Academic literature on the topic 'United States. Departmentof Defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'United States. Departmentof Defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "United States. Departmentof Defense"

1

Richards, Allen L. "Parasitology Research in the United States Department of Defense." Comparative Parasitology 69, no. 2 (July 2002): 135–36. http://dx.doi.org/10.1654/1525-2647(2002)069[0135:pritus]2.0.co;2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Yearn. "Defense and the Environment: Policy and Management." Journal of the IEST 28, no. 1 (January 1, 1985): 48–51. http://dx.doi.org/10.17764/jiet.1.28.1.75r7g57537926124.

Full text
Abstract:
This paper describes the problem of balancing national security needs and environmental quality concerns in the United States Department of Defense. The Department of Defense (DoD) is often symbolized to the public as military uniforms, fighters and bombers, aircraft carriers and submarines, tanks and missiles. But it is much more; it is a human organization concerned with the welfare of the citizens and the environment they live in. It would make little sense for DoD to be building the defenses of the nation if in doing so it was threatening the health of the environment. Defense should mean the defense of the environment, too.
APA, Harvard, Vancouver, ISO, and other styles
3

Hillier, Paul. "Securitization of Commercial Supply Chains." Potentia: Journal of International Affairs 3 (October 1, 2011): 13–20. http://dx.doi.org/10.18192/potentia.v3i0.4383.

Full text
Abstract:
As commercial off-the-shelf products have become increasingly important to defence procurements, so too have the threats of infiltration to both government departments and private companies risen. This has motivated many countries to look at the role government can play in securing global commercial supply chains. in the United states, this happened in January 2011 when congress gave the Department of Defense unprecedented powers to regulate commercial supply chains, namely the purview to blacklist contractors without oversight or transparency.
APA, Harvard, Vancouver, ISO, and other styles
4

Eichler, Rose Richerson. "Cybersecurity, Encryption, and Defense Industry Compliance with United States Export Regulations." Texas A&M Journal of Property Law 5, no. 1 (October 2018): 5–36. http://dx.doi.org/10.37419/jpl.v5.i1.2.

Full text
Abstract:
Exports of technology and items containing technical information are regulated by the United States government. United States export control regulations exist to help protect national security, economic, and political interests. United States defense industry companies manufacture products and develop technologies and information that the United States has a particular interest in protecting. Therefore, defense industry companies must comply with United States export control regulations when exporting items and information to their international partners and customers. An “export” not only includes shipments of hardware or other tangible assets to foreign end-users but also includes the sharing of certain types of information with foreign recipients in the form of phone conversations, emails, meetings, conferences, presentations, and so on. Many employees of defense industry companies travel internationally with company issued laptops and cellphones containing company information that could be viewed by foreign persons. All of these activities are considered exports and may require prior authorization from the United States government under export control regulations. Failure to follow export regulations could result in a violation requiring a report to the United States government that may result in civil penalties or criminal charges. Additionally, intentional as well as unintentional releases of information to certain foreign persons could be detrimental to a defense industry company’s business and reputation and may even result in security concerns for the United States. Although the government has an interest in regulating defense industry companies’ technology and information, critics argue that strong export control regulations may result in invasions of privacy, violations of free speech, and a displacement of the United States as a leader in a world of technological advancement. However, despite current regulations, defense industry information is still at risk of cyberattacks and inadvertent data releases, creating potential threats to national security and the security of company technology and information. In an effort to secure company and sensitive information while exporting, defense industry companies utilize encryption and other cybersecurity measures. Advancing technologies in cybersecurity can help the government and defense industry companies by bolstering the security of their information. These same advancements can also aid attackers in breaking through cybersecurity defenses. Some advances in technology are even preventing law enforcement from gathering necessary information to conduct investigations when cyber-attacks occur, making it difficult to identify criminal actors and seek justice.The United States government faces challenges in creating and up- dating regulations to keep up with consistently advancing technology. Likewise, defense industry companies must adhere to government regulations by creating robust compliance programs, but they should also implement security and compliance measures above and beyond what the government requires to ensure more effective security for their technology and information. This Article discusses the effect of advancing cyber technology; United States export regulations; reporting requirements related to the export of encrypted items; and encryption technology in the defense industry. First, the Article defines encryption and encrypted items. Second, the Article explains United States regulations of ex- ports and specifically, regulations related to encryption and encrypted items. Third, the Article explains the need for defense industry companies to export and to use encrypted items. Fourth, the Article analyzes criticisms of export regulations and the differing views on United States controls. Fifth, the Article will discuss the complexities of com- plying with export regulations and defense industry compliance pro- grams. Sixth, the Article examines the outlook for encryption technology, the future of regulations related to cybersecurity, and the outlook for defense industry security measures and compliance with regulations. The United States government is beginning to recognize the need for more advanced security measures to protect domestically produced technology and information, especially information that puts national security at risk. Specifically, the technology and information produced by United States defense industry companies should be protected from getting into the hands of our foreign adversaries at all costs. In response to the growing need for security measures, the United States government has implemented new programs, commissions, agencies, and projects to create more robust security systems and regulations. The United States should employ the most talented and experienced cybersecurity professionals to innovate and produce security systems that protect our nation’s most sensitive information. The government should then provide these systems to its defense industry companies at minimal cost and should require companies to use the best technology in its security measures. With or without the government’s assistance, defense industry companies within the United States must also implement their own measures of protection. Current policies offer little protection of sensitive and export controlled information including encrypted items and in- formation. In addition, the government should also provide the defense industry companies better guidance and access to resources in order to assist them in protecting the important information and encrypted items.207 For example, any new systems or software purchased by the United States should be made available to defense industry companies as the standard. If the government truly wishes to protect its most important technology and information, it should provide the new systems at minimal cost to the defense industry. Advancements in security programs should be shared with defense industry companies as soon as they are available and ready for use. Nevertheless, the government may not want to provide defense industry companies with the best security technology because in the event that the government needs to conduct an investigation, a company utilizing strong cyber- security and encryption software is much more difficult to investigate. Alternatively, the United States could update current regulations to require that defense industry companies must utilize specific security measures or face a penalty for failing to do so. Such regulation could require defense companies to implement more robust security pro- grams with updated security software. This is a less effective solution as the advancement in cyberattack technology increases so rapidly, and reformed regulations will likely be outdated as soon as they are implemented. It makes more sense to require that defense companies must implement the most updated software and programs determined by government security experts and cyber-security experts. Also, by allowing defense companies to decide which security companies it will work with, the defense companies obtain the option to shop for the best and most expensive program, or the company could choose the cheapest option, resulting in less efficient security. Cybersecurity regulations that are too specific run the risk of being outdated quickly, whereas broad requirements leave the option for companies to implement the lowest of security measures. Even if the government declines these suggested measures, defense industry companies should make the protection of their sensitive in- formation and encrypted items top priority. This method would re- quire complete buy-in from the senior management within the company and a thorough flow-down of cultural beliefs among its employees. A change in norms must be implemented, and defense industry personnel should be inundated with reminders on the importance of information security. Companies should provide employees with easy access to guidance, training, and assistance in handling, sharing, protecting, and exporting sensitive and export controlled information. Changing company culture takes time, and failure to change personnel beliefs will result in a lack of understanding and potential violations of export control regulations. In the worst cases, data spills and cyberattacks could result in the loss of sensitive or even classified in- formation that could jeopardize national security. Huge unauthorized data releases of sensitive information will negatively affect a company’s reputation thus affecting its ability to generate revenue. The risks in using and exporting encryption technology and sensitive information should be a major concern for defense industry companies. This concern should motivate the government to invest significant resources into compliance programs. Resources such as dedicated and qualified personnel can create policy and procedure to ensure compliance with United States government regulations, and the procedures will provide guidance and training to all employees. In addition, companies should employ IT security, data security, and counterintelligence personnel to work with the compliance team in innovating preventive measures and in addressing any potential data releases and export violations. Immediate actions and counter measures should be prioritized not just among the compliance and security teams but should be a known, expected response from all employees. In other words, cybersecurity norms should be instilled company-wide and thoroughly policed from within the company. How a company chooses to implement such measures remains discretionary, but a better resourced compliance department dedicated to implementing effective policies and responding quickly to potential issues will prevent export control violations and data releases of important information. Defense industry companies transfer export controlled information that may subject the United States to security risks. The United States responds to this risk by implementing regulations to control the high- risk exports. Defense industry companies must comply with these regulations. Therefore, defense industry companies should approach exports and cybersecurity from the standpoint that technology is always advancing—failure to simultaneously advance security and compliance measures will leave the country and the company vulnerable to attack.
APA, Harvard, Vancouver, ISO, and other styles
5

Zedalis, Rex J. "The Chemical Weapons Convention Implementation Act: United States Control Over Exports." American Journal of International Law 90, no. 1 (January 1996): 138–49. http://dx.doi.org/10.2307/2203761.

Full text
Abstract:
During 1994, the total sales value of chemicals exported from the United States exceeded $51 billion, up 15 percent over the previous year and resulting in the chemical sector outpacing all other sectors that finished the year with favorable trade balances. Chemicals leaving the United States were shipped under the control provisions of both the Department of Commerce's Export Administration Regulations (EAR), and the Department of State's International Traffic in Arms Regulations (ITAR). Though this is something of an oversimplification, the EAR basically concerns itself with products that have civilian application, and the ITAR with products of use to the military. Currently, the Commodity Control List of the EAR, overseen by Commerce's Office of Export Licensing within the Bureau of Export Administration, identifies fifty-four chemicals and ten toxins as intermediate agents and precursors to chemical weapons subject to export regulation. The Munitions List of the ITAR, administered by the Office of Defense Trade Controls of the State Department's Bureau of Politico-Military Affairs, identifies twenty-two chemicals as subject to regulation and cautions that this listing is merely illustrative, as any “chemical agent,” defined as “a substance having military application,” is subject to export control.
APA, Harvard, Vancouver, ISO, and other styles
6

Cope, Stanton E., Georgia NW Schoeler, and Gregory M. Beavers. "Medical Entomology in the United States Department of Defense: Challenging and Rewarding." Outlooks on Pest Management 22, no. 3 (June 1, 2011): 129–33. http://dx.doi.org/10.1564/22jun09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Price, R. Marcus. "Radio Spectrum Management and RFI in the United States." International Astronomical Union Colloquium 112 (1991): 174–75. http://dx.doi.org/10.1017/s0252921100003936.

Full text
Abstract:
ABSTRACTIn the United States, civil common carrier telecommunications are provided by private companies, not by any agency of the government. Regulation of these services and spectrum management oversight is provided by the Federal Communications Commission (FCC), an agency of the government. Government telecommunications are operated by individual agencies, e.g. the Department of Defense, under the overall regulation of the Office of Spectrum Management of the National Telecommunications and Information Administration (NTIA), a government body separate from the FCC. In bands shared by the civil and government sectors, liaison and coordination is effected between the FCC and the NTIA.
APA, Harvard, Vancouver, ISO, and other styles
8

Keysar, Elizabeth. "Commentary: Implementing Regional Sustainability Initiatives: Lessons from the United States Department of Defense." Environmental Practice 13, no. 2 (June 2011): 90–100. http://dx.doi.org/10.1017/s1466046611000044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bentley, David. "The United States Department of Defense Law of War Manual: commentary and critique." International Affairs 95, no. 6 (November 1, 2019): 1477–79. http://dx.doi.org/10.1093/ia/iiz234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baker, George H. "EVOLUTION AND RATIONALE FOR UNITED STATES DEPARTMENT OF DEFENSE ELECTROMAGNETIC PULSE PROTECTION STANDARD." INSIGHT 19, no. 4 (December 2016): 30–32. http://dx.doi.org/10.1002/inst.12123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "United States. Departmentof Defense"

1

Byrdsong, Ricardo Crespo Luis A. Holland George A. Parker Christopher D. Torunoglu Emine Gulsen. "Transformation of Department of Defense contract closeout /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FByrdsong.pdf.

Full text
Abstract:
Thesis (M.B.A.)--Naval Postgraduate School, June 2003.
"MBA professional report."--Cover. Joint authors: Luis A. Crespo, George A. Holland, Christopher D. Parker, Emine Gulsen Torunoglu. Thesis advisor(s): David V. Lamm, Phil J. Candreva. Includes bibliographical references (p. 193-198). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Skarin, John W. "The horizon of financial management for the Department of Defense." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FSkarin.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jacobsen, Gary L. "A Department Of Defense retirement system for the future." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FJacobsen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cooper, Michael Andrew. "Department of Defense implementation of acquisition reform." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FCooper.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ellis, Bradford C. "Impact of establishing the Department of Homeland Security: mission and budget analysis of the Department of Defense and other government agencies." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FEllis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kozar, Mark Joseph. "An analysis of obligation patterns for the Department of Defense operations and maintenance appropriations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA276430.

Full text
Abstract:
Thesis (M.S. in Financial Management) Naval Postgraduate School, December 1993.
Thesis advisor(s): San Miguel, Joseph ; Seiden, Neil. "December 1993." Includes bibliographical references (p. 143-144). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Barry R. "Consistency in Department of Defense environmental contracting." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA327647.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, December 1996.
Thesis advisor(s): Mark W. Stone, David V. Lamm. "December 1996." Includes bibliographical references (p. 103-106). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Falk, Chris J. "A savings study on dual sourcing in the Defense Department." Thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-05092009-040401/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Foss, Sean M. "The National Security Personnel System : Department of Defense civilian personnel structures and the U.S. legislative process /." Thesis, access full text online, 2004. http://theses.nps.navy.mil/04Jun%5FFoss.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Flannery, Robert E. "Applying Department of Defense financial statement guidelines to the Naval Postgraduate School." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FFlannery.pdf.

Full text
Abstract:
Thesis (M.S. in Financial Management)--Naval Postgraduate School, December 2002.
Thesis advisor(s): O. Douglas Moses, Don Summers. Includes bibliographical references (p. 51-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "United States. Departmentof Defense"

1

United States. Department of Defense. Computer Security Center. Computer security requirements: Guidance for applying the Departmentof Defense trusted computer system evaluation criteria in specific environments. Fort George G. Meade, Md: Department of Defense, Computer Security Center, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Commission on Roles and Missions of the Armed Forces. Directions for defense: The Department of Defense report. Washington: Brassey's, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Commission on Roles and Missions of the Armed Forces. Directions for defense. [Arlington, Va.]: The Commission, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Services, United States Congress Senate Committee on Armed. Reorganization of the Department of Defense: Hearings before the Committee on Armed Services, United States Senate, Ninety-ninth Congress, first session, October 16; November 14, 19, 20, 21; December 4, 5, 6, 11, 12, 1985. Washington: U.S. G.P.O., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Center, United States Department of Defense Computer Security. Department of Defense password management guideline. Fort George G. Meade, Md: Department of Defense, Computer Security Center, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Towell, Pat. Defense authorization and appropriation. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rumsfeld, Donald. Public statements of Donald H. Rumsfeld, Secretary of Defense, 2001. Washington, D.C: Historical Office, Office of the Secretary of Defense, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rumsfeld, Donald. Public statements of Donald H. Rumsfeld, Secretary of Defense, 2003. Washington, D.C.]: Historical Office, Office of the Secretary of Defense, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Department of Defense body armor programs. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gates, Robert Michael. Public statements of Robert M. Gates, Secretary of Defense, 2006-2007. Washington, D.C.]: Historical Office, Office of the Secretary of Defense, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "United States. Departmentof Defense"

1

Birx, Deborah L., Arthur E. Brown, Philip O. Renzullo, Mark S. de Souza, and John G. McNeil. "United States Department of Defense HIV-1 Vaccine Development in Thailand." In AIDS in Asia, 513–39. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-0-306-48536-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, James D., and Duane Hybertson. "Implementing Large-Scale COTS Reengineering within the United States Department of Defense." In COTS-Based Software Systems, 245–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45588-4_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Suermann, Patrick C., and Lindsey R. Maddox. "MILCON in the Department of Defense: Estimating, Building Information Modeling (BIM) Based Design, and Impact on United States Army and Air Force Construction." In Building Information Modeling, 83–106. Reston, VA: American Society of Civil Engineers, 2015. http://dx.doi.org/10.1061/9780784413982.ch04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

High, Steven. "The United States and Hemispheric Defense." In Base Colonies in the Western Hemisphere, 1940–1967, 17–42. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618046_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hellman, Deborah. "An Epistemic Defense of Precedent." In Precedent in the United States Supreme Court, 63–76. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7951-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Greer, Edward F. "The Changing Defense Industrial Base." In United States Post-Cold War Defence Interests, 235–50. London: Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9780230000834_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amara, Jomana, and Raymond Franck. "The United States and its defense industries." In The Economics of the Global Defence Industry, 7–34. Milton Park, Abingdon, Oxon ; New York : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429466793-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jackson, LeeAnne. "Food Chain Defense in the United States." In Food Chain Security, 91–101. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9558-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chapman, Bert. "JSF and the United States." In Global Defense Procurement and the F-35 Joint Strike Fighter, 89–163. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01367-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Robert S. "Introduction." In In Defense of the United States Constitution, 1–18. New York, NY: Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781351117708-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "United States. Departmentof Defense"

1

Baldwin, Kristen, Paul R. Popick, John F. Miller, and Jonathan Goodnight. "The United States Department of Defense revitalization of system security engineering through program protection." In 2012 6th Annual IEEE Systems Conference (SysCon). IEEE, 2012. http://dx.doi.org/10.1109/syscon.2012.6189463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Delaney, C. L. "Test and Evaluation of Shale Derived Jet Fuel by the United States Air Force." In ASME 1985 Beijing International Gas Turbine Symposium and Exposition. American Society of Mechanical Engineers, 1985. http://dx.doi.org/10.1115/85-igt-115.

Full text
Abstract:
In June 1980, the United States Congress passed the Energy Security Act which provided for the formation of the United States Synthetic Fuels Corporation and amended the Defense Production Act of 1950 to provide for synthetic fuels for the Department of Defense (DOD). A subsequent law, P.L., 96-304, appropriated up to $20 billion for financial incentives to foster a national synthetic fuel industry. The initial synthetic fuel project funded under the Energy Security Act is the Unocal Parachute Creek Project in Colorado with an expected shale oil production of 10,000 bbls/day. The Defense Fuel Supply Center (DFSC) contracted with Gary Energy Refining Company, Fruita, Colorado to provide approximately 5000 bbls/day of shale JP-4 for the United States Air Force (USAF) using crude from the Parachute Creek project, with initial deliveries to begin in 1985. The USAF immediately accelerated preparations for the eventual operational use of shale derived fuels for turbine engine aircraft. An extensive test and evaluation program was initiated consisting of aviation turbine fuel processing, fuel characterization, aircraft component and subsystem testing, engine and flight testing. This paper describes the testing program that was accomplished, the significant results which were determined and the quality assurance program that is being implemented to assure that the shale fuel meets the requirements of JP-4, the standard USAF jet fuel.
APA, Harvard, Vancouver, ISO, and other styles
3

Kidwell, J. "Garrett Multipurpose Small Power Unit (MPSPU) Program Status." In ASME 1989 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1989. http://dx.doi.org/10.1115/89-gt-172.

Full text
Abstract:
The Garrett Auxiliary Power Division’s Multipurpose Small Power unit (MPSPU), Contract DAAJ02-86-C-0006, sponsored by the Aviation Applied Technology Directorate, Ft. Eustis, Virginia, has progressed through detail design and analysis to component and power unit development testing. The MPSPU Advanced Development program is structured to provide advanced technology for current and future United States Army and other Department of Defense auxiliary power unit/secondary power system applications for aircraft, combat vehicles, and mobile tactical shelters. The MPSPU has been designed for low specific fuel consumption, low weight and volume, low acquisition and life cycle costs and high reliability and durability. This paper discusses the design and current developmental status of the Garrett GTP50 MPSPU as reported by Kidwell (1988).
APA, Harvard, Vancouver, ISO, and other styles
4

Annati, R. E., and J. R. Smyth. "Garrett GTP50-1 Multipurpose Small Power Unit Technology Demonstrator Program." In ASME 1991 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/91-gt-328.

Full text
Abstract:
The Multipurpose Small Power Unit (MPSPU) Advanced Development Program is providing the United States Army and other Department of Defense branches with advanced technology for current and future auxiliary power units (APUs)/secondary power systems (SPSs) in aircraft, combat vehicles, and mobile shelters. The design includes low specific fuel consumption (SFC), weight and volume, acquisition and life cycle costs (LCC), and high reliability and durability. The Garrett Auxiliary Power Division (GAPD) Model GTP50-1 MPSPU has demonstrated major advances in small gas turbine power unit design and manufacturing technologies. Component test rigs have completed extensive development testing. Power unit operation of 214 hours, with 557 starts, has been accumulated. Power unit and rig testing has demonstrated program goals and identified areas for continued technical development. The program has demonstrated 77.6 kW (104 shp), corrected to sea level standard day, at an SFC of 0.5 kg/kW-hr (0.8 lb/hp-hr).
APA, Harvard, Vancouver, ISO, and other styles
5

Cockle, John. "Risk Acceptance and Application of the Common Safety Method in the United States." In 2016 Joint Rail Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/jrc2016-5747.

Full text
Abstract:
The Federal Railroad Administration (FRA) has published a Notice of Proposed Rulemaking (NPRM) that will require passenger rail operators in the United States to develop a System Safety Program using a risk-based hazard management approach. Identified as 49 CFR, Part 270 System Safety Rule [1], the NPRM describes the basic requirements for a system safety program plan, including the need for a method for accepting risk. The NPRM does not, however, identify how the responsible party should actually go about managing risk. That is left up to the railways themselves. In Europe, hazard management is applied in the railroad industry (including high-speed rail systems) under the regulatory authority of the European Union. European Commission Regulation 352/2009/EC [2] outlines a Common Safety Method (CSM) on Risk Evaluation and Assessment for Railways of the European Union, commonly known as the CSM Regulation and the heart of the railway safety program in Europe. The CSM Regulation includes the standard risk assessment process elements: identification of the hazards, corresponding risks, mitigation measures to reduce the risk, and the resulting safety requirements to be fulfilled by the system under assessment. What sets the CSM Regulation apart from other risk assessment programs is that it provides a methodology for determining when acceptable risk is achieved. The risk acceptability of the system under assessment is evaluated using one or more of the following risk acceptance principles: a) The application of relevant codes of practice; b) A comparison with similar systems (reference systems); c) Explicit risk estimation. In essence, the responsible party can accept risk that has either been regulated to an acceptable level by an authority having jurisdiction or a widely-accepted industry practice, or if the risk has been successfully addressed by a similar railway system through that railway’s engineering and operational controls. If neither of these cases applies the responsible party can estimate the risk and choose to accept it or not. A common approach, even internationally, is to develop an explicit risk estimation process based on the U.S. Department of Defense Military Standard 882E (MIL-STD-882E) [3]. Safety hazards are identified, analyzed for risk (severity and probability), and mitigations are progressively applied until a level of safety is achieved that is as low as reasonably practicable. The California High-Speed Rail Authority (CHSRA) has adopted a risk-based hazard management program to achieve an acceptable level of safety for the design, construction, implementation and operation of the California High-Speed Rail System. CHSRA has deliberately used both domestic and international guidance and standards in the development of this program in an effort to apply the most up-to-date processes and philosophies, and to draw upon the impressive safety legacy of international high-speed railway operators. This paper will describe the relevant regulations and guidance (both domestically and internationally), review the elements of a risk acceptance program based upon the CSM Regulation, and apply the program to a select set of hazards to demonstrate how appropriate mitigations can be determined and residual risk accepted. The paper will also identify potential future applications for the CSM Regulation here in the United States, and will challenge the reader to manage hazards using a risk-based approach that incorporates the basic framework of the CSM Regulation.
APA, Harvard, Vancouver, ISO, and other styles
6

Macalino, Grace, Nicole Kluz, Nazia Rahman, Jose Sanchez, and Ann Jese. "O12.1 Establishing a department of defense (DOD) gonococcal resistance surveillance effort, reference laboratory and repository from a population of at-risk united states dod beneficiaries." In STI and HIV World Congress Abstracts, July 9–12 2017, Rio de Janeiro, Brazil. BMJ Publishing Group Ltd, 2017. http://dx.doi.org/10.1136/sextrans-2017-053264.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siemietkowski, John S., and Walter S. Williams. "10,000 Hours of LM2500 Gas Turbine Experience as Seen Through the Borescope." In ASME 1986 International Gas Turbine Conference and Exhibit. American Society of Mechanical Engineers, 1986. http://dx.doi.org/10.1115/86-gt-269.

Full text
Abstract:
The General Electric LM2500 Marine Gas Turbine, currently used by the United States Navy as main propulsion on various classes of ships, lends itself very easily to a procedure known as photoborescopy. Photoborescopy is that process where discrete, color photographs are taken of various internal parts of the engine. Borescoping in itself is not new, but maximizing the borescopes capabilities is a program that the U.S. Navy continuously is developing at the Naval Ship Systems Engineering Station (NAVSSES) in Philadelphia, Pennsylvania. This paper will describe the photoborescopy technique used by NAVSSES and also give and show graphically the Fleet experience with two LM2500’s which had accumulated 10,000 hours of successful at-sea operation. The opinions expressed herein are those of the author and not necessarily of the Department of Defense or the Navy Department.
APA, Harvard, Vancouver, ISO, and other styles
8

Maier, Jonathan R. A., James M. McLellan, Gregory Mocko, Georges M. Fadel, and Mark Brudnak. "Lightweight Engineering of Military Vehicles Through Requirements Analysis and Function Integration." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86562.

Full text
Abstract:
The trend toward lighter-weight vehicles in the private sector has been pushed by demands to improve fuel economy, improve dynamic performance, and reduce material and transportation costs. The same demands exist and are even more acute for military vehicles. The reduction of weight across a military vehicle platform can affect hundreds of thousands of vehicles with dramatic ramifications for military budgets, logistic support, deployment time and cost, and other factors critical to national defense. In this paper we report on methods developed for requirements analysis and function integration based on a modeling framework (developed in previous work) which captures requirements, functions, working principles, components, component parameters, test measures, and tests. We also show that the problem of assigning the mass of individual components to requirements is not solvable in practice. The methods are demonstrated using a case study of the United States Department of Defense Family of Medium Tactical Vehicles (FMTV).
APA, Harvard, Vancouver, ISO, and other styles
9

Barattino, William J., Scott Foster, and James Spaulding. "The U.S. Federal Market as an Early Adopter of SMRs." In ASME 2014 Small Modular Reactors Symposium. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/smr2014-3331.

Full text
Abstract:
The Federal Government accounts for about 2% of energy usage within the United States, with electricity accounting for approximately one-fifth of this usage. The Department of Defense (DOD) is the largest energy consumer across all Federal Agencies, accounting for nearly half of total use and has implemented programs to assure sustainable energy supplies for meeting mission critical operations. As prototype systems of Small Modular Reactors mature during the remainder of this decade, there is growing interest at senior levels of government to use the secure confines of military bases for electricity generated with SMRs to service power requirements of the DOD base and possibly the surrounding communities. This paper explores the potential for using DOD as an early adopter of SMRs from perspectives of the size of the market and adaptability of the current procurement process for private ownership of SMRs on military bases. Such an approach is shown to be consistent with DOD Sustainability objectives, as well as ensuring a continuation of the projected erosion of diversity mix for prime power generation within the U.S. A review of contract types for energy services are evaluated from the perspective of including SMRs. Required modifications for SMRs to be a part of this energy mix for Federal Agencies are presented.
APA, Harvard, Vancouver, ISO, and other styles
10

McManamon, Paul F., Gary Kamerman, and Milton Huffaker. "A history of laser radar in the United States." In SPIE Defense, Security, and Sensing, edited by Monte D. Turner and Gary W. Kamerman. SPIE, 2010. http://dx.doi.org/10.1117/12.862562.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "United States. Departmentof Defense"

1

Hoelscher, J. F., R. Ducey, G. D. Smith, L. W. Strother, and C. Combs. Photovoltaics in the United States Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada348498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

NORTH CAROLINA UNIV AT CHAPEL HILL. X.509 Certificate Policy for the United States Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, December 1999. http://dx.doi.org/10.21236/ada385555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DEPARTMENT OF DEFENSE WASHINGTON DC. X.509 Certificate Policy for the United States Department of Defense Version 5.2. Fort Belvoir, VA: Defense Technical Information Center, November 2000. http://dx.doi.org/10.21236/ada399894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bates, Michael M. NEPA After Natural Resources Defense Council V. United States Department of the Navy. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada417428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keysar, Elizabeth. Relevance of Emerging Ecosystem Service Science and Policy to the United States Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, September 2011. http://dx.doi.org/10.21236/ada608637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DEPARTMENT OF DEFENSE WASHINGTON DC. Estimated Impacts of Sequestration-Level Funding: United States Department of Defense Fiscal Year 1015 Budget Request. Fort Belvoir, VA: Defense Technical Information Center, April 2014. http://dx.doi.org/10.21236/ada599263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DEPARTMENT OF DEFENSE WASHINGTON DC. The Budget of the United States Government. Department of Defense Extract for Fiscal Years 1990 and 1991. Fort Belvoir, VA: Defense Technical Information Center, January 1988. http://dx.doi.org/10.21236/ada207053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Extract of the Budget of the United States Government for Fiscal Years 1992 and 1993. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada240106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

DEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Program for Planning, Managing, and Accounting for Contractor Services and Contractor Personnel During Contingency Operations. Report to the Congress of the United States. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada503689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Scott, Dylan, Steven Graham, Bradford Songer, Brian Green, Michael Grotke, and Tony Brogdon. Laboratory characterization of Cor-Tuf Baseline and UHPC-S. Engineer Research and Development Center (U.S.), March 2021. http://dx.doi.org/10.21079/11681/40121.

Full text
Abstract:
This experimental effort is part of a larger program entitled Development of Ultra-High-Performance Concrete Tools and Design Guidelines. This program operates in accordance with an agreement concerning combating terrorism research and development between the United States of America Department of Defense and the Republic of Singapore Ministry of Defence. The objective of the program is to develop a better understanding of the potential benefits that may be achieved from the application of ultra-high-performance concrete (UHPC) materials for protective structures. The specific effort detailed in this report will provide insight into laboratory-scale mechanical properties of Cor-Tuf and a proprietary material termed UHPC-Singapore (UHPC-S).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography