Academic literature on the topic 'Necessary defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Necessary defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Necessary defence"

1

Gearty, Conor. "Necessity: A Necessary Defence in Criminal Law?" Cambridge Law Journal 48, no. 3 (November 1989): 357–59. http://dx.doi.org/10.1017/s0008197300109572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mamedov, Dadash. "Exceeding the limits of necessary defense and the right to arm." nauka.me, no. 1 (2021): 86. http://dx.doi.org/10.18254/s241328880015897-0.

Full text
Abstract:
This article deals with the problem of law enforcement related to the appraisal concepts used in the Institute of Necessary Defence. In particular, it is proposed to formalize the legal limits of protection for a defender which under no circumstances would be qualified as exceeding the limits of the necessary defence. The article also considers the advantages of the free carrying of firearms by citizens as one of the condition of crime deterrence protecting against socially dangerous assaults.
APA, Harvard, Vancouver, ISO, and other styles
3

Liston‐Heyes, Catherine. "Bailouts and defence contracting: A necessary evil?" Defence and Peace Economics 6, no. 4 (December 1995): 289–94. http://dx.doi.org/10.1080/10430719508404832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grudecki, Michał, and Magdalena Kleszcz. "DEPRIVATION OF LIFE OF AN ASSAILANT IN THE NECESSARY DEFENSE AND A CATALOG OF PROTECTED LEGAL INTERESTS." Roczniki Administracji i Prawa 3, no. XX (September 30, 2020): 135–52. http://dx.doi.org/10.5604/01.3001.0014.4235.

Full text
Abstract:
The article is devoted to the issue of killing an attacker in self-defense. The considerations are based on the interpretation of Article 25 § 2 of the Penal Code, from which it follows that the method of defense must be commensurate with the danger of attack. The authors are looking for a catalog of legal interests that can be defended by harming the attacker’s life. They also analyze Article 2 (2a) European Convention of Human Rights, according to which deprivation of life shall not be regarded as inflicted in contravention of this Article when it results from the use of force which is no more than absolutely necessary in defence of any person from unlawful violence. The authors draw attention to the role of this provision in the interpretation of the signs of necessary defense, especially the sign of proportionality of the means of defense to the danger of assassination. In the article, they also defined the concept of a countertype (justification) and briefly characterized the remaining features of necessary defense
APA, Harvard, Vancouver, ISO, and other styles
5

Horder, Jeremy. "Self-Defence, Necessity and Duress: Understanding the Relationship." Canadian Journal of Law & Jurisprudence 11, no. 1 (January 1998): 143–65. http://dx.doi.org/10.1017/s0841820900001727.

Full text
Abstract:
The distinctions that may be drawn between self-defence, necessity and duress are interesting as a matter of theory, but may also be important in practice. In some jurisdictions, for example, duress and necessity are no defence to murder whereas self-defence is a defence available in principle to all crimes. In such jurisdictions, in homicide cases, the point at which one reaches the boundaries of self-defence and enters upon the terrain of necessity may thus be of crucial significance. Drawing on Suzanne Uniacke’s theory of self-defence, I would like to suggest that each defence can be distinguished by a different key issue. In necessity cases, the key issue is the moral imperative to act: what matters is whether in the circumstances it was morally imperative to act, even if this might involve the commission of wrongdoing, in order to negate or avoid some other evil. In duress cases, the key issue is the personal sacrifice D is being asked to make: should D be expected to make the personal sacrifice involved in refusing to give in to a coercive threat, rather than avoid implementation of the coercive threat by doing wrong? In self-defence cases, the key issue is D’s legal permission to act: where V unjustly represented a threat to D (normally, although not exclusively, through his—V’s—conduct), the question is whether necessary and proportionate steps were taken by D to negate or avoid the threat. For, D has a legal permission to take necessary and proportionate steps to negate or avoid an unjust threat, even if (exceptionally) these involve the use of lethal force. So baldly stated, the differences between the defences may seem obvious. Few common law jurisdictions, and few commentators, however, have appreciated the full significance of the differences, as we shall shortly see.
APA, Harvard, Vancouver, ISO, and other styles
6

Arenson, Kenneth J. "The Paradox of Disallowing Duress as a Defence to Murder." Journal of Criminal Law 78, no. 1 (February 2014): 65–79. http://dx.doi.org/10.1350/jcla.2014.78.1.892.

Full text
Abstract:
The common law has long recognised that what would otherwise constitute murder should be reduced to the lesser offence of voluntary manslaughter in instances where the accused was induced to kill because of provocative conduct on the part of the deceased that does not amount to lawful excuse or justification such as self-defence or defence of others. In what is often termed as a reasonable concession to human frailty, the law has opted to treat those who kill under such circumstances as less morally blameworthy than those who kill in the absence of such provocation or other mitigating circumstances such as a genuinely held, albeit objectively unreasonable belief, that the use of deadly force was necessary in self-defence or the defence of another person. In sharp contrast, the common law has steadfastly declined to allow the defence of duress to be interposed in like manner as a partial defence to the crime of murder. The discussion to follow will examine whether this disparate treatment is justifiable in light of the stated underpinnings of these defences. The discussion will conclude by exploring various proposals for reform and the extent to which they are likely to result in sanctions that are commensurate with the relative degrees of moral culpability of those who seek to interpose these defences as complete or partial defences to the crime of murder.
APA, Harvard, Vancouver, ISO, and other styles
7

Dimitrova, Sevdalina, and Venelin Terziev. "Financial Provisioning - Basis Of Strategic Decisions Of Themanagement Of Resources For Security And Defence." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 2 (June 1, 2015): 294–99. http://dx.doi.org/10.1515/kbo-2015-0050.

Full text
Abstract:
Abstract The strategic decisions defining the defence capabilities that are necessary for our country in response to the dynamic changes in the security environment are directly related to the question “How much?” concerning the price that taxpayers should pay for the creation and development of those capabilities. Since security and defense constitute a public good whose creation is entirely dependent on the economic potential, on the GDP of the country, the manifestation of the price of that good is the budget of the Defence Ministry. This calls for the implementation of a system and tools, appropriate for budget resource management in order to ensure the increase of the added value of defence capabilities.
APA, Harvard, Vancouver, ISO, and other styles
8

SARGSYAN, AREN, and TIGRAN KOCHARYAN. "STRATEGIC DEFENCE REVIEW IN THE CONTEXT OF DEFENCE REFORMS." Main Issues Of Pedagogy And Psychology 10, no. 1 (April 4, 2016): 142–49. http://dx.doi.org/10.24234/miopap.v10i1.195.

Full text
Abstract:
The South Caucasus region is characterized by the presence of frozen conflicts, the activation of impending threats. For security and stability problematic is the important factor that the countries in the region have adopted a diametrically different security and defense strategies, policy of joining the centers of power and allies. Continuing development of defense capabilities is a logical choice for Armenia, which follows from the aims of the state and public security, and the maintenance and, if necessary, even the world compulsion. To achieve these objectives in the Republic of Armenia is carried out the process, which called the Strategic Defense Review.
APA, Harvard, Vancouver, ISO, and other styles
9

MORRISTON, WES. "Are omnipotence and necessary moral perfection compatible? Reply to Mawson." Religious Studies 39, no. 4 (October 16, 2003): 441–49. http://dx.doi.org/10.1017/s003441250300670x.

