflective layer to prevent exposure of the second reflective layer.

  16. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Training Center Great Lakes, Illinois

    DTIC Science & Technology

    1994-05-19

    the audit of project P-608T, Building Modifications, as they relate to project P-557S. Because...project P-608T was addressed in Report No. 94-108, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California, May 19,

  17. Defense Base Closure and Realignment Commission

    DTIC Science & Technology

    1993-01-01

    during, their training . DLI required Only 803 houising units oii thle Army students inl thle human intelligence field Annex, the post cýxchiaige arid...community also stressed the Navy did not proposes significantly reduccd closure costs by know the true cost of relocating or replicating taking...Warfare Center- Carderock, Annapolis Detachment, The Annapolis community stressed in 1991 theDefense Base Closure and Realignment Coin- Annapolis

  18. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    other product areas. Where unmet requirements are identified and where S&T is required to meet cost objectives, the CBRN defense homeland security... industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military operations and homeland defense initiatives...as well as shelf-life expirations for stockpiles built in the 1980s, have contributed to demand for industrial base services and products

  19. The Transatlantic Defense Industrial Base: Restructuring Scenarios and Their Implications

    DTIC Science & Technology

    2005-04-01

    construction of a transatlantic defense sector are tangible, but significant obstacles may accelerate the formation of a bipolar industrial base. While market...electronics powerhouse. Four months later, this combined entity merged with Dasa to form European Aeronautic Defence and Space Company (EADS). Construcciones ...producers, and aircraft engine makers, there is little left to consolidate within Europe. Directions des Constructions Navales (DCN), the French shipmaker

  20. [Relationships between defense mechanisms and coping strategies, facing exam anxiety performance].

    PubMed

    Grebot, E; Paty, B; Girarddephanix, N

    2006-01-01

    Defence mechanisms and coping strategies rely on different theoretical backgrounds and describe distinct psychological processes. Cramer has based a distinction on the following dimensions: conscious processes vs. not; intentionality vs. not; hierarchical conception vs. not. On the contrary to these distinctions, the two notions of defense mechanisms and coping strategies are defined as similar in the Diagnostical and Statistical Manual (DSM IV). This assimilation between coping and defenses in the DSM IV is not confirmed by some researches, namely the one by Callahan and Chabrol. It indeed proves a relationship between adaptive coping and mature defenses, as well as between maladaptive coping and immature defenses. Similarly, Plutchik offered theoretical correspondences between eight defense mechanisms and eight coping strategies: (a) Defenses: repression, isolation, introjection and Coping escape; (b) Defense denial and Coping minimalization; (c) Defense undoing and coping substitution; (d) Defenses: regression, acting out and coping social support; (e) Defenses: compensation, identification, fantasy and coping replacement; (f) Defenses: intellectualization, sublimation, annulation, rationalisation and coping: planification; (g) Defense projection and coping blame; (h) Defense: reactional formation and coping inversion. this research aims at testing the relations observed by Callahan and Chabrol and some theoretical correspondences proposed by Plutchik between defences and coping strategies in a population of students similar to the one used by Callahan and Chabrol. It also aims at studying the relationships between coping strategies and conscious derives of defense mechanisms, such as defined by Bond (1995). Defenses were evaluated the first day of the examination week. the population includes 184 women students in human sciences (sociology and psychology). defenses were evaluated with the Defense Style Questionnaire by Bond (DSQ 40). Its French version is made of 40 items and validated by Guelfi et al. It explores 20 defense mechanisms, as well as 3 defense styles: (1) a "mature style", composed by 4 defenses: sublimation, humor, anticipation, repression; (2) a "neurotic style", composed by 4 defenses: annulation, reactional formation, altruism and idealization; (3) an "immature style", composed by 12 defenses. Coping strategies were measured by the French version of the Way of Coping Check-List-Revised, (WCC-R) by Lazarus and Folkman, validated by Graziani et al. It evaluates 10 factors: 1) Problem solving; 2) Evasion; 3) Social support; 4) Self-control; 5) Escape; 6) Responsabilization-Replanification; 7) Resignation; 8)Diplomacy; 9) Confrontation; 10) Personal evolution. Our results confirm partially Callahan and Chabrol's conclusions in favour of existing relationships between adaptive coping strategies and mature defenses, as well as between maladaptive coping strategies and immature defenses. They demonstrate three positive relationships: 1) a relation between Problem solving resolution coping and two mature defenses (Sublimation, Anticipation); 2) a relation between Evasion coping and nevrotic and immature defenses; 3) a relation between Escaping coping and immature defenses. The correspondences between defense mechanisms and coping strategies, such as proposed by Plutchik psycho-evolutionist emotional model are partly validated. Some links were indeed validated in this research, between: a) Defense Undoing and Escaping or Evasion coping; b) Defense Fantasy and Responzabilization coping, c) Defense Sublimation and Problem solving resolution coping; d) Defense Sublimation and Responsabilization coping or Problem solving resolution coping; e) Défense Annulation and Responzabilisation coping.

Top