Full text
Abstract:
In response to an earlier paper of mine, T. J. Mawson has argued that omnipotence is logically incompatible with wrong-doing, ‘whilst accepting that there is “a genuine, active power knowingly to choose evil” and thus leaving room for a free-will defence to the problem of evil’. Here, I attempt to show that Mawson is mistaken on both counts – that his argument for the incompatibility of omnipotence and wrong-doing is defective, and that the free-will defence cannot be sustained on the ground marked out by him. Given Mawson's understanding of power and freedom, I argue that it would be possible for God to create persons who are both free and unable to make evil choices.
APA, Harvard, Vancouver, ISO, and other styles
10

ROBINSON, MICHAEL D. "Divine guidance and an accidentally necessary future: a response to Hunt." Religious Studies 40, no. 4 (October 26, 2004): 493–98. http://dx.doi.org/10.1017/s0034412504007358.

Full text
Abstract:
In his reply to my original essay, David Hunt maintains that I do not discuss how his defence of providentially useful simple foreknowledge violates the Metaphysical Principle. Further, he claims that I try to force him into both affirming and denying the accidental necessity of future events and their role in explaining divine advice-giving. In this response, I attempt to articulate more fully why Hunt's defence of simple foreknowledge implies that dependency loops could unfold. Further, I argue that Hunt's scenario is not tenable, whether one affirms that future events are accidentally necessary or contingent.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Necessary defence"

1

Ismailov, Otabek. "The Necessity Defense in International Investment Law." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/35860.

Full text
Abstract:
More than fifty investor-state arbitration claims have been filed by foreign investors against the Republic of Argentina due to the country's adoption of measures to mitigate the consequences of a severe financial crisis that struck the country in the early 2000s. Argentina invoked the Non-Precluded Measures (NPM) clause in the U.S.-Argentina Bilateral Investment Treaty (BIT) and the necessity defence in customary international law as its defense in these arbitrations. As a result of taking divergent approaches to interpreting the NPM clause in the U.S.-Argentina BIT, the tribunals reached inconsistent decisions on Argentina’s liability for damages incurred by foreign investors, which intensified the legitimacy crisis in the investment arbitration regime. Consequently, the tribunals’ approaches to interpreting the nexus requirement of the treaty NPM clause (the "necessary for" term) caused a fierce academic debate among scholars. This thesis studies the issues related to the inconsistent interpretation of treaty NPM clauses and the customary necessity defense in the investment arbitration regime. It presents a detailed examination of the necessity defense in customary international law and treaty NPM clauses through the lens of regime theory. By applying relevant concepts of regime theory, such as regime formation, regime attributes, regime consequences and regime dynamics, this work explores the origins and evolution of the necessity doctrine, and provides a comparative analysis of the attributes, structural elements and the consequences of invoking the customary necessity defense and treaty NPM clauses. This thesis analyses the interpretative issues in the Argentine cases, and based on the dynamics of developments in the practice of states, it arrives at concrete proposals that will contribute to the coherent practice of investment arbitration tribunals in interpreting treaty NPM clauses. By applying the concept of interaction of regimes, this thesis provides a comparative analysis of tests suggested by scholars for interpreting Article XI of the U.S.-Argentina BIT. It examines whether the interpretative testsmargin of appreciation, proportionality and less restrictive meansused by dispute settlement bodies in other specialized treaty regimes have the potential to serve as an optimal standard for interpreting Article XI. This work explains the contents of these tests and inquires as to the advantages and criticisms related to their application in the investment arbitration regime. This thesis further advances the argument that the interpretation of treaty NPM clauses (Article XI of the U.S.-Argentina BIT) should be performed with strict adherence to the general rules of interpretation as established under Article 31 of the Vienna Convention on the Law of Treaties (VCLT). Specifically, it argues that in cases when tribunals fail to define the meaning of a treaty provision under Article 31 (1) and (2) of VCLT, they should not look for guidance from other specialized treaty regimes, but rather, must have recourse to general international law, specifically, customary rules of international law. As a methodology for performing this interpretation, this thesis proposes to apply a systemic integration approach through operationalizing Article 31(3)(c) of VCLT. Furthermore, this thesis advances the argument that the interpretation of the only means requirement of the customary necessity defense (Article 25 of Articles on the Responsibility of States) does not accurately reflect the contemporary customary rules on necessity. Thus, by applying the concept of regime dynamics, it proposes to reconceptualise the interpretation of the only means requirement through incorporating the elements of a more progressive version, which is found in the international trade regime. Unlike the scholars who rejected the application of the customary necessity elements, and proposed the direct importation of the LRM test from the international trade regime to interpret Article XI, this thesis proposes a different approach to taking advantage of the WTO jurisprudence. Specifically, it argues that WTO jurisprudence can be incorporated into the investment regime indirectly by serving as a source from which we can identify the development of state practice in examining the "only means" nature of state measures adopted in emergency (necessity) circumstances. It is contended that such state practice represents a more progressive and practical approach to interpreting the only means requirement of customary necessity defense, and thus, should be incorporated into the interpretation practice of investment arbitral tribunals.
APA, Harvard, Vancouver, ISO, and other styles
2

Bin, Idris Mohammad Hussin Ali. "Necessity within the legal framework of self-defence against terrorism." Thesis, University of Leeds, 2015. http://etheses.whiterose.ac.uk/13390/.

Full text
Abstract:
This thesis focuses on the criteria established for the use of force in self-defence in international law. The prohibition on the use of force in Article 2(4) of the United Nations Charter is subject to exemption by way of approval from the Security Council, or by invoking the right to self-defence. The use of force in self-defence is promulgated in Article 51 of the United Nations Charter, but is understood to be restricted by the principles of necessity and proportionality. Since the attacks in the United Stated on 11th September 2001, the law on self-defence has focused on the emergence of non-state actors within the framework of jus ad bellum. In view of this, and the contemporary context, this thesis seeks to reappraise the meaning of necessity in light of terrorism. In particular, the study asks whether the meaning of necessity is affected if self-defence is applied against a non-state actor, and if so, how. It also explores the establishment of the two conditions of self-defence, necessity and proportionality, based on the Caroline incident, and examines how the Caroline doctrine has been interpreted in the formulation of rules incorporated in jus ad bellum. The understanding of necessity in self-defence is also re-evaluated by asking the role of necessity in self-defence framework. It is argued that necessity has two important roles in self-defence law. First, it argued that necessity acts as a requirement to self-defence, specifically by seeking whether an armed attack has taken place, and if so, whether there is an alternative option to the use of non-forcible measures. Second, necessity acts as a limitation to self-defence, establishing that any defensive measures must be employed solely to achieve the legitimate aim of self-defence, which is to halt and repel an armed attack. However, it is difficult to assess necessity as a limitation on the use of force in self-defence when force is directed against terrorist groups.
APA, Harvard, Vancouver, ISO, and other styles
3

O'Meara, Christopher. "Necessity and proportionality and the right of self-defence in international law." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10057299/.

Full text
Abstract:
When states use force extraterritorially, they invariably claim a right of self-defence. They also accept that its exercise is conditioned by the customary international law requirements of necessity and proportionality. To date, these requirements have received little attention. They are notorious for being normatively indeterminate and operationally complex. As a breach of either requirement transforms lawful acts of self-defence into unlawful uses of force, increased determinacy regarding their scope and substance is crucial to how international law constrains military force. This thesis addresses this fact. It examines the conceptual meaning, content and practical application of necessity and proportionality as they relate to the right of self-defence following the adoption of the UN Charter. It provides a coherent and up-to-date description of the lex lata and an analytical framework to guide its operation and appraisal. It does this by undertaking the first comprehensive review of relevant jurisprudence, academic commentary and state practice from 1945 to date. Although the operation of necessity and proportionality is highly contextual, the result is a more determinate elaboration of international law that bridges theory and practice. This greater normative clarity strengthens the law's potential to exert a pull towards compliance. Necessity determines whether defensive force may be used to respond to an armed attack, and where it must be directed. Proportionality governs how much total force is permissible. This thesis contends that the two requirements are conceptually distinct and must be applied in the foregoing order to avoid an insufficient 'catch-all' description of (il)legality. It also argues that necessity and proportionality must apply on an ongoing basis, throughout the duration of an armed conflict prompted by self-defence. This ensures that the purposes of self-defence are met, and nothing more, and that defensive force is not unduly disruptive to third party interests and international peace and security.
APA, Harvard, Vancouver, ISO, and other styles
4

Schuh, Sr Matthew Anderson. "The Epistemic Necessity and Ethical Permissibility of Randomized Clinical Trials: A Minimalist Defense." Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_dissertations/167.

Full text
Abstract:
I argue for two main theses that are at odds with the positions of many clinical researchers and philosophers who write on the ethics of clinical research. The first is that certain types of clinical trials, namely, randomized clinical trials with double or triple blinding and a placebo group are generally necessary to establish that a medical intervention is effective in treating a certain type of disease or disorder. The second main thesis is that such trials are generally not ethically impermissible. My minimalist defense of clinical trials differs from most defenses of clinical trials found in the literature. I feel that the ethical permissibility of clinical trials can be judged by answering yes to the following questions: 1) Is the potential experimental subject competent to exercise his autonomy and his right of self determination in order to enroll in the clinical trial? 2) Is the potential experimental subject informed about the nature of risk and benefit involved in his participation in the clinical trial? 3) Is the trial scientifically/ epistemically valid? 4) Will the trial attempt to answer a scientific question or questions of value? I argue that competent persons have the right to enroll in scientifically valid clinical trials so long as they are informed and consent to participate.
APA, Harvard, Vancouver, ISO, and other styles
5

Cashen, Kevin M. "A compilation of necessary elements for a local government continuity of operations plan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FCashen.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Ellen M. Gordon. "September 2006." Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Morris, Brendan Scott. "A Defense of Frank Jackson's Two-Dimensional Analysis of the Necessary A Posteriori from Scott Soames' Anti-Two-Dimensionalist Attacks." Oberlin College Honors Theses / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1213048040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lodge, Anne. "Criminal responsibility for intrusions on the rights of innocent persons : the limits of self-defence, necessity and duress." Thesis, Durham University, 2009. http://etheses.dur.ac.uk/2102/.

Full text
Abstract:
This thesis is an exploratory study of the boundaries of English and Welsh criminal law where the legally protected personal and proprietary interests of innocent persons are intentionally infringed by another. Despite fulfilling the definitional elements of a criminal offence, there may be circumstances in which the law is prepared to exculpate the actor even where the interests of an innocent person are set back by the conduct. The justifications and excuses to be considered fall predominantly within the province of self-defence, necessity and duress and the correspondence between these respective domains is addressed. The aim is to explore the extent to which the criminal law in a liberal society negates criminal liability for deliberate intrusions on the rights of innocent persons by defining the precise scope of the relevant defences. The innocent persons to be considered fall into three main categories. First, the criminal responsibility of an actor who sets back the interests of an innocent incompetent person in their best interests will be addressed. Next, the liability of a defendant who infringes the rights of an innocent person who poses a threat, unjust or incidental, to the interests of the defendant or another will be analysed. Finally, the criminal responsibility of an actor who violates the rights of an innocent non-threatening bystander in order to stave off a threat to their own interests will be considered. It is argued that in English law the scope of criminal liability for intentional acts which set back the interests of an innocent person is ill-defined. An attempt is made to provide a more consistent philosophical and practical approach to the limits of criminal responsibility in this challenging area of law.
APA, Harvard, Vancouver, ISO, and other styles
8

Shirato, Yoh. "Epistemological necessity of Christocentric soteriology a defense of religious particularism in the theology of Jonathan Edwards /." Theological Research Exchange Network (TREN), 2005. http://www.tren.com/search.cfm?p003-0144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shirato, Yoh. "Epistemological necessity of Christocentric soteriology a defense of religious particularism in the theology of Jonathan Edwards /." Theological Research Exchange Network (TREN) Theological Research Exchange Network (TREN) Access this title online, 2006. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Navikaitė, Renata. "Teisė į savigyną pagal tarptautinę teisę." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060316_182254-43668.

Full text
Abstract:
The Master's Paper analyses the scope of the right to self-defence under international law. The Author seeks to present a thorough evaluation of the provisions of the United Nations Charter, the rules formed in the customary international law, the jurisprudence of the International Court of Justice as well as the state practice in respect of the implementation conditions of the right to self-defence.The Paper also focuses on the analysis of the theory of preventive self-defence undergoing the formation process as well as on the disclosure of the predicted negative entailments attached to its legalisation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Necessary defence"

1

Hayes, Jonathan. Necessary toughness: Facing defenses and diabetes. Alexandria, Va: American Diabetes Association, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parrish, Stephen E. God and necessity: A defense of classical theism. Lanham, Md: University Press of America, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bramhall, John. A defence of true liberty from antecedent and extrinsecall necessity. London: Routledge/Thoemmes, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The role of emotions in criminal law defences: Duress, necessity and lesser evils. Cambridge: Cambridge University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Der durch Menschen ausgelöste Defensivnotstand. Frankfurt am Main: P. Lang, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garbatovich, D. A. Neobkhodimai︠a︡ oborona pri zashchite chesti, dostoinstva, polovoĭ svobody, prava sobstvennosti: Monografii︠a︡. Moskva: I︠U︡rlitinform, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng dang fang wei yu jin ji bi xian. Fuzhou: Fujian ren min chu ban she, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lavilla, Francisco Baldó. Estado de necesidad y legítima defensa: Un estudio sobre las "situaciones de necesidad" de las que derivan facultades y deberes de salvaguarda. Barcelona: J.M. Bosch, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sidelle, Alan. Necessity, essence, and individuation: A defense of conventionalism. Ithaca: Cornell University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

California. Legislature. Senate. Select Committee on Defense Base Closures. Legislative actions necessary to expedite base conversions. Sacramento, CA: Senate Publications, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Necessary defence"

1

Lellouche, Pierre. "Necessary Progress in the Defence of Europe." In The Constantinos Karamanlis Institute for Democracy Yearbook Series, 33–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12374-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petter, Brian, and Reinhard Quick. "The Politics of TDI and the Different Views in EU Member States: Necessary Safety-Valve or Luxurious Rent-Seeking Device?" In The Future of Trade Defence Instruments, 17–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95306-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Katagiri, Nori. "Japanese Concepts of Deterrence." In NL ARMS, 201–14. The Hague: T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_11.

Full text
Abstract:
AbstractJapan has consistently adopted a deterrence-by-denial strategy in the post-war period. Its ability to deter foreign attacks depends more heavily on its ability to deny hostility than to punish perpetrators. Japan’s deterrence-by-denial posture has faced at least two major problems. One problem is the inherent limit on its ability to deter foreign attacks. This posture is more oriented toward defence-by-denial than real deterrence. Japan’s national security resources and institutions are positioned to deny hostility to defend the homeland, but they are not suited to deter foreign attackers because Japan bans itself from having the ability to conduct offensive military operations—a necessary factor for deterrence by the imposition of threats. Existing restrictions on the use and threat of force stem from post-war constitutional and normative constraints that have proven anachronistic today.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaushal, Sidharth. "The Grey Zone is Defined by the Defender." In Necessary Heresies, 24–33. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003289340-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gagliardi, Isabella. "Le vestigia dei gesuati." In Le vestigia dei gesuati, 13–38. Florence: Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-228-7.04.

Full text
Abstract:
The essay traces the salient historical steps of the Jesuat congregation, highlighting its genesis and development up to the year of its suppression (1668). The focus is on the dynamics triggered by the born of the Jesuat congregation, who grew on the border between the “church of the religious” and the “church of the laity”, and on the use of intellectual energies of the Jesuat friars, because they were directed towards defining and safeguarding their own religious identity. The latter had two focal points: the example of Giovanni Colombini, its first “father”, and, at the same time, the defence of the autonomy necessary to move interstitially between institutions, groups and movements. The historical parable of the Jesuats, in fact, clearly shows the importance assumed by the network of social relations for the constitution of the movement and for its progressive normalisation.
APA, Harvard, Vancouver, ISO, and other styles
6

Abad-Quintanal, Gracia. "EU-NATO Relations: Between Necessity and Strategic Uncertainty." In Security and Defence in Europe, 233–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12293-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"13. Convergence Theatre: Necessary Producers." In In Defence of Theatre, 196–212. University of Toronto Press, 2016. http://dx.doi.org/10.3138/9781442630819-016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Burgess, Kevin. "Defence Acquisition." In Emerging Strategies in Defense Acquisitions and Military Procurement, 1–21. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0599-0.ch001.

Full text
Abstract:
The speed of reforms within defence acquisition (DA) over the past forty years has greatly outstripped theoretical understanding. This development is of considerable concern because it weakens knowledge development at the very time DA's role, responsibilities and accountabilities are increasing. Modern defence organizations' increasing dependence on suppliers to generate military capability in turn requires DA to be more commercially effective (often with decreasing budgets) while at the same time developing and maintaining harmonious relationships at defence-supplier interfaces. The scale of changes generated by DA reforms have been such that past knowledge development processes are not able to effectively meet current requirements. Closing the theory-practice divide is the means most likely to generate the knowledge necessary to address present and emerging challenges. This chapter outlines the type of theory required to match DA's emerging role and what its development would entail.
APA, Harvard, Vancouver, ISO, and other styles
9

Neal, Derrick J. "Defence Acquisition." In Emerging Strategies in Defense Acquisitions and Military Procurement, 150–66. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0599-0.ch009.

Full text
Abstract:
Through the lenses of Strategy and Change management academic theory this chapter presents a view of the evolution of defence acquisition using the UK Ministry of Defence (MOD) as the vehicle and assesses the impact of disruptive technologies. The chapter proposes a number of changes that need to be embraced by the defence acquisition community if it is to be able to meet the needs of the nation now and in the future. The chapter concludes that the UK MOD must accept that the old model is now flawed and that in order to bring about the necessary changes a shift in mind-set is a sine qua non and that this change will take time. The envisaged way forward with a fundamental change in the way defence capability is acquired will result in a smaller, more agile and more professional organisation if, and only if, the required transformational change can be implemented effectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaldor, Mary, Dan Smith, and Steve Vines. "Current Defence Effort and The Necessary Level of Cuts." In Democratic Socialism and the Cost of Defence, 31–48. Routledge, 2018. http://dx.doi.org/10.4324/9780429436703-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Necessary defence"

1

Chhaya, Bharvi, Shafagh Jafer, and Paolo Proietti. "An ontology for threat modeling and simulation of Small Unmanned Aerial Vehicles." In THE 9TH INTERNATIONAL DEFENCE AND HOMELAND SECURITY SIMULATION WORKSHOP. CAL-TEK srl, 2019. http://dx.doi.org/10.46354/i3m.2019.dhss.004.

Full text
Abstract:
Low, Slow and Small Unmanned Aerial Vehicles (LSS UAVs) are one of the fastest-growing threats for national defense, security and privacy. A NATO task group performed a study to identify the elements necessary to define LSS models applicable for the development of necessary countermeasure to potential threats in the future. The goal of this project is to utilize this data collected by the NMSG-154 study to generate a Web Ontology Language (OWL) ontology for LSS threat modeling. The LSS ontology will form the basis for a metamodel for a domain-specific language (DSL) based on the parameters identified. This DSL will eventually be used to generate specific simulation scenarios to model potential threats caused by small drones.
APA, Harvard, Vancouver, ISO, and other styles
2

Chengcheng, Wang. "New Requirements of Defence in Depth and Extension of its Application." In 2020 International Conference on Nuclear Engineering collocated with the ASME 2020 Power Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/icone2020-16022.

Full text
Abstract:
Abstract As states in the IAEA SSR-2/1 (Rev.1) and IAEA TECDOC-1791, the defence in depth concept is not to be understood as merely limited to the request for the implementation of a number of consecutive barriers and protection levels, but is to be understood as the main general principle that leads to the formulation of safety requirements including requirements necessary to achieve the quality and reliability expected for the barriers and for systems ensuring their integrity. Thus, the application of defence in depth concept is not only limited in the reactor core design, but also can extend to a wider range in nuclear power plant design. In this paper, the application of defence in depth concept, which is defined in IAEA latest requirements, in the irradiated fuel water pool storage, electrical system, internal hazards and external hazards of the nuclear power plant design are reviewed. Base on the study of the newest standard and codes, the design requirements of each level of defence in depth in the above systems are confirmed. The analysis of defence in depth design features of an advanced nuclear power plant in China are also show the application value of defence in depth in these extended regions.
APA, Harvard, Vancouver, ISO, and other styles
3

Brawner, Keith. "Machine learning for approximated sensors for Marksmanship training." In The 8th International Defence and Homeland Security Simulation Workshop. CAL-TEK srl, 2018. http://dx.doi.org/10.46354/i3m.2018.dhss.006.

Full text
Abstract:
"All people in the military must be proficient on the basics – to shoot, move, and communicate. Basic Rifle Marksmanship (BRM) is required for both noncommissioned and enlisted Warfighters in all branches of military service, with training on BRM skills being conducted in a series of “dry fire”, simulation, and live drills. In all phases of training, Warfighters receive instruction on the four fundamentals of shooting: breathing, body position, sight picture, and trigger squeeze. Within simulation, this training is conducted in a 1:4 to 1:8 range; one instructor per 4-8 students. While realtime individualized feedback is a goal of instruction, it is not a reality, as instructors must attend to the needs of many students. In an effort to aid instructors in providing valuable individualized feedback, a tutoring system was developed which automatically diagnosed novice performance when compared to experts. This system was used to diagnose novice performance with extensive physical sensors applied to the weapons. This work investigates whether machine learning can aid in the diagnosis of the novice performance, without the physical sensors, and analyzes the degree to which the sensors are necessary."
APA, Harvard, Vancouver, ISO, and other styles
4

Grudinin, Nikita. "PROSPECTS FOR THE DEVELOPMENT OF THE INSTITUTE OF NECESSARY DEFENSE IN RUSSIA." In Development of legal systems in Russia and foreign countries: problems of theory and practices. ru: Publishing Center RIOR, 2022. http://dx.doi.org/10.29039/02090-6-0-36-44.

Full text
Abstract:
The Institute of Necessary Defense in Russian Criminal Law has gone a fairly long way in its formation and development. Currently, this institute is functioning, but has some difficulties in determining criteria for exceeding the limits of necessary defense in practice. The purpose of the study is to consider possible prospects and directions for the development of the institution of necessary defense in Russia. As a result of the study, it was concluded that one of the possible solutions to the problem of imperfection of the legislation on the necessary defense is to expand the limits of harm, with an appropriate narrowing of the criminal legal guarantees for the attacker. A potential striker should be aware that his attack will be rebuffed, and the defender should not be afraid to give such a rebuff.
APA, Harvard, Vancouver, ISO, and other styles
5

Holst, Gerald C. "Are reconstruction filters necessary?" In Defense and Security Symposium, edited by Gerald C. Holst. SPIE, 2006. http://dx.doi.org/10.1117/12.668618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hughes, Derek, and Andrew Wills. "Complex System Engineering for Naval Ship Procurement." In SNAME Maritime Convention. SNAME, 2014. http://dx.doi.org/10.5957/smc-2014-tr1.

Full text
Abstract:
Canada has not had a focused military shipbuilding program for some years and one of the outcomes from this is that uniformed and civilian staff within the Department of National Defence have not managed to acquire the skillsets necessary to support large acquisition programs in an effective manner. In addition to this, in recent years, numbers of former Department of National Defence staff have transitioned to Industry, often in senior positions as Industry wish to make use of the information held by these staff. The logical extension is that many sectors in the Canadian Industrial base also lack the skillsets to support large acquisition programs and have to rely on foreign third party support where they are able to call upon it. The paper will discuss the concept of providing a set of Workshops, “Think Tanks” and provide feedback to Project Teams on their approaches linked to likely outcomes with the aim of transferring knowledge to the project team members and empowering the project teams with a “Systems Thinking” culture.
APA, Harvard, Vancouver, ISO, and other styles
7

Boschi, A., E. Cimini, F. Pagni, L. Parracone, M. Pocai, M. Russo, and M. Spano. "RTS - 1 - Galilei Decommissioning Project." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4661.

Full text
Abstract:
The RTS-1 “Galileo Galilei” is an open pool research reactor light water moderated and cooled. It had a maximum thermal output of 5 MWth and an average thermal flux of 5 E+13 n/cm2sec. It became critical for the first time on April 1963 and it was definitely shutdown in March 1980. The reactor is situated at CISAM (Joint Centre of Studies and Military Application - Italian Ministry of Defence), S. Piero a Grado, Pisa, Italy, and its decommissioning is in progress. In this paper the strategy adopted to achieve the green status of the reactor site is discussed, with particular attention on the different steps to be done according to the national laws. Emphasis is placed on the characteristics of two different conditions required, namely Passive Protective Custody, which is a step necessary to allow the decay of the radioactive materials present into the plant to decrease the radiological risk to operate safely, and Unconditioned Release, in which all the materials can be released without radiological restrictions. Another aspect discussed in this paper is the effort spent on the determination of the radioisotopic abundance of the reactor components, the personal dose evaluation due to the necessary activities to achieve two different status of “Passive Protective Custody” and “Unconditioned Release” and the waste characterisation. The necessary authorisations to start decommissioning has been obtained as far as concern the removal of spent fuel and the dismantling of some experimental equipments.
APA, Harvard, Vancouver, ISO, and other styles
8

Hempelmann, Christian F., Divya Solomon, Abdullah N. Arslan, Salvatore Attardo, Grady P. Blount, Tracy Adkins, and Nikolay M. Sirakov. "Detecting necessary and sufficient parts for assembling a functional weapon." In SPIE Defense + Security, edited by Firooz A. Sadjadi and Abhijit Mahalanobis. SPIE, 2017. http://dx.doi.org/10.1117/12.2268808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Daum, Fred, and Jim Huang. "Proof that particle flow corresponds to Bayes’ rule: necessary and sufficient conditions." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2015. http://dx.doi.org/10.1117/12.2076167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vodianitskii, V. A. "Institute of necessary defense in the Russian Federation: problems perfection." In Наука России: Цели и задачи. НИЦ «Л-Журнал», 2018. http://dx.doi.org/10.18411/sr-10-12-2018-42.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Necessary defence"

1

Rumbaugh, Jack R. DoD Medical Unification: A Necessity for the Combatant Commander and Homeland Defense. Fort Belvoir, VA: Defense Technical Information Center, May 2002. http://dx.doi.org/10.21236/ada405649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McBride, Kevin R. Homeland Defense and Response to Weapons of Mass Destruction: Are National Guard Civil Support Teams a Necessary Asset or Duplication of Effort. Fort Belvoir, VA: Defense Technical Information Center, May 2000. http://dx.doi.org/10.21236/ada381637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wagner, Rolf. Virtual Victory": The Influence of "Post" Modern Warfare on Post Conflict Operations: Is Defect Necessary to Start "Phase IV"". Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada435839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gehlhaus, Diana, Ron Hodge, Luke Koslosky, Kayla Goode, and Jonathan Rotner. The DOD’s Hidden Artificial Intelligence Workforce: Leveraging AI Talent at the U.S. Department of Defense. Center for Security and Emerging Technology, September 2021. http://dx.doi.org/10.51593/20210013.

Full text
Abstract:
This policy brief, authored in collaboration with the MITRE Corporation, provides a new perspective on the U.S. Department of Defense’s struggle to recruit and retain artificial intelligence talent. The authors find that the DOD already has a cadre of AI and related experts, but that this talent remains hidden. Better leveraging this talent could go a long way in meeting the DOD’s AI objectives. The authors argue that this can be done through policies that more effectively identify AI talent and assignment opportunities, processes that incentivize experimentation and changes in career paths, and investing in the necessary technological infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
5

Ross, Andrew, David Johnson, Hai Le, Danny Griffin, Carl Mudd, and David Dawson. USACE Advanced Modeling Object Standard : Release 1.0. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/42152.

Full text
Abstract:
The U.S. Army Corps of Engineers (USACE) Advanced Modeling Object Standard (AMOS) has been developed by the CAD/BIM Technology Center for Facilities, Infrastructure, and Environment to establish standards for support of the Advanced Modeling process within the Department of Defense (DoD) and the Federal Government. The critical component of Advanced Modeling is the objects themselves- and either make the modeling process more difficult or more successful. This manual is part of an initiative to develop a nonproprietary Advanced Modeling standard that incorporates both vertical construction and horizontal construction objects that will address the entire life cycle of facilities within the DoD. The material addressed in this USACE Advanced Modeling Object Standard includes a classification organization that is needed to identify models for specific use cases. Compliance with this standard will allow users to know whether the object model they are getting is graphically well developed but data poor or if it does have the data needed for creating contract documents. This capability will greatly reduce the designers’ efforts to either build an object or search/find/edit an object necessary for the development of their project. Considering that an advanced model may contain hundreds of objects this would represent a huge time savings and improve the modeling process.
APA, Harvard, Vancouver, ISO, and other styles
6

Ficht, Thomas, Gary Splitter, Menachem Banai, and Menachem Davidson. Characterization of B. Melinensis REV 1 Attenuated Mutants. United States Department of Agriculture, December 2000. http://dx.doi.org/10.32747/2000.7580667.bard.

Full text
Abstract:
Brucella Mutagenesis (TAMU) The working hypothesis for this study was that survival of Brucella vaccines was directly related to their persistence in the host. This premise is based on previously published work detailing the survival of the currently employed vaccine strains S19 and Rev 1. The approach employed signature-tagged mutagenesis to construct mutants interrupted in individual genes, and the mouse model to identify mutants with attenuated virulence/survival. Intracellular survival in macrophages is the key to both reproductive disease in ruminants and reticuloendothelial disease observed in most other species. Therefore, the mouse model permitted selection of mutants of reduced intracellular survival that would limit their ability to cause reproductive disease in ruminants. Several classes of mutants were expected. Colonization/invasion requires gene products that enhance host-agent interaction or increase resistance to antibacterial activity in macrophages. The establishment of chronic infection requires gene products necessary for intracellular bacterial growth. Maintenance of chronic infection requires gene products that sustain a low-level metabolism during periods characterized little or no growth (1, 2). Of these mutants, the latter group was of greatest interest with regard to our originally stated premise. However, the results obtained do not necessarily support a simplistic model of vaccine efficacy, i.e., long-survival of vaccine strains provides better immunity. Our conclusion can only be that optimal vaccines will only be developed with a thorough understanding of host agent interaction, and will be preferable to the use of fortuitous isolates of unknown genetic background. Each mutant could be distinguished from among a group of mutants by PCR amplification of the signature tag (5). This approach permitted infection of mice with pools of different mutants (including the parental wild-type as a control) and identified 40 mutants with apparently defective survival characteristics that were tentatively assigned to three distinct classes or groups. Group I (n=13) contained organisms that exhibited reduced survival at two weeks post-infection. Organisms in this group were recovered at normal levels by eight weeks and were not studied further, since they may persist in the host. Group II (n=11) contained organisms that were reduced by 2 weeks post infection and remained at reduced levels at eight weeks post-infection. Group III (n=16) contained mutants that were normal at two weeks, but recovered at reduced levels at eight weeks. A subset of these mutants (n= 15) was confirmed to be attenuated in mixed infections (1:1) with the parental wild-type. One of these mutants was eliminated from consideration due to a reduced growth rate in vitro that may account for its apparent growth defect in the mouse model. Although the original plan involved construction of the mutant bank in B. melitensis Rev 1 the low transformability of this strain, prevented accumulation of the necessary number of mutants. In addition, the probability that Rev 1 already carries one genetic defect increases the likelihood that a second defect will severely compromise the survival of this organism. Once key genes have been identified, it is relatively easy to prepare the appropriate genetic constructs (knockouts) lacking these genes in B. melitensis Rev 1 or any other genetic background. The construction of "designer" vaccines is expected to improve immune protection resulting from minor sequence variation corresponding to geographically distinct isolates or to design vaccines for use in specific hosts. A.2 Mouse Model of Brucella Infection (UWISC) Interferon regulatory factor-1-deficient (IRF-1-/- mice have diverse immunodeficient phenotypes that are necessary for conferring proper immune protection to intracellular bacterial infection, such as a 90% reduction of CD8+ T cells, functionally impaired NK cells, as well as a deficiency in iNOS and IL-12p40 induction. Interestingly, IRF-1-/- mice infected with diverse Brucella abortus strains reacted differently in a death and survival manner depending on the dose of injection and the level of virulence. Notably, 50% of IRF-1-/- mice intraperitoneally infected with a sublethal dose in C57BL/6 mice, i.e., 5 x 105 CFU of virulent S2308 or the attenuated vaccine S19, died at 10 and 20 days post-infection, respectively. Interestingly, the same dose of RB51, an attenuated new vaccine strain, did not induce the death of IRF-1-/- mice for the 4 weeks of infection. IRF-1-/- mice infected with four more other genetically manipulated S2308 mutants at 5 x 105 CFU also reacted in a death or survival manner depending on the level of virulence. Splenic CFU from C57BL/6 mice infected with 5 x 105 CFU of S2308, S19, or RB51, as well as four different S2308 mutants supports the finding that reduced virulence correlates with survival Of IRF-1-/- mice. Therefore, these results suggest that IRF-1 regulation of multi-gene transcription plays a crucial role in controlling B. abortus infection, and IRF-1 mice could be used as an animal model to determine the degree of B. abortus virulence by examining death or survival. A3 Diagnostic Tests for Detection of B. melitensis Rev 1 (Kimron) In this project we developed an effective PCR tool that can distinguish between Rev1 field isolates and B. melitensis virulent field strains. This has allowed, for the first time, to monitor epidemiological outbreaks of Rev1 infection in vaccinated flocks and to clearly demonstrate horizontal transfer of the strain from vaccinated ewes to unvaccinated ones. Moreover, two human isolates were characterized as Rev1 isolates implying the risk of use of improperly controlled lots of the vaccine in the national campaign. Since atypical B. melitensis biotype 1 strains have been characterized in Israel, the PCR technique has unequivocally demonstrated that strain Rev1 has not diverted into a virulent mutant. In addition, we could demonstrate that very likely a new prototype biotype 1 strain has evolved in the Middle East compared to the classical strain 16M. All the Israeli field strains have been shown to differ from strain 16M in the PstI digestion profile of the omp2a gene sequence suggesting that the local strains were possibly developed as a separate branch of B. melitensis. Should this be confirmed these data suggest that the Rev1 vaccine may not be an optimal vaccine strain for the Israeli flocks as it shares the same omp2 PstI digestion profile as strain 16M.
APA, Harvard, Vancouver, ISO, and other styles
7

Yogev, David, Ricardo Rosenbusch, Sharon Levisohn, and Eitan Rapoport. Molecular Pathogenesis of Mycoplasma bovis and Mycoplasma agalactiae and its Application in Diagnosis and Control. United States Department of Agriculture, April 2000. http://dx.doi.org/10.32747/2000.7573073.bard.

Full text
Abstract:
Mycoplasma bovis and M. agalactiae are two phylogenetically related mycoplasmas which cause economically significant diseases in their respective bovine or small ruminant hosts. These organisms cause persistent asymptomatic infections that can result in severe outbreaks upon introduction of carrier animals into susceptible herds. Little is known about the mechanisms underlying mycoplasma-host interaction, variation in virulence, or of the factors enabling avoidance of the host immune system. In recent years it has become apparent that the ability of pathogenic microorganisms to rapidly alter surface antigenic structures and to fine tune their antigenicity, a phenomena called antigenic variation, is one of the most effective strategies used to escape immune destruction and to establish chronic infections. Our discovery of a novel genetic system, mediating antigenic variation in M. bovis (vsp) as well as in M. agalactiae (avg) served as a starting point for our proposal which included the following objectives: (i) Molecular and functional characterization of the variable surface lipoproteins (Vsp) system of M. bovis and comparison with the Vsp-counterpart in M. agalactiae (ii) Determination of the role of Vsp proteins in the survival of M. bovis when confronted by host defense factors, (iii) Assessment of Vsp-based genetic and antigenic typing of M. bovis and M. agalactiae for epidemiology of infection and (iv) Improvement of diagnostic tests for M. bovis and M. agalactiae based on the vsp-and vsp-analogous systems. We have carried out an extensive molecular characterization of the vsp system and unravelled the precise molecular mechanism responsible for the generation of surface antigenic variation in M. bovis. Our data clearly demonstrated that the two pathogenic mycoplasma species possess large gene families encoding variable lipoprotein antigens that apparently play an important role in immune evasion and in pathogen-host interaction during infection. Phase variable production of these antigens was found to be mediated by a novel molecular mechanism utilizing double site-specific DNA inversions via an intermediate vsp configuration. Studies in model systems indicate that phase variation of VspA is relevant in interaction between M. bovis and macrophages or monocytes, a crucial stage in pathogenesis. Using an ELISA test with captured VspA as an antigen, phase variation was shown to occur in vivo and under field conditions. Genomic rearrangements in the avg gene family of M. agalactiae were shown to occur in vivo and may well have a role in evasion of host defences and establishment of chronic infection. An epidemiological study indicated that patterns of vsp-related antigenic variation diverge rapidly in an M. bovis infected herd. Marked divergence was also found with avg-based genomic typing of M. agalactiae in chronically infected sheep. However, avg-genomic fingerprints were found to be relatively homogeneous in different animals during acute stages of an outbreak of Contagious Agalactiae, and differ between unrelated outbreaks. These data support the concept of vsp-based genomic typing but indicate the necessity for further refinement of the methodology. The molecular knowledge on these surface antigens and their encoding genes provides the basis for generating specific recombinant tools and serological methods for serodiagnosis and epidemiological purposes. Utilization of these methods in the field may allow differentiating acutely infected herds from chronic herds and disease-free herds. In addition the highly immunogenic nature of these lipoproteins may facilitate the design of protective vaccine against mycoplasma infections.
APA, Harvard, Vancouver, ISO, and other styles
8

Irudayaraj, Joseph, Ze'ev Schmilovitch, Amos Mizrach, Giora Kritzman, and Chitrita DebRoy. Rapid detection of food borne pathogens and non-pathogens in fresh produce using FT-IRS and raman spectroscopy. United States Department of Agriculture, October 2004. http://dx.doi.org/10.32747/2004.7587221.bard.

Full text
Abstract:
Rapid detection of pathogens and hazardous elements in fresh fruits and vegetables after harvest requires the use of advanced sensor technology at each step in the farm-to-consumer or farm-to-processing sequence. Fourier-transform infrared (FTIR) spectroscopy and the complementary Raman spectroscopy, an advanced optical technique based on light scattering will be investigated for rapid and on-site assessment of produce safety. Paving the way toward the development of this innovative methodology, specific original objectives were to (1) identify and distinguish different serotypes of Escherichia coli, Listeria monocytogenes, Salmonella typhimurium, and Bacillus cereus by FTIR and Raman spectroscopy, (2) develop spectroscopic fingerprint patterns and detection methodology for fungi such as Aspergillus, Rhizopus, Fusarium, and Penicillium (3) to validate a universal spectroscopic procedure to detect foodborne pathogens and non-pathogens in food systems. The original objectives proposed were very ambitious hence modifications were necessary to fit with the funding. Elaborate experiments were conducted for sensitivity, additionally, testing a wide range of pathogens (more than selected list proposed) was also necessary to demonstrate the robustness of the instruments, most crucially, algorithms for differentiating a specific organism of interest in mixed cultures was conceptualized and validated, and finally neural network and chemometric models were tested on a variety of applications. Food systems tested were apple juice and buffer systems. Pathogens tested include Enterococcus faecium, Salmonella enteritidis, Salmonella typhimurium, Bacillus cereus, Yersinia enterocolitis, Shigella boydii, Staphylococus aureus, Serratiamarcescens, Pseudomonas vulgaris, Vibrio cholerae, Hafniaalvei, Enterobacter cloacae, Enterobacter aerogenes, E. coli (O103, O55, O121, O30 and O26), Aspergillus niger (NRRL 326) and Fusarium verticilliodes (NRRL 13586), Saccharomyces cerevisiae (ATCC 24859), Lactobacillus casei (ATCC 11443), Erwinia carotovora pv. carotovora and Clavibacter michiganense. Sensitivity of the FTIR detection was 103CFU/ml and a clear differentiation was obtained between the different organisms both at the species as well as at the strain level for the tested pathogens. A very crucial step in the direction of analyzing mixed cultures was taken. The vector based algorithm was able to identify a target pathogen of interest in a mixture of up to three organisms. Efforts will be made to extend this to 10-12 key pathogens. The experience gained was very helpful in laying the foundations for extracting the true fingerprint of a specific pathogen irrespective of the background substrate. This is very crucial especially when experimenting with solid samples as well as complex food matrices. Spectroscopic techniques, especially FTIR and Raman methods are being pursued by agencies such as DARPA and Department of Defense to combat homeland security. Through the BARD US-3296-02 feasibility grant, the foundations for detection, sample handling, and the needed algorithms and models were developed. Successive efforts will be made in transferring the methodology to fruit surfaces and to other complex food matrices which can be accomplished with creative sampling methods and experimentation. Even a marginal success in this direction will result in a very significant breakthrough because FTIR and Raman methods, in spite of their limitations are still one of most rapid and nondestructive methods available. Continued interest and efforts in improving the components as well as the refinement of the procedures is bound to result in a significant breakthrough in sensor technology for food safety and biosecurity.
APA, Harvard, Vancouver, ISO, and other styles
9

Steffens, John C., and Eithan Harel. Polyphenol Oxidases- Expression, Assembly and Function. United States Department of Agriculture, January 1995. http://dx.doi.org/10.32747/1995.7571358.bard.

Full text
Abstract:
Polyphenol oxidases (PPOs) participate in the preparation of many plant products on the one hand and cause considerable losses during processing of plant products on the other hand. However, the physiological functions of plant PPO were still a subject of controversy at the onset of the project. Preliminary observations that suggested involvement of PPOs in resistance to herbivores and pathogens held great promise for application in agriculture but required elucidation of PPO's function if modulation of PPO expression is to be considered for improving plant protection or storage and processing of plant products. Suggestions on a possible role of PPO in various aspects of chloroplast metabolism were also relevant in this context. The characterization of plant PPO genes opened a way for achieving these goals. We reasoned that "understanding PPO targeting and routing, designing ways to manipulate its expression and assessing the effects of such modifications will enable determination of the true properties of the enzyme and open the way for controlling its activity". The objective of the project was to "obtain an insight into the function and biological significance of PPOs" by examining possible function(s) of PPO in photosynthesis and plant-pest interactions using transgenic tomato plants; extending our understanding of PPO routing and assembly and the mechanism of its thylakoid translocation; preparing recombinant PPOs for use in import studies, determination of the genuine properties of PPOs and understanding its assembly and determining the effect of PPO's absence on chloroplast performance. Results obtained during work on the project made it necessary to abandon some minor objectives and devote the effort to more promising topics. Such changes are mentioned in the 'Body of the report' which is arranged according to the objectives of the original proposal. The complex expression pattern of tomato PPO gene family was determined. Individual members of the family are differentially expressed in various parts of the plant and subjected to developmentally regulated turnover. Some members are differentially regulated also by pathogens, wounding and chemical wound signals. Wounding systemically induces PPO activity and level in potato. Only tissues that are developmentally competent to express PPO are capable of responding to the systemic wounding signal by increased accumulation of PPO mRNA. Down regulation of PPO genes causes hyper susceptibility to leaf pathogens in tomato while over expression regulation of PPO expression in tomato plants is their apparent increased tolerance to drought. Both the enhanced disease resistance conferred by PPO over expression and the increased stress tolerance due to down regulation can be used in the engineering of improved crop plants. Photosynthesis rate and variable fluorescence measurements in wild type, and PPO-null and over expressing transgenic tomato lines suggest that PPO does not enable plants to cope better with stressful high light intensities or reactive oxygen species. Rather high levels of the enzyme aggravate the damage caused under such conditions. Our work suggests that PPO's primary role is in defending plants against pathogens and herbivores. Jasmonate and ethylene, and apparently also salicylate, signals involved in responses to wounding and defense against herbivores and pathogens, enhance markedly and specifically the competence of chloroplasts to import and process pPPO. The interaction of the precursor with thylakoid membranes is primarily affected. The routing of PPO shows other unusual properties: stromal processing occurs in two sites, resulting in intermediates that are translocated across thylakoids by two different mechanisms - a DpH- and a Sec-dependent one. It is suggested that the dual pattern of processing and routing constitutes a'fail safe' mechanism, reflecting the need for a rapid and flexible response to defense challenges. Many of the observations described above should be taken into consideration when manipulation of PPO expression is contemplated for use in crop improvement.
APA, Harvard, Vancouver, ISO, and other styles
10

Ashley, Caitlyn, Elizabeth Spencer Berthiaume, Philip Berzin, Rikki Blassingame, Stephanie Bradley Fryer, John Cox, E. Samuel Crecelius, et al. Law and Policy Resource Guide: A Survey of Eminent Domain Law in Texas and the Nation. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, 2017. http://dx.doi.org/10.37419/eenrs.eminentdomainguide.

Full text
Abstract:
Eminent Domain is the power of the government or quasi-government entities to take private or public property interests through condemnation. Eminent Domain has been a significant issue since 1879 when, in the case of Boom Company v. Patterson, the Supreme Court first acknowledged that the power of eminent domain may be delegated by state legislatures to agencies and non-governmental entities. Thus, the era of legal takings began. Though an important legal dispute then, more recently eminent domain has blossomed into an enduring contentious social and political problem throughout the United States. The Fifth Amendment to the United States Constitution states, “nor shall private property be taken for public use, without just compensation.” Thus, in the wake of the now infamous decision in Kelo v. City of New London, where the Court upheld the taking of private property for purely economic benefit as a “public use,” the requirement of “just compensation” stands as the primary defender of constitutionally protected liberty under the federal constitution. In response to Kelo, many state legislatures passed a variety of eminent domain reforms specifically tailoring what qualifies as a public use and how just compensation should be calculated. Texas landowners recognize that the state’s population is growing at a rapid pace. There is an increasing need for more land and resources such as energy and transportation. But, private property rights are equally important, especially in Texas, and must be protected as well. Eminent domain and the condemnation process is not a willing buyer and willing seller transition; it is a legally forced sale. Therefore, it is necessary to consider further improvements to the laws that govern the use of eminent domain so Texas landowners can have more assurance that this process is fair and respectful of their private property rights when they are forced to relinquish their land. This report compiles statutes and information from the other forty-nine states to illustrate how they address key eminent domain issues. Further, this report endeavors to provide a neutral third voice in Texas to strike a more appropriate balance between individual’s property rights and the need for increased economic development. This report breaks down eminent domain into seven major topics that, in addition to Texas, seemed to be similar in many of the other states. These categories are: (1) Awarding of Attorneys’ Fee; (2) Compensation and Valuation; (3) Procedure Prior to Suit; (4) Condemnation Procedure; (5) What Cannot be Condemned; (6) Public Use & Authority to Condemn; and (7) Abandonment. In analyzing these seven categories, this report does not seek to advance a particular interest but only to provide information on how Texas law differs from other states. This report lays out trends seen across other states that are either similar or dissimilar to Texas, and additionally, discusses interesting and unique laws employed by other states that may be of interest to Texas policy makers. Our research found three dominant categories which tend to be major issues across the country: (1) the awarding of attorneys’ fees; (2) the valuation and measurement of just compensation; and (3) procedure prior to suit.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography