Science.gov

Sample records for defense identification code

  1. Color code identification in coded structured light.

    PubMed

    Zhang, Xu; Li, Youfu; Zhu, Limin

    2012-08-01

    Color code is widely employed in coded structured light to reconstruct the three-dimensional shape of objects. Before determining the correspondence, a very important step is to identify the color code. Until now, the lack of an effective evaluation standard has hindered the progress in this unsupervised classification. In this paper, we propose a framework based on the benchmark to explore the new frontier. Two basic facets of the color code identification are discussed, including color feature selection and clustering algorithm design. First, we adopt analysis methods to evaluate the performance of different color features, and the order of these color features in the discriminating power is concluded after a large number of experiments. Second, in order to overcome the drawback of K-means, a decision-directed method is introduced to find the initial centroids. Quantitative comparisons affirm that our method is robust with high accuracy, and it can find or closely approach the global peak. PMID:22859022

  2. Secure surface identification codes

    NASA Astrophysics Data System (ADS)

    Beekhof, F.; Voloshynovskiy, S.; Koval, O.; Villan, R.; Pun, T.

    2008-02-01

    This paper introduces an identification framework for random microstructures of material surfaces. These microstructures represent a kind of unique fingerprints that can be used to track and trace an item as well as for anti-counterfeiting. We first consider the architecture for mobile phone-based item identification and then introduce a practical identification algorithm enabling fast searching in large databases. The proposed algorithm is based on reference list decoding. The link to digital communications and robust perceptual hashing is shown. We consider a practical construction of reference list decoding, which comprizes computational complexity, security, memory storage and performance requirements. The efficiency of the proposed algorithm is demonstrated on experimental data obtained from natural paper surfaces.

  3. 76 FR 38046 - Defense Federal Acquisition Regulation Supplement (DFARS); Assignment of Order Codes (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-29

    ... Logistics Agency with Defense Procurement and Acquisition Policy, Program Development and Implementation, as... Regulation Supplement (DFARS); Assignment of Order Codes (DFARS Case 2011-D004) AGENCY: Defense Acquisition... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  4. 49 CFR 178.502 - Identification codes for packagings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Identification codes for packagings. 178.502... FOR PACKAGINGS Non-bulk Performance-Oriented Packaging Standards § 178.502 Identification codes for packagings. (a) Identification codes for designating kinds of packagings consist of the following: (1)...

  5. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  6. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  7. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  8. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Large Packaging identification codes. 178.905... PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code... letter(s) specified in paragraph (b) of this section. (a) Large packaging code number designations are...

  9. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed...

  10. 49 CFR 178.1005 - Flexible Bulk Container identification code.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Flexible Bulk Container identification code. 178... FOR PACKAGINGS Flexible Bulk Container Standards § 178.1005 Flexible Bulk Container identification code. The Flexible Bulk Container code designation is BK3....

  11. 49 CFR 178.1005 - Flexible Bulk Container identification code.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Flexible Bulk Container identification code. 178... FOR PACKAGINGS Flexible Bulk Container Standards § 178.1005 Flexible Bulk Container identification code. The Flexible Bulk Container code designation is BK3....

  12. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... types and sizes of boats that will be imported. If a nation has a hull identification number system... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  13. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... be imported. If a nation has a hull identification number system which has been accepted by the U.S... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  14. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... be imported. If a nation has a hull identification number system which has been accepted by the U.S... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Manufacturer identification code... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31...

  15. 76 FR 9714 - Defense Federal Acquisition Regulation Supplement; Passive Radio Frequency Identification (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-22

    ... Regulation Supplement; Passive Radio Frequency Identification (DFARS Case 2010-D014) AGENCY: Defense... to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to update requirements..., Chapter 203, for marking of 463L System pallets. Passive RFID tag means a tag that reflects energy...

  16. Improving the Use of Self-Generated Identification Codes

    ERIC Educational Resources Information Center

    Schnell, Rainer; Bachteler, Tobias; Reiher, Jorg

    2010-01-01

    In panel studies on sensitive topics, respondent-generated identification codes are often used to link records across surveys. However, usually a substantial number of cases are lost due to the codes. These losses may cause biased estimates. Using more components and linking the codes by the Levenshtein string distance function will reduce the…

  17. Identification of a Maize Locus that Modulates the Hypersensitive Defense Response, Using Mutant-Assisted Gene Identification and Characterization (MAGIC)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The hypersensitive response (HR) is the most visible and arguably the most important defense response in plants, although the details of how it is controlled and executed remain patchy. In this paper a novel genetic technique called MAGIC (Mutant-Assisted Gene Identification and Characterization) i...

  18. Identification coding schemes for modulated reflectance systems

    DOEpatents

    Coates, Don M.; Briles, Scott D.; Neagley, Daniel L.; Platts, David; Clark, David D.

    2006-08-22

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  19. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases...

  20. Bar code technology improves positive patient identification and transfusion safety.

    PubMed

    Sandler, S G; Langeberg, A; Dohnalek, L

    2005-01-01

    As a result of human error, an estimated 1 in 12,000 blood transfusions is given to the wrong patient. The cause of nearly all of these errors is failure of hospital personnel to identify positively intended transfusion recipients, their blood samples for cross-matching, or their correct blood components. We describe our experience using a point-of-care bar code transfusion safety system that links patients' bar-coded wristbands, with bar-coded labels on blood sample tubes, blood component bags, and nurses' identification badges. The result was 100 % accuracy of matching patients, their blood samples, and components for transfusions. For verifying information before starting blood transfusions, nurses preferred bar code "double checks" to conventional visual "double checks" by a second nurse. Methods are needed to reinforce nurses' proficiency with technological approaches to transfusion safety, such as software-driven bar code scanning, in situations where transfusions are administered infrequently. PMID:16050151

  1. Adaptive error correction codes for face identification

    NASA Astrophysics Data System (ADS)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  2. Identification of Drosophila Mutants Affecting Defense to an Entomopathogenic Fungus

    PubMed Central

    Lu, Hsiao-Ling; Wang, Jonathan B.; Brown, Markus A.; Euerle, Christopher; St. Leger, Raymond J.

    2015-01-01

    Fungi cause the majority of insect disease. However, to date attempts to model host–fungal interactions with Drosophila have focused on opportunistic human pathogens. Here, we performed a screen of 2,613 mutant Drosophila lines to identify host genes affecting susceptibility to the natural insect pathogen Metarhizium anisopliae (Ma549). Overall, 241 (9.22%) mutant lines had altered resistance to Ma549. Life spans ranged from 3.0 to 6.2 days, with females being more susceptible than males in all lines. Speed of kill correlated with within-host growth and onset of sporulation, but total spore production is decoupled from host genotypes. Results showed that mutations affected the ability of Drosophila to restrain rather than tolerate infections and suggested trade-offs between antifungal and antibacterial genes affecting cuticle and gut structural barriers. Approximately, 13% of mutations where in genes previously associated with host pathogen interactions. These encoded fast-acting immune responses including coagulation, phagocytosis, encapsulation and melanization but not the slow-response induction of anti-fungal peptides. The non-immune genes impact a wide variety of biological functions, including behavioral traits. Many have human orthologs already implicated in human disorders; while others were mutations in protein and non-protein coding genes for which disease resistance was the first biological annotation. PMID:26202798

  3. Predictive Fallout Composition Modeling: Improvements and Applications of the Defense Land Fallout Interpretive Code

    SciTech Connect

    Hooper, David A; Jodoin, Vincent J; Lee, Ronald W; Monterial, Mateusz

    2012-01-01

    This paper outlines several improvements to the Particle Activity Module of the Defense Land Fallout Interpretive Code (DELFIC). The modeling of each phase of the fallout process is discussed within DELFIC to demonstrate the capabilities and limitations with the code for modeling and simulation. Expansion of the DELFIC isotopic library to include actinides and light elements is shown. Several key features of the new library are demonstrated, including compliance with ENDF/B-VII standards, augmentation of hardwired activated soil and actinide decay calculations with exact Bateman calculations, and full physical and chemical fractionation of all material inventories. Improvements to the radionuclide source term are demonstrated, including the ability to specify heterogeneous fission types and the ability to import source terms from irradiation calculations using the Oak Ridge Isotope Generation (ORIGEN) code. Additionally, the dose, kerma, and effective dose conversion factors are revised. Finally, the application of DELFIC for consequence management planning and forensic analysis is presented. For consequence management, DELFIC is shown to provide disaster recovery teams with simulations of real-time events, including the location, composition, time of arrival, activity rates, and dose rates of fallout, accounting for site-specific atmospheric effects. The results from DELFIC are also demonstrated for use by nuclear forensics teams to plan collection routes (including the determination of optimal collection locations), estimate dose rates to collectors, and anticipate the composition of material at collection sites. These capabilities give mission planners the ability to maximize their effectiveness in the field while minimizing risk to their collectors.

  4. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  5. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  6. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  7. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  8. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  9. Bar Coding MS(2) Spectra for Metabolite Identification.

    PubMed

    Spalding, Jonathan L; Cho, Kevin; Mahieu, Nathaniel G; Nikolskiy, Igor; Llufrio, Elizabeth M; Johnson, Stephen L; Patti, Gary J

    2016-03-01

    Metabolite identifications are most frequently achieved in untargeted metabolomics by matching precursor mass and full, high-resolution MS(2) spectra to metabolite databases and standards. Here we considered an alternative approach for establishing metabolite identifications that does not rely on full, high-resolution MS(2) spectra. First, we select mass-to-charge regions containing the most informative metabolite fragments and designate them as bins. We then translate each metabolite fragmentation pattern into a binary code by assigning 1's to bins containing fragments and 0's to bins without fragments. With 20 bins, this binary-code system is capable of distinguishing 96% of the compounds in the METLIN MS(2) library. A major advantage of the approach is that it extends untargeted metabolomics to low-resolution triple quadrupole (QqQ) instruments, which are typically less expensive and more robust than other types of mass spectrometers. We demonstrate a method of acquiring MS(2) data in which the third quadrupole of a QqQ instrument cycles over 20 wide isolation windows (coinciding with the location and width of our bins) for each precursor mass selected by the first quadrupole. Operating the QqQ instrument in this mode yields diagnostic bar codes for each precursor mass that can be matched to the bar codes of metabolite standards. Furthermore, our data suggest that using low-resolution bar codes enables QqQ instruments to make MS(2)-based identifications in untargeted metabolomics with a specificity and sensitivity that is competitive to high-resolution time-of-flight technologies. PMID:26837423

  10. CRITICA: coding region identification tool invoking comparative analysis

    NASA Technical Reports Server (NTRS)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  11. Identification of protein coding regions in RNA transcripts

    PubMed Central

    Tang, Shiyuyun; Lomsadze, Alexandre; Borodovsky, Mark

    2015-01-01

    Massive parallel sequencing of RNA transcripts by next-generation technology (RNA-Seq) generates critically important data for eukaryotic gene discovery. Gene finding in transcripts can be done by statistical (alignment-free) as well as by alignment-based methods. We describe a new tool, GeneMarkS-T, for ab initio identification of protein-coding regions in RNA transcripts. The algorithm parameters are estimated by unsupervised training which makes unnecessary manually curated preparation of training sets. We demonstrate that (i) the unsupervised training is robust with respect to the presence of transcripts assembly errors and (ii) the accuracy of GeneMarkS-T in identifying protein-coding regions and, particularly, in predicting translation initiation sites in modelled as well as in assembled transcripts compares favourably to other existing methods. PMID:25870408

  12. Identification of a Maize Locus That Modulates the Hypersensitive Defense Response, Using Mutant-Assisted Gene Identification and Characterization

    PubMed Central

    Chintamanani, Satya; Hulbert, Scot H.; Johal, Gurmukh S.; Balint-Kurti, Peter J.

    2010-01-01

    Potentially useful naturally occurring genetic variation is often difficult to identify as the effects of individual genes are subtle and difficult to observe. In this study, a novel genetic technique called Mutant-Assisted Gene Identification and Characterization is used to identify naturally occurring loci modulating the hypersensitive defense response (HR) in maize. Mutant-Assisted Gene Identification and Characterization facilitates the identification of naturally occurring alleles underlying phenotypic variation from diverse germplasm, using a mutant phenotype as a “reporter.” In this study the reporter phenotype was caused by a partially dominant autoactive disease resistance gene, Rp1-D21, which caused HR lesions to form spontaneously all over the plant. Here it is demonstrated that the Rp1-D21 phenotype is profoundly affected by genetic background. By crossing the Rp1-D21 gene into the IBM mapping population, it was possible to map and identify Hrml1 on chromosome 10, a locus responsible for modulating the HR phenotype conferred by Rp1-D21. Other loci with smaller effects were identified on chromosomes 1 and 9. These results demonstrate that Mutant-Assisted Gene Identification and Characterization is a viable approach for identifying naturally occurring useful genetic variation. PMID:20176981

  13. Amino acids and our genetic code: a highly adaptive and interacting defense system.

    PubMed

    Verheesen, R H; Schweitzer, C M

    2012-04-01

    Since the discovery of the genetic code, Mendel's heredity theory and Darwin's evolution theory, science believes that adaptations to the environment are processes in which the adaptation of the genes is a matter of probability, in which finally the specie will survive which is evolved by chance. We hypothesize that evolution and the adaptation of the genes is a well-organized fully adaptive system in which there is no rigidity of the genes. The dividing of the genes will take place in line with the environment to be expected, sensed through the mother. The encoding triplets can encode for more than one amino acid depending on the availability of the amino acids and the needed micronutrients. Those nutrients can cause disease but also prevent diseases, even cancer and auto immunity. In fact we hypothesize that auto immunity is an effective process of the organism to clear suboptimal proteins, formed due to amino acid and micronutrient deficiencies. Only when deficiencies sustain, disease will develop, otherwise the autoantibodies will function as all antibodies function, in a protective way. Furthermore, we hypothesize that essential amino acids are less important than nonessential amino acid (NEA). Species developed the ability to produce the nonessential amino acids themselves because they were not provided by food sufficiently. In contrast essential amino acids are widely available, without any evolutionary pressure. Since we can only produce small amounts of NEA and the availability in food can be reasoned to be too low they are still our main concern in amino acid availability. In conclusion, we hypothesize that increasing health will only be possible by improving our natural environment and living circumstances, not by changing the genes, since they are our last line of defense in surviving our environmental changes. PMID:22289341

  14. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response

    PubMed Central

    2014-01-01

    Background Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA“s” and PthC“s” of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Results Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA“s” and PthC“s” in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. Conclusions The identification of PthA“s” and PthC“s” targets, such as the LOB (LATERAL ORGAN BOUNDARY) and CCNBS genes that we report here, is key for the understanding

  15. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology.

    PubMed

    Baad, Rajendra K; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  16. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  17. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  18. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... codes: (a) Code 000—The United States: The United States of America, any State(s) of the United States... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Identification of principal geographic code..., ORIGIN AND NATIONALITY FOR COMMODITIES AND SERVICES FINANCED BY USAID Definitions and Scope of This...

  19. PROBCON-HDW: A probability and consequence system of codes for long-term analysis of Hanford defense wastes

    SciTech Connect

    Piepho, M.G.; Nguyen, T.H.

    1988-12-01

    The PROBCON-HDW (PROBability and CONsequence analysis for Hanford defense waste) computer code system calculates the long-term cumulative releases of radionuclides from the Hanford defense wastes (HDW) to the accessible environment and compares the releases to environmental release limits as defined in 40 CFR 191. PROBCON-HDW takes into account the variability of input parameter values used in models to calculate HDW release and transport in the vadose zone to the accessible environment (taken here as groundwater). A human intrusion scenario, which consists of drilling boreholes into the waste beneath the waste sites and bringing waste to the surface, is also included in PROBCON-HDW. PROBCON-HDW also includes the capability to combine the cumulative releases according to various long-term (10,000 year) scenarios into a composite risk curve or complementary cumulative distribution function (CCDF). The system structure of the PROBCON-HDW codes, the mathematical models in PROBCON-HDW, the input files, the input formats, the command files, and the graphical output results of several HDW release scenarios are described in the report. 3 refs., 7 figs., 9 tabs.

  20. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Drilleau, Margery O.

    1976-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), and National Cartographic Information Center (NCIC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  1. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Josefson, Beverly M.

    1982-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (USGS)

  2. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Myers, Beverly M.

    1979-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  3. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Drilleau, Margery O.

    1978-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (Woodard-USGS)

  4. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Edwards, Melvin D.; Myers, Beverly M.

    1981-01-01

    This report contains codes for the identification of public and private organizations listed in computerized data systems. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new codes. (USGS)

  5. The Use of Self-Generated Identification Codes in Longitudinal Research

    ERIC Educational Resources Information Center

    Yurek, Leo A.; Vasey, Joseph; Sullivan Havens, Donna

    2008-01-01

    Longitudinal research designs involve data collection at multiple time points to measure change over time. Therefore, identification of the same respondents is essential at each time point so that data from the same respondents can be matched for comparison over time. Subject-generated identification codes permit an anonymous means to track…

  6. Identification of ICD Codes Suggestive of Child Maltreatment

    ERIC Educational Resources Information Center

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  7. Identification of Novel Defense Response Genes in Medicago truncatula for Improving Disease Resistance in Alfalfa

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Infection of plants by pathogens initiates a cascade of defense responses that halt or limit pathogen growth. However, the role of many of the genes induced by pathogens is unknown. Transcript profiling was used to identify genes associated with defense responses in the model legume Medicago truncat...

  8. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Blackwell, C.D.

    1988-01-01

    Codes for the unique identification of public and private organizations listed in computerized data systems are presented. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new books. (Author 's abstract)

  9. The effect of a redundant color code on an overlearned identification task

    NASA Technical Reports Server (NTRS)

    Obrien, Kevin

    1992-01-01

    The possibility of finding redundancy gains with overlearned tasks was examined using a paradigm varying familiarity with the stimulus set. Redundant coding in a multidimensional stimulus was demonstrated to result in increased identification accuracy and decreased latency of identification when compared to stimuli varying on only one dimension. The advantages attributable to redundant coding are referred to as redundancy gain and were found for a variety of stimulus dimension combinations, including the use of hue or color as one of the dimensions. Factors that have affected redundancy gain include the discriminability of the levels of one stimulus dimension and the level of stimulus-to-response association. The results demonstrated that response time is in part a function of familiarity, but no effect of redundant color coding was demonstrated. Implications of research on coding in identification tasks for display design are discussed.

  10. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy...-1000 Air Force: SAF/AQCI, 1060 Air Force Pentagon, Washington, DC 20330-1060 Defense Logistics Agency: Defense Logistics Agency, Acquisition Policy Branch (J-3311), John J. Kingman Road, Fort Belvoir, VA...

  11. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Assignment of order codes. 204.7005 Section 204.7005 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Uniform Procurement Instrument Identification Numbers 204.7005 Assignment of order codes....

  12. Identification of transcriptional regulatory nodes in soybean defense networks using transient co-transactivation assays

    PubMed Central

    Wang, Yongli; Wang, Hui; Ma, Yujie; Du, Haiping; Yang, Qing; Yu, Deyue

    2015-01-01

    Plant responses to major environmental stressors, such as insect feeding, not only occur via the functions of defense genes but also involve a series of regulatory factors. Our previous transcriptome studies proposed that, in addition to two defense-related genes, GmVSPβ and GmN:IFR, a high proportion of transcription factors (TFs) participate in the incompatible soybean-common cutworm interaction networks. However, the regulatory mechanisms and effects of these TFs on those induced defense-related genes remain unknown. In the present work, we isolated and identified 12 genes encoding MYB, WRKY, NAC, bZIP, and DREB TFs from a common cutworm-induced cDNA library of a resistant soybean line. Sequence analysis of the promoters of three co-expressed genes, including GmVSPα, GmVSPβ, and GmN:IFR, revealed the enrichment of various TF-binding sites for defense and stress responses. To further identify the regulatory nodes composed of these TFs and defense gene promoters, we performed extensive transient co-transactivation assays to directly test the transcriptional activity of the 12 TFs binding at different levels to the three co-expressed gene promoters. The results showed that all 12 TFs were able to transactivate the GmVSPβ and GmN:IFR promoters. GmbZIP110 and GmMYB75 functioned as distinct regulators of GmVSPα/β and GmN:IFR expression, respectively, while GmWRKY39 acted as a common central regulator of GmVSPα/β and GmN:IFR expression. These corresponding TFs play crucial roles in coordinated plant defense regulation, which provides valuable information for understanding the molecular mechanisms involved in insect-induced transcriptional regulation in soybean. More importantly, the identified TFs and suitable promoters can be used to engineer insect-resistant plants in molecular breeding studies. PMID:26579162

  13. Computational identification of genetic subnetwork modules associated with maize defense response to Fusarium verticillioides

    PubMed Central

    2015-01-01

    Background Maize, a crop of global significance, is vulnerable to a variety of biotic stresses resulting in economic losses. Fusarium verticillioides (teleomorph Gibberella moniliformis) is one of the key fungal pathogens of maize, causing ear rots and stalk rots. To better understand the genetic mechanisms involved in maize defense as well as F. verticillioides virulence, a systematic investigation of the host-pathogen interaction is needed. The aim of this study was to computationally identify potential maize subnetwork modules associated with its defense response against F. verticillioides. Results We obtained time-course RNA-seq data from B73 maize inoculated with wild type F. verticillioides and a loss-of-virulence mutant, and subsequently established a computational pipeline for network-based comparative analysis. Specifically, we first analyzed the RNA-seq data by a cointegration-correlation-expression approach, where maize genes were jointly analyzed with known F. verticillioides virulence genes to find candidate maize genes likely associated with the defense mechanism. We predicted maize co-expression networks around the selected maize candidate genes based on partial correlation, and subsequently searched for subnetwork modules that were differentially activated when inoculated with two different fungal strains. Based on our analysis pipeline, we identified four potential maize defense subnetwork modules. Two were directly associated with maize defense response and were associated with significant GO terms such as GO:0009817 (defense response to fungus) and GO:0009620 (response to fungus). The other two predicted modules were indirectly involved in the defense response, where the most significant GO terms associated with these modules were GO:0046914 (transition metal ion binding) and GO:0046686 (response to cadmium ion). Conclusion Through our RNA-seq data analysis, we have shown that a network-based approach can enhance our understanding of the

  14. A simple and inexpensive bar-coding technique for denture identification

    PubMed Central

    Nalawade, Sonali N; Lagdive, Sanjay B; Gangadhar, SA; Bhandari, Aruna J

    2011-01-01

    A number of commercial methods for identifying dentures are available. They can be either invasive or noninvasive techniques. The less sophisticated procedures include simple engraving with bur, and more sophisticated procedures use labels or chips. Bar coding system is a way of transferring data to the computer and huge data can be stored as a record. Bar coding can be easily incorporated during acrylization of the denture and thus could be used in individual identification. PMID:22408329

  15. A simple and inexpensive bar-coding technique for denture identification.

    PubMed

    Nalawade, Sonali N; Lagdive, Sanjay B; Gangadhar, Sa; Bhandari, Aruna J

    2011-07-01

    A number of commercial methods for identifying dentures are available. They can be either invasive or noninvasive techniques. The less sophisticated procedures include simple engraving with bur, and more sophisticated procedures use labels or chips. Bar coding system is a way of transferring data to the computer and huge data can be stored as a record. Bar coding can be easily incorporated during acrylization of the denture and thus could be used in individual identification. PMID:22408329

  16. 76 FR 14641 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... the ``Submit a Comment'' screen. Please include your name, company name (if any), and ``DFARS Case... This DFARS case was initiated at the request of the Defense Contract Management Agency so that when DoD... joint agency instructions, such as Management of Aviation Critical Safety Items (dated January 25,...

  17. Identification of defense-related genes newly-associated with tomato flower abscission

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense res...

  18. Machine readable identification systems: An overview. [Bar code and other labeling methods

    SciTech Connect

    Smith, F.J.; Cantor, S.

    1987-09-01

    The application of automated identification of an item by the use of machine readable methods is improving the accuracy and speed of data capture. Bar codes, optical character recognition, magnetic strips, and magnetic-ink recognition are all current machine readable methods which are used for data collection. Bar code data collection is the most used technology for real time inventory control, tracking, and point of sale applications. Magnetic strip coding is used for highly compact data identification on ID cards and on tags. Optical character recognition is generally used today to capture documents for computer storage and recall. Magnetic-ink character recognition, though used widely in banking, has limited applications elsewhere. Bar code methods are currently experiencing a faster rate of growth than the other technologies. Emphasis of this paper is on bar coding because of its popularity. The fundamentals of bar coding are discussed and labeling and scanning techniques are presented. New, automatic data-collection techniques are being developed, utilizing microcircuits and compact-disk memory media. The greatly increased memory capacity of these systems will likely lead to identification in terms of definitive characteristics of the item.

  19. Identification and function of long non-coding RNA

    PubMed Central

    Ernst, Carl; Morton, Cynthia C.

    2013-01-01

    Long non-coding (lnc) RNAs are defined as non-protein coding RNAs distinct from housekeeping RNAs such as tRNAs, rRNAs, and snRNAs, and independent from small RNAs with specific molecular processing machinery such as micro- or piwi-RNAs. Recent studies of lncRNAs across different species have revealed a diverse population of RNA molecules of differing size and function. RNA sequencing studies suggest transcription throughout the genome, so there is a need to understand how sequence relates to functional and structural relationships amongst RNA molecules. Our synthesis of recent studies suggests that neither size, presence of a poly-A tail, splicing, direction of transcription, nor strand specificity are of importance to lncRNA function. Rather, relative genomic position in relation to a target is fundamentally important. In this review, we describe issues of key importance in functional assessment of lncRNA and how this might apply to lncRNAs important in neurodevelopment. PMID:24106460

  20. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  1. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  2. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  3. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  4. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  5. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile...

  6. One-time collision arbitration algorithm in radio-frequency identification based on the Manchester code

    NASA Astrophysics Data System (ADS)

    Liu, Chen-Chung; Chan, Yin-Tsung

    2011-02-01

    In radio-requency identification (RFID) systems, when multiple tags transmit data to a reader simultaneously, these data may collide and create unsuccessful identifications; hence, anticollision algorithms are needed to reduce collisions (collision cycles) to improve the tag identification speed. We propose a one-time collision arbitration algorithm to reduce both the number of collisions and the time consumption for tags' identification in RFID. The proposed algorithm uses Manchester coding to detect the locations of collided bits, uses the divide-and-conquer strategy to find the structure of colliding bits to generate 96-bit query strings as the 96-bit candidate query strings (96BCQSs), and uses query-tree anticollision schemes with 96BCQSs to identify tags. The performance analysis and experimental results show that the proposed algorithm has three advantages: (i) reducing the number of collisions to only one, so that the time complexity of tag identification is the simplest O(1), (ii) storing identified identification numbers (IDs) and the 96BCQSs in a register to save the used memory, and (iii) resulting in the number of bits transmitted by both the reader and tags being evidently less than the other algorithms in one-tag identification or in all tags identification.

  7. 76 FR 52138 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... a proposed rule at 76 FR 14641 on March 17, 2011, to add a contract clause that clearly identifies... published at 76 FR 14642 on March 17, 2011. Briefly, the combination of the actions of the design control... Regulation Supplement; Identification of Critical Safety Items (DFARS Case 2010-D022) AGENCY:...

  8. Department of Defense picture archiving and communication system acceptance testing: results and identification of problem components.

    PubMed

    Allison, Scott A; Sweet, Clifford F; Beall, Douglas P; Lewis, Thomas E; Monroe, Thomas

    2005-09-01

    The PACS implementation process is complicated requiring a tremendous amount of time, resources, and planning. The Department of Defense (DOD) has significant experience in developing and refining PACS acceptance testing (AT) protocols that assure contract compliance, clinical safety, and functionality. The DOD's AT experience under the initial Medical Diagnostic Imaging Support System contract led to the current Digital Imaging Network-Picture Archiving and Communications Systems (DIN-PACS) contract AT protocol. To identify the most common system and component deficiencies under the current DIN-PACS AT protocol, 14 tri-service sites were evaluated during 1998-2000. Sixteen system deficiency citations with 154 separate types of limitations were noted with problems involving the workstation, interfaces, and the Radiology Information System comprising more than 50% of the citations. Larger PACS deployments were associated with a higher number of deficiencies. The most commonly cited systems deficiencies were among the most expensive components of the PACS. PMID:15924273

  9. Evidence for a Nest Defense Pheromone in Bald-Faced Hornets, Dolichovespula Maculata, and Identification of Components.

    PubMed

    Jimenez, Sebastian Ibarra; Gries, Regine; Zhai, Huimin; Derstine, Nathan; McCann, Sean; Gries, Gerhard

    2016-05-01

    In eusocial insects like Bald-faced hornets, Dolichovespula maculata, nest defense is essential because nests contain a large number of protein-rich larvae and pupae, and thus are attractive to nest predators. Our objectives were to investigate whether D. maculata exhibit pheromone-mediated nest defense, and to identify and field test any pheromone components. We tested for pheromone-mediated nest defense behavior of D. maculata by placing a paired box-apparatus near the entrance of D. maculata nests, and treating both boxes with a solvent control, or one of the two boxes with a solvent control and the other with either venom sac extract, the putative source of nest defense pheromone, or synthetic pheromone. The sound impulses caused by nest mates attempting to sting or strike the boxes were recorded for 3 min. Compared to the double-control treatment, the number of strikes increased 27-fold when one of the two boxes was treated with venom sac extract, providing evidence for an alarm response. The box treated with venom sac extract also induced a significantly greater proportion of strikes than the corresponding control box, providing evidence for a target-oriented response. Analyzing venom sac extract by gas chromatographic-electroantennographic detection (GC-EAD) and GC-mass spectrometry resulted in the identification of seven candidate pheromone components: (a) dimethylaminoethanol, (b) dimethylamino ethyl acetate, (c) 2,5-dimethylpyrazine, (d) N-3-methylbutylacetamide, (e) 2-heptadecanone, (f) (Z)-8-heptadecen-2-one, and (g) (Z)-10-nonadecen-2-one. Testing in paired-box bioassays blends of the nitrogen-containing volatile components a-d, the less volatile ketones e-g, or both (a-g), indicated that a-d primarily have an alarm function. The ketones e-g, in contrast, induced target-oriented responses, possibly marking the box, or potential nest predators, for guided and concerted attacks, or enhancing the alarm-inducing effect of the volatile pheromone components

  10. Identification and Validation of Reference Genes for Transcript Normalization in Strawberry (Fragaria × ananassa) Defense Responses

    PubMed Central

    Amil-Ruiz, Francisco; Garrido-Gala, José; Blanco-Portales, Rosario; Folta, Kevin M.; Muñoz-Blanco, Juan; Caballero, José L.

    2013-01-01

    Strawberry (Fragaria spp) is an emerging model for the development of basic genomics and recombinant DNA studies among rosaceous crops. Functional genomic and molecular studies involve relative quantification of gene expression under experimental conditions of interest. Accuracy and reliability are dependent upon the choice of an optimal reference control transcript. There is no information available on validated endogenous reference genes for use in studies testing strawberry-pathogen interactions. Thirteen potential pre-selected strawberry reference genes were tested against different tissues, strawberry cultivars, biotic stresses, ripening and senescent conditions, and SA/JA treatments. Evaluation of reference candidate’s suitability was analyzed by five different methodologies, and information was merged to identify best reference transcripts. A combination of all five methods was used for selective classification of reference genes. The resulting superior reference genes, FaRIB413, FaACTIN, FaEF1α and FaGAPDH2 are strongly recommended as control genes for relative quantification of gene expression in strawberry. This report constitutes the first systematic study to identify and validate optimal reference genes for accurate normalization of gene expression in strawberry plant defense response studies. PMID:23940602

  11. Identification and characterization of the gene expression profiles for protein coding and non-coding RNAs of pancreatic ductal adenocarcinomas

    PubMed Central

    Gutiérrez, María Laura; Corchete, Luis; Teodosio, Cristina; Sarasquete, María Eugenia; Abad, María del Mar; Iglesias, Manuel; Esteban, Carmen

    2015-01-01

    Significant advances have been achieved in recent years in the identification of the genetic and the molecular alterations of pancreatic ductal adenocarcinoma (PDAC). Despite this, at present the understanding of the precise mechanisms involved in the development and malignant transformation of PDAC remain relatively limited. Here, we evaluated for the first time, the molecular heterogeneity of PDAC tumors, through simultaneous assessment of the gene expression profile (GEP) for both coding and non-coding genes of tumor samples from 27 consecutive PDAC patients. Overall, we identified a common GEP for all PDAC tumors, characterized by an increased expression of genes involved in PDAC cell proliferation, local invasion and metastatic capacity, together with a significant alteration of the early steps of the cellular immune response. At the same time, we confirm and extend on previous observations about the genetic complexity of PDAC tumors as revealed by the demonstration of two clearly distinct and unique GEPs (e.g. epithelial-like vs. mesenchymal-like) reflecting the alteration of different signaling pathways involved in the oncogenesis and progression of these tumors. Our results also highlight the potential role of the immune system microenvironment in these tumors, with potential diagnostic and therapeutic implications. PMID:26053098

  12. Analytical qualification of system identification (modal analysis) codes for use in the dynamic testing of nuclear power plant structures

    SciTech Connect

    Weaver, H.J.; Ng, D.; Lager, D.

    1980-01-02

    The analytical evaluation of two particular system identification codes used at Lawrence Livermore Laboratory is presented. Both codes are eigenparameter identification codes; however, one uses a time domain approach while the other a frequency domain approach. The evaluation was accomplished by analytically generating several time history signals in which the true modal parameters were known. These time histories ranged from widely spaced modes with spacing factors of 100 percent to closely spaced modes with spacing factors of 6 percent. These signals were then polluted with various levels of simulated measurement noise and the ability of our computer codes to extract the parameters from this noisy data was evaluated.

  13. Violations of Temporary Flight Restrictions and Air Defense Identification Zones: An Analysis of Airspace Violations and Pilot Report Data

    NASA Technical Reports Server (NTRS)

    Zuschlag, Michael

    2005-01-01

    This document provides the results from a study into the apparent factors and causes of violations of restricted airspace, particularly temporary flight restrictions (TFRs) and air defense identification zones (ADIZs). By illuminating the reasons for these violations, this study aims to take the first step towards reducing them. The study assesses the basic characteristics of restricted airspace violations as well as the probable causes and factors contributing to violations. Results from the study imply most violations occur where the restriction has been in place for a significant amount of time prior to the violation. Additionally, the study results imply most violations are not due to the pilot simply being unaware of the airspace at the time of violation. In most violations, pilots are aware of the presence of the restricted airspace but have incorrect information about it, namely, its exact boundaries or procedures for authorized penetration. These results imply that the best means to reduce violations of restricted airspace is to improve the effectiveness of providing pilots the details required to avoid the airspace.

  14. Wind turbine control systems: Dynamic model development using system identification and the fast structural dynamics code

    SciTech Connect

    Stuart, J.G.; Wright, A.D.; Butterfield, C.P.

    1996-10-01

    Mitigating the effects of damaging wind turbine loads and responses extends the lifetime of the turbine and, consequently, reduces the associated Cost of Energy (COE). Active control of aerodynamic devices is one option for achieving wind turbine load mitigation. Generally speaking, control system design and analysis requires a reasonable dynamic model of {open_quotes}plant,{close_quotes} (i.e., the system being controlled). This paper extends the wind turbine aileron control research, previously conducted at the National Wind Technology Center (NWTC), by presenting a more detailed development of the wind turbine dynamic model. In prior research, active aileron control designs were implemented in an existing wind turbine structural dynamics code, FAST (Fatigue, Aerodynamics, Structures, and Turbulence). In this paper, the FAST code is used, in conjunction with system identification, to generate a wind turbine dynamic model for use in active aileron control system design. The FAST code is described and an overview of the system identification technique is presented. An aileron control case study is used to demonstrate this modeling technique. The results of the case study are then used to propose ideas for generalizing this technique for creating dynamic models for other wind turbine control applications.

  15. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus

    PubMed Central

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H.; Kav, Nat N. V.

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  16. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus.

    PubMed

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H; Kav, Nat N V

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  17. Identification of several inducible defense-related genes in mechanically damaged soybean (glycine max l. merr) stems

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Multiple defense-related genes have been identified in soybean (Glycine max L. Merr), however, research has primarily focused on the plant leaves, and despite the numerous insects and pathogens that feed on soybean stem tissues, relatively little is known about the stem defense response. In the curr...

  18. Identification of long non-coding RNAs involved in neuronal development and intellectual disability.

    PubMed

    D'haene, Eva; Jacobs, Eva Z; Volders, Pieter-Jan; De Meyer, Tim; Menten, Björn; Vergult, Sarah

    2016-01-01

    Recently, exome sequencing led to the identification of causal mutations in 16-31% of patients with intellectual disability (ID), leaving the underlying cause for many patients unidentified. In this context, the noncoding part of the human genome remains largely unexplored. For many long non-coding RNAs (lncRNAs) a crucial role in neurodevelopment and hence the human brain is anticipated. Here we aimed at identifying lncRNAs associated with neuronal development and ID. Therefore, we applied an integrated genomics approach, harnessing several public epigenetic datasets. We found that the presence of neuron-specific H3K4me3 confers the highest specificity for genes involved in neurodevelopment and ID. Based on the presence of this feature and GWAS hits for CNS disorders, we identified 53 candidate lncRNA genes. Extensive expression profiling on human brain samples and other tissues, followed by Gene Set Enrichment Analysis indicates that at least 24 of these lncRNAs are indeed implicated in processes such as synaptic transmission, nervous system development and neurogenesis. The bidirectional or antisense overlapping orientation relative to multiple coding genes involved in neuronal processes supports these results. In conclusion, we identified several lncRNA genes putatively involved in neurodevelopment and CNS disorders, providing a resource for functional studies. PMID:27319317

  19. Identification of long non-coding RNAs involved in neuronal development and intellectual disability

    PubMed Central

    D’haene, Eva; Jacobs, Eva Z.; Volders, Pieter-Jan; De Meyer, Tim; Menten, Björn; Vergult, Sarah

    2016-01-01

    Recently, exome sequencing led to the identification of causal mutations in 16–31% of patients with intellectual disability (ID), leaving the underlying cause for many patients unidentified. In this context, the noncoding part of the human genome remains largely unexplored. For many long non-coding RNAs (lncRNAs) a crucial role in neurodevelopment and hence the human brain is anticipated. Here we aimed at identifying lncRNAs associated with neuronal development and ID. Therefore, we applied an integrated genomics approach, harnessing several public epigenetic datasets. We found that the presence of neuron-specific H3K4me3 confers the highest specificity for genes involved in neurodevelopment and ID. Based on the presence of this feature and GWAS hits for CNS disorders, we identified 53 candidate lncRNA genes. Extensive expression profiling on human brain samples and other tissues, followed by Gene Set Enrichment Analysis indicates that at least 24 of these lncRNAs are indeed implicated in processes such as synaptic transmission, nervous system development and neurogenesis. The bidirectional or antisense overlapping orientation relative to multiple coding genes involved in neuronal processes supports these results. In conclusion, we identified several lncRNA genes putatively involved in neurodevelopment and CNS disorders, providing a resource for functional studies. PMID:27319317

  20. [Evaluation of the GNF computer-coding system for the identification of non-fermentative Gram-negative bacilli].

    PubMed

    Tarng, C M; Chen, M M; Tsai, W C

    1983-05-01

    In order to evaluate the effectiveness of the GNF computer-coding system for the identification of glucose non-fermenting gram-negative bacilli, we employed 406 strains of bacteria including 367 clinical isolates and 39 standard strains for testing. These strains were inoculated into the following eleven conventional biochemical test media: Triple Sugar Iron Agar, Simmon's Citrate Agar, Christensen's Urea Agar, Sulfide-Indole-Motility Medium, Semisolid Voges-Proskauer Test Medium, Moeller's Ornithine Decarboxylase Test Medium, Pyocyanin Test Medium, Oxidation/Fermentation (O/F) Glucose, O/F Fructose, Nitrate Broth, Moeller's Arginine Dihydrolase Test Medium. The results of these tests plus those from the hanging drop motility test and the oxidase test were converted into bacterial code number and then checked with the GNF computer-coding system. It was found that the first preference of agreement was 75.6%, second 15.3%, third 5.9%, and fourth or more 3.2%. In regard to the speed of bacterial identification by using the GNF system and information from hemolysis pattern and flagella stain, it was indicated that 84.7% would be correctly identified within 36-48 hours after isolation. If more confirmational tests were employed, the accurate identification rate would reach to 98.7% after 4 days of isolation. In addition, the use of the GNF computer-coding system can standardize identification procedures, shorten the identification period, and save cost in terms of materials supply, inoculation time, media preparation and media-storing space. Therefore, we conclude that the GNF computer-coding system is an effective tool in the identification of the glucose non-fermenting gram-negative bacilli. PMID:6617315

  1. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    U.S. Geological Survey

    1988-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  2. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    U.S. Geological Survey

    1985-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  3. Partial kindling of the ventral hippocampus: identification of changes in limbic physiology which accompany changes in feline aggression and defense.

    PubMed

    Adamec, R E

    1991-03-01

    This study examined the interictal consequences of partial kindling of the ventral perforant path on attack and defensive behavior in the domestic cat. Partial kindling produced a lasting increase in defense response of cats to both rats and conspecific threat howls. In addition, there was a lasting suppression of approach-attack behaviors directed toward rats. The suppression of some components of approach-attack were shown to be independent of the increases in defensive response. The effects of partial kindling of the ventral perforant path on spread of seizure activity into the amygdala, and on the output of the amygdala to both the ventromedial hypothalamus (VMH) and bed nucleus of the stria terminalis (BNST) were also examined. In addition, the effects of repeated hippocampal seizures on recurrent inhibition in the trisynaptic circuit (areas CA1 and CA3) were investigated. Growth of seizure activity in the amygdala and VMH as partial kindling progressed was essential for behavioral change. In addition, interictal long-term potentiation of potentials evoked in the VMH and in the BNST by pulsed stimulation of the amygdala followed partial kindling or afterdischarge threshold determination in the ventral perforant path. A lasting interictal increase in inhibition in area CA3 and a lasting interictal failure of inhibition in area CA1 of the ventral hippocampus also followed partial kindling. These changes in limbic physiology were related to the behavioral changes produced by partial kindling. The analysis revealed the importance of the amygdalo-VMH pathway in increased defensive response to rats. The amygdalo-BNST pathway is not important in mediating defensive response to prey, but it is implicated in suppression of some types of predatory aggression. Finally, changes in neural inhibition in the ventral hippocampus in areas CA1 and CA3 are associated with changes in both defensiveness and predatory aggression. PMID:1648239

  4. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization. PMID:17875603

  5. Genome defense against exogenous nucleic acids in eukaryotes by non-coding DNA occurs through CRISPR-like mechanisms in the cytosol and the bodyguard protection in the nucleus.

    PubMed

    Qiu, Guo-Hua

    2016-01-01

    In this review, the protective function of the abundant non-coding DNA in the eukaryotic genome is discussed from the perspective of genome defense against exogenous nucleic acids. Peripheral non-coding DNA has been proposed to act as a bodyguard that protects the genome and the central protein-coding sequences from ionizing radiation-induced DNA damage. In the proposed mechanism of protection, the radicals generated by water radiolysis in the cytosol and IR energy are absorbed, blocked and/or reduced by peripheral heterochromatin; then, the DNA damage sites in the heterochromatin are removed and expelled from the nucleus to the cytoplasm through nuclear pore complexes, most likely through the formation of extrachromosomal circular DNA. To strengthen this hypothesis, this review summarizes the experimental evidence supporting the protective function of non-coding DNA against exogenous nucleic acids. Based on these data, I hypothesize herein about the presence of an additional line of defense formed by small RNAs in the cytosol in addition to their bodyguard protection mechanism in the nucleus. Therefore, exogenous nucleic acids may be initially inactivated in the cytosol by small RNAs generated from non-coding DNA via mechanisms similar to the prokaryotic CRISPR-Cas system. Exogenous nucleic acids may enter the nucleus, where some are absorbed and/or blocked by heterochromatin and others integrate into chromosomes. The integrated fragments and the sites of DNA damage are removed by repetitive non-coding DNA elements in the heterochromatin and excluded from the nucleus. Therefore, the normal eukaryotic genome and the central protein-coding sequences are triply protected by non-coding DNA against invasion by exogenous nucleic acids. This review provides evidence supporting the protective role of non-coding DNA in genome defense. PMID:27036064

  6. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori

    PubMed Central

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori. PMID:26771876

  7. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori.

    PubMed

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori. PMID:26771876

  8. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    PubMed

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here. PMID:17947623

  9. Self-Reported Pleasantness Ratings and Examiner-Coded Defensiveness in Response to Touch in Children with ASD: Effects of Stimulus Material and Bodily Location

    ERIC Educational Resources Information Center

    Cascio, Carissa J.; Lorenzi, Jill; Baranek, Grace T.

    2016-01-01

    Tactile defensiveness, characterized by behavioral hyperresponsiveness and negative emotional responses to touch, is a common manifestation of aberrant sensory processing in autism spectrum disorders (ASD) and other developmental disabilities (DD). Variations in tactile defensiveness with the properties of the stimulus and the bodily site of…

  10. Identification of a key role for permeability glycoprotein in enhancing the cellular defense mechanisms of fertilized oocytes.

    PubMed

    Martin, Jacinta H; Nixon, Brett; Lord, Tessa; Bromfield, Elizabeth G; Aitken, R John

    2016-09-01

    Double strand breaks (DSBs) are highly damaging DNA lesions that can destabilize the genome and generate a suite of adverse physiological outcomes in the oocyte and early embryo. While it is therefore likely that these cells possess a sophisticated suite of protective mechanisms to ameliorate such damage, the precise nature of these defense systems are yet to be fully elucidated. This study characterizes the sensitivity of the oocyte to etoposide, a chemotherapeutic agent with the ability to elicit DSBs. We demonstrate significant developmental changes in etoposide vulnerability, with fertilization of the oocyte leading to an enhancement of its cellular defense machinery. Using a parthenogenic model we show that this response is mediated, at least in part, by permeability glycoprotein (PGP), an endogenous multidrug efflux transporter that is up-regulated, translocated to the oolemma and phosphorylated upon oocyte activation. Moreover, evidence from dye exclusion assays in the presence of a specific PGP pharmacological inhibitor (PSC833), illustrates that these events effectively increase oocyte efflux activity, thereby enhancing the ability of these cells to exclude genotoxicants capable of eliciting DSB formation. PMID:27397031

  11. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry

    PubMed Central

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems. PMID:25616408

  12. Coupling scanning electronc microscopy with DNA bar coding: A novel approach for thrips identification

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The small size and cryptic nature of thrips pests help them acquire microhabitats of a plant and in the field, often making their monitoring and the identification process difficult. Accurate identification of such pests is a fundamental requirement in development of any effective quarantine and man...

  13. Molecular identification of three novel glutaredoxin genes that play important roles in antioxidant defense in Helicoverpa armigera.

    PubMed

    Zhang, Song-Dou; Shen, Zhong-Jian; Liu, Xiao-Ming; Li, Zhen; Zhang, Qing-Wen; Liu, Xiao-Xia

    2016-08-01

    Glutaredoxins (Grxs), also known as thioltransferases, play key roles in maintaining intracellular redox balance and protecting cells from oxidative damage in plants and mammals. We tested whether Grxs play important roles in antioxidant defense in insects using the moth, Helicoverpa armigera. We obtained the full-length cDNA sequences of three novel Grx genes, named HaGrx, HaGrx3, and HaGrx5. Sequence analysis indicated that HaGrx shared a high amino acid identity (58%-78%) and a CPYC motif of conserved redox activity with homologues from other selected insect species. In contrast, HaGrx3 and HaGrx5 both shared a CGF(S/G) motif, a conserved catalytic domain, with other orthologous genes. Quantitative real-time PCR results revealed that HaGrx, HaGrx3, and HaGrx5 exhibited temporally- and spatially-dependent patterns of expression. The mRNA expression of HaGrx, HaGrx3, and HaGrx5 was induced by various temperature stresses and H2O2 treatments. We further investigated the knockdown of HaGrx, HaGrx3, and HaGrx5 in H. armigera larvae and found that most of the selected antioxidant genes were up regulated. However, Tpx was down regulated, and further interpretation of the complementary functions of these antioxidant genes is still required. We also determined the effect of HaGrx, HaGrx3, and HaGrx5 knockdown on antioxidant enzymatic activity and metabolite content. The enzymatic activities of SOD, CAT, and POD, and the metabolite contents of hydrogen peroxide, ascorbate, protein carbonyl, and total GSH increased after RNAi mediated knockdown of HaGrx, HaGrx3, and HaGrx5. These results supported our hypothesis that HaGrx, HaGrx3, and HaGrx5 play important roles in antioxidant defense of Helicoverpa armigera and provided a theoretical basis for further in-depth study of physiological function in the insect glutaredoxin family genes. PMID:27339760

  14. Identification and analysis of mouse non-coding RNA using transcriptome data.

    PubMed

    Zhao, Yuhui; Liu, Wanfei; Zeng, Jingyao; Liu, Shoucheng; Tan, Xinyu; Aljohi, Hasanawad; Hu, Songnian

    2016-06-01

    Transcripts are expressed spatially and temporally and they are very complicated, precise and specific; however, most studies are focused on protein-coding related genes. Recently, massively parallel cDNA sequencing (RNA-seq) has emerged to be a new and promising tool for transcriptome research, and numbers of non-coding RNAs, especially lincRNAs, have been widely identified and well characterized as important regulators of diverse biological processes. In this study, we used ultra-deep RNA-seq data from 15 mouse tissues to study the diversity and dynamic of non-coding RNAs in mouse. Using our own criteria, we identified totally 16,249 non-coding genes (21,569 non-coding RNAs) in mouse. We annotated these non-coding RNAs by diverse properties and found non-coding RNAs are generally shorter, have fewer exons, express in lower level and are more strikingly tissue-specific compared with protein-coding genes. Moreover, these non-coding RNAs show significant enrichment with transcriptional initiation and elongation signals including histone modifications (H3K4me3, H3K27me3 and H3K36me3), RNAPII binding sites and CAGE tags. The gene set enrichment analysis (GSEA) result revealed several sets of lincRNAs associated with diverse biological processes such as immune effector process, muscle development and sexual reproduction. Taken together, this study provides a more comprehensive annotation of mouse non-coding RNAs and gives an opportunity for future functional and evolutionary study of mouse non-coding RNAs. PMID:26944582

  15. Identification of Defense Compounds in Barbarea vulgaris against the Herbivore Phyllotreta nemorum by an Ecometabolomic Approach1[W

    PubMed Central

    Kuzina, Vera; Ekstrøm, Claus Thorn; Andersen, Sven Bode; Nielsen, Jens Kvist; Olsen, Carl Erik; Bak, Søren

    2009-01-01

    Winter cress (Barbarea vulgaris) is resistant to a range of insect species. Some B. vulgaris genotypes are resistant, whereas others are susceptible, to herbivory by flea beetle larvae (Phyllotreta nemorum). Metabolites involved in resistance to herbivory by flea beetles were identified using an ecometabolomic approach. An F2 population representing the whole range from full susceptibility to full resistance to flea beetle larvae was generated by a cross between a susceptible and a resistant B. vulgaris plant. This F2 offspring was evaluated with a bioassay measuring the ability of susceptible flea beetle larvae to survive on each plant. Metabolites that correlated negatively with larvae survival were identified through correlation, cluster, and principal component analyses. Two main clusters of metabolites that correlate negatively with larvae survival were identified. Principal component analysis grouped resistant and susceptible plants as well as correlated metabolites. Known saponins, such as hederagenin cellobioside and oleanolic acid cellobioside, as well as two other saponins correlated significantly with plant resistance. This study shows the potential of metabolomics to identify bioactive compounds involved in plant defense. PMID:19819983

  16. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    SciTech Connect

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  17. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., Washington, December 16, 2013. [FR Doc. 2013-30984 Filed 12-23-13; 11:15 am] Billing code 4710-10 ... Cooperation Council To Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961... that the furnishing of defense articles and defense services to the Gulf Cooperation Council...

  18. Combining subproteome enrichment and Rubisco depletion enables identification of low abundance proteins differentially regulated during plant defense.

    PubMed

    Widjaja, Ivy; Naumann, Kai; Roth, Udo; Wolf, Noreen; Mackey, David; Dangl, Jeffery L; Scheel, Dierk; Lee, Justin

    2009-01-01

    Transgenic Arabidopsis conditionally expressing the bacterial avrRpm1 type III effector under the control of a dexamethasone-responsive promoter were used for proteomics studies. This model system permits study of an individual effector without interference from additional bacterial components. Coupling of different prefractionation approaches to high resolution 2-DE facilitated the discovery of low abundance proteins - enabling the identification of proteins that have escaped detection in similar experiments. A total of 34 differentially regulated protein spots were identified. Four of these (a remorin, a protein phosphatase 2C (PP2C), an RNA-binding protein, and a C2-domain-containing protein) are potentially early signaling components in the interaction between AvrRpm1 and the cognate disease resistance gene product, resistance to Pseudomonas syringae pv. maculicola 1 (RPM1). For the remorin and RNA-binding protein, involvement of PTM and post-transcriptional regulation are implicated, respectively. PMID:19053141

  19. The identification of the first molluscan Akirin2 with immune defense function in the Hong Kong oyster Crassostrea hongkongensis.

    PubMed

    Qu, Fufa; Xiang, Zhiming; Zhang, Yang; Li, Jun; Zhang, Yuehuan; Yu, Ziniu

    2014-12-01

    The Akirin protein is a nuclear factor in the innate immune system that is highly conserved from insects to mammals and plays key roles in diverse biological processes, including immunity, myogenesis, development and the cellular stress response. However, the function of Akirins in mollusk, the second most diverse group of animals, is still poorly understood. In this study, we report the discovery of an Akirin2 gene homolog (ChAkirin2) and its biological functions in the Hong Kong oyster Crassostrea hongkongensis. ChAkirin2 is 189 amino acids in length and shares significant homology with invertebrate homologs. Phylogenetic analysis results revealed that ChAkirin2 is clustered with invertebrate Akirin2s. A sequence analysis of the 5' flanking regions of ChAkirin2 indicated that it harbors several potential PAMP-activated transcription factor binding sites (TFB), including sites for NF-κB, C/EBPα, AP-1, SRF, Oct-1 and GATA-1. An RT-PCR analysis showed that ChAkirin2 mRNA was ubiquitously expressed in various tissues and at different embryonic and larval stages. Additionally, upon infection by pathogens (Vibrio alginolyticus, Staphylococcus haemolyticus and Saccharomyces cerevisiae) and pathogen-associated molecular patterns (PAMPs: LPS, PGN and polyI:C), the expression of ChAkirin2 was significantly up-regulated. Moreover, fluorescence microscopy observations show that ChAkirin2 is located in the nuclei of HeLa cells, and the overexpression of ChAkirin2 activated the transcriptional activities of the NF-κB reporter gene in HEK293T cells. Altogether, this report provided the first experimental demonstration that mollusks possess a functional Akirin2 that is involved in the innate defense and embryogenesis processes of the oyster. PMID:25284180

  20. HYPERSENSITIVE RESPONSE-LIKE LESIONS 1 Codes for AtPPT1 and Regulates Accumulation of ROS and Defense Against Bacterial Pathogen Pseudomonas syringae in Arabidopsis thaliana

    PubMed Central

    Dutta, Aditya; Chan, Samuel H.P.; Pauli, Noel T.

    2015-01-01

    Abstract Aims: Plants employ both basal and resistance gene (R gene)-mediated defenses in response to pathogens. Reactive oxygen species (ROS) are widely reported to play a central role in both basal and R gene-mediated defense; however, the nature of ROS has been less well established for basal defense. In addition, spatial distribution of redox moieties and mechanisms of plant responses during basal defense are poorly understood. We investigated redox signaling in Arabidopsis thaliana in response to virulent bacterial pathogen, focusing on the role of the mitochondria in balancing energy demands against generation of physiologically relevant ROS. Results: Positional cloning of an Arabidopsis lesion mimic mutant identified a polyprenyl transferase involved in the biosynthesis of Coenzyme Q10 (CoQ), which leads to novel insights into physiological ROS levels and their role in basal resistance. Gain- and loss-of-function studies identified Coenzyme Q10 redox state to be a key determinant of ROS levels. These Coenzyme Q10 redox state-mediated ROS levels had a direct bearing on both response against pathogen and ability to thrive in high oxidative stress environments. Innovation: We demonstrate that Coenzyme Q10 redox state generates an ROS threshold for a successful basal resistance response. Perturbation of the Coenzyme Q10 redox state has the potential to disrupt plant defense responses against bacterial pathogens. Conclusions: Coenzyme Q10 redox state is a key regulator of Arabidopsis basal resistance against bacterial pathogens. Antioxid. Redox Signal. 22, 785–796. PMID:25557512

  1. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    SciTech Connect

    Dickens, J.K.

    1981-03-01

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given.

  2. Identification and Characterization of Long Non-Coding RNAs Related to Mouse Embryonic Brain Development from Available Transcriptomic Data

    PubMed Central

    He, Hongjuan; Xiu, Youcheng; Guo, Jing; Liu, Hui; Liu, Qi; Zeng, Tiebo; Chen, Yan; Zhang, Yan; Wu, Qiong

    2013-01-01

    Long non-coding RNAs (lncRNAs) as a key group of non-coding RNAs have gained widely attention. Though lncRNAs have been functionally annotated and systematic explored in higher mammals, few are under systematical identification and annotation. Owing to the expression specificity, known lncRNAs expressed in embryonic brain tissues remain still limited. Considering a large number of lncRNAs are only transcribed in brain tissues, studies of lncRNAs in developmental brain are therefore of special interest. Here, publicly available RNA-sequencing (RNA-seq) data in embryonic brain are integrated to identify thousands of embryonic brain lncRNAs by a customized pipeline. A significant proportion of novel transcripts have not been annotated by available genomic resources. The putative embryonic brain lncRNAs are shorter in length, less spliced and show less conservation than known genes. The expression of putative lncRNAs is in one tenth on average of known coding genes, while comparable with known lncRNAs. From chromatin data, putative embryonic brain lncRNAs are associated with active chromatin marks, comparable with known lncRNAs. Embryonic brain expressed lncRNAs are also indicated to have expression though not evident in adult brain. Gene Ontology analysis of putative embryonic brain lncRNAs suggests that they are associated with brain development. The putative lncRNAs are shown to be related to possible cis-regulatory roles in imprinting even themselves are deemed to be imprinted lncRNAs. Re-analysis of one knockdown data suggests that four regulators are associated with lncRNAs. Taken together, the identification and systematic analysis of putative lncRNAs would provide novel insights into uncharacterized mouse non-coding regions and the relationships with mammalian embryonic brain development. PMID:23967161

  3. Self-identification of protein-coding regions in microbial genomes.

    PubMed

    Audic, S; Claverie, J M

    1998-08-18

    A new method for predicting protein-coding regions in microbial genomic DNA sequences is presented. It uses an ab initio iterative Markov modeling procedure to automatically perform the partition of genomic sequences into three subsets shown to correspond to coding, coding on the opposite strand, and noncoding segments. In contrast to current methods, such as GENEMARK [Borodovsky, M. & McIninch, J. D. (1993) Comput. Chem. 17, 123-133], no training set or prior knowledge of the statistical properties of the studied genome are required. This new method tolerates error rates of 1-2% and can process unassembled sequences. It is thus ideal for the analysis of genome survey and/or fragmented sequence data from uncharacterized microorganisms. The method was validated on 10 complete bacterial genomes (from four major phylogenetic lineages). The results show that protein-coding regions can be identified with an accuracy of up to 90% with a totally automated and objective procedure. PMID:9707594

  4. Validation of coding algorithms for the identification of patients with primary biliary cirrhosis using administrative data

    PubMed Central

    Myers, Robert P; Shaheen, Abdel Aziz M; Fong, Andrew; Wan, Alex F; Swain, Mark G; Hilsden, Robert J; Sutherland, Lloyd; Quan, Hude

    2010-01-01

    BACKGROUND: Large-scale epidemiological studies of primary biliary cirrhosis (PBC) have been hindered by difficulties in case ascertainment. OBJECTIVE: To develop coding algorithms for identifying PBC patients using administrative data – a widely available data source. METHODS: Population-based administrative databases were used to identify patients with a diagnosis code for PBC from 1994 to 2002. Coding algorithms for confirmed PBC (two or more of antimitochondrial antibody positivity, cholestatic liver biochemistry and/or compatible liver histology) were derived using chart abstraction data as the reference. Patients with a recorded PBC diagnosis but insufficient confirmatory data were classified as ‘suspected PBC’. RESULTS: Of 189 potential PBC cases, 119 (60%) had confirmed PBC and 28 (14%) had suspected PBC. The optimal algorithm including two or more uses of a PBC code had a sensitivity of 94% (95% CI 71% to 100%) and positive predictive values of 73% (95% CI 61% to 75%) for confirmed PBC, and 89% (95% CI 82% to 94%) for confirmed or suspected PBC. Sensitivity analyses revealed greater accuracy among women, and with the use of multiple data sources and one or more years of data. Inclusion of diagnosis codes for conditions frequently misclassified as PBC did not improve algorithm performance. CONCLUSIONS: Administrative databases can reliably identify patients with PBC and may facilitate epidemiological investigations of this condition. PMID:20352146

  5. Identification of internal transcribed spacer sequence motifs in truffles: a first step toward their DNA bar coding.

    PubMed

    El Karkouri, Khalid; Murat, Claude; Zampieri, Elisa; Bonfante, Paola

    2007-08-01

    This work presents DNA sequence motifs from the internal transcribed spacer (ITS) of the nuclear rRNA repeat unit which are useful for the identification of five European and Asiatic truffles (Tuber magnatum, T. melanosporum, T. indicum, T. aestivum, and T. mesentericum). Truffles are edible mycorrhizal ascomycetes that show similar morphological characteristics but that have distinct organoleptic and economic values. A total of 36 out of 46 ITS1 or ITS2 sequence motifs have allowed an accurate in silico distinction of the five truffles to be made (i.e., by pattern matching and/or BLAST analysis on downloaded GenBank sequences and directly against GenBank databases). The motifs considered the intraspecific genetic variability of each species, including rare haplotypes, and assigned their respective species from either the ascocarps or ectomycorrhizas. The data indicate that short ITS1 or ITS2 motifs (< or = 50 bp in size) can be considered promising tools for truffle species identification. A dot blot hybridization analysis of T. magnatum and T. melanosporum compared with other close relatives or distant lineages allowed at least one highly specific motif to be identified for each species. These results were confirmed in a blind test which included new field isolates. The current work has provided a reliable new tool for a truffle oligonucleotide bar code and identification in ecological and evolutionary studies. PMID:17601808

  6. Inter-STOP symbol distances for the identification of coding regions.

    PubMed

    Bastos, Carlos A C; Afreixo, Vera; Garcia, Sara P; Pinho, Armando J

    2013-01-01

    In this study we explore the potential of inter-STOP symbol distances for finding coding regions in DNA sequences. We use the distance between STOP symbols in the DNA sequence and a chi-square statistic to evaluate the nonhomogeneity of the three possible reading frames and the occurrence of one long distance in one of the frames. The results of this exploratory study suggest that inter-STOP symbol distances have strong ability to discriminate coding regions in prokaryotes and simple eukaryotes. PMID:24231144

  7. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis) RNA-seq Data.

    PubMed

    Song, Xiaobo; Sun, Liang; Luo, Haitao; Ma, Qingguo; Zhao, Yi; Pei, Dong

    2016-01-01

    Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs). Long ncRNAs (lncRNAs), a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants. PMID:26938562

  8. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis) RNA-seq Data

    PubMed Central

    Song, Xiaobo; Sun, Liang; Luo, Haitao; Ma, Qingguo; Zhao, Yi; Pei, Dong

    2016-01-01

    Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs). Long ncRNAs (lncRNAs), a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants. PMID:26938562

  9. Identification and characterization of long non-coding RNAs in rainbow trout eggs

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Long non-coding RNAs (lncRNAs) are in general considered as a diverse class of transcripts longer than 200 nucleotides that structurally resemble mRNAs but do not encode proteins. Recent advances in RNA sequencing (RNA-Seq) and bioinformatics methods have provided an opportunity to indentify and ana...

  10. Identification of a Rare Coding Variant in Complement 3 Associated with Age-related Macular Degeneration

    PubMed Central

    Zhan, Xiaowei; Larson, David E.; Wang, Chaolong; Koboldt, Daniel C.; Sergeev, Yuri V.; Fulton, Robert S.; Fulton, Lucinda L.; Fronick, Catrina C.; Branham, Kari E.; Bragg-Gresham, Jennifer; Jun, Goo; Hu, Youna; Kang, Hyun Min; Liu, Dajiang; Othman, Mohammad; Brooks, Matthew; Ratnapriya, Rinki; Boleda, Alexis; Grassmann, Felix; von Strachwitz, Claudia; Olson, Lana M.; Buitendijk, Gabriëlle H.S.; Hofman, Albert; van Duijn, Cornelia M.; Cipriani, Valentina; Moore, Anthony T.; Shahid, Humma; Jiang, Yingda; Conley, Yvette P.; Morgan, Denise J.; Kim, Ivana K.; Johnson, Matthew P.; Cantsilieris, Stuart; Richardson, Andrea J.; Guymer, Robyn H.; Luo, Hongrong; Ouyang, Hong; Licht, Christoph; Pluthero, Fred G.; Zhang, Mindy M.; Zhang, Kang; Baird, Paul N.; Blangero, John; Klein, Michael L.; Farrer, Lindsay A.; DeAngelis, Margaret M.; Weeks, Daniel E.; Gorin, Michael B.; Yates, John R.W.; Klaver, Caroline C.W.; Pericak-Vance, Margaret A.; Haines, Jonathan L.; Weber, Bernhard H.F.; Wilson, Richard K.; Heckenlively, John R.; Chew, Emily Y.; Stambolian, Dwight; Mardis, Elaine R.; Swaroop, Anand; Abecasis, Goncalo R.

    2013-01-01

    Macular degeneration is a common cause of blindness in the elderly. To identify rare coding variants associated with a large increase in risk of age-related macular degeneration (AMD), we sequenced 2,335 cases and 789 controls in 10 candidate loci (57 genes). To increase power, we augmented our control set with ancestry-matched exome sequenced controls. An analysis of coding variation in 2,268 AMD cases and 2,268 ancestry matched controls revealed two large-effect rare variants; previously described R1210C in the CFH gene (fcase = 0.51%, fcontrol = 0.02%, OR = 23.11), and newly identified K155Q in the C3 gene (fcase = 1.06%, fcontrol = 0.39%, OR = 2.68). The variants suggest decreased inhibition of C3 by Factor H, resulting in increased activation of the alternative complement pathway, as a key component of disease biology. PMID:24036949

  11. Key for protein coding sequences identification: computer analysis of codon strategy.

    PubMed Central

    Rodier, F; Gabarro-Arpa, J; Ehrlich, R; Reiss, C

    1982-01-01

    The signal qualifying an AUG or GUG as an initiator in mRNAs processed by E. coli ribosomes is not found to be a systematic, literal homology sequence. In contrast, stability analysis reveals that initiators always occur within nucleic acid domains of low stability, for which a high A/U content is observed. Since no aminoacid selection pressure can be detected at N-termini of the proteins, the A/U enrichment results from a biased usage of the code degeneracy. A computer analysis is presented which allows easy detection of the codon strategy. N-terminal codons carry rather systematically A or U in third position, which suggests a mechanism for translation initiation and helps to detect protein coding sequences in sequenced DNA. PMID:7038623

  12. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    PubMed Central

    Bashir, Yasir; Dar, Firdous Ahmad; Sekhar, M.

    2016-01-01

    This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR). Out of 98 isolates, 71 (72.45%) isolates were identified as E. coli and the remaining 27 (27.55%) as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients. PMID:27403451

  13. Identification of a Novel Small Non-Coding RNA Modulating the Intracellular Survival of Brucella melitensis.

    PubMed

    Wang, Yufei; Ke, Yuehua; Xu, Jie; Wang, Ligui; Wang, Tongkun; Liang, Hui; Zhang, Wei; Gong, Chunli; Yuan, Jiuyun; Zhuang, Yubin; An, Chang; Lei, Shuangshuang; Du, Xinying; Wang, Zhoujia; Li, Wenna; Yuan, Xitong; Huang, Liuyu; Yang, Xiaoli; Chen, Zeliang

    2015-01-01

    Bacterial small non-coding RNAs (sRNAs) are gene expression modulators respond to environmental changes, stressful conditions, and pathogenesis. In this study, by using a combined bioinformatic and experimental approach, eight novel sRNA genes were identified in intracellular pathogen Brucella melitensis. BSR0602, one sRNA that was highly induced in stationary phase, was further examined and found to modulate the intracellular survival of B. melitensis. BSR0602 was present at very high levels in vitro under stresses similar to those encountered during infection in host macrophages. Furthermore, BSR0602 was found to be highly expressed in the spleens of infected mice, suggesting its potential role in the control of pathogenesis. BSR0602 targets the mRNAs coding for gntR, a global transcriptional regulator, which is required for B. melitensis virulence. Overexpression of BSR0602 results in distinct reduction in the gntR mRNA level. B. melitensis with high level of BSR0602 is defective in bacteria intracellular survival in macrophages and defective in growth in the spleens of infected mice. Therefore, BSR0602 may directly inhibit the expression of gntR, which then impairs Brucellae intracellular survival and contributes to Brucella infection. Our findings suggest that BSR0602 is responsible for bacterial adaptation to stress conditions and thus modulate B. melitensis intracellular survival. PMID:25852653

  14. Identification of a Novel Small Non-Coding RNA Modulating the Intracellular Survival of Brucella melitensis

    PubMed Central

    Wang, Yufei; Ke, Yuehua; Xu, Jie; Wang, Ligui; Wang, Tongkun; Liang, Hui; Zhang, Wei; Gong, Chunli; Yuan, Jiuyun; Zhuang, Yubin; An, Chang; Lei, Shuangshuang; Du, Xinying; Wang, Zhoujia; Li, Wenna; Yuan, Xitong; Huang, Liuyu; Yang, Xiaoli; Chen, Zeliang

    2015-01-01

    Bacterial small non-coding RNAs (sRNAs) are gene expression modulators respond to environmental changes, stressful conditions, and pathogenesis. In this study, by using a combined bioinformatic and experimental approach, eight novel sRNA genes were identified in intracellular pathogen Brucella melitensis. BSR0602, one sRNA that was highly induced in stationary phase, was further examined and found to modulate the intracellular survival of B. melitensis. BSR0602 was present at very high levels in vitro under stresses similar to those encountered during infection in host macrophages. Furthermore, BSR0602 was found to be highly expressed in the spleens of infected mice, suggesting its potential role in the control of pathogenesis. BSR0602 targets the mRNAs coding for gntR, a global transcriptional regulator, which is required for B. melitensis virulence. Overexpression of BSR0602 results in distinct reduction in the gntR mRNA level. B. melitensis with high level of BSR0602 is defective in bacteria intracellular survival in macrophages and defective in growth in the spleens of infected mice. Therefore, BSR0602 may directly inhibit the expression of gntR, which then impairs Brucellae intracellular survival and contributes to Brucella infection. Our findings suggest that BSR0602 is responsible for bacterial adaptation to stress conditions and thus modulate B. melitensis intracellular survival. PMID:25852653

  15. [Identification of the open reading frame coding transposase of Bordetella pertussis RS-element].

    PubMed

    Vorontsov, V V; Sivov, I G; Umiarov, A M; Siniashina, L N; Bol'shakova, T N; Dobrynina, O Iu; Molchanova, M L; Amelina, I P; Rudnev, I A; Karataev, G I

    2004-01-01

    A computer-aided analysis of the repeating sequence of Bordetella pertussis chromosome (RSBP3) revealed 3 open reading frames, one of whose (ORF1) can code a protein whose structure and properties are similar to those of transposasas, i.e. enzymes in charges for the traveling of migrating genetic elements of pro- and eukaryote. Mutants of the RSBP3 insertion sequence with the affected and unaffected ORF1 sequence were constructed in order to substantiate the above assumption. Two independent experimental models (formation of inter-plasmid co-integrates and of co-integrates between plasmid and E. coli chromosome) were used to show that the RSBP3-stimulated formation of co-integrates is only true for plasmids containing RSBP3 with the unaffected ORF1 sequence. An activity of the Hpr protein (a component of the phosphoenolpyruvate-dependent phosphotransferase) was proven to influence the formation process of inter-plasmid co-integrates. PMID:15164716

  16. Enteropathogenic Escherichia coli: identification of a gene cluster coding for bundle-forming pilus morphogenesis.

    PubMed Central

    Sohel, I; Puente, J L; Ramer, S W; Bieber, D; Wu, C Y; Schoolnik, G K

    1996-01-01

    Sequence flanking the bfpA locus on the enteroadherent factor plasmid of the enteropathogenic Escherichia coli (EPEC) strain B171-8 (O111:NM) was obtained to identify genes that might be required for bundle-forming pilus (BFP) biosynthesis. Deletion experiments led to the identification of a contiguous cluster of at least 12 open reading frames, including bfpA, that could direct the synthesis of a morphologically normal BFP filament. Within the bfp gene cluster, we identified open reading frames that share homology with other type IV pilus accessory genes and with genes required for transformation competence and protein secretion. Immediately upstream of the bfp gene cluster, we identified a potential replication origin including genes that are predicted to encode proteins homologous with replicase and resolvase. Restriction fragment length polymorphism analysis of DNA from six additional EPEC serotypes showed that the organization of the bfp gene cluster and its juxtaposition with a potential plasmid origin of replication are highly conserved features of the EPEC biotype. PMID:8626330

  17. Rat hepatic glutaminase: identification of the full coding sequence and characterization of a functional promoter.

    PubMed Central

    Chung-Bok, M I; Vincent, N; Jhala, U; Watford, M

    1997-01-01

    Glutamine catabolism in mammalian liver is catalysed by a unique isoenzyme of phosphate-activated glutaminase. The full coding and 5' untranslated sequence for rat hepatic glutaminase was isolated by screening lambda ZAP cDNA libraries and a Charon 4a rat genomic library. The sequence produces a mRNA 2225 nt in length, encoding a polypeptide of 535 amino acid residues with a calculated molecular mass of 59.2 kDa. The deduced amino acid sequence of rat liver glutaminase shows 86% similarity to that of rat kidney glutaminase and 65% similarity to a putative glutaminase from Caenorhabditis elegans. A genomic clone to rat liver glutaminase was isolated that contains 3.5 kb of the gene and 7.5 kb of the 5' flanking region. The 1 kb immediately upstream of the hepatic glutaminase gene (from -1022 to +48) showed functional promoter activity in HepG2 hepatoma cells. This promoter region did not respond to treatment with cAMP, but was highly responsive (10-fold stimulation) to the synthetic glucocorticoid dexamethasone. Subsequent 5' deletion analysis indicated that the promoter region between -103 and +48 was sufficient for basal promoter activity. This region does not contain an identifiable TATA element, indicating that transcription of the glutaminase gene is driven by a TATA-less promoter. The region responsive to glucocorticoids was mapped to -252 to -103 relative to the transcription start site. PMID:9164856

  18. Identification of novel long non-coding RNAs in triple-negative breast cancer

    PubMed Central

    Yu, Wenjie; Wang, Wenmin; Xu, Dong; Yan, Xinqiang; Chen, Beibei; Yu, Longyao; Li, Jicheng; Chen, Xiaobing; Ding, Kan; Cao, Feilin

    2015-01-01

    Triple-negative breast carcinomas (TNBC) are characterized by particularly poor outcomes, and there are no established markers significantly associated with prognosis. Long non-coding RNAs (lncRNAs) are subclass of noncoding RNAs that have been recently shown to play critical roles in cancer biology. However, little is known about their mechanistic role in TNBC pathogenesis. In this report, we investigated the expression patterns of lncRNAs from TNBC tissues and matched normal tissues with Agilent Human lncRNA array. We identified 1,758 lncRNAs and 1,254 mRNAs that were differentially expressed (≥ 2-fold change), indicating that many lncRNAs are significantly upregulated or downregulated in TNBC. Among these, XR_250621.1 and NONHSAT125629 were the most upregulated and downregulated lncRNAs respectively. qRT-PCR was employed to validate the microarray analysis findings, and results were consistent with the data from the microarrays. GO and KEGG pathway analysis were applied to explore the potential lncRNAs functions, some pathways including microtubule motor activity and DNA replication were identified in TNBC pathogenesis. Our study revealed that a set of lncRNAs were differentially expressed in TNBC tissues, suggesting that they may play role in TNBC. These results shed light on lncRNAs’ biological functions and provide useful information for exploring potential therapeutic targets for breast cancer. PMID:26078338

  19. Experimental identification and analysis of macronuclear non-coding RNAs from the ciliate Tetrahymena thermophila

    PubMed Central

    Andersen, Kasper L.; Nielsen, Henrik

    2012-01-01

    The ciliate Tetrahymena thermophila is an important eukaryotic model organism that has been used in pioneering studies of general phenomena, such as ribozymes, telomeres, chromatin structure and genome reorganization. Recent work has shown that Tetrahymena has many classes of small RNA molecules expressed during vegetative growth or sexual reorganization. In order to get an overview of medium-sized (40–500 nt) RNAs expressed from the Tetrahymena genome, we created a size-fractionated cDNA library from macronuclear RNA and analyzed 80 RNAs, most of which were previously unknown. The most abundant class was small nucleolar RNAs (snoRNAs), many of which are formed by an unusual maturation pathway. The modifications guided by the snoRNAs were analyzed bioinformatically and experimentally and many Tetrahymena-specific modifications were found, including several in an essential, but not conserved domain of ribosomal RNA. Of particular interest, we detected two methylations in the 5′-end of U6 small nuclear RNA (snRNA) that has an unusual structure in Tetrahymena. Further, we found a candidate for the first U8 outside metazoans, and an unusual U14 candidate. In addition, a number of candidates for new non-coding RNAs were characterized by expression analysis at different growth conditions. PMID:21967850

  20. Defense Mechanisms: Discussions and Bibliographies; General or Multiple, and Specific.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This publication considers some Freudian ego mechanisms. The first discussion and bibliography concerns defense mechanisms, in general or in multiple; after which, the discussions and bibliographies concern specific defense mechanisms: denial; displacement, substitution, sublimation; fixation; identification, introjection, incorporation,…

  1. Identification of Differentially Expressed Long Non-coding RNAs in Polarized Macrophages

    PubMed Central

    Huang, Zikun; Luo, Qing; Yao, Fangyi; Qing, Cheng; Ye, Jianqing; Deng, Yating; Li, Junming

    2016-01-01

    Macrophages display remarkable plasticity, with the ability to undergo dynamic transition between classically and alternatively activated phenotypes. Long non-coding RNAs (lncRNAs) are more than 200 nucleotides in length and play roles in various biological pathways. However, the role of lncRNAs in regulating macrophage polarization has yet to be explored. In this study, lncRNAs expression profiles were determined in human monocyte-derived macrophages (MDMs) incubated in conditions causing activation toward M(IFN-γ + LPS) or M(IL-4) phenotypes. Compared with primary MDMs, 9343 lncRNAs and 5903 mRNAs were deregulated in M(IFN-γ + LPS) group (fold change ≥2.0, P < 0.05), 4592 lncRNAs and 3122 mRNAs were deregulated in M(IL-4) group. RT-qPCR results were generally consistent with the microarray data. Furthermore, we found that TCONS_00019715 is expressed at a higher level in M(IFN-γ + LPS) macrophages than in M(IL-4) macrophages. TCONS_00019715 expression was decreased when M(IFN-γ + LPS) converted to M(IL-4) whereas increased when M(IL-4) converted to M(IFN-γ + LPS). Knockdown of TCONS_00019715 following the activation of THP-1 cellls using IFN-γ and LPS diminished the expression of M(IFN-γ + LPS) markers, and elevated the expression of M(IL-4) markers. These data show a significantly altered lncRNA and mRNA expression profile in macrophages exposure to different activating conditions. Dysregulation of some of these lncRNAs may play important roles in regulating macrophage polarization. PMID:26796525

  2. Identification of neural firing patterns, frequency and temporal coding mechanisms in individual aortic baroreceptors

    PubMed Central

    Gu, Huaguang; Pan, Baobao

    2015-01-01

    In rabbit depressor nerve fibers, an on-off firing pattern, period-1 firing, and integer multiple firing with quiescent state were observed as the static pressure level was increased. A bursting pattern with bursts at the systolic phase of blood pressure, continuous firing, and bursting with burst at diastolic phase and quiescent state at systolic phase were observed as the mean level of the dynamic blood pressure was increased. For both static and dynamic pressures, the firing frequency of the first two firing patterns increased and of the last firing pattern decreased due to the quiescent state. If the quiescent state is disregarded, the spike frequency becomes an increasing trend. The instantaneous spike frequency of the systolic phase bursting, continuous firing, and diastolic phase bursting can reflect the temporal process of the systolic phase, whole procedure, and diastolic phase of the dynamic blood pressure signal, respectively. With increasing the static current corresponding to pressure level, the deterministic Hodgkin-Huxley (HH) model manifests a process from a resting state first to period-1 firing via a subcritical Hopf bifurcation and then to a resting state via a supercritical Hopf bifurcation, and the firing frequency increases. The on-off firing and integer multiple firing were here identified as noise-induced firing patterns near the subcritical and supercritical Hopf bifurcation points, respectively, using the stochastic HH model. The systolic phase bursting and diastolic phase bursting were identified as pressure-induced firings near the subcritical and supercritical Hopf bifurcation points, respectively, using an HH model with a dynamic signal. The firing, spike frequency, and instantaneous spike frequency observed in the experiment were simulated and explained using HH models. The results illustrate the dynamics of different firing patterns and the frequency and temporal coding mechanisms of aortic baroreceptor. PMID:26379539

  3. Identification of Differentially Expressed Long Non-coding RNAs in Polarized Macrophages.

    PubMed

    Huang, Zikun; Luo, Qing; Yao, Fangyi; Qing, Cheng; Ye, Jianqing; Deng, Yating; Li, Junming

    2016-01-01

    Macrophages display remarkable plasticity, with the ability to undergo dynamic transition between classically and alternatively activated phenotypes. Long non-coding RNAs (lncRNAs) are more than 200 nucleotides in length and play roles in various biological pathways. However, the role of lncRNAs in regulating macrophage polarization has yet to be explored. In this study, lncRNAs expression profiles were determined in human monocyte-derived macrophages (MDMs) incubated in conditions causing activation toward M(IFN-γ + LPS) or M(IL-4) phenotypes. Compared with primary MDMs, 9343 lncRNAs and 5903 mRNAs were deregulated in M(IFN-γ + LPS) group (fold change ≥ 2.0, P < 0.05), 4592 lncRNAs and 3122 mRNAs were deregulated in M(IL-4) group. RT-qPCR results were generally consistent with the microarray data. Furthermore, we found that TCONS_00019715 is expressed at a higher level in M(IFN-γ + LPS) macrophages than in M(IL-4) macrophages. TCONS_00019715 expression was decreased when M(IFN-γ + LPS) converted to M(IL-4) whereas increased when M(IL-4) converted to M(IFN-γ + LPS). Knockdown of TCONS_00019715 following the activation of THP-1 cellls using IFN-γ and LPS diminished the expression of M(IFN-γ + LPS) markers, and elevated the expression of M(IL-4) markers. These data show a significantly altered lncRNA and mRNA expression profile in macrophages exposure to different activating conditions. Dysregulation of some of these lncRNAs may play important roles in regulating macrophage polarization. PMID:26796525

  4. Phosphoprotein Isotope-coded Affinity Tags: Application to the Enrichment and Identification of Low-Abundance Phosphoproteins

    SciTech Connect

    Goshe, Michael; Veenstra, Timothy D. ); Panisko, Ellen A.; Conrads, Thomas P. ); Angell, Nicolas H.; Smith, Richard D. )

    2002-02-01

    A novel approach using different isotopic labeling and biotinylation has been developed for the enrichment and quantitation of phosphoseryl and phosphothreonyl-peptides. The phosphoprotein isotope-coded affinity tag (PhIAT) exploits the high affinity biotin-avidin interaction to isolate modified phosphopeptides from a complex mixture of peptides. The PhIAT strategy for quantifying and enriching mixtures for phosphopeptides was demonstrated using a commercially available sample of the phosphoprotein B-casein. A denatured solution of B-casein was labeled using the PhIAT method and after proteolytic digestion, the labeled peptides were isolated using immobilize avidin. The recovered peptides were separated by capillary reversed-phase liquid chromatography and identified by tandem mass spectrometry. PhIAT-labeled peptides corresponding to known O-phosphorylated peptides from B-casein were identified as were phosphorylated peptides from as1-casein and ase-casein, known low-level (< 5%) contaminants of commercially available B-casein. All of the identified phosphopeptides from these caseins have been previously documented to be phosphorylated at the sites elucidated by the PhIAT approach. The results illustrate the efficancy of the PhIAT-labeling strategy to enrich mixtures for phosphopeptides and permit the detection and identification of low abundance phosphopeptides. In addition, experiments using light and heavy isotopic version of the PhIAT reagents demonstrated that a 10% difference in phosphorylation state could be determined between phosphopeptides in comparative samples.

  5. Analysis of putative apoplastic effectors from the nematode, Globodera rostochiensis, and identification of an expansin-like protein that can induce and suppress host defenses.

    PubMed

    Ali, Shawkat; Magne, Maxime; Chen, Shiyan; Côté, Olivier; Stare, Barbara Gerič; Obradovic, Natasa; Jamshaid, Lubna; Wang, Xiaohong; Bélair, Guy; Moffett, Peter

    2015-01-01

    The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12) and an expansin-like protein (GrEXPB2), suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses. PMID:25606855

  6. Analysis of Putative Apoplastic Effectors from the Nematode, Globodera rostochiensis, and Identification of an Expansin-Like Protein That Can Induce and Suppress Host Defenses

    PubMed Central

    Ali, Shawkat; Magne, Maxime; Chen, Shiyan; Côté, Olivier; Stare, Barbara Gerič; Obradovic, Natasa; Jamshaid, Lubna; Wang, Xiaohong; Bélair, Guy; Moffett, Peter

    2015-01-01

    The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12) and an expansin-like protein (GrEXPB2), suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses. PMID:25606855

  7. Identification of a positive transcription regulatory element within the coding region of the nifLA operon in Azotobacter vinelandii.

    PubMed

    Mitra, Ranjana; Das, Hirendra K; Dixit, Aparna

    2005-07-01

    Nitrogen fixation in Azotobacter vinelandii is regulated by the nifLA operon. NifA activates the transcription of nif genes, while NifL antagonizes the transcriptional activator NifA in response to fixed nitrogen and molecular oxygen levels. However, transcriptional regulation of the nifLA operon of A. vinelandii itself is not fully understood. Using the S1 nuclease assay, we mapped the transcription start site of the nifLA operon, showing it to be similar to the sigma54-dependent promoters. We also identified a positive cis-acting regulatory element (+134 to +790) of the nifLA operon within the coding region of the nifL gene of A. vinelandii. Deletion of this element results in complete loss of promoter activity. Several protein factors bind to this region, and the specific binding sites have been mapped by DNase I foot printing. Two of these sites, namely dR1 (+134 to +204) and dR2 (+745 to +765), are involved in regulating the nifLA promoter activity. The absence of NtrC-like binding sites in the upstream region of the nifLA operon in A. vinelandii makes the identification of these downstream elements a highly significant finding. The interaction of the promoter with the proteins binding to the dR2 region spanning +745 to +765 appears to be dependent on the face of the helix as introduction of 4 bases just before this region completely disrupts promoter activity. Thus, the positive regulatory element present within the BglII-BglII fragment may play, in part; an important role in nifLA regulation in A. vinelandii. PMID:16000781

  8. Primitive defenses: cognitive aspects and therapeutic handling.

    PubMed

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process. PMID:7429737

  9. Identification of Predictive Markers for Response to Neoadjuvant Chemoradiation in Rectal Carcinomas by Proteomic Isotope Coded Protein Label (ICPL) Analysis

    PubMed Central

    Croner, Roland S.; Sevim, Müzeyyen; Metodiev, Metodi V.; Jo, Peter; Ghadimi, Michael; Schellerer, Vera; Brunner, Maximillian; Geppert, Carol; Rau, Tilman; Stürzl, Michael; Naschberger, Elisabeth; Matzel, Klaus E.; Hohenberger, Werner; Lottspeich, Friedrich; Kellermann, Josef

    2016-01-01

    Neoadjuvant chemoradiation (nCRT) is an established procedure in stage union internationale contre le cancer (UICC) II/III rectal carcinomas. Around 53% of the tumours present with good tumor regression after nCRT, and 8%–15% are complete responders. Reliable selection markers would allow the identification of poor or non-responders prior to therapy. Tumor biopsies were harvested from 20 patients with rectal carcinomas, and stored in liquid nitrogen prior to therapy after obtaining patients’ informed consent (Erlangen-No.3784). Patients received standardized nCRT with 5-Fluoruracil (nCRT I) or 5-Fluoruracil ± Oxaliplatin (nCRT II) according to the CAO/ARO/AIO-04 protocol. After surgery, regression grading (Dworak) of the tumors was performed during histopathological examination of the specimens. Tumors were classified as poor (Dworak 1 + 2) or good (Dworak 3 + 4) responders. Laser capture microdissection (LCM) for tumor enrichment was performed on preoperative biopsies. Differences in expressed proteins between poor and good responders to nCRT I and II were identified by proteomic analysis (Isotope Coded Protein Label, ICPL™) and selected markers were validated by immunohistochemistry. Tumors of 10 patients were classified as histopathologically poor (Dworak 1 or 2) and the other 10 tumor samples as histopathologically good (Dworak 3 or 4) responders to nCRT after surgery. Sufficient material in good quality was harvested for ICPL analysis by LCM from all biopsies. We identified 140 differentially regulated proteins regarding the selection criteria and the response to nCRT. Fourteen of these proteins were synchronously up-regulated at least 1.5-fold after nCRT I or nCRT II (e.g., FLNB, TKT, PKM2, SERINB1, IGHG2). Thirty-five proteins showed a complete reciprocal regulation (up or down) after nCRT I or nCRT II and the rest was regulated either according to nCRT I or II. The protein expression of regulated proteins such as PLEC1, TKT, HADHA and TAGLN was

  10. The Fusion Protein Signal-Peptide-Coding Region of Canine Distemper Virus: A Useful Tool for Phylogenetic Reconstruction and Lineage Identification

    PubMed Central

    Sarute, Nicolás; Calderón, Marina Gallo; Pérez, Ruben; La Torre, José; Hernández, Martín; Francia, Lourdes; Panzera, Yanina

    2013-01-01

    Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus) is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H) gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp) coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages. PMID:23675493

  11. Identification and Expression Analysis of Candidate Genes Associated with Defense Responses to Phytophthora capsici in Pepper Line “PI 201234”

    PubMed Central

    Wang, Pingyong; Liu, Xiaodan; Guo, Jinju; Liu, Chen; Fu, Nan; Shen, Huolin

    2015-01-01

    Phytophthora capsici (Leonian), classified as an oomycete, seriously threatens the production of pepper (Capsicum annuum). Current understanding of the defense responses in pepper to P. capsici is limited. In this study, RNA-sequencing analysis was utilized to identify differentially expressed genes in the resistant line “PI 201234”, with 1220 differentially expressed genes detected. Of those genes, 480 were up-regulated and 740 were down-regulated, with 211 candidate genes found to be involved in defense responses based on the gene annotations. Furthermore, the expression patterns of 12 candidate genes were further validated via quantitative real-time PCR (qPCR). These genes were found to be significantly up-regulated at different time points post-inoculation (6 hpi, 24 hpi, and 5 dpi) in the resistant line “PI 201234” and susceptible line “Qiemen”. Seven genes were found to be involved in cell wall modification, phytoalexin biosynthesis, symptom development, and phytohormone signaling pathways, thus possibly playing important roles in combating exogenous pathogens. The genes identified herein will provide a basis for further gene cloning and functional verification studies and will aid in an understanding of the regulatory mechanism of pepper resistance to P. capsici. PMID:25993303

  12. 32 CFR 32.42 - Codes of conduct.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Codes of conduct. 32.42 Section 32.42 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS... NON-PROFIT ORGANIZATIONS Post-Award Requirements Procurement Standards § 32.42 Codes of conduct....

  13. A Global Identification and Analysis of Small Nucleolar RNAs and Possible Intermediate-Sized Non-Coding RNAs in Oryza sativa

    PubMed Central

    Liu, Ting-Ting; Zhu, Danmeng; Chen, Wei; Deng, Xing Wang

    2013-01-01

    Accumulating evidence suggests that non-coding RNAs (ncRNAs) are both widespread and functionally important in many eukaryotic organisms. In this study, we employed a special size fractionation and cDNA library construction method followed by 454 deep sequencing to systematically profile rice intermediate-size ncRNAs. Our analysis resulted in the identification of 1349 ncRNAs in total, including 754 novel ncRNAs of an unknown functional category. Chromosome distribution of all identified ncRNAs showed no strand bias, and displayed a pattern similar to that observed in protein-coding genes with few chromosome dependencies. More than half of the ncRNAs were centered around the plus-strand of the 5’ and 3’ termini of the coding regions. The majority of the novel ncRNAs were rice specific, while 78% of the small nucleolar RNAs (snoRNAs) were conserved. Tandem duplication drove the expansion of over half of the snoRNA gene families. Furthermore, 90% of the snoRNA candidates were shown to produce small RNAs between 20–30 nt, 80% of which were associated with ARGONAUT proteins generally, and AGO1b in particular. Overall, our findings provide a comprehensive view of an intermediate-size non-coding transcriptome in a monocot species, which will serve as a useful platform for an in-depth analysis of ncRNA functions. PMID:22986792

  14. Identification of a long non-coding RNA gene, growth hormone secretagogue receptor opposite strand, which stimulates cell migration in non-small cell lung cancer cell lines.

    PubMed

    Whiteside, Eliza J; Seim, Inge; Pauli, Jana P; O'Keeffe, Angela J; Thomas, Patrick B; Carter, Shea L; Walpole, Carina M; Fung, Jenny N T; Josh, Peter; Herington, Adrian C; Chopin, Lisa K

    2013-08-01

    The molecular mechanisms involved in non‑small cell lung cancer tumourigenesis are largely unknown; however, recent studies have suggested that long non-coding RNAs (lncRNAs) are likely to play a role. In this study, we used public databases to identify an mRNA-like, candidate long non-coding RNA, GHSROS (GHSR opposite strand), transcribed from the antisense strand of the ghrelin receptor gene, growth hormone secretagogue receptor (GHSR). Quantitative real-time RT-PCR revealed higher expression of GHSROS in lung cancer tissue compared to adjacent, non-tumour lung tissue. In common with many long non-coding RNAs, GHSROS is 5' capped and 3' polyadenylated (mRNA-like), lacks an extensive open reading frame and harbours a transposable element. Engineered overexpression of GHSROS stimulated cell migration in the A549 and NCI-H1299 non-small cell lung cancer cell lines, but suppressed cell migration in the Beas-2B normal lung-derived bronchoepithelial cell line. This suggests that GHSROS function may be dependent on the oncogenic context. The identification of GHSROS, which is expressed in lung cancer and stimulates cell migration in lung cancer cell lines, contributes to the growing number of non-coding RNAs that play a role in the regulation of tumourigenesis and metastatic cancer progression. PMID:23722988

  15. Values as Defenses

    ERIC Educational Resources Information Center

    Hultman, Kenneth E.

    1976-01-01

    The author outlines a cognitive approach for explaining how and why people use values as defenses. He examines the relationship between defensive values and irrational beliefs, suggests a number of criteria for diagnosing the presence of defensive values, and proposes some strategies for dealing with defensive values in counseling. (Author)

  16. Construction of a full-length cDNA library of Solen grandis dunker and identification of defense- and immune-related genes

    NASA Astrophysics Data System (ADS)

    Sun, Guohua; Liu, Xiangquan; Ren, Lihua; Yang, Jianmin; Wei, Xiumei; Yang, Jialong

    2013-11-01

    The basic genetic characteristics, important functional genes, and entire transcriptome of Solen grandis Dunker were investigated by constructing a full-length cDNA library with the `switching mechanism at the 5'-end of the RNA transcript' (SMART) technique. Total RNA was isolated from the immune-relevant tissues, gills and hemocytes, using the Trizol reagent, and cDNA fragments were digested with Sfi I before being ligated to the pBluescript II SK* vector. The cDNA library had a titer of 1048 cfu μL-1 and a storage capacity of 1.05×106 cfu. Approximately 98% of the clones in the library were recombinants, and the fragment lengths of insert cDNA ranged from 0.8 kb to 3.0 kb. A total of 2038 expressed sequence tags were successfully sequenced and clustered into 965 unigenes. BLASTN analysis showed that 240 sequences were highly similar to the known genes (E-value < 1e -5; percent identity >80%), accounting for 25% of the total unigenes. According to the Gene Ontology, these unigenes were related to several biological processes, including cell structure, signal transport, protein synthesis, transcription, energy metabolism, and immunity. Fifteen of the identified sequences were related to defense and immunity. The full-length cDNA sequence of HSC70 was obtained. The cDNA library of S. grandis provided a useful resource for future researches of functional genomics related to stress tolerance, immunity, and other physiological activities.

  17. 32 CFR Appendix A to Part 169a - Codes and Definitions of Functional Areas

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Codes and Definitions of Functional Areas A Appendix A to Part 169a National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMMERCIAL ACTIVITIES PROGRAM PROCEDURES Pt. 169a, App. A Appendix A to Part 169a—Codes and Definitions of Functional Areas This list...

  18. 32 CFR Appendix A to Part 169a - Codes and Definitions of Functional Areas

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Codes and Definitions of Functional Areas A Appendix A to Part 169a National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMMERCIAL ACTIVITIES PROGRAM PROCEDURES Pt. 169a, App. A Appendix A to Part 169a—Codes and Definitions of Functional Areas This list...

  19. 32 CFR Appendix A to Part 169a - Codes and Definitions of Functional Areas

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Codes and Definitions of Functional Areas A Appendix A to Part 169a National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMMERCIAL ACTIVITIES PROGRAM PROCEDURES Pt. 169a, App. A Appendix A to Part 169a—Codes and Definitions of Functional Areas This list...

  20. 32 CFR Appendix A to Part 169a - Codes and Definitions of Functional Areas

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Codes and Definitions of Functional Areas A Appendix A to Part 169a National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMMERCIAL ACTIVITIES PROGRAM PROCEDURES Pt. 169a, App. A Appendix A to Part 169a—Codes and Definitions of Functional Areas This list...

  1. 32 CFR Appendix A to Part 169a - Codes and Definitions of Functional Areas

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Codes and Definitions of Functional Areas A Appendix A to Part 169a National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMMERCIAL ACTIVITIES PROGRAM PROCEDURES Pt. 169a, App. A Appendix A to Part 169a—Codes and Definitions of Functional Areas This list...

  2. PCR assay based on DNA coding for 16S rRNA for detection and identification of mycobacteria in clinical samples.

    PubMed Central

    Kox, L F; van Leeuwen, J; Knijper, S; Jansen, H M; Kolk, A H

    1995-01-01

    A PCR and a reverse cross blot hybridization assay were developed for the detection and identification of mycobacteria in clinical samples. The PCR amplifies a part of the DNA coding for 16S rRNA with a set of primers that is specific for the genus Mycobacterium and that flanks species-specific sequences within the genes coding for 16S rRNA. The PCR product is analyzed in a reverse cross blot hybridization assay with probes specific for M. tuberculosis complex (pTub1), M. avium (pAvi3), M. intracellulare (pInt5 and pInt7), M. kansasii complex-M. scrofulaceum complex (pKan1), M. xenopi (pXen1), M. fortuitum (pFor1), M. smegmatis (pSme1), and Mycobacterium spp. (pMyc5a). The PCR assay can detect 10 fg of DNA, the equivalent of two mycobacteria. The specificities of the probes were tested with 108 mycobacterial strains (33 species) and 31 nonmycobacterial strains (of 17 genera). The probes pAvi3, pInt5, pInt7, pKan1, pXen1, and pMyc5a were specific. With probes pTub1, pFor1, and pSme1, slight cross hybridization occurred. However, the mycobacterial strains from which the cross-hybridizing PCR products were derived belonged to nonpathogenic or nonopportunistic species which do not occur in clinical samples. The test was used on 31 different clinical specimens obtained from patients suspected of having mycobacterial disease, including a patient with a double mycobacterial infection. The samples included sputum, bronchoalveolar lavage, tissue biopsy samples, cerebrospinal fluid, pus, peritoneal fluid, pleural fluid, and blood. The results of the PCR assay agreed with those of conventional identification methods or with clinical data, showing that the test can be used for the direct and rapid detection and identification of mycobacteria in clinical samples. PMID:8586707

  3. Improving the identification of people with dementia in primary care: evaluation of the impact of primary care dementia coding guidance on identified prevalence

    PubMed Central

    Russell, Paul; Banerjee, Sube; Watt, Jen; Adleman, Rosalyn; Agoe, Belinda; Burnie, Nerida; Carefull, Alex; Chandan, Kiran; Constable, Dominie; Daniels, Mark; Davies, David; Deshmukh, Sid; Huddart, Martin; Jabin, Ashrafi; Jarrett, Penelope; King, Jenifer; Koch, Tamar; Kumar, Sanjoy; Lees, Stavroula; Mir, Sinan; Naidoo, Dominic; Nyame, Sylvia; Sasae, Ryuichiro; Sharma, Tushar; Thormod, Clare; Vedavanam, Krish; Wilton, Anja; Flaherty, Breda

    2013-01-01

    Objective Improving dementia care is a policy priority nationally and internationally; there is a ‘diagnosis gap’ with less than half of the cases of dementia ever diagnosed. The English Health Department's Quality and Outcomes Framework (QOF) encourages primary care recognition and recording of dementia. The codes for dementia are complex with the possibility of underidentification through miscoding. We developed guidance on coding of dementia; we report the impact of applying this to ‘clean up’ dementia coding and records at a practice level. Design The guidance had five elements: (1) identify Read Codes for dementia; (2) access QOF dementia register; (3) generate lists of patients who may have dementia; (4) compare search with QOF data and (5) review cases. In each practice, one general practitioner conducted the exercise. The number of dementia QOF registers before and after the exercise was recorded with the hours taken to complete the exercise. Setting London primary care. Participants 23 (85%) of 27 practices participated, covering 79 312 (19 562 over 65 s) participants. Outcomes The number on dementia QOF registers; time taken. Results The number of people with dementia on QOF registers increased from 1007 to 1139 (χ2=8.17, p=0.004), raising identification rates by 8.8%. It took 4.7 h per practice, on an average. Conclusions These data demonstrate the potential of a simple primary care coding exercise, requiring no specific training, to increase the dementia identification rate. An improvement of 8.8% between 2011 and 2012 is equivalent to that of the fourth most improved primary care trust in the UK. In absolute terms, if this effects were mirrored across the UK primary care, the number of cases with dementia identified would rise by over 70 000 from 364 329 to 434 488 raising the recognition rate from 46% to 54.8%. Implementing this exercise appears to be a simple and effective way to improve recognition rates in primary care. PMID

  4. Identification of Genes Potentially Responsible for extra-Oral Digestion and Overcoming Plant Defense from Salivary Glands of the Tarnished Plant Bug (Hemiptera: Miridae) Using cDNA Sequencing

    PubMed Central

    Zhu, Yu-Cheng; Yao, Jianxiu; Luttrell, Randall

    2016-01-01

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris [Palisot de Beauvois]) feeding. By facilitating the piercing, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the plant fluids are ingested by TPBs. To identify salivary gland genes, mRNA was extracted from salivary glands and cDNA library clones were sequenced. A de novo-assembling of 7,000 Sanger sequences revealed 666 high-quality unique cDNAs with an average size of 624 bp, in which the identities of 347 cDNAs were determined using Blast2GO. Kyoto Encyclopedia of Genes and Genomes analysis indicated that these genes participate in eighteen metabolic pathways. Identifications of large number of enzyme genes in TPB salivary glands evidenced functions for extra-oral digestion and feeding damage mechanism, including 45 polygalacturonase, two α- amylase, one glucosidase, one glycan enzyme, one aminopeptidase, four lipase, and many serine protease cDNAs. The presence of multiple transcripts, multigene members, and high abundance of cell wall degradation enzymes (polygalacturonases) indicated that the enzyme-rich saliva may cause damage to plants by breaking down plant cell walls to make nutrients available for feeding. We also identified genes potentially involved in insect adaptation and detoxifying xenobiotics that may allow insects to overcome plant defense responses, including four glutathione S-transferases, three esterases, one cytochrome P450, and several serine proteases. The gene profiles of TPB salivary glands revealed in this study provides a foundation for further understanding and potential development of novel enzymatic inhibitors, or other RNAi approaches that may interrupt or minimize TPB feeding damage. PMID:27324587

  5. Identification of Genes Potentially Responsible for extra-Oral Digestion and Overcoming Plant Defense from Salivary Glands of the Tarnished Plant Bug (Hemiptera: Miridae) Using cDNA Sequencing.

    PubMed

    Zhu, Yu-Cheng; Yao, Jianxiu; Luttrell, Randall

    2016-01-01

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris [Palisot de Beauvois]) feeding. By facilitating the piercing, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the plant fluids are ingested by TPBs. To identify salivary gland genes, mRNA was extracted from salivary glands and cDNA library clones were sequenced. A de novo-assembling of 7,000 Sanger sequences revealed 666 high-quality unique cDNAs with an average size of 624 bp, in which the identities of 347 cDNAs were determined using Blast2GO. Kyoto Encyclopedia of Genes and Genomes analysis indicated that these genes participate in eighteen metabolic pathways. Identifications of large number of enzyme genes in TPB salivary glands evidenced functions for extra-oral digestion and feeding damage mechanism, including 45 polygalacturonase, two α- amylase, one glucosidase, one glycan enzyme, one aminopeptidase, four lipase, and many serine protease cDNAs. The presence of multiple transcripts, multigene members, and high abundance of cell wall degradation enzymes (polygalacturonases) indicated that the enzyme-rich saliva may cause damage to plants by breaking down plant cell walls to make nutrients available for feeding. We also identified genes potentially involved in insect adaptation and detoxifying xenobiotics that may allow insects to overcome plant defense responses, including four glutathione S-transferases, three esterases, one cytochrome P450, and several serine proteases. The gene profiles of TPB salivary glands revealed in this study provides a foundation for further understanding and potential development of novel enzymatic inhibitors, or other RNAi approaches that may interrupt or minimize TPB feeding damage. PMID:27324587

  6. High resolution methylome map of rat indicates role of intragenic DNA methylation in identification of coding region.

    PubMed

    Sati, Satish; Tanwar, Vinay Singh; Kumar, K Anand; Patowary, Ashok; Jain, Vaibhav; Ghosh, Sourav; Ahmad, Shadab; Singh, Meghna; Reddy, S Umakar; Chandak, Giriraj Ratan; Raghunath, Manchala; Sivasubbu, Sridhar; Chakraborty, Kausik; Scaria, Vinod; Sengupta, Shantanu

    2012-01-01

    DNA methylation is crucial for gene regulation and maintenance of genomic stability. Rat has been a key model system in understanding mammalian systemic physiology, however detailed rat methylome remains uncharacterized till date. Here, we present the first high resolution methylome of rat liver generated using Methylated DNA immunoprecipitation and high throughput sequencing (MeDIP-Seq) approach. We observed that within the DNA/RNA repeat elements, simple repeats harbor the highest degree of methylation. Promoter hypomethylation and exon hypermethylation were common features in both RefSeq genes and expressed genes (as evaluated by proteomic approach). We also found that although CpG islands were generally hypomethylated, about 6% of them were methylated and a large proportion (37%) of methylated islands fell within the exons. Notably, we obeserved significant differences in methylation of terminal exons (UTRs); methylation being more pronounced in coding/partially coding exons compared to the non-coding exons. Further, events like alternate exon splicing (cassette exon) and intron retentions were marked by DNA methylation and these regions are retained in the final transcript. Thus, we suggest that DNA methylation could play a crucial role in marking coding regions thereby regulating alternative splicing. Apart from generating the first high resolution methylome map of rat liver tissue, the present study provides several critical insights into methylome organization and extends our understanding of interplay between epigenome, gene expression and genome stability. PMID:22355382

  7. Identification of a Conserved Non-Protein-Coding Genomic Element that Plays an Essential Role in Alphabaculovirus Pathogenesis

    PubMed Central

    Kikhno, Irina

    2014-01-01

    Highly homologous sequences 154–157 bp in length grouped under the name of “conserved non-protein-coding element” (CNE) were revealed in all of the sequenced genomes of baculoviruses belonging to the genus Alphabaculovirus. A CNE alignment led to the detection of a set of highly conserved nucleotide clusters that occupy strictly conserved positions in the CNE sequence. The significant length of the CNE and conservation of both its length and cluster architecture were identified as a combination of characteristics that make this CNE different from known viral non-coding functional sequences. The essential role of the CNE in the Alphabaculovirus life cycle was demonstrated through the use of a CNE-knockout Autographa californica multiple nucleopolyhedrovirus (AcMNPV) bacmid. It was shown that the essential function of the CNE was not mediated by the presumed expression activities of the protein- and non-protein-coding genes that overlap the AcMNPV CNE. On the basis of the presented data, the AcMNPV CNE was categorized as a complex-structured, polyfunctional genomic element involved in an essential DNA transaction that is associated with an undefined function of the baculovirus genome. PMID:24740153

  8. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  9. Identification of differentially expressed small non-coding RNAs in the legume endosymbiont Sinorhizobium meliloti by comparative genomics.

    PubMed

    del Val, Coral; Rivas, Elena; Torres-Quesada, Omar; Toro, Nicolás; Jiménez-Zurdo, José I

    2007-12-01

    Bacterial small non-coding RNAs (sRNAs) are being recognized as novel widespread regulators of gene expression in response to environmental signals. Here, we present the first search for sRNA-encoding genes in the nitrogen-fixing endosymbiont Sinorhizobium meliloti, performed by a genome-wide computational analysis of its intergenic regions. Comparative sequence data from eight related alpha-proteobacteria were obtained, and the interspecies pairwise alignments were scored with the programs eQRNA and RNAz as complementary predictive tools to identify conserved and stable secondary structures corresponding to putative non-coding RNAs. Northern experiments confirmed that eight of the predicted loci, selected among the original 32 candidates as most probable sRNA genes, expressed small transcripts. This result supports the combined use of eQRNA and RNAz as a robust strategy to identify novel sRNAs in bacteria. Furthermore, seven of the transcripts accumulated differentially in free-living and symbiotic conditions. Experimental mapping of the 5'-ends of the detected transcripts revealed that their encoding genes are organized in autonomous transcription units with recognizable promoter and, in most cases, termination signatures. These findings suggest novel regulatory functions for sRNAs related to the interactions of alpha-proteobacteria with their eukaryotic hosts. PMID:17971083

  10. Identification of differentially expressed small non-coding RNAs in the legume endosymbiont Sinorhizobium meliloti by comparative genomics

    PubMed Central

    del Val, Coral; Rivas, Elena; Torres-Quesada, Omar; Toro, Nicolás; Jiménez-Zurdo, José I

    2007-01-01

    Bacterial small non-coding RNAs (sRNAs) are being recognized as novel widespread regulators of gene expression in response to environmental signals. Here, we present the first search for sRNA-encoding genes in the nitrogen-fixing endosymbiont Sinorhizobium meliloti, performed by a genome-wide computational analysis of its intergenic regions. Comparative sequence data from eight related α-proteobacteria were obtained, and the interspecies pairwise alignments were scored with the programs eQRNA and RNAz as complementary predictive tools to identify conserved and stable secondary structures corresponding to putative non-coding RNAs. Northern experiments confirmed that eight of the predicted loci, selected among the original 32 candidates as most probable sRNA genes, expressed small transcripts. This result supports the combined use of eQRNA and RNAz as a robust strategy to identify novel sRNAs in bacteria. Furthermore, seven of the transcripts accumulated differentially in free-living and symbiotic conditions. Experimental mapping of the 5′-ends of the detected transcripts revealed that their encoding genes are organized in autonomous transcription units with recognizable promoter and, in most cases, termination signatures. These findings suggest novel regulatory functions for sRNAs related to the interactions of α-proteobacteria with their eukaryotic hosts. PMID:17971083

  11. Identification of Tissue-Specific Protein-Coding and Noncoding Transcripts across 14 Human Tissues Using RNA-seq

    PubMed Central

    Zhu, Jinhang; Chen, Geng; Zhu, Sibo; Li, Suqing; Wen, Zhuo; Bin Li; Zheng, Yuanting; Shi, Leming

    2016-01-01

    Many diseases and adverse drug reactions exhibit tissue specificity. To better understand the tissue-specific expression characteristics of transcripts in different human tissues, we deeply sequenced RNA samples from 14 different human tissues. After filtering many lowly expressed transcripts, 24,729 protein-coding transcripts and 1,653 noncoding transcripts were identified. By analyzing highly expressed tissue-specific protein-coding transcripts (TSCTs) and noncoding transcripts (TSNTs), we found that testis expressed the highest numbers of TSCTs and TSNTs. Brain, monocytes, ovary, and heart expressed more TSCTs than the rest tissues, whereas brain, placenta, heart, and monocytes expressed more TSNTs than other tissues. Co-expression network constructed based on the TSCTs and TSNTs showed that each hub TSNT was co-expressed with several TSCTs, allowing functional annotation of TSNTs. Important biological processes and KEGG pathways highly related to the specific functions or diseases of each tissue were enriched with the corresponding TSCTs. These TSCTs and TSNTs may participate in the tissue-specific physiological or pathological processes. Our study provided a unique data set and systematic analysis of expression characteristics and functions of both TSCTs and TSNTs based on 14 distinct human tissues, and could facilitate future investigation of the mechanisms behind tissue-specific diseases and adverse drug reactions. PMID:27329541

  12. Identification and analysis of the genes coding for the putative pyruvate dehydrogenase enzyme complex in Acholeplasma laidlawii.

    PubMed Central

    Wallbrandt, P; Tegman, V; Jonsson, B H; Wieslander, A

    1992-01-01

    A monospecific antibody recognizing two membrane proteins in Acholeplasma laidlawii identified a plasmid clone from a genomic library. The nucleotide sequence of the 4.6-kbp insert contained four sequential genes coding for proteins of 39 kDa (E1 alpha, N terminus not cloned), 36 kDa (E1 beta), 57 kDa (E2), and 36 kDa (E3; C terminus not cloned). The N termini of the cloned E2, E1 beta, and native A. laidlawii E2 proteins were verified by amino acid sequencing. Computer-aided searches showed that the translated DNA sequences were homologous to the four subenzymes of the pyruvate dehydrogenase complexes from gram-positive bacteria and humans. The plasmid-encoded 57-kDa (E2) protein was recognized by antibodies against the E2 subenzymes of the pyruvate and oxoglutarate dehydrogenase complexes from Bacillus subtilis. A substantial fraction of the E2 protein as well as part of the pyruvate dehydrogenase enzymatic activity was associated with the cytoplasmic membrane in A. laidlawii. In vivo complementation with three different Escherichia coli pyruvate dehydrogenase-defective mutants showed that the four plasmid-encoded proteins were able to restore pyruvate dehydrogenase enzyme activity in E. coli. Since A. laidlawii lacks oxoglutarate dehydrogenase and most likely branched-chain dehydrogenase enzyme complex activities, these results strongly suggest that the sequenced genes code for the pyruvate dehydrogenase complex. Images PMID:1735725

  13. Identification of Tissue-Specific Protein-Coding and Noncoding Transcripts across 14 Human Tissues Using RNA-seq.

    PubMed

    Zhu, Jinhang; Chen, Geng; Zhu, Sibo; Li, Suqing; Wen, Zhuo; Bin Li; Zheng, Yuanting; Shi, Leming

    2016-01-01

    Many diseases and adverse drug reactions exhibit tissue specificity. To better understand the tissue-specific expression characteristics of transcripts in different human tissues, we deeply sequenced RNA samples from 14 different human tissues. After filtering many lowly expressed transcripts, 24,729 protein-coding transcripts and 1,653 noncoding transcripts were identified. By analyzing highly expressed tissue-specific protein-coding transcripts (TSCTs) and noncoding transcripts (TSNTs), we found that testis expressed the highest numbers of TSCTs and TSNTs. Brain, monocytes, ovary, and heart expressed more TSCTs than the rest tissues, whereas brain, placenta, heart, and monocytes expressed more TSNTs than other tissues. Co-expression network constructed based on the TSCTs and TSNTs showed that each hub TSNT was co-expressed with several TSCTs, allowing functional annotation of TSNTs. Important biological processes and KEGG pathways highly related to the specific functions or diseases of each tissue were enriched with the corresponding TSCTs. These TSCTs and TSNTs may participate in the tissue-specific physiological or pathological processes. Our study provided a unique data set and systematic analysis of expression characteristics and functions of both TSCTs and TSNTs based on 14 distinct human tissues, and could facilitate future investigation of the mechanisms behind tissue-specific diseases and adverse drug reactions. PMID:27329541

  14. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  15. Identification and expression patterns of novel long non-coding RNAs in neural progenitors of the developing mammalian cortex

    PubMed Central

    Aprea, Julieta; Lesche, Mathias; Massalini, Simone; Prenninger, Silvia; Alexopoulou, Dimitra; Dahl, Andreas; Hiller, Michael; Calegari, Federico

    2015-01-01

    Long non-coding (lnc)RNAs play key roles in many biological processes. Elucidating the function of lncRNAs in cell type specification during organ development requires knowledge about their expression in individual progenitor types rather than in whole tissues. To achieve this during cortical development, we used a dual-reporter mouse line to isolate coexisting proliferating neural stem cells, differentiating neurogenic progenitors and newborn neurons and assessed the expression of lncRNAs by paired-end, high-throughput sequencing. We identified 379 genomic loci encoding novel lncRNAs and performed a comprehensive assessment of cell-specific expression patterns for all, annotated and novel, lncRNAs described to date. Our study provides a powerful new resource for studying these elusive transcripts during stem cell commitment and neurogenesis.

  16. lncRNA-MFDL: identification of human long non-coding RNAs by fusing multiple features and using deep learning.

    PubMed

    Fan, Xiao-Nan; Zhang, Shao-Wu

    2015-03-01

    Long noncoding RNAs (lncRNAs) are emerging as a novel class of noncoding RNAs and potent gene regulators, which play an important and varied role in cellular functions. lncRNAs are closely related with the occurrence and development of some diseases. High-throughput RNA-sequencing techniques combined with de novo assembly have identified a large number of novel transcripts. The discovery of large and 'hidden' transcriptomes urgently requires the development of effective computational methods that can rapidly distinguish between coding and long noncoding RNAs. In this study, we developed a powerful predictor (named as lncRNA-MFDL) to identify lncRNAs by fusing multiple features of the open reading frame, k-mer, the secondary structure and the most-like coding domain sequence and using deep learning classification algorithms. Using the same human training dataset and a 10-fold cross validation test, lncRNA-MFDL can achieve 97.1% prediction accuracy which is 5.7, 3.7, and 3.4% higher than that of CPC, CNCI and lncRNA-FMFSVM predictors, respectively. Compared with CPC and CNCI predictors in other species (e.g., anole lizard, zebrafish, chicken, gorilla, macaque, mouse, lamprey, orangutan, xenopus and C. elegans) testing datasets, the new lncRNA-MFDL predictor is also much more effective and robust. These results show that lncRNA-MFDL is a powerful tool for identifying lncRNAs. The lncRNA-MFDL software package is freely available at for academic users. PMID:25588719

  17. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  18. 32 CFR 634.25 - Installation traffic codes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Installation traffic codes. 634.25 Section 634.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation...

  19. 32 CFR 634.25 - Installation traffic codes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Installation traffic codes. 634.25 Section 634.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation...

  20. Experimental RNomics in Aquifex aeolicus: identification of small non-coding RNAs and the putative 6S RNA homolog

    PubMed Central

    Willkomm, Dagmar K.; Minnerup, Jens; Hüttenhofer, Alexander; Hartmann, Roland K.

    2005-01-01

    By an experimental RNomics approach, we have generated a cDNA library from small RNAs expressed from the genome of the hyperthermophilic bacterium Aquifex aeolicus. The library included RNAs that were antisense to mRNAs and tRNAs as well as RNAs encoded in intergenic regions. Substantial steady-state levels in A.aeolicus cells were confirmed for several of the cloned RNAs by northern blot analysis. The most abundant intergenic RNA of the library was identified as the 6S RNA homolog of A.aeolicus. Although shorter in size (150 nt) than its γ-proteobacterial homologs (∼185 nt), it is predicted to have the most stable structure among known 6S RNAs. As in the γ-proteobacteria, the A.aeolicus 6S RNA gene (ssrS) is located immediately upstream of the ygfA gene encoding a widely conserved 5-formyltetrahydrofolate cyclo-ligase. We identifed novel 6S RNA candidates within the γ-proteobacteria but were unable to identify reasonable 6S RNA candidates in other bacterial branches, utilizing mfold analyses of the region immediately upstream of ygfA combined with 6S RNA blastn searches. By RACE experiments, we mapped the major transcription initiation site of A.aeolicus 6S RNA primary transcripts, located within the pheT gene preceding ygfA, as well as three processing sites. PMID:15814812

  1. 77 FR 43469 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... from the Code of Federal Regulations with the publication of DFARS Case 2011-D048 (77 FR 19128), and... DFARS Case 2012-D003 (77 FR 35879). List of Subjects in 48 CFR Part 252 Government procurement. Ynette R... Defense Acquisition Regulations System 48 CFR Part 252 Defense Federal Acquisition Regulation...

  2. Identification of a long non-coding RNA-associated RNP complex regulating metastasis at the translational step

    PubMed Central

    Gumireddy, Kiranmai; Li, Anping; Yan, Jinchun; Setoyama, Tetsuro; Johannes, Gregg J; Ørom, Ulf A; Tchou, Julia; Liu, Qin; Zhang, Lin; Speicher, David W; Calin, George A; Huang, Qihong

    2013-01-01

    Long non-coding RNAs (lncRNAs) are a novel class of regulatory genes that play critical roles in various processes ranging from normal development to human diseases such as cancer progression. Recent studies have shown that lncRNAs regulate the gene expression by chromatin remodelling, transcription, splicing and RNA decay control, enhancer function, and epigenetic regulation. However, little is known about translation regulation by lncRNAs. We identified a translational regulatory lncRNA (treRNA) through genome-wide computational analysis. We found that treRNA is upregulated in paired clinical breast cancer primary and lymph-node metastasis samples, and that its expression stimulates tumour invasion in vitro and metastasis in vivo. Interestingly, we found that treRNA downregulates the expression of the epithelial marker E-cadherin by suppressing the translation of its mRNA. We identified a novel ribonucleoprotein (RNP) complex, consisting of RNA-binding proteins (hnRNP K, FXR1, and FXR2), PUF60 and SF3B3, that is required for this treRNA functions. Translational suppression by treRNA is dependent on the 3′UTR of the E-cadherin mRNA. Taken together, our study indicates a novel mechanism of gene regulation by lncRNAs in cancer progression. PMID:23974796

  3. Identification of long non-coding RNAs as novel biomarker and potential therapeutic target for atrial fibrillation in old adults

    PubMed Central

    Xu, Yingjia; Huang, Ritai; Gu, Jianing; Jiang, Weifeng

    2016-01-01

    Atrial fibrillation (AF) is a highly prevalent cardiac arrhythmia disease, which widely leads to exacerbate heart failure and ischemic stroke in elder world. Recently, long non-coding RNAs (lncRNAs), a subclass of noncoding RNAs, have been reported to play critical roles in pathophysiology of cardiac heart. However, little is known of their role in cardiac arrhythmia. In the present study, we investigated the expression levels of lncRNAs of AF patients and healthy people with Agilent Human lncRNA array for the first time. 177 lncRNAs of 78243 and 153 mRNAs of 30215 tested were identified to be differentially expressed (≥ 2-fold change), indicating that the expression of many lncRNAs are upregulated or downregulated in AF. Among these, NONHSAT040387 and NONHSAT098586 were the most upregulated and downregulated lncRNAs. Real time quantitative PCR were employed to validate the microarray analysis findings, and the results confirmed the consistence. GO and KEGG pathway analysis were applied to explore the potential lncRNAs functions, some pathways including oxygen transporter activity and protein heterodimerization activity were speculated to be involved in AF pathogenesis. These results shed some light on lncRNAs' physiologic functions and provide useful information for exploring potential therapeutic treatments for heart rhythm disease. PMID:26908457

  4. Identification of a long non-coding RNA NR_026689 associated with lung carcinogenesis induced by NNK

    PubMed Central

    Xu, Yiqin; Yang, Ti; Yang, Qiaoyuan; Yang, Chengfeng; Jiang, Yiguo

    2016-01-01

    Long non-coding RNAs (lncRNA) are thought to be important epigenetic regulators involved in the development of a variety of cancers. Alterations in lncRNA expression are associated with exposure to chemical carcinogens. However, it is still unclear whether lncRNA expression during lung carcinogenesis is induced by chemical carcinogens. In this study, using NNK-induced rat lung cancer model established by our previous study, we determined the lncRNA expression profiles, and an alteration in lncRNA expression was observed in lung cancer tissues and blood in the NNK treatment group. Using quantitative reverse-transcription PCR (qRT-PCR), five differentially expressed lncRNAs were further detected and validated. We identified a novel lncRNA, NR_026689, which showed increased expression in lung cancer tissues induced by NNK and the alteration of lncRNA NR_026689 was specifically observed in lung tissue. The level of NR_026689 was determined and significantly increased in rat whole blood at the 10th and 20th week after NNK treatment to evaluate it as a potential early marker for lung cancer. Together, these findings suggest that lncRNA NR_026689 may be a potential early biomarker for lung cancer and is associated with lung carcinogenesis induced by NNK. PMID:26908441

  5. 32 CFR 635.19 - Offense codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Offense codes. 635.19 Section 635.19 National... INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.19 Offense codes. (a) The offense code describes, as nearly as possible, the complaint or offense by using an alphanumeric code. Appendix C of AR...

  6. Technologies for Distributed Defense

    SciTech Connect

    Seiders, Barbara AB; Rybka, Anthony J.

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of "citizen soldiers," with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  7. Environmental Fluid Dynamics Code

    EPA Science Inventory

    The Environmental Fluid Dynamics Code (EFDC)is a state-of-the-art hydrodynamic model that can be used to simulate aquatic systems in one, two, and three dimensions. It has evolved over the past two decades to become one of the most widely used and technically defensible hydrodyn...

  8. Identification of a non-coding KLF4 transcript generated from intron retention and downregulated in human hepatocellular carcinoma.

    PubMed

    Zhou, Junwei; Lai, Paul Bo-San; Tsui, Stephen Kwok-Wing

    2015-10-01

    The Krüppel-like factor 4 (KLF4) gene is related to various biological processes including stem cell reprogramming and tumorigenesis. In this study, we identified and characterized a non-coding transcript of KLF4, which was designated KLF4‑003, in human liver tissue samples. KLF4‑003 was identified in a number of cell lines by reverse transcription PCR and DNA sequencing. Its expression levels were determined in 54 pairs of human hepatocellular carcinoma (HCC) tissues and a number of HCC cell lines by real-time PCR (RT-PCR). Methylation status of KLF4‑003 CpG islands was determined by bisulfite sequencing. The regulatory effect of KLF4‑003 CpG islands hypermethylation in Hep3B cells was then validated by the 5-aza-dC demethylation treatment, followed by RT-PCR analysis. Receiver operating characteristic (ROC) curve was created to evaluate the diagnostic value for differentiating between HCC cancer and benign diseases. The association study between KLF4‑003 expression level and clinical traits of HCC patients was performed with SPSS. We found that KLF4‑003 was downregulated in 46 out of 54 HCC samples compared with their adjunct normal tissues. The reduced KLF4‑003 expression was significantly associated with HCC recurrence (P=0.045) in the follow-up of 31 HCC patients. Significant differences were detected between the methylation status of HCC specimens and their adjacent normal controls. Demethylation treatment significantly rescued the expression of KLF4‑003 in Hep3B cells. Such observation indicated that the CpG island hypermethylation was at least partially responsible for the downregulation of KLF4‑003 in HCC. The area under ROC curve for the prediction of HCC reached 0.803 (95% CI=0.719-0.886, P<0.001). Our results suggested that the expression of KLF4‑003 was epigenetically regulated by methylation status of a KLF4‑003 CpG island in HCC. The differential expression of KLF4‑003 might play an important role in HCC development and might

  9. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  10. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  11. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  12. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  13. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  14. Schools and Civil Defense.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…

  15. Forgiveness and Defense Style

    ERIC Educational Resources Information Center

    Maltby, John; Day, Liz

    2004-01-01

    Within the literature on the psychology of forgiveness, researchers have hypothesized that the 1st stage in the process of being able to forgive is the role of psychological defense. To examine such a hypothesis, the authors explored the relationship between forgiveness and defense style. The 304 respondents (151 men, 153 women) completed measures…

  16. Defense Mechanisms: A Bibliography.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  17. Two systems and defenses.

    PubMed

    Novick, Jack; Novick, Kerry Kelly

    2013-02-01

    The authors suggest that Freud's concept of defense differentiated psychoanalysis from other medical and psychological theories of personality development and functioning then and now. Reclaiming the concept's centrality and linking it with interdisciplinary research findings, they illustrate their extension of defense into a two-system model of self-protection and self-regulation with a clinical example. The authors suggest that the two-system model allows for the reintegration of defense into a multidimensional psychoanalytic theory and multimodal therapeutic technique. PMID:23421665

  18. 77 FR 3369 - Presidential Determination on the Eligibility of South Sudan To Receive Defense Articles and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-24

    ... HOUSE, Washington, January 6, 2012 [FR Doc. 2012-1545 Filed 1-23-12; 8:45 am] Billing code 4710-10-P ... the Eligibility of South Sudan To Receive Defense Articles and Defense Services Under the Foreign... defense services to the Republic of South Sudan will strengthen the security of the United States...

  19. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... are maintained in a DSS system. (b) Identification. Identification of individuals is required both for... 32 National Defense 2 2012-07-01 2012-07-01 false Requirements for identification. 321.4 Section...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification....

  20. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... are maintained in a DSS system. (b) Identification. Identification of individuals is required both for... 32 National Defense 2 2011-07-01 2011-07-01 false Requirements for identification. 321.4 Section...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification....

  1. Identification and functional characterization of cDNAs coding for hydroxybenzoate/hydroxycinnamate glucosyltransferases co-expressed with genes related to proanthocyanidin biosynthesis

    PubMed Central

    Khater, F.; Fournand, D.; Vialet, S.; Meudec, E.; Cheynier, V.; Terrier, N.

    2012-01-01

    Grape proanthocyanidins (PAs) play a major role in the organoleptic properties of wine. They are accumulated mainly in grape skin and seeds during the early stages of berry development. Despite the recent progress in the identification of genes involved in PA biosynthesis, the mechanisms involved in subunit condensation, galloylation, or fine regulation of the spatio-temporal composition of grape berries in PAs are still not elucidated. Two Myb transcription factors, VvMybPA1 and VvMybPA2, controlling the PA pathway have recently been identified and ectopically over-expressed in an homologous system. In addition to already known PA genes, three genes coding for glucosyltransferases were significantly differentially expressed between hairy roots over-expressing VvMybPA1 or VvMybPA2 and control lines. The involvement of these genes in PA biosynthesis metabolism is unclear. The three glucosyltransferases display high sequence similarities with other plant glucosyltransferases able to catalyse the formation of glucose esters, which are important intermediate actors for the synthesis of different phenolic compounds. Studies of the in vitro properties of these three enzymes (Km, Vmax, substrate specificity, pH sensitivity) were performed through production of recombinant proteins in E. coli and demonstrated that they are able to catalyse the formation of 1-O-acyl-Glc esters of phenolic acids but are not active on flavonoids and stilbenes. The transcripts are expressed in the early stages of grape berry development, mainly in the berry skins and seeds. The results presented here suggest that these enzymes could be involved in vivo in PA galloylation or in the synthesis of hydroxycinnamic esters. PMID:22090445

  2. Identification of a genetic alteration in the code for bilirubin UDP-glucuronosyltransferase in the UGT1 gene complex of a Crigler-Najjar type I patient.

    PubMed Central

    Ritter, J K; Yeatman, M T; Ferreira, P; Owens, I S

    1992-01-01

    Patients with Crigler-Najjar syndrome (CN) type I inherit an autosomal recessive trait for hyperbilirubinemia, which is characterized by the total absence of bilirubin UDP-glucuronosyltransferase (transferase) activity. The recent identification of two bilirubin transferase isoforms with identical carboxyl termini (Ritter, J. K., J. M. Crawford, and I. S. Owens. 1991. J. Biol. Chem. 266:1043-1047) led to the discovery of a unique locus, UGT1, which encodes a family of UDP-glucuronosyltransferase isozymes, including the two bilirubin forms (Ritter, J. K., F. Chen, Y. Y. Sheen, H. M. Tran, S. Kimura, M. T. Yeatman, and I. S. Owens. 1992. J. Biol. Chem. 267:3257-3261). The UGT1 locus features a complex of six overlapping transcriptional units encoding transferases, each of which shares the four most 3' exons (2, 3, 4, and 5) specifying the 3' half of the transferase coding regions (condons 289-533) and the entire 3' untranslated region of each mRNA. This gene model predicts that a single critical mutation in any of these four "common" exons may inactivate the entire family of encoded transferases. In agreement with this prediction, we show here that in the first CN type I individual analyzed (patient F.B.), a 13-bp deletion has occurred in exon 2. Analysis of product generated by the polymerase chain reaction and genomic DNA demonstrated that F.B. is homozygous for the defective allele (UGT1*FB), and that the consanguineous parents are both heterozygotic at this locus. The mutation is predicted to result in the synthesis of severely truncated bilirubin transferase isozymes that are lacking a highly conserved sequence in the carboxyl-terminus and the characteristic membrane (endoplasmic reticulum)-anchoring segment of the protein molecule. Images PMID:1634606

  3. Moscow's defense intellectuals

    SciTech Connect

    Lambeth, B.S.

    1990-01-01

    This essay was originally written two decades ago as a seminar paper. A substantial portion of it addresses what were then only the first steps toward the establishment of a community of professional civilian defense analysts in the Soviet Union. Throughout most of the intervening period, that community found itself mired in immobilism as jurisdiction over such key Soviet national security inputs as military doctrine, force requirements, resource needs, and to a considerable degree, arms negotiating positions remained an exclusive prerogative of the Defense Ministry and the General Staff. Today, this former military monopoly has come to be challenged with increasing success by a host of newcomers to the Soviet defense scene, including the Foreign Ministry, the Supreme Soviet, and an ambitious cadre of civilian analysts attached to the social science research institutes of the Academy of Sciences. These individuals are making a determined bid for greater influence over Soviet defense policy, with the express encouragement of President Gorbachev and his supporters. The result has been an unprecedented infusion of pluralism into Soviet defense politics and a significant change in the content and goals of Soviet military policy.

  4. 32 CFR 1662.3 - Identification of information requested.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification of information requested. 1662.3 Section 1662.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM FREEDOM OF INFORMATION ACT (FOIA) PROCEDURES § 1662.3 Identification of information requested. Any...

  5. 32 CFR 1662.3 - Identification of information requested.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification of information requested. 1662.3 Section 1662.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM FREEDOM OF INFORMATION ACT (FOIA) PROCEDURES § 1662.3 Identification of information requested. Any person who requests information under...

  6. 32 CFR 1662.3 - Identification of information requested.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification of information requested. 1662.3 Section 1662.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM FREEDOM OF INFORMATION ACT (FOIA) PROCEDURES § 1662.3 Identification of information requested. Any person who requests information under...

  7. 32 CFR 1662.3 - Identification of information requested.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification of information requested. 1662.3 Section 1662.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM FREEDOM OF INFORMATION ACT (FOIA) PROCEDURES § 1662.3 Identification of information requested. Any person who requests information under...

  8. 32 CFR 1662.3 - Identification of information requested.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of information requested. 1662.3 Section 1662.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM FREEDOM OF INFORMATION ACT (FOIA) PROCEDURES § 1662.3 Identification of information requested. Any...

  9. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    PubMed Central

    Gómez-Lama Cabanás, Carmen; Schilirò, Elisabetta; Valverde-Corredor, Antonio; Mercado-Blanco, Jesús

    2014-01-01

    Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA) against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH) cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets), many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR) experiments aiming to: (1) validate the induction of these genes, and (2) shed light on their expression pattern along time (from 1 to 15 days). Induction of olive genes potentially coding for lipoxygenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase, and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e., JERF, bHLH, WRKY), as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mounts a wide array of systemic defense responses in distant tissues (stems, leaves). This sheds light on how olive plants respond to the “non-hostile” colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7. PMID:25250017

  10. Value of space defenses

    SciTech Connect

    Canavan, G.H.

    1992-10-29

    This report discusses the economic value of defenses against Near-Earth Object (NEO) impacts is bounded by calculating expected losses in their absence, which illustrates the contributions from NEOs of different sizes and the sensitivity of total expected losses to impact frequencies. For typical size distributions and damage of only a few decades duration, losses are most sensitive to small NEOs, and lead to defenses worth a few $M/yr. When the persistence of damage with NEO size is taken into account, that shifts the loss to the largest NEOs and greatly increases expected loss and values.

  11. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  12. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  13. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense...

  14. Identification of genes potentially responsible for extra-oral digestion and overcoming plant defense from salivary glands of the tarnished plant bug (Lygus lineolaris) using cDNA sequencing

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris) feeding. TPBs secrete saliva during feeding to facilitate the piercing into plant tissues. More importantly, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the p...

  15. Radiological Defense Manual.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    Originally prepared for use as a student textbook in Radiological Defense (RADEF) courses, this manual provides the basic technical information necessary for an understanding of RADEF. It also briefly discusses the need for RADEF planning and expected postattack emergency operations. There are 14 chapters covering these major topics: introduction…

  16. Censorship: Tactics for Defense.

    ERIC Educational Resources Information Center

    Lowery, Skip

    1998-01-01

    Book banners are generally successful because they have a wide network of support, including national coalitions with sophisticated organizational methods--such as electing certain people to school boards. School officials should get organized and devise defensive strategies, such as inviting critics to class, asking what they would like to…

  17. Defense Language Institute.

    ERIC Educational Resources Information Center

    Defense Language Inst., Washington, DC.

    Discussed in this Defense Language Institute (DLI) brochure are its intensive language programs' history, and its four schools, which are located in Monterey, California, Washington, D.C., Lackland Air Force Base, and Fort Bliss, Texas. Proficiency levels determined by the DLI and utilization of the audiolingual method are also described.…

  18. 9. BASRELIEF DECORATION, 'DEFENSE', MURAL COMMEMORATING THE DEFENSE OF FORT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. BAS-RELIEF DECORATION, 'DEFENSE', MURAL COMMEMORATING THE DEFENSE OF FORT DEARBORN - Chicago River Bascule Bridge, Michigan Avenue, Spanning Chicago River at North Michigan Avenue, Chicago, Cook County, IL

  19. Clinical coding. Code breakers.

    PubMed

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  20. 22 CFR 126.16 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and Australia.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Explosives found at 27 CFR parts 447, 478, and 479, which are unaffected by the Defense Trade Cooperation... and USA Treaty Community//.” For example, for defense articles classified SECRET, the marking or identification shall be “//SECRET USML//REL AUS and USA Treaty Community//.” (ii) Unclassified defense...

  1. [Thoughts on "defensive" medicine].

    PubMed

    Csiba, László

    2007-03-25

    "Defensive" medicine is called medical behaviour characterized by deformation of diagnostic and therapeutic activities due to fears endangering existence and work, thus some interventions are omitted or, on the contrary, superfluous examinations are proposed on account of internal uncertainty, the patient's distrust or hostile social environment. Trust relation between patient and physician is the most gravely damaged because of aggravation and distortion of some conscienceless physicians' abuses by the media; patient-physician relations may not be degraded to contractual legal relations. Young physicians must get acquainted with the joy of success in diagnostics that enriches the personality. They shall have healthy self-esteem and be ready to take diagnostic and therapeutic challenges on themselves. All of us have to fight against social atmosphere hostile to physicians, against causes inducing and augmenting practice of defensive medicine. PMID:17444017

  2. Defense Waste Processing Facility

    SciTech Connect

    Haselow, J.S.; Wilhite, E.L.; Stieve, A.L.

    1990-05-01

    The information contained in this report is intended to supplement the original Environmental Impact Statement (EIS) for the Defense Waste Processing Facility (DWPF). Since the original EIS in 1982, alterations have been made to he conceptual process that reduce the impact to the groundwater. This reduced impact is documented in this report along with an update of the understanding of seismology and geology of the Savannah River Site. 6 refs., 2 figs., 2 tabs.

  3. Binary coding for hyperspectral imagery

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Chang, Chein-I.; Chang, Chein-Chi; Lin, Chinsu

    2004-10-01

    Binary coding is one of simplest ways to characterize spectral features. One commonly used method is a binary coding-based image software system, called Spectral Analysis Manager (SPAM) for remotely sensed imagery developed by Mazer et al. For a given spectral signature, the SPAM calculates its spectral mean and inter-band spectral difference and uses them as thresholds to generate a binary code word for this particular spectral signature. Such coding scheme is generally effective and also very simple to implement. This paper revisits the SPAM and further develops three new SPAM-based binary coding methods, called equal probability partition (EPP) binary coding, halfway partition (HP) binary coding and median partition (MP) binary coding. These three binary coding methods along with the SPAM well be evaluated for spectral discrimination and identification. In doing so, a new criterion, called a posteriori discrimination probability (APDP) is also introduced for performance measure.

  4. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  5. Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus.

    PubMed

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A; Highland, Heather M; Locke, Adam E; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J; Teslovich, Tanya M; Rayner, N William; Robertson, Neil R; Beer, Nicola L; Rundle, Jana K; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P; Gabriel, Stacey; Gjesing, Anette P; Groves, Christopher J; Hollensted, Mette; Huyghe, Jeroen R; Jackson, Anne U; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S; Stringham, Heather M; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I; Blangero, John; Cox, Nancy J; Duggirala, Ravindranath; Hanis, Craig L; Seielstad, Mark; Wilson, James G; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L; Doney, Alex S F; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D; Morris, Andrew D; Palmer, Colin N A; Collins, Francis S; Mohlke, Karen L; Bergman, Richard N; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C; Morris, Andrew P; Altshuler, David; Meigs, James B; Boehnke, Michael; McCarthy, Mark I; Lindgren, Cecilia M; Gloyn, Anna L

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  6. Identification and Functional Characterization of G6PC2 Coding Variants Influencing Glycemic Traits Define an Effector Transcript at the G6PC2-ABCB11 Locus

    PubMed Central

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A.; Highland, Heather M.; Locke, Adam E.; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J.; Teslovich, Tanya M.; Rayner, N. William; Robertson, Neil R.; Beer, Nicola L.; Rundle, Jana K.; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P.; Gabriel, Stacey; Gjesing, Anette P.; Groves, Christopher J.; Hollensted, Mette; Huyghe, Jeroen R.; Jackson, Anne U.; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S.; Stringham, Heather M.; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I.; Blangero, John; Cox, Nancy J.; Duggirala, Ravindranath; Hanis, Craig L.; Seielstad, Mark; Wilson, James G.; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L.; Doney, Alex S. F.; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E.; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D.; Morris, Andrew D.; Palmer, Colin N. A.; Collins, Francis S.; Mohlke, Karen L.; Bergman, Richard N.; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M.; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C.; Morris, Andrew P.; Altshuler, David; Meigs, James B.; Boehnke, Michael; McCarthy, Mark I.; Lindgren, Cecilia M.; Gloyn, Anna L.

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  7. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  8. 32 CFR 634.21 - Department of Defense Form 2220.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Department of Defense Form 2220. (a) Use. DD Form 2220 will be used to identify registered POVs on Army, Navy...). (ii) Alphanumeric individual form identification number. (iii) DOD seal. (2) Name of the installation... guided by state or host nation laws will specify the exact placement of DD Form 2220. (5) For Navy...

  9. 32 CFR 634.21 - Department of Defense Form 2220.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense Form 2220. (a) Use. DD Form 2220 will be used to identify registered POVs on Army, Navy...). (ii) Alphanumeric individual form identification number. (iii) DOD seal. (2) Name of the installation... guided by state or host nation laws will specify the exact placement of DD Form 2220. (5) For Navy...

  10. 32 CFR 634.21 - Department of Defense Form 2220.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Department of Defense Form 2220. (a) Use. DD Form 2220 will be used to identify registered POVs on Army, Navy...). (ii) Alphanumeric individual form identification number. (iii) DOD seal. (2) Name of the installation... guided by state or host nation laws will specify the exact placement of DD Form 2220. (5) For Navy...

  11. 32 CFR 634.21 - Department of Defense Form 2220.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Department of Defense Form 2220. (a) Use. DD Form 2220 will be used to identify registered POVs on Army, Navy...). (ii) Alphanumeric individual form identification number. (iii) DOD seal. (2) Name of the installation... guided by state or host nation laws will specify the exact placement of DD Form 2220. (5) For Navy...

  12. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  13. Phonological coding during reading.

    PubMed

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  14. Identification of a Novel Small Cysteine-Rich Protein in the Fraction from the Biocontrol Fusarium oxysporum Strain CS-20 that Mitigates Fusarium Wilt Symptoms and Triggers Defense Responses in Tomato

    PubMed Central

    Shcherbakova, Larisa A.; Odintsova, Tatyana I.; Stakheev, Alexander A.; Fravel, Deborah R.; Zavriev, Sergey K.

    2016-01-01

    The biocontrol effect of the non-pathogenic Fusarium oxysporum strain CS-20 against the tomato wilt pathogen F. oxysporum f. sp. lycopersici (FOL) has been previously reported to be primarily plant-mediated. This study shows that CS-20 produces proteins, which elicit defense responses in tomato plants. Three protein-containing fractions were isolated from CS-20 biomass using size exclusion chromatography. Exposure of seedling roots to one of these fractions prior to inoculation with pathogenic FOL strains significantly reduced wilt severity. This fraction initiated an ion exchange response in cultured tomato cells resulting in a reversible alteration of extracellular pH; increased tomato chitinase activity, and induced systemic resistance by enhancing PR-1 expression in tomato leaves. Two other protein fractions were inactive in seedling protection. The main polypeptide (designated CS20EP), which was specifically present in the defense-inducing fraction and was not detected in inactive protein fractions, was identified. The nucleotide sequence encoding this protein was determined, and its complete amino acid sequence was deduced from direct Edman degradation (25 N-terminal amino acid residues) and DNA sequencing. The CS20EP was found to be a small basic cysteine-rich protein with a pI of 9.87 and 23.43% of hydrophobic amino acid residues. BLAST search in the NCBI database showed that the protein is new; however, it displays 48% sequence similarity with a hypothetical protein FGSG_10784 from F. graminearum strain PH-1. The contribution of CS20EP to elicitation of tomato defense responses resulting in wilt mitigating is discussed. PMID:26779237

  15. Synthetic plant defense elicitors

    PubMed Central

    Bektas, Yasemin; Eulgem, Thomas

    2015-01-01

    To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug-like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection. PMID:25674095

  16. Nanomaterials for Defense Applications

    NASA Astrophysics Data System (ADS)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  17. Identification of a xyloglucan-specific endo-(1-4)-beta-D-glucanase inhibitor protein from apple (Malus × domestica Borkh.) as a potential defense gene against Botryosphaeria dothidea.

    PubMed

    Bai, Suhua; Dong, Chaohua; Zhu, Jun; Zhang, Yugang; Dai, Hongyi

    2015-02-01

    Botryosphaeria dothidea is the causal agent of apple ring rot which is a highly destructive apple disease in China. Here, a putative xyloglucan-specific endo-(1-4)-beta-d-glucanase inhibitor protein from Malus×domestica (designated as MdXEGIP1) was found to be involved in defense against B. dothidea infection. MdXEGIP1 shares high amino acid sequence identity with other apple XEGIPs, but exhibited significantly different responses to B. dothidea infection. Quantitative real-time PCR revealed that MdXEGIP1 expression was significantly induced in shoot bark of apple plant by B. dothidea and showed different expression pattern in resistant and susceptible apple cultivars. In resistant cultivar, MdXEGIP1 expression was elevated with larger amplitude than that in susceptible cultivar after B. dothidea infection. MdXEGIP1 expression was also significantly enhanced by treatment with exogenous methyl jasmonate and salicylic acid in apple plantlets. Further investigation revealed that recombinant MdXEGIP1 has significant inhibitor activity to XEGs from family 12 and 74 of glycoside hydrolase. More importantly, recombinant MdXEGIP1 inhibited crude enzyme solution of XEG from B. dothidea, suggesting that MdXEGIP1 might protect apple plant from B. dothidea infection by inhibiting XEG activity. Taken together, the results indicated that MdXEGIP1 is a potential defense gene against B. dothidea in apple. PMID:25575987

  18. 32 CFR 536.125 - Statutory authority for Uniform Code of Military Justice (UCMJ) Claims.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Justice (UCMJ) Claims. 536.125 Section 536.125 National Defense Department of Defense (Continued... 139, Uniform Code of Military Justice § 536.125 Statutory authority for Uniform Code of Military Justice (UCMJ) Claims. The authority for this subpart is Article 139, Uniform Code of Military...

  19. Immune defense mechanisms of the dental pulp.

    PubMed

    Jontell, M; Okiji, T; Dahlgren, U; Bergenholtz, G

    1998-01-01

    Defense reactions of the dentin/pulp complex involve a variety of biological systems, in which the immune system plays a pivotal role. The knowledge of the organization and function of pulpal immunocompetent cells has been sparse, but in recent years a significant body of information of immune mechanisms in general has provided a footing for substantial new knowledge of the immune mechanisms of the dental pulp. The identification of pulpal dendritic cells (DCs) has generated research activities which have led to a concept of how an antigenic challenge may evoke a pulpal inflammatory response. Although DCs are not able to identify foreign antigens specifically, they provide necessary signals to activate T-lymphocytes which in turn will orchestrate other immunocompetent cells to mount the local immune defense of the dental pulp. The purpose of this review is to accent the organization and function of pulpal DCs and other tissue and cellular components and to provide a basis for how they may interact to instigate pulpal defense mechanisms. PMID:9603235

  20. Light regulation of plant defense.

    PubMed

    Ballaré, Carlos L

    2014-01-01

    Precise allocation of limited resources between growth and defense is critical for plant survival. In shade-intolerant species, perception of competition signals by informational photoreceptors activates shade-avoidance responses and reduces the expression of defenses against pathogens and insects. The main mechanism underlying defense suppression is the simultaneous downregulation of jasmonate and salicylic acid signaling by low ratios of red:far-red radiation. Inactivation of phytochrome B by low red:far-red ratios appears to suppress jasmonate responses by altering the balance between DELLA and JASMONATE ZIM DOMAIN (JAZ) proteins in favor of the latter. Solar UVB radiation is a positive modulator of plant defense, signaling through jasmonate-dependent and jasmonate-independent pathways. Light, perceived by phytochrome B and presumably other photoreceptors, helps plants concentrate their defensive arsenals in photosynthetically valuable leaves. The discovery of connections between photoreceptors and defense signaling is revealing novel mechanisms that control key resource allocation decisions in plant canopies. PMID:24471835

  1. 76 FR 71465 - Defense Federal Acquisition Regulation Supplement: Management of Manufacturing Risk in Major...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-18

    ... interim rule in the Federal Register at 76 FR 38050 on June 29, 2011, to amend Defense Federal Acquisition... at 76 FR 38050 on June 29, 2011, is adopted as a final rule without change. BILLING CODE 5001-06-P ... Regulation Supplement: Management of Manufacturing Risk in Major Defense Acquisition Programs (DFARS...

  2. 75 FR 3178 - Defense Federal Acquisition Regulation Supplement; Lead System Integrators

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-20

    ... an interim rule at 73 FR 1823 on January 10, 2008, to implement Section 807 of the National ] Defense... 74 FR 34268 on July 15, 2009, is adopted as a final rule without change. BILLING CODE 5001-08-P ... Acquisition Regulation Supplement; Lead System Integrators AGENCY: Department of Defense (DoD). ACTION:...

  3. 75 FR 32087 - Designating the Chairperson of the Defense Production Act Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ..., 2010 [FR Doc. 2010-13659 Filed 6-4-10; 8:45 am] Billing code 4410-10-P ...#0;#0; ] Memorandum of May 19, 2010 Designating the Chairperson of the Defense Production Act... authority vested in me by section 722(b)(2) of the Defense Production Act of 1950, as amended (section 11...

  4. 48 CFR 211.275 - Radio frequency identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Radio frequency identification....

  5. Codes and Standards Technical Team Roadmap

    SciTech Connect

    2013-06-01

    The Hydrogen Codes and Standards Tech Team (CSTT) mission is to enable and facilitate the appropriate research, development, & demonstration (RD&D) for the development of safe, performance-based defensible technical codes and standards that support the technology readiness and are appropriate for widespread consumer use of fuel cells and hydrogen-based technologies with commercialization by 2020. Therefore, it is important that the necessary codes and standards be in place no later than 2015.

  6. Speech coding

    NASA Astrophysics Data System (ADS)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  7. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome.

    PubMed

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-01-01

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives. PMID:26658305

  8. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome

    PubMed Central

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-01-01

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives. PMID:26658305

  9. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  10. Antipredator defenses predict diversification rates.

    PubMed

    Arbuckle, Kevin; Speed, Michael P

    2015-11-01

    The "escape-and-radiate" hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  11. Uplink Coding

    NASA Technical Reports Server (NTRS)

    Pollara, Fabrizio; Hamkins, Jon; Dolinar, Sam; Andrews, Ken; Divsalar, Dariush

    2006-01-01

    This viewgraph presentation reviews uplink coding. The purpose and goals of the briefing are (1) Show a plan for using uplink coding and describe benefits (2) Define possible solutions and their applicability to different types of uplink, including emergency uplink (3) Concur with our conclusions so we can embark on a plan to use proposed uplink system (4) Identify the need for the development of appropriate technology and infusion in the DSN (5) Gain advocacy to implement uplink coding in flight projects Action Item EMB04-1-14 -- Show a plan for using uplink coding, including showing where it is useful or not (include discussion of emergency uplink coding).

  12. Self-Defense for Teens

    ERIC Educational Resources Information Center

    Givler, Jill I.

    2005-01-01

    Resources for self-defense training programs have become more popular and available over the last few years. Introducing a self-defense unit as part of a school physical education program is a wonderful way to address a number of psychosocial issues that prevail among teenagers today. The physical skills learned in this type of program allow…

  13. 32 CFR 634.25 - Installation traffic codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes. 634.25 Section 634.25... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation or activity commanders will establish a traffic code for operation of...

  14. 32 CFR 634.25 - Installation traffic codes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Installation traffic codes. 634.25 Section 634.25... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation or activity commanders will establish a traffic code for operation of...

  15. 32 CFR 634.25 - Installation traffic codes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Installation traffic codes. 634.25 Section 634.25... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation or activity commanders will establish a traffic code for operation of...

  16. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1802.13 Section 1802.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SECTION 1.9...

  17. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification of material at issue. 1802.13 Section 1802.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SECTION 1.9...

  18. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification of material at issue. 1802.13 Section 1802.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SECTION 1.9...

  19. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification of material at issue. 1802.13 Section 1802.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SECTION 1.9...

  20. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification of material at issue. 1802.13 Section 1802.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SECTION 1.9...

  1. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification of material at issue. 1907.13 Section 1907.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SEC. 1.8 OF...

  2. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification of material at issue. 1907.13 Section 1907.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SEC. 1.8 OF...

  3. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification of material at issue. 1907.13 Section 1907.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO SEC. 1.8 OF...

  4. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  5. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  6. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  7. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  8. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification of material at issue. 1907.13 Section 1907.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO § 1.9 OF...

  9. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1907.13 Section 1907.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO § 1.9 OF...

  10. [Defensive Medicine: Defensive Medicine: Overview of the literature].

    PubMed

    Panella, Massimiliano; Leigheb, Fabrizio; Rinaldi, Carmela; Donnarumma, Chiara; Tozzi, Quinto; Di Stanislao, Francesco

    2015-01-01

    A literature review was performed on the subject of defensive medicine, in order to gather information and evidence for identifying a shared definition of this phenomenon, identify its causes, quantify its frequency and its economic impact.Results show that defensive medicine is primarily the result of medical professionals adapting to the pressure of litigation risks, and whose behaviour is motivated by fear of malpractice claims rather than by the patient's health. Defensive medicine seems to have become a diffuse phenomenon, afflicting all diagnostic-therapeutic areas and some disciplines to a greater degree, and leading to a large waste of human, organizational and economic resources. PMID:26241515

  11. 78 FR 20624 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... Regulation Supplement (DFARS); Radio Frequency Identification Advance Shipment Notices AGENCY: Defense... Supplement (DFARS), Part 211 and related clause at 252.211; Radio Frequency Identification Advance Shipment.... Annual Burden Hours: 31,556. Frequency: On occasion. Summary of Information Collection The clause...

  12. Assistant to the Secretary of Defense (Atomic Energy). Directive

    SciTech Connect

    Kennedy, R.

    1986-02-04

    The Directive reissues DoD Directive 5148.2, August 10, 1978, to redefine the responsibilities and functions of the Assistant to the Secretary of Defense (Atomic Energy) (ATSD(AE)). The Directive, pursuant to the authority vested in the Secretary of Defense under the provisions of Title 10, United States Code, the position of ATSD(AE), is hereby established with responsibilities, functions and authorities as prescribed herein. The Chairman of the Military Liaison Committee to the Department of Energy will serve as the ATSD(AE) without additional compensation.

  13. Identification of acetic acid bacteria by restriction fragment length polymorphism analysis of a PCR-amplified fragment of the gene coding for 16S rRNA.

    PubMed

    Poblet, M; Rozès, N; Guillamón, J M; Mas, A

    2000-07-01

    Acetic acid bacteria (AAB) irreversibly spoil wines and represent a serious problem. Limited studies on the ecology of AAB during winemaking have been done due to the lack of rapid and precise techniques for their identification. RFLP analysis of PCR-amplified fragment of 16S rDNA was performed on AAB reference strains. The amplified rDNAs were approximately 870-bp long for all AAB species while no amplicons were detected for lactic acid bacteria and yeasts. Out of the four restriction enzymes tested, TaqI was the most efficient one and divided the studied AAB into six groups. However, complete differentiation among collection strains of Acetobacter pasteurianus and Gluconoacetobacter hansenii was not possible. PMID:10886617

  14. Identification of genes coding for B cell antigens of Mycoplasma mycoides subsp. mycoides Small Colony (MmmSC) by using phage display

    PubMed Central

    2009-01-01

    Background Contagious bovine pleuropneumonia (CBPP) is a mycoplasmal disease caused by Mycoplasma mycoides subsp. mycoides SC (MmmSC). Since the disease is a serious problem that can affect cattle production in parts of Africa, there is a need for an effective and economical vaccine. Identifying which of the causative agent's proteins trigger potentially protective immune responses is an important step towards developing a subunit vaccine. Accordingly, the purpose of this study was to determine whether phage display combined with bioinformatics could be used to narrow the search for genes that code for potentially immunogenic proteins of MmmSC. Since the production of IgG2 and IgA are associated with a Th1 cellular immune response which is implicated in protection against CBPP, antigens which elicit these immunoglobulin subclasses may be useful in developing a subunit vaccine. Results A filamentous phage library displaying a repertoire of peptides expressed by fragments of the genome of MmmSC was constructed. It was subjected to selection using antibodies from naturally- and experimentally-infected cattle. Mycoplasmal genes were identified by matching the nucleotide sequences of DNA from immunoselected phage particles with the mycoplasmal genome. This allowed a catalogue of genes coding for the proteins that elicited an immune response to be compiled. Using this method together with computer algorithms designed to score parameters that influence surface accessibility and hence potential antigenicity, five genes (abc, gapN, glpO, lppB and ptsG) were chosen to be expressed in Escherichia coli. After appropriate site-directed mutagenesis, polypeptides representing portions of each of these proteins were tested for immunoreactivity. Of these five, polypeptides representing expression products of abc and lppB were recognised on immunoblots by sera obtained from cattle during a natural outbreak of the disease. Conclusion Since phage display physically couples phenotype

  15. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination.

    PubMed

    Dong, Xiaomin; Chen, Kenian; Cuevas-Diaz Duran, Raquel; You, Yanan; Sloan, Steven A; Zhang, Ye; Zong, Shan; Cao, Qilin; Barres, Ben A; Wu, Jia Qian

    2015-12-01

    Long non-coding RNAs (lncRNAs) (> 200 bp) play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS) development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF) occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC) differentiation from Neural Stem Cells (NSCs) and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE) mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation)-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and analysis results

  16. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination

    PubMed Central

    Dong, Xiaomin; Chen, Kenian; Cuevas-Diaz Duran, Raquel; You, Yanan; Sloan, Steven A.; Zhang, Ye; Zong, Shan; Cao, Qilin; Barres, Ben A.; Wu, Jia Qian

    2015-01-01

    Long non-coding RNAs (lncRNAs) (> 200 bp) play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS) development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF) occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC) differentiation from Neural Stem Cells (NSCs) and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE) mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation)-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and analysis results

  17. Directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka

    2013-09-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. Numerous risk mitigation strategies have been described, most involving dedicated missions to a threatening object. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR for Directed Energy System for Targeting of Asteroids and exploRation. DE-STAR is a modular phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, test, and initial deployment, lowering cost, minimizing risk, and allowing for technological co-development, leading eventually to an orbiting structure that would be developed in stages with both technological and target milestones. The main objective of DE-STAR is to use the focused directed energy to raise the surface spot temperature to ~3,000K, allowing direct vaporization of all known substances. In the process of heating the surface ejecting evaporated material a large reaction force would alter the asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1-10km array) depending on the degree of protection desired. A DE-STAR 4 allows for asteroid engagement starting beyond 1AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in one year. Small asteroids and comets can be diverted/evaporated with a DESTAR 2 (100m) while space debris is vaporized with a DE-STAR 1 (10m).

  18. Sequence analysis and identification of new variations in the coding sequence of melatonin receptor gene (MTNR1A) of Indian Chokla sheep breed

    PubMed Central

    Saxena, Vijay Kumar; Jha, Bipul Kumar; Meena, Amar Singh; Naqvi, S.M.K.

    2014-01-01

    Melatonin receptor 1A gene is the prime receptor mediating the effect of melatonin at the neuroendocrine level for control of seasonal reproduction in sheep. The aims of this study were to examine the polymorphism pattern of coding sequence of MTNR1A gene in Chokla sheep, a breed of Indian arid tract and to identify new variations in relation to its aseasonal status. Genomic DNAs of 101 Chokla sheep were collected and an 824 bp coding sequence of Exon II was amplified. RFLP was performed with enzyme RsaI and MnlI to assess the presence of polymorphism at position C606T and G612A, respectively. Genotyping revealed significantly higher frequency of M and R alleles than m and r alleles. RR and MM were found to be dominantly present in the group of studied population. Cloning and sequencing of Exon II followed by mutation/polymorphism analysis revealed ten mutations of which three were non-synonymous mutations (G706A, C893A, G931C). G706A leads to substitution of valine by isoleucine Val125I (U14109) in the fifth transmembrane domain. C893A leads to substitution of alanine by aspartic acid in the third extracellular loop. G931C mutation brings about substitution of amino acid alanine by proline in the seventh transmembrane helix, can affect the conformational stability of the molecule. Polyphen-2 analysis revealed that the polymorphism at position 931 is potentially damaging while the mutations at positions 706 and 893 were benign. It is concluded that G931C mutation of MTNR 1A gene, may explain, in part, the importance of melatonin structure integrity in influencing seasonality in sheep. PMID:25606429

  19. Molecular Characterization of the Tumor Suppressor Candidate 5 Gene: Regulation by PPARγ and Identification of TUSC5 Coding Variants in Lean and Obese Humans

    PubMed Central

    Knotts, Trina A.; Lee, Hyun Woo; Kim, Jae Bum; Oort, Pieter J.; McPherson, Ruth; Dent, Robert; Tachibana, Keisuke; Doi, Takefumi; Yu, Songtao; Reddy, Janardan K.; Uno, Kenji; Katagiri, Hideki; Pasarica, Magdalena; Smith, Steven R.; Sears, Dorothy D.; Grino, Michel; Adams, Sean H.

    2009-01-01

    Tumor suppressor candidate 5 (TUSC5) is a gene expressed abundantly in white adipose tissue (WAT), brown adipose tissue (BAT), and peripheral afferent neurons. Strong adipocyte expression and increased expression following peroxisome proliferator activated receptor γ (PPARγ) agonist treatment of 3T3-L1 adipocytes suggested a role for Tusc5 in fat cell proliferation and/or metabolism. However, the regulation of Tusc5 in WAT and its potential association with obesity phenotypes remain unclear. We tested the hypothesis that the TUSC5 gene is a bona fide PPARγ target and evaluated whether its WAT expression or single-nucleotide polymorphisms (SNPs) in the TUSC5 coding region are associated with human obesity. Induction of Tusc5 mRNA levels in 3T3-L1 adipocytes by troglitazone and GW1929 followed a dose-response consistent with these agents' binding affinities for PPARγ. Chromatin immunoprecipitation (ChIP) experiments confirmed that PPARγ protein binds a ∼ −1.1 kb promotor sequence of murine TUSC5 transiently during 3T3-L1 adipogenesis, concurrent with histone H3 acetylation. No change in Tusc5 mRNA or protein levels was evident in type 2 diabetic patients treated with pioglitazone. Tusc5 expression was not induced appreciably in liver preparations overexpressing PPARs, suggesting that tissue-specific factors regulate PPARγ responsiveness of the TUSC5 gene. Finally, we observed no differences in Tusc5 WAT expression or prevalence of coding region SNPs in lean versus obese human subjects. These studies firmly establish the murine TUSC5 gene locus as a PPARγ target, but the significance of Tusc5 in obesity phenotypes or in the pharmacologic actions of PPARγ agonists in humans remains equivocal. PMID:20204174

  20. Defenseive Structuring and Environmental Stress

    ERIC Educational Resources Information Center

    Siegel, Bernard J.

    1970-01-01

    This essay explores a kind of adaptation, referred to as defenseive structuring, that recurs with great regularity among groups that perceive themselves as exposed to environmental stress of long duration with which they cannot cope directly and aggressively." (Author)

  1. DEFENSE MEDICAL SURVEILLANCE SYSTEM (DMSS)

    EPA Science Inventory

    AMSA operates the Defense Medical Surveillance System (DMSS), an executive information system whose database contains up-to-date and historical data on diseases and medical events (e.g., hospitalizations, ambulatory visits, reportable diseases, HIV tests, acute respiratory diseas...

  2. Strategic Defense Initiative - an overview

    SciTech Connect

    Abrahamson, J.A.

    1985-01-01

    A general framework for developing the concept and implementing options for strategic ballistic missile defense systems is emerging. The objective of the Strategic Defense Initiative (SDI) program is to conduct research on those technologies for defensive system which could intercept ballistic missiles after they have been launched and prevent them from hitting their targets. Its goal is to acquire the technical knowledge as a basis for a later decision on deployment, not a program for deployment or star wars. Abrahamson reviews the basic technological questions facing researchers, outlines the multi-layered defense possibilities and summarizes the status of technology to date. He argues for a continuity of resources to conduct the program. 4 figures.

  3. Analysis of human follistatin structure: identification of two discontinuous N-terminal sequences coding for activin A binding and structural consequences of activin binding to native proteins.

    PubMed

    Wang, Q; Keutmann, H T; Schneyer, A L; Sluss, P M

    2000-09-01

    A primary physiological function of follistatin is the binding and neutralization of activin, a transforming growth factor-beta family growth factor, and loss of function mutations are lethal. Despite the critical biological importance of follistatin's neutralization of activin, the structural basis of activin's binding to follistatin is poorly understood. The purposes of these studies were 1) to identify the primary sequence(s) within the N-terminal domain of the follistatin coding for activin binding, and 2) to determine whether activin binding to the native protein causes changes in other structural domains of follistatin. Synthetic peptide mimotopes identified within a 63-residue N-terminal domain two discontinuous sequences capable of binding labeled activin A. The first is located in a region (amino acids 3-26) of follistatin, a site previously identified by directed mutagenesis as important for activin binding. The second epitope, predicted to be located between amino acids 46 and 59, is newly identified. Although the sequences 3-26 and 46-59 code for activin binding, native follistatin only binds activin if disulfide bonding is intact. Furthermore, pyridylethylation of Cys residues followed by N-terminal sequencing and amino acid analysis revealed that all of the Cys residues in follistatin are involved in disulfide bonds and lack reactive free sulfhydryl groups. Specific ligands were used to probe the structural effects of activin binding on the other domains of the full-length molecule, comprised largely of the three 10-Cys follistatin module domains. No effects on ligand binding to follistatin-like module I or II were observed after the binding of activin A to native protein. In contrast, activin binding diminished recognition of domain III and enhanced that of the C domain by their respective monoclonal antibody probes, indicating an alteration of the antigenic structures of these regions. Thus, subsequent to activin binding, interactions are likely to

  4. Computer Code

    NASA Technical Reports Server (NTRS)

    1985-01-01

    COSMIC MINIVER, a computer code developed by NASA for analyzing aerodynamic heating and heat transfer on the Space Shuttle, has been used by Marquardt Company to analyze heat transfer on Navy/Air Force missile bodies. The code analyzes heat transfer by four different methods which can be compared for accuracy. MINIVER saved Marquardt three months in computer time and $15,000.

  5. Extraction of capsaicins in aerosol defense sprays from fabrics.

    PubMed

    Spicer, Oliver; Almirall, José R

    2005-08-15

    The use of aerosol defense sprays has increased as a means of self-defense and as a weapon in the commission of a crime. The residue of these sprays is often left behind as physical evidence on a victim's clothing or personal belongings. As the popularity of self-defense weaponry increases, so does the likelihood that it will be encountered in forensic casework. The extraction, recovery from fabrics, and identification of residue from defense sprays is described. The commonly used extraction method of liquid-liquid extraction is compared to solid phase microextraction (SPME) to recover capsaicin and dihydrocapsaicin from cotton swabs. The use of SPME resulted in lower limits of detection and greater recovery efficiency when compared to solvent extraction. SPME also provided more consistent recovery and less variability when compared to solvent extraction. The effect of use of various types of evidence packages on the preservation of this type of evidence is also reported. The collection and analysis of hand swabs after normal discharge of pepper spray canisters was studied indicating the low persistence of these compounds on the hands of the person conducting the spraying. Finally, the results of a real case whereby solvent-solvent extraction did not provide the necessary sensitivity for extracting the capsaicin compounds on the garments of a victim of an alleged spraying and the SPME extraction provided the recovery and identification of the compounds is also presented. PMID:18970178

  6. Anorexia and attachment: dysregulated defense and pathological mourning

    PubMed Central

    Delvecchio, Elisa; Di Riso, Daniela; Salcuni, Silvia; Lis, Adriana; George, Carol

    2014-01-01

    The role of defensive exclusion (Deactivation and Segregated Systems) in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP). Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed. PMID:25389412

  7. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...-free 1-888-352-9333); (B) The on-line access to the CAGE file through the Defense Logistics Information System; (C) The on-line access to the Defense Logistics Agency (DLA) CAGE file through the DLA Network or....39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe use of CAGE codes....

  8. Strategic defense initiative: critical issues

    SciTech Connect

    Nuckolls, J.H.

    1985-06-01

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to the defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)

  9. Identification and functional analysis of acute myeloid leukemia susceptibility associated single nucleotide polymorphisms at non-protein coding regions of RUNX1.

    PubMed

    Xu, Xin; Ren, Xiuyu; Wang, Haiying; Zhao, Yao; Yi, Zhengjun; Wang, Kaifeng; Zhang, Shizhuang; Wang, Lin; Samuelson, David J; Hu, Zhenbo

    2016-06-01

    Little is known about the susceptibility to acute myeloid leukemia. We aim to search non-protein coding regions of key hematopoiesis transcription factors for genetic variations associated with acute myeloid leukemia susceptibility. We genotyped SNPs of RUNX1 P1 promoter, P2 promoter, +23 enhancer, intron 5.2 enhancer, PU.1 promoter, CEBPA promoter, and CEBPE promoter from acute myeloid leukemia patients and healthy controls. Rs2249650 and rs2268276 at RUNX1 intron 5.2 enhancer were found to be associated with acute myeloid leukemia susceptibility. Artificial reporters containing different rs2249650 and rs2268276 alleles showed differential activities in the K562 cell line, a human immortalized myeloid leukemia line. Rs2249650 contributes to reporter activities more than rs2268276. Gel shift assay is consistent with the luciferase assay. Supershift assay indicated that one potential binding protein was PU.1. To sum up, rs2268276 and especially rs2249650 may be qualified as new acute myeloid leukemia susceptibility-associated SNPs. PMID:26374622

  10. NMR-assisted prediction of RNA secondary structure: identification of a probable pseudoknot in the coding region of an R2 retrotransposon.

    PubMed

    Hart, James M; Kennedy, Scott D; Mathews, David H; Turner, Douglas H

    2008-08-01

    As the rate of functional RNA sequence discovery escalates, high-throughput techniques for reliable structural determination are becoming crucial for revealing the essential features of these RNAs in a timely fashion. Computational predictions of RNA secondary structure quickly generate reasonable models but suffer from several approximations, including overly simplified models and incomplete knowledge of significant interactions. Similar problems limit the accuracy of predictions for other self-folding polymers, including DNA and peptide nucleic acid (PNA). The work presented here demonstrates that incorporating unassigned data from simple nuclear magnetic resonance (NMR) experiments into a dynamic folding algorithm greatly reduces the potential folding space of a given RNA and therefore increases the confidence and accuracy of modeling. This procedure has been packaged into an NMR-assisted prediction of secondary structure (NAPSS) algorithm that can produce pseudoknotted as well as non-pseudoknotted secondary structures. The method reveals a probable pseudoknot in the part of the coding region of the R2 retrotransposon from Bombyx mori that orchestrates second-strand DNA cleavage during insertion into the genome. PMID:18613678

  11. DNA codes

    SciTech Connect

    Torney, D. C.

    2001-01-01

    We have begun to characterize a variety of codes, motivated by potential implementation as (quaternary) DNA n-sequences, with letters denoted A, C The first codes we studied are the most reminiscent of conventional group codes. For these codes, Hamming similarity was generalized so that the score for matched letters takes more than one value, depending upon which letters are matched [2]. These codes consist of n-sequences satisfying an upper bound on the similarities, summed over the letter positions, of distinct codewords. We chose similarity 2 for matches of letters A and T and 3 for matches of the letters C and G, providing a rough approximation to double-strand bond energies in DNA. An inherent novelty of DNA codes is 'reverse complementation'. The latter may be defined, as follows, not only for alphabets of size four, but, more generally, for any even-size alphabet. All that is required is a matching of the letters of the alphabet: a partition into pairs. Then, the reverse complement of a codeword is obtained by reversing the order of its letters and replacing each letter by its match. For DNA, the matching is AT/CG because these are the Watson-Crick bonding pairs. Reversal arises because two DNA sequences form a double strand with opposite relative orientations. Thus, as will be described in detail, because in vitro decoding involves the formation of double-stranded DNA from two codewords, it is reasonable to assume - for universal applicability - that the reverse complement of any codeword is also a codeword. In particular, self-reverse complementary codewords are expressly forbidden in reverse-complement codes. Thus, an appropriate distance between all pairs of codewords must, when large, effectively prohibit binding between the respective codewords: to form a double strand. Only reverse-complement pairs of codewords should be able to bind. For most applications, a DNA code is to be bi-partitioned, such that the reverse-complementary pairs are separated

  12. Identification of bacteria in a biodegraded wall painting by denaturing gradient gel electrophoresis of PCR-amplified gene fragments coding for 16S rRNA.

    PubMed Central

    Rölleke, S; Muyzer, G; Wawer, C; Wanner, G; Lubitz, W

    1996-01-01

    Medieval wall paintings are often affected by biodecay. An inventory of the existing microorganisms associated with the damage to the paintings is not yet an integral part of the restoration process. This stems from the lack of effective means for such a stocktaking. Nevertheless, fungi and bacteria cause severe damage through mechanical processes from growth into the painting and its grounding and through their metabolism. Detailed information on the bacterial colonization of ancient wall paintings is essential for the protection of the paintings. We used a molecular approach based on the detection and identification of DNA sequences encoding rRNA (rDNA) to identify bacteria present on an ancient wall painting without prior cultivation of the organisms, since it has been shown that most of these bacteria cannot be cultivated under laboratory conditions. To trace the noncultivated fraction of bacteria, total DNA from a biodegraded wall painting sample from a 13th century fresco was extracted and 194-bp fragments of the 16S rDNA were amplified with eubacterial primers. The 16S rDNA fragments of uniform length obtained from the different bacterial species were separated according to their sequence differences by denaturing gradient gel electrophoresis (DGGE). By sequencing excised and reamplified individual DNA bands, we characterized the phylogenetic affiliation of the corresponding bacteria. Using this approach, we identified members or close relatives of the genera Halomonas, Clostridium, and Frankia. To our knowledge, these groups of bacteria have not yet been isolated and implicated by conventional microbiological techniques as contributing to the biodegradation of wall paintings. PMID:8787403

  13. 22 CFR 126.17 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and the...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Explosives found at 27 CFR parts 447, 478, and 479, which are unaffected by the Defense Trade Cooperation... read “//CLASSIFICATION LEVEL USML//REL USA and GBR Treaty Community//.” For example, for defense articles classified SECRET, the marking or identification shall be “//SECRET USML//REL USA and GBR...

  14. Adaptive behaviours of attacking futsal teams to opposition defensive formations.

    PubMed

    Travassos, B; Bourbousson, J; Esteves, P T; Marcelino, R; Pacheco, M; Davids, K

    2016-06-01

    This study evaluated tendencies towards flexibility/stability of coordinated behaviours in international futsal teams, considered as complex collective systems, according to changes in opposition defensive formations. Six games of two international futsal teams (Spain and Portugal) were selected for Social Network Analysis to capture the coordination tendencies that emerge in the tactical behaviours of players when performing against different defensive formations. Ball trajectories in each offensive pattern of play were notated in an adjacency matrix where each entry accounted for the linkages between 12 spatial field areas. Each offensive play was coded according to the defensive formation of an opposing team (i.e. conservative or risky formation). Results revealed similar network properties between teams when competing against more risky defensive formations, while notable differences were observed against conservative defences. Effect of defensive formation of opponents on macro network properties was observed in both the Portuguese and Spanish teams. At a meso-level, only the Spanish national team exhibited notable changes, suggesting a greater level of adaptability to unfolding performance events. The observed flexibility in tactical behaviours of the Spanish team appeared to express their greater expertise levels. PMID:26918489

  15. 76 FR 7475 - Annual Update to the Report Specified in Section 1251 of the National Defense Authorization Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ..., Washington, February 7, 2011. [FR Doc. 2011-3053 Filed 2-8-11; 11:15 am] Billing code 5000-04-P ... Specified in Section 1251 of the National Defense Authorization Act for Fiscal Year 2010 (Public Law 111-84... Act for Fiscal Year 2010 (Public Law 111-84) Memorandum for the Secretary of Defense the Secretary...

  16. Midbrain circuits for defensive behaviour.

    PubMed

    Tovote, Philip; Esposito, Maria Soledad; Botta, Paolo; Chaudun, Fabrice; Fadok, Jonathan P; Markovic, Milica; Wolff, Steffen B E; Ramakrishnan, Charu; Fenno, Lief; Deisseroth, Karl; Herry, Cyril; Arber, Silvia; Lüthi, Andreas

    2016-06-01

    Survival in threatening situations depends on the selection and rapid execution of an appropriate active or passive defensive response, yet the underlying brain circuitry is not understood. Here we use circuit-based optogenetic, in vivo and in vitro electrophysiological, and neuroanatomical tracing methods to define midbrain periaqueductal grey circuits for specific defensive behaviours. We identify an inhibitory pathway from the central nucleus of the amygdala to the ventrolateral periaqueductal grey that produces freezing by disinhibition of ventrolateral periaqueductal grey excitatory outputs to pre-motor targets in the magnocellular nucleus of the medulla. In addition, we provide evidence for anatomical and functional interaction of this freezing pathway with long-range and local circuits mediating flight. Our data define the neuronal circuitry underlying the execution of freezing, an evolutionarily conserved defensive behaviour, which is expressed by many species including fish, rodents and primates. In humans, dysregulation of this 'survival circuit' has been implicated in anxiety-related disorders. PMID:27279213

  17. Inducible defenses, phenotypic variability and biotic environments.

    PubMed

    Adler, F R; Drew Harvell, C

    1990-12-01

    Defensive morphologies, chemicals and behaviors induced by cues from consumers or competitors have been described in numerous organisms. Much work has focused on the costs of defenses and the actual cues used. Here, we review recent progress in determining the effects of inducible defenses on consumers and the cues implicated in inducing defenses against consumers and competitors, thereby laying the groundwork for studying the implications of inducible defenses for the dynamics of foraging, population size and evolution. PMID:21232402

  18. Plant Defense against Herbivorous Pests: Exploiting Resistance and Tolerance Traits for Sustainable Crop Protection.

    PubMed

    Mitchell, Carolyn; Brennan, Rex M; Graham, Julie; Karley, Alison J

    2016-01-01

    Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection. PMID:27524994

  19. Plant Defense against Herbivorous Pests: Exploiting Resistance and Tolerance Traits for Sustainable Crop Protection

    PubMed Central

    Mitchell, Carolyn; Brennan, Rex M.; Graham, Julie; Karley, Alison J.

    2016-01-01

    Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection. PMID:27524994

  20. Bulgy tadpoles: inducible defense morph.

    PubMed

    Kishida, Osamu; Nishimura, Kinya

    2004-08-01

    Predator induced morphological defenses are marked morphological shifts induced directly by cues associated with a predator. Generally, remote cues, i.e., chemical substances emitted from predators or injured conspecifics, are considered to be ideal signals to induce morphological change in aquatic environments rather than close cues, i.e., close chemical or tactile cues, since chemical substances that can propagate over relatively long distances and persist for a long period may allow organisms to keep safe and to deliberately change their morph. In fact, most organisms adopting an inducible morphological defense utilize remote chemical cues to detect predation risk and to produce morphological defenses. In this paper, we report a unique and functionally well designed inducible morphological defense strategy where the induction process requires close cues from a predator. The tadpoles of Rana pirica exhibited a bulgy bodied morphology when threatened with predation by larval salamanders, Hynobius retardatus, in close proximity. Predation trials and a function experiment showed that the induced bulgy morph is an adaptive defense phenotype against the gape-limited predator larval H. retardatus. Furthermore, R. pirica tadpoles use two adaptive strategies in terms of cost saving, i.e., adjustment of the extent of bulginess according to predation risk and reversibility by actual shrink of bulgy body after removing the predation threat. In general, R. pirica hatch earlier than H. retardatus. In natural ponds, during the early developmental stage R. pirica tadpoles live in close proximity to young H. retardatus larvae. As they grow, the salamanders gradually become serious predators and the predator-prey interaction becomes intimate. After a while, predation, cannibalism and metamorphosis decrease the number of salamanders in the ponds, and the predator-prey interaction weakens. Such a phenology in the predator-prey interaction allows the evolution of a close

  1. Transnational architecting for homeland defense

    NASA Astrophysics Data System (ADS)

    O'Brien, Thomas W.

    2002-07-01

    The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.

  2. RNase 7 in Cutaneous Defense

    PubMed Central

    Rademacher, Franziska; Simanski, Maren; Harder, Jürgen

    2016-01-01

    RNase 7 belongs to the RNase A superfamily and exhibits a broad spectrum of antimicrobial activity against various microorganisms. RNase 7 is expressed in human skin, and expression in keratinocytes can be induced by cytokines and microbes. These properties suggest that RNase 7 participates in innate cutaneous defense. In this review, we provide an overview about the role of RNase 7 in cutaneous defense with focus on the molecular mechanism of the antimicrobial activity of RNase 7, the regulation of RNase 7 expression, and the role of RNase 7 in skin diseases. PMID:27089327

  3. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... of Availability (NOA) in the Federal Register (76 FR 28757) announcing the revised Defense Logistics... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense....

  4. 22 CFR 120.44 - Foreign defense article or defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Foreign defense article or defense service. 120.44 Section 120.44 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.44 Foreign defense article or defense service. Foreign defense article...

  5. Speech coding

    SciTech Connect

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  6. The Redox Code

    PubMed Central

    Jones, Dean P.

    2015-01-01

    Abstract Significance: The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O2 and H2O2 contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Recent Advances: Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Critical Issues: Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Future Directions: Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine. Antioxid. Redox Signal. 23, 734–746. PMID:25891126

  7. A genetic scale of reading frame coding.

    PubMed

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. PMID:24698943

  8. Radiological Defense Officer. Student Workbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This student workbook includes the necessary administrative materials, briefs, exercises and answer sheets for the quizzes and final course examination as needed by the students during the conduct of the Radiological Defense Officer course. Among the briefs included are the following: (1) Reporting Forms; (2) Forecasting Dose Rates; (3) Dose…

  9. Directions for Defense Digital Libraries.

    ERIC Educational Resources Information Center

    Larsen, Ronald L.

    1998-01-01

    Describes directions, challenges, and objectives of the information management program of the United States Defense Advanced Research Projects Agency (DARPA). The program envisions the rigor and organization normally associated with a research library to be virtually rendered and extended in the networked world of distributed information. (AEF)

  10. In Defense of the Vendors

    ERIC Educational Resources Information Center

    Irwin, G. Brockett

    1975-01-01

    The problems that are encountered when cooperation breaks down between the industrial source operator and the pollution control equipment vendor are examined. The focal point of this examination is the study of defenses available to the equipment vendor when industrial source operators refuse to cooperate. (Author/BT)

  11. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  12. QR Codes

    ERIC Educational Resources Information Center

    Lai, Hsin-Chih; Chang, Chun-Yen; Li, Wen-Shiane; Fan, Yu-Lin; Wu, Ying-Tien

    2013-01-01

    This study presents an m-learning method that incorporates Integrated Quick Response (QR) codes. This learning method not only achieves the objectives of outdoor education, but it also increases applications of Cognitive Theory of Multimedia Learning (CTML) (Mayer, 2001) in m-learning for practical use in a diverse range of outdoor locations. When…

  13. 77 FR 51782 - Federal Acquisition Regulation; Information Collection; Taxpayer Identification Number Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... what was published in the Federal Register at 73 FR 20613, on April 16, 2008. The decrease is... Regulation; Information Collection; Taxpayer Identification Number Information AGENCY: Department of Defense... previously approved information collection requirement concerning Taxpayer Identification Number...

  14. 32 CFR 634.24 - Traffic planning and codes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Traffic planning and codes. 634.24 Section 634... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.24 Traffic planning and codes. (a) Safe and efficient movement of traffic on an installation requires...

  15. 32 CFR 636.11 - Installation traffic codes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Installation traffic codes. 636.11 Section 636... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes. In addition to the requirements in § 634.25(d)...

  16. 32 CFR 636.11 - Installation traffic codes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Installation traffic codes. 636.11 Section 636.11... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes. In addition to the requirements in § 634.25(d) of this...

  17. 32 CFR 634.24 - Traffic planning and codes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Traffic planning and codes. 634.24 Section 634.24... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.24 Traffic planning and codes. (a) Safe and efficient movement of traffic on an installation requires traffic supervision....

  18. 32 CFR 636.11 - Installation traffic codes

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Installation traffic codes 636.11 Section 636.11... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes In addition to the requirements in § 634.25(d) of this...

  19. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... are in support of contingency, humanitarian, or peacekeeping operations, or to facilitate defense... peacekeeping operations, or to facilitate defense against or recovery from nuclear, biological, chemical,...

  20. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light. Submarines may display, as a distinctive means of identification, an intermittent flashing amber beacon...

  1. Automatic Identification And Data Collection Via Barcode Laser Scanning.

    NASA Astrophysics Data System (ADS)

    Jacobeus, Michel

    1986-07-01

    How to earn over 100 million a year by investing 40 million ? No this is not the latest Wall Street "tip" but the costsavings obtained by the U.S. Department of Defense. 2 % savings on annual turnover claim supermarkets ! Millions of Dollars saved report automotive companies ! These are not daydreams, but tangible results measured by users after implemen-ting Automatic Identification and Data Collection systems, based on bar codes. To paraphrase the famous sentence "I think, thus I am", with AI/ADC systems "You knonw, thus you are". Indeed, in today's world, an immediate, accurate and precise information is a vital management need for companies growth and survival. AI/ADC techniques fullfill these objectives by supplying automatically and without any delay nor alteration the right information.

  2. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  3. Interleukin 17-Mediated Host Defense against Candida albicans

    PubMed Central

    Sparber, Florian; LeibundGut-Landmann, Salomé

    2015-01-01

    Candida albicans is part of the normal microbiota in most healthy individuals. However, it can cause opportunistic infections if host defenses are breached, with symptoms ranging from superficial lesions to severe systemic disease. The study of rare congenital defects in patients with chronic mucocutaneous candidiasis led to the identification of interleukin-17 (IL-17) as a key factor in host defense against mucosal fungal infection. Experimental infections in mice confirmed the critical role of IL-17 in mucocutaneous immunity against C. albicans. Research on mouse models has also contributed importantly to our current understanding of the regulation of IL-17 production by different cellular sources and its effector functions in distinct tissues. In this review, we highlight recent findings on IL-17-mediated immunity against C. albicans in mouse and man. PMID:26274976

  4. Event-recording devices with identification codes

    NASA Technical Reports Server (NTRS)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor); Vidmar, Robert J. (Inventor)

    2003-01-01

    A recording device allows wireless interrogation to determine its identity and its state. The state indicates whether one or more physical or chemical events have taken place. In effect, the one or more physical or chemical events are recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. The recording device may be used in an array of devices that allows wireless probing by an interrogation unit. When probed, each device tells the interrogator who it is and what state it is in. The devices allow multiple use and the interrogator may use a logical reset to determine the state of each device. The interrogator can thus easily identify particular items in an array that have reached a particular condition. The device may record the status of each device in a database to maintain a history for each.

  5. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority. The Secretary of Defense may exempt, on...

  6. Defense display strategy and roadmaps

    NASA Astrophysics Data System (ADS)

    Hopper, Darrel G.

    2002-08-01

    The Department of Defense (DoD) is developing a new strategy for displays. The new displays science and technology roadmap will incorporate urgent warfighter needs as well as investment opportunities where military advantage is foreseen. Thrusts now ending include the High Definition System (HDS) program and related initiatives, like flexible displays, at the Defense Advanced Research Projects Agency (DARPA). Continuing thrusts include a variety of Serviceled programs to develop micro-displays for virtual image helmet-/rifle-mounted systems for pilots and soldiers, novel displays, materials, and basic research. New thrusts are being formulated for ultra-resolution, true 3D, and intelligent displays (integration of computers and communication functions into screens). The new strategy is Service-led.

  7. Issues in national missile defense

    SciTech Connect

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any of them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.

  8. Homeland Security and Defense Applications

    SciTech Connect

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  9. Homeland Security and Defense Applications

    ScienceCinema

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  10. Second line of defense program

    SciTech Connect

    Cantut, L; Thomas, L L

    1999-07-15

    Since the collapse of the Soviet Union, the prospect of nuclear materials entering the world market has become an ever-increasing threat. The Second Line of Defense (SLD) program was developed by the U.S. Department of Energy's (DOE) Nuclear Transfer and Supplier Policy Division (NN-43) to assist the Russian Federation State Customs Committee (RFSCC) in strengthening its capability to prevent illicit trafficking of nuclear materials across Russia's borders. The SLD program is a natural complement to the Material Protection Control and Accounting (MPC and A) program, which represents a first line of defense against the theft and diversion of nuclear materials. The SLD program is the first U.S.-Russian cooperative program to combat the illicit trafficking of nuclear and nuclear-related materials to would-be proliferators across Russia's borders.

  11. Defense Programs Transportation Risk Assessment

    SciTech Connect

    Clauss, D.B.

    1994-08-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data.

  12. Stability of missile forces and defenses

    SciTech Connect

    Canavan, G.H.

    1997-04-01

    This note derives the exchange equation for mixes of missiles and defenses and discusses the impact on stability of varying their relative proportions. For fixed offenses increasing defenses decreases stability until first strikes fall to zero. The same is true of decreasing offenses for fixed defenses, although the decrease in indices is smaller. A judicious increase in defenses and decrease in offenses should effect that transition with minimum loss of stability.

  13. Problems of National Missile Defense

    NASA Astrophysics Data System (ADS)

    Cornwall, John

    2000-04-01

    The currently-proposed national missile defense (NMD) is supposed to counter accidental Russian or Chinese launches of intercontinental nuclear-armed missiles, or rogue nation launches of similar nuclear missiles or of missiles armed with biological weapons, by using mid-course hit-to-kill vehicles guided by IR and radar. But it seems very likely that any nation capable of building (or buying) such a missile offense can build (or buy) effective countermeasures to NMD. These include anti-simulation decoys made of multi-layer insulation (MLI), with warheads covered in MLI sheaths so their signatures resemble those of the decoys. MLI can be effective against both passive IR and radar detection/discrimination. Biological warheads can counter any mid-course defense by releasing a great number of submunitions early in flight. Both nuclear and biological weapons can be deployed by other means, including covert ships in port; trucks; and cruise missiles. The best defense against Russian/Chinese accidental launches is assistance to these countries in improving their launch control systems.

  14. Defense of a space elevator

    SciTech Connect

    Laubscher, B. E.

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  15. Radiological Defense. Planning and Operations Guide. Revised.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    This guide is a reprint of published and draft materials from the Federal Civil Defense Guide. This guide is intended to assist the student in planning, developing, implementing and operating a local, county, or state radiological defense (RADEF) system. The state and local radiological defense program objectives are to create an effective and…

  16. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  17. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  18. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  19. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  20. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  1. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  2. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  3. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  4. 75 FR 32416 - Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... of the Secretary Defense Science Board AGENCY: Department of Defense (DoD). ACTION: Notice of advisory committee meeting. SUMMARY: The Defense Science Board Task Force on the Survivability of DoD... Science Board Threat Reduction Advisory Committee (TRAC) Task Force findings, recommendations and...

  5. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  6. Teaching Gibb's Taxonomy of Defensiveness through Performance

    ERIC Educational Resources Information Center

    Thomson, Deborah M.

    2008-01-01

    The topic of defensiveness resonates with students, who are generally eager to learn how to prevent it. Gibb's taxonomy of defensive/supportive behaviors is widely published and used today. According to Gibb, defensiveness occurs when a communicator puts substantial effort into defending him/herself from a perceived communicative threat. This…

  7. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  8. 32 CFR 1801.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Requirements as to identification of requester. 1801.13 Section 1801.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing Of Privacy Act Requests §...

  9. 32 CFR 1801.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to identification of requester. 1801.13 Section 1801.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing Of Privacy Act Requests §...

  10. 32 CFR 1801.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Requirements as to identification of requester. 1801.13 Section 1801.13 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing Of Privacy Act Requests §...

  11. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests §...

  12. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests §...

  13. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests §...

  14. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  15. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... Secretary of Defense for Acquisition, Technology & Logistics and the Director, Missile Defense Agency... Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal Advisory Committee... System. The Under Secretary of Defense for Acquisition, Technology and Logistics or designee may act...

  16. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  17. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  18. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... (DLA) published a Notice of Availability (NOA) in the Federal Register (76 FR 28757) announcing the... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION:...

  19. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal...

  20. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  1. Change in children's externalizing and internalizing behavior problems: the role of defense mechanisms.

    PubMed

    Cramer, Phebe

    2015-03-01

    This study investigates the relation of defense mechanism to children's externalizing and internalizing behavior problems, as assessed from mothers' report at age 9 and 12 years, based on archival data. The defense mechanisms of denial, projection, and identification were assessed from Thematic Apperception Test stories told by the children at age 9 years, using the Defense Mechanism Manual (Cramer, The development of defense mechanisms: Theory, research and assessment. New York: Springer-Verlag, 1991a; Protecting the self: Defense mechanisms in action. New York: Guilford Press, 2006). The results showed that the use of identification predicted a decrease in externalizing behaviors between age 9 and 12 years. In contrast, change in internalizing behaviors was not predicted by defense use, but the use of projection was related to fewer internalizing behaviors at both ages. These findings are consistent with the idea that behavioral intervention stressing self-regulation can be effective in reducing externalizing problems, but internalizing problems require an intervention that is sensitive to the underlying behavioral inhibition in these children. PMID:25668653

  2. Schistosome serine protease inhibitors: parasite defense or homeostasis?

    PubMed Central

    Lopez Quezada, Landys A.; McKerrow, James H.

    2016-01-01

    Serpins are a structurally conserved family of macromolecular inhibitors found in numerous biological systems. The completion and annotation of the genomes of Schistosoma mansoni and Schistosoma japonicum has enabled the identification by phylogenetic analysis of two major serpin clades. S. mansoni shows a greater multiplicity of serpin genes, perhaps reflecting adaptation to infection of a human host. Putative targets of schistosome serpins can be predicted from the sequence of the reactive center loop (RCL). Schistosome serpins may play important roles in both post-translational regulation of schistosome-derived proteases, as well as parasite defense mechanisms against the action of host proteases. PMID:21670886

  3. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining... provide DoD unique item identification if— (1) The items, as determined by the head of the agency, are...

  4. Defensive Spiroketals from Asceles glaber (Phasmatodea): Absolute Configuration and Effects on Ants and Mosquitoes

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Recently we discovered that the defensive spray of Asceles glaber, a stick insect native to Thailand, contains two spiroketals (major: 2(S)-(-)-(E,E)-2- methyl-1,7-dioxaspiro[5.5]undecane and minor: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this report we: 1) illustrate the identification o...

  5. NBS-LRR-Encoding genes in sorghum and their role in plant defense

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Nucleotide-binding site leucine-rich repeats (NBS-LRR) proteins are encoded by a large class of plant genes and many of them play an important role in plant defense against pest attack. Identification and characterization of the whole set of NBS-LRR genes in a plant genome will provide insights int...

  6. Depression, responsibility, and criminal defenses.

    PubMed

    Hannan, Barbara

    2005-01-01

    The concepts of voluntary action, agency, free will, and responsibility, while central to moral and legal institutions, are generally poorly understood. Philosophers of law such as H.L.A. Hart, Joel Feinberg, and Robert F. Schopp have contributed significantly to understanding of these concepts through their work on the foundations of criminal defenses, including excuses based on mental illness. In this paper, I summarize and present their valuable insights, in the context of an argument (influenced by personal experience) that clinical depression, even when non-psychotic, may in some cases constitute a legitimate excuse for criminal or otherwise immoral failures to act. PMID:15913778

  7. Background issues for defensive interceptors

    SciTech Connect

    Canavan, G.H.

    1991-03-01

    Mean nuclear backgrounds are large, but are arguably amenable to frame-to-frame subtraction. Striated backgrounds on the sensors for defensive interceptors could, however, cause clutter leak-through, which could make detection and track difficult. Nominal motions and backgrounds give signal to clutter ratios too low to be useful. Clutter leakage due to line-of-sight drift can be reduced by stabilizing the line of sight around the background clutter itself. Current interceptors have detector arrays large enough for operation independent of nuclear backgrounds in their fields of view. 6 refs., 2 figs.

  8. 76 FR 21705 - Closed Meeting of the Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... Pentagon, Arlington, VA. The mission of the Defense Science Board is to advise the Secretary of Defense and..., Defense Science Board, 3140 Defense Pentagon, Room 3B888A, Washington, DC 20301-3140, via e-mail at...

  9. 48 CFR 204.203 - Taxpayer identification information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Taxpayer identification information. 204.203 Section 204.203 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.203...

  10. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Item identification and valuation. 252.211-7003 Section 252.211-7003 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES...

  11. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Item identification and valuation. 252.211-7003 Section 252.211-7003 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES...

  12. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Item identification and valuation. 252.211-7003 Section 252.211-7003 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES...

  13. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Item identification and valuation. 252.211-7003 Section 252.211-7003 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES...

  14. 48 CFR 204.203 - Taxpayer identification information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Taxpayer identification information. 204.203 Section 204.203 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.203...

  15. 48 CFR 204.203 - Taxpayer identification information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Taxpayer identification information. 204.203 Section 204.203 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contract Distribution 204.203...

  16. Peripheral coding of taste

    PubMed Central

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  17. Biogeography of a defensive symbiosis

    PubMed Central

    Kaltenpoth, Martin; Roeser-Mueller, Kerstin; Stubblefield, J. William; Seger, Jon; Strohm, Erhard

    2014-01-01

    Mutualistic microorganisms play important roles in nutrition, reproduction and defense of many insects, yet the factors contributing to their maintenance and dispersal remain unknown in most cases. Theory suggests that collaboration can be maintained by repeated interaction of the same partners (partner fidelity) or by selective discrimination against non-cooperative partners (partner choice). In the defensive mutualism between solitary beewolf wasps and their antibiotic-producing Streptomyces bacteria, partner choice by host control of vertical symbiont transmission reinforces partner fidelity and has helped to maintain this highly specific association since it originated in the late Cretaceous. However, co-phylogenetic and biogeographic analyses suggest that there has also been considerable horizontal transmission of the symbionts. While the beewolves clearly have a paleotropic or palearctic origin, with later colonization of the nearctic and neotropics via Beringia and the Aves ridge, respectively, the bacteria show only weak geographical clustering, implying global dispersal or vicariance within the confines of an otherwise apparently exclusive symbiotic relationship. We discuss several hypotheses that may explain these patterns. Future studies investigating the occurrence of beewolf symbionts in the environment could yield broadly applicable insights into the relative impact of animal-vectored and free-living dispersal on the distribution of microorganisms in nature. PMID:26479018

  18. Defense mutualisms enhance plant diversification.

    PubMed

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity. PMID:25349406

  19. Defense mutualisms enhance plant diversification

    PubMed Central

    Weber, Marjorie G.; Agrawal, Anurag A.

    2014-01-01

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity. PMID:25349406

  20. Verification of excess defense material

    SciTech Connect

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-12-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials.

  1. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. PMID:25389065

  2. Change in patient affect/defense ratio from early to late sessions in brief psychotherapy.

    PubMed

    Taurke, E A; Flegenheimer, W; McCullough, L; Winston, A; Pollack, J; Trujillo, M

    1990-09-01

    The current study examined changes in the ratio of patients' affective and defensive behaviors during the course of brief psychodynamic psychotherapy. Treatments of 16 patients were videotaped. For each patient, four sessions were evaluated with a minute-by-minute coding system of process variables. When patients were grouped according to outcome scores, significant differences between the high outcome and the average-to-low outcome groups emerged. During the early phase of treatment, patients in both groups showed an average of one affective response per five defensive responses. By the late phase of treatment, the high outcome patients showed a marked shift to one affective response per two defensive responses, while the low outcome patients remained the same. An incidental finding was a negative correlation between good outcome and the ratio of defensive behavior to total patient activity. PMID:2246376

  3. 76 FR 60812 - Defense Business Board (DBB); Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... of the Secretary Defense Business Board (DBB); Meeting Notice AGENCY: Department of Defense (DoD... meeting of the Defense Business Board (DBB). DATES: The public meeting of the Defense Business Board...: Ms. Debora Duffy, Defense Business Board, 1155 Defense Pentagon, Room 5B1088A, Washington, DC...

  4. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  5. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  6. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  7. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  8. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE COURTS OF CRIMINAL APPEALS RULES OF PRACTICE AND PROCEDURE § 150.10 Request for appellate defense counsel. An...

  9. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  10. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  11. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  12. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  13. 3 CFR - Delegation of Certain Functions Under Section 3134 of the National Defense Authorization Act for...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false Delegation of Certain Functions Under Section 3134 of the National Defense Authorization Act for Fiscal Year 2008 (Public Law 110-181) Presidential... laws of the United States, including section 301 of title 3, United States Code, I hereby delegate...

  14. 77 FR 29525 - National Defense Transportation Day and National Transportation Week, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ... thirty-sixth. (Presidential Sig.) [FR Doc. 2012-12221 Filed 5-17-12; 8:45 am] Billing code 3295-F2-P ...;#0; ] Proclamation 8819 of May 14, 2012 National Defense Transportation Day and National Transportation Week, 2012 By the President of the United States of America A Proclamation From the railroads...

  15. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    SciTech Connect

    Not Available

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms.

  16. Codes with special correlation.

    NASA Technical Reports Server (NTRS)

    Baumert, L. D.

    1964-01-01

    Uniform binary codes with special correlation including transorthogonality and simplex code, Hadamard matrices and difference sets uniform binary codes with special correlation including transorthogonality and simplex code, Hadamard matrices and difference sets

  17. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  18. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  19. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. PMID:26568089

  20. Interaction of strategic defenses with crisis stability

    SciTech Connect

    Canavan, G.H.

    1991-03-01

    Crisis stability indices calculated for two-sided strategic interactions are used to discuss the impact of boost and midcourse defenses. They largely suppress missiles, leaving bombers and cruise missiles to deliver the bulk of restrikes. Boost-phase defenses are able to attrit missile attacks, but lack the preferentiality needed to defend specific targets. Midcourse layers could protect a significant fraction of forces; combined defenses could defend more. Results are sensitive to decoys and target sets. 29 refs., 26 figs.

  1. Defense spending and interregional labor migration.

    PubMed

    Ellis, M; Barff, R; Markusen, A R

    1993-04-01

    The impact of defense-related industry on labor migration within the United States is analyzed using census data for the period 1975-1980. The results "suggest that workers follow jobs in the defense industry, rather than vice versa, and indicate that a process of defense-related regional labor pool formation, amplified by interstate migration, adds to the volume of interregional labor flows." PMID:12286235

  2. Should the "slow code" be resuscitated?

    PubMed

    Lantos, John D; Meadow, William L

    2011-11-01

    Most bioethicists and professional medical societies condemn the practice of "slow codes." The American College of Physicians ethics manual states, "Because it is deceptive, physicians or nurses should not perform half-hearted resuscitation efforts ('slow codes')." A leading textbook calls slow codes "dishonest, crass dissimulation, and unethical." A medical sociologist describes them as "deplorable, dishonest and inconsistent with established ethical principles." Nevertheless, we believe that slow codes may be appropriate and ethically defensible in situations in which cardiopulmonary resuscitation (CPR) is likely to be ineffective, the family decision makers understand and accept that death is inevitable, and those family members cannot bring themselves to consent or even assent to a do-not-resuscitate (DNR) order. In such cases, we argue, physicians may best serve both the patient and the family by having a carefully ambiguous discussion about end-of-life options and then providing resuscitation efforts that are less vigorous or prolonged than usual. PMID:22047113

  3. Defense program pushes microchip frontiers

    NASA Astrophysics Data System (ADS)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  4. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. PMID:27086223

  5. Dynamic defense workshop : from research to practice.

    SciTech Connect

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  6. Defense Mechanisms Reported by Patients with Borderline Personality Disorder and Axis II Comparison Subjects Over 16 Years of Prospective Follow-up: Description and Prediction of Recovery

    PubMed Central

    Zanarini, Mary C.; Frankenburg, Frances R.; Fitzmaurice, Garrett

    2012-01-01

    Objective This study assessed the defensive functioning of 290 borderline patients and compared it to that of 72 patients with other forms of axis II psychopathology over 16 years of prospective follow-up. It also assessed the relationship between time-varying defenses and recovery from borderline personality disorder. Method The Defense Style Questionnaire, a self-report measure with demonstrated criterion validity and internal consistency, was initially administered at study entry. It was readministered at eight contiguous two-year long follow-up periods. Results Borderline patients had significantly lower scores than axis II comparison subjects on one mature defense mechanism (suppression) and significantly higher scores on seven of the other 18 defenses studied. More specifically, borderline patients had significantly higher scores on one neurotic-level defense (undoing), four immature defenses (acting out, emotional hypochondriasis, passive aggression, and projection), and two image-distorting/borderline defenses (projective identification and splitting). In terms of change, borderline patients were found to have had significant improvement on 13 of the 19 defenses studied. More specifically, they had significantly higher scores over time on one mature defense (anticipation) and significantly lower scores on two neurotic defenses (isolation and undoing), all immature defenses, and all image-distorting/borderline defenses except primitive idealization. In addition, four time-varying defense mechanisms were found to predict time-to-recovery: humor, acting out, emotional hypochondriasis, and projection. Conclusions Taken together, the results of this study suggest that the longitudinal defensive functioning of borderline patients is both distinct and improves substantially over time. They also suggest that immature defenses are the best predictors of time-to-recovery. PMID:23223866

  7. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    PubMed

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy. PMID:26241796

  8. Defense Economic Impact Modeling System (DEIMS). A New Concept in Economic Forecasting for Defense Expenditures.

    ERIC Educational Resources Information Center

    Blond, David L.

    The Defense Economic Impact Modeling System (DEIMS) analyzes the economic effect of defense expenditures on the United States economy by using a consistent, reliable framework of economic models and government policy assumptions. Planning information on defense requirements is also provided to private sector firms. The DEIMS allows the Department…

  9. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  10. 3 CFR - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export... Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act Memorandum for the...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and...

  11. Protecting the Self: Defense Mechanisms in Action

    ERIC Educational Resources Information Center

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  12. REPORT ON THE DEFENSE LANGUAGE INSTITUTE.

    ERIC Educational Resources Information Center

    BENOIT, LEROY JAMES

    A SUMMARY IS GIVEN OF THE LANGUAGE TRAINING ACTIVITIES OF THE DEFENSE LANGUAGE INSTITUTE, ESTABLISHED IN 1963 TO TEACH THE GLOBAL LANGUAGE REQUIREMENTS OF THE DEPARTMENT OF DEFENSE TO U.S. MILITARY PERSONNEL AND ENGLISH TO FOREIGN ALLIED MILITARY PERSONNEL. THE REPORT DESCRIBES THE AUDIOLINGUAL METHODOLOGY AND APPROACH USED IN ITS INTENSIVE…

  13. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  14. DEFENSE ENVIRONMENTAL NETWORK AND INFORMATION EXCHANGE (DENIX)

    EPA Science Inventory

    DENIX serves as a central platform for the dissemination of environment, safety and occupational health (ESOH) news, policy, and guidance within Department of Defense (DoD) activities worldwide, in support of the national defense mission. DENIX informs ESOH professionals of salie...

  15. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS GENERAL ADMINISTRATIVE REQUIREMENTS Imposition of Civil Money Penalties § 160.410 Affirmative defenses. (a) For violations occurring prior...

  16. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... defense exists with respect to the violations, including the following: (1) The violation is an act... that an affirmative defense exists with respect to the violations, including the following: (1)...

  17. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... affirmative defense exists with respect to the violation, including the following: (1) The covered...

  18. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS GENERAL ADMINISTRATIVE REQUIREMENTS Imposition of Civil Money Penalties § 160.410 Affirmative defenses. (a) The Secretary may not: (1) Prior...

  19. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... defense exists with respect to the violations, including the following: (1) The violation is an act... that an affirmative defense exists with respect to the violations, including the following: (1)...

  20. Defense Contracting and Vocational Education in Illinois.

    ERIC Educational Resources Information Center

    Kjos, Diane; And Others

    A study examined the relationship between defense contracting and vocational education in Illinois. During the study, researchers analyzed data from a variety of national and Illinois state data sources, including the Department of Defense, the Bureau of Labor Statistics, the Illinois Department of Commerce and Community Affairs, the Research and…

  1. Homological stabilizer codes

    SciTech Connect

    Anderson, Jonas T.

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  2. Defensive externality and blame projection following failure.

    PubMed

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals. PMID:1177087

  3. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... identification than a symbol or logo by itself. Homeopathic drug products are required only to bear an imprint... National Drug Code, or a mark, symbol, logo, or monogram, or a combination of letters, numbers, and...

  4. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... identification than a symbol or logo by itself. Homeopathic drug products are required only to bear an imprint... National Drug Code, or a mark, symbol, logo, or monogram, or a combination of letters, numbers, and...

  5. Computer programs for the characterization of protein coding genes.

    PubMed

    Pierno, G; Barni, N; Candurro, M; Cipollaro, M; Franzè, A; Juliano, L; Macchiato, M F; Mastrocinque, G; Moscatelli, C; Scarlato, V

    1984-01-11

    Computer programs, implemented on an Univac II00/80 computer system, for the identification and characterization of protein coding genes and for the analysis of nucleic acid sequences, are described. PMID:6546420

  6. Computer programs for the characterization of protein coding genes.

    PubMed Central

    Pierno, G; Barni, N; Candurro, M; Cipollaro, M; Franzè, A; Juliano, L; Macchiato, M F; Mastrocinque, G; Moscatelli, C; Scarlato, V

    1984-01-01

    Computer programs, implemented on an Univac II00/80 computer system, for the identification and characterization of protein coding genes and for the analysis of nucleic acid sequences, are described. PMID:6546420

  7. Toward directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka; O'Neill, Hugh

    2014-02-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR, for Directed Energy System for Targeting of Asteroids and exploRation. The DE-STAR is a modular-phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, minimizing risk, and allowing for technological codevelopment. An orbiting structure would be developed in stages. The main objective of the DE-STAR is to use focused directed energy to raise the surface spot temperature to ˜3000 K, sufficient to vaporize all known substances. Ejection of evaporated material creates a large reaction force that would alter an asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1- to 10-km array) depending on the degree of protection desired. A DE-STAR 4 allows initial engagement beyond 1 AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in 1 year. Small objects can be diverted with a DE-STAR 2 (100 m) while space debris is vaporized with a DE-STAR 1 (10 m).

  8. The First Line of Defense

    PubMed Central

    Hammer, Adam M.; Morris, Niya L.; Earley, Zachary M.; Choudhry, Mashkoor A.

    2015-01-01

    Alcohol (ethanol) is one of the most globally abused substances, and is one of the leading causes of premature death in the world. As a result of its complexity and direct contact with ingested alcohol, the intestine represents the primary source from which alcohol-associated pathologies stem. The gut is the largest reservoir of bacteria in the body, and under healthy conditions, it maintains a barrier preventing bacteria from translocating out of the intestinal lumen. The intestinal barrier is compromised following alcohol exposure, which can lead to life-threatening systemic complications including sepsis and multiple organ failure. Furthermore, alcohol is a major confounding factor in pathology associated with trauma. Experimental data from both human and animal studies suggest that alcohol perturbs the intestinal barrier and its function, which is exacerbated by a “second hit” from traumatic injury. This article highlights the role of alcohol-mediated alterations of the intestinal epithelia and its defense against bacteria within the gut, and the impact of alcohol on intestinal immunity, specifically on T cells and neutrophils. Finally, it discusses how the gut microbiome both contributes to and protects the intestines from dysbiosis after alcohol exposure and trauma. PMID:26695746

  9. Analyzing plant defenses in nature

    PubMed Central

    Kautz, Stefanie; Heil, Martin; Hegeman, Adrian D

    2009-01-01

    A broad range of chemical plant defenses against herbivores has been studied extensively under laboratory conditions. In many of these cases there is still little understanding of their relevance in nature. In natural systems, functional analyses of plant traits are often complicated by an extreme variability, which affects the interaction with higher trophic levels. Successful analyses require consideration of the numerous sources of variation that potentially affect the plant trait of interest. In our recent study on wild lima bean (Phaseolus lunatus L.) in South Mexico, we applied an integrative approach combining analyses for quantitative correlations of cyanogenic potential (HCNp; the maximum amount of cyanide that can be released from a given tissue) and herbivory in the field with subsequent feeding trials under controlled conditions. This approach allowed us to causally explain the consequences of quantitative variation of HCNp on herbivore-plant interactions in nature and highlights the importance of combining data obtained in natural systems with analyses under controlled conditions. PMID:19820300

  10. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  11. Coding of Neuroinfectious Diseases.

    PubMed

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue. PMID:26633789

  12. Model Children's Code.

    ERIC Educational Resources Information Center

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  13. 48 CFR 204.203 - Taxpayer identification information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Taxpayer identification information. 204.203 Section 204.203 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... identification number and the type of organization from the System for Award Management database....

  14. 48 CFR 204.203 - Taxpayer identification information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Taxpayer identification information. 204.203 Section 204.203 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... identification number and the type of organization from the System for Award Management database....

  15. 48 CFR 211.274 - Item identification and valuation requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Item identification and valuation requirements. 211.274 Section 211.274 Federal Acquisition Regulations System DEFENSE ACQUISITION... Requirements Documents 211.274 Item identification and valuation requirements....

  16. 33 CFR 245.30 - Identification of responsible parties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Identification of responsible..., DEPARTMENT OF DEFENSE REMOVAL OF WRECKS AND OTHER OBSTRUCTIONS § 245.30 Identification of responsible parties... cannot be determined, the lessee or operator. If cargo is involved, ownership will be...

  17. 33 CFR 245.30 - Identification of responsible parties.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Identification of responsible..., DEPARTMENT OF DEFENSE REMOVAL OF WRECKS AND OTHER OBSTRUCTIONS § 245.30 Identification of responsible parties... cannot be determined, the lessee or operator. If cargo is involved, ownership will be...

  18. 33 CFR 245.30 - Identification of responsible parties.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Identification of responsible..., DEPARTMENT OF DEFENSE REMOVAL OF WRECKS AND OTHER OBSTRUCTIONS § 245.30 Identification of responsible parties... cannot be determined, the lessee or operator. If cargo is involved, ownership will be...

  19. 33 CFR 245.30 - Identification of responsible parties.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Identification of responsible parties. 245.30 Section 245.30 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REMOVAL OF WRECKS AND OTHER OBSTRUCTIONS § 245.30 Identification of responsible parties. (a) Investigation. When marking...

  20. 33 CFR 245.30 - Identification of responsible parties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Identification of responsible..., DEPARTMENT OF DEFENSE REMOVAL OF WRECKS AND OTHER OBSTRUCTIONS § 245.30 Identification of responsible parties... cannot be determined, the lessee or operator. If cargo is involved, ownership will be...

  1. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification....

  2. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification....

  3. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification....

  4. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification....

  5. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all...

  6. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all...

  7. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all...

  8. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all...

  9. PLEA OF INSANITY AS A DEFENSE IN CRIMINAL CASES: AN UPDATE

    PubMed Central

    Akhtar, Sayeed; Jagawat, Tushar

    1994-01-01

    Mc'Naughten Rule is die commonest formulation for plea of insanity in most countries. Although assessment of the mental state at the time of offence is difficult, few instruments have been devised for this purpose. In the USA, efforts are being made to abolish the insanity defense and in the United Kingdom, amendments in the provisions of insanity defense have been proposed. The authors have stressed the need for some changes in the relevant sections of Indian Penal Code to increase the credibility of Psychiatric testimony in such cases. PMID:21743662

  10. 77 FR 66443 - Renewal of the Defense Health Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-05

    ... of the Secretary Renewal of the Defense Health Board AGENCY: DoD. ACTION: Renewal of Federal Advisory... Defense gives notice that it is renewing the charter for the Defense Health Board (hereinafter referred to... Secretary of Defense''), and the Assistant Secretary of Defense for Health Affairs, independent advice...

  11. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false The Defense Commissioner. 0.181 Section 0.181..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is designated by the Commission. The Defense Commissioner directs the homeland security, national security...

  12. 32 CFR 644.333 - Screening for defense needs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Screening for defense needs. 644.333 Section 644.333 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL... Air Force will be screened against requirements of other Department of Defense (DOD) agencies and...

  13. Thermoelectric pump performance analysis computer code

    NASA Technical Reports Server (NTRS)

    Johnson, J. L.

    1973-01-01

    A computer program is presented that was used to analyze and design dual-throat electromagnetic dc conduction pumps for the 5-kwe ZrH reactor thermoelectric system. In addition to a listing of the code and corresponding identification of symbols, the bases for this analytical model are provided.

  14. Fluorescent taggants with temporally coded signatures.

    PubMed

    Wang, Siyang; Vyas, Raul; Dwyer, Chris

    2016-07-11

    In this paper, resonance energy transfer (RET) networks between chromophores are used to implement fluorescent taggants with temporally coded signatures. Because the temporal signature of such a fluorescent taggant is a phase-type distribution defined by the geometry of its RET network, the taggant design is not constrained by resolvable dyes and has a significantly larger coding capacity than spectrally or lifetime coded fluorescent taggants. Meanwhile, the detection process becomes highly efficient when the signatures are coded in the time domain. The taggant identification method is based on the multinomial distribution of detected photons and Maximum Likelihood Estimation, which guarantees high accuracy even with only a few hundred photons and also applies to a mixture of taggants in multiplex detection. Therefore, these temporally coded fluorescent taggants have great potential for both in situ and Lidar applications. PMID:27410827

  15. Defenses and disincentives to proliferation. Final report

    SciTech Connect

    Snipes, F.S.; Scesney, P.E.

    1992-03-02

    The proliferation of ballistic missiles and their associated technologies through the Third World has become a chief security concern for the United States and its allies. To meet this threat, the U.S. and other industrial nations have attempted to impose export controls on critical missile technologies in order to prohibit certain regimes from acquiring ballistic missile systems. Unfortunately, the controls have largely been ineffective as not only have ballistic missiles been acquired by dangerous Third World regimes, but often the technology and engineering expertise to indigenously produce these weapons have been obtained as well. Two major instances of ballistic missile use in the Third World--the Iran-Iraq War of the Cities and Desert Storm--have brought home the realization that arms control measures alone are not going to be successful in stopping proliferation of these weapons. Other responses to these systems are needed to enhance current arms control efforts. One of these responses is active ballistic missile defense. Desert Storm demonstrated the utility of defense as a response to the products of proliferation. Less obvious, but of great interest to SDI and U.S. foreign policy is how this demonstration of defensive prowess and subsequent development in defensive technologies will affect ballistic missile proliferation. The presence of defenses reduces the value of ballistic missiles that is determined by a potential proliferator. By doing so, defenses provide disincentives for regional countries to proliferate. Examining these disincentives is an integral part of determining the net value of defensive deployments.

  16. 77 FR 27615 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary 32 CFR Part 236 Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary... other forms of information technology. (a) Title: Defense Industrial Base Cyber Security/Information... added to read as follows: PART 236--DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB)...

  17. Directed energy missile defense in space

    NASA Astrophysics Data System (ADS)

    Carter, A. B.

    1984-04-01

    Current concepts for directed-energy ballistic missile defense in space are described and assessed. Its purpose is to provide Members of Congress, their staffs, and the public with a readable introduction to the so-called Star Wars technologies that some suggest might form the basis of a future nationwide defense against Soviet nuclear ballistic missiles. Since these technologies are a relatively new focus for U.S. missile defense efforts, little information about them has been readily available outside the expert community.

  18. Strategic defense initiative: Folly or future

    SciTech Connect

    Haley, P.E.; Merritt, J.

    1986-01-01

    This collection of analyses is a guide through the maze of claims and criticisms about ''Star Wars,'' the controversial effort of the Reagan administration to reorient United States nuclear strategy to strategic defense. The text starts with an introduction by the editors followed by individual chapters outlining the strategic defense initiative as originally conceived and subsequently modified by the Reagan administration; the arguments for and against the plan's strategic and technical feasibility; and assessments of the harmful and constructive effects of strategic defense on U.S.-Soviet and U.S.-allied relations.

  19. Impact of defense-only and opposing eyewitness experts on juror judgments.

    PubMed

    Devenport, Jennifer L; Cutler, Brian L

    2004-10-01

    Previous research shows that expert testimony on eyewitness memory influences mock-juror judgments. We examined the extent to which opposing expert testimony mitigates the impact of defense-only expert testimony. Participants (N = 497) viewed a video-taped trial involving an eyewitness identification and individually rendered verdicts and evaluated the evidence and the experts. We manipulated the Foils (unbiased vs. biased) and Instructions (unbiased vs. biased) of the lineup and Expert Testimony (no expert vs. defense-only expert vs. opposing experts). Expert testimony did not significantly influence juror judgments, but the opposing expert testimony diminished the credibility of the defense expert in the eyes of the jurors. Results point to the need for further research on conditions that qualify the impact of expert testimony. PMID:15638210

  20. Sandia National Laboratories analysis code data base

    SciTech Connect

    Peterson, C.W.

    1994-11-01

    Sandia National Laboratories, mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The Laboratories` strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia`s technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code ``ownership`` and release status, and references describing the physical models and numerical implementation.

  1. Criticality Code Validation Exercises with TSUNAMI

    SciTech Connect

    Rearden, Bradley T

    2007-01-01

    In the criticality code validation of common systems, many paths may exist to a correct bias, bias uncertainty, and upper subcritical limit. The challenge for the criticality analyst is to select an efficient, defensible, and safe methodology to consistently obtain the correct values. One method of testing criticality code validation techniques is to use a sample system with a known bias as a test application and determine whether the methods employed can reproduce the known bias. In this paper, a low-enriched uranium (LEU) lattice critical experiment with a known bias is used as the test application, and numerous other LEU experiments are used as the benchmarks for the criticality code validation exercises using traditional and advanced parametric techniques. The parameters explored are enrichment, energy of average lethargy causing fission (EALF), and the TSUNAMI integral index ck with experiments with varying degrees of similarity. This paper is an extension of a previously published summary.

  2. 78 FR 41331 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 225 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to insert a hyperlink and direct contracting officers to the DFARS Procedures,...

  3. 77 FR 19128 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 203 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to add a reference for reporting suspected lobbying violations. DATES: Effective...

  4. 77 FR 11775 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 252 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: February 28, 2012. FOR...

  5. 78 FR 36113 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 222 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: June 17, 2013. FOR...

  6. 76 FR 6766 - Meeting of the Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... February 23-24, 2011; at the Pentagon, Arlington, VA. The mission of the Defense Science Board is to advise... Rose, Executive Officer, Defense Science Board, 3140 Defense Pentagon, Room 3B888A, Washington,...

  7. 32 CFR 634.24 - Traffic planning and codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic planning and codes. 634.24 Section 634.24... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.24 Traffic planning and... traffic supervision program includes traffic circulation planning and control of motor vehicle...

  8. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to the Defense Logistics Agency (DLA) CAGE file through the DLA Network or dial-up capability; or... Logistics Information Service assigns or records and maintains CAGE codes to identify commercial and... Volume 7 of DoD 4100.39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe...

  9. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... access to the Defense Logistics Agency (DLA) CAGE file through the DLA Network or dial-up capability; or... Logistics Information Service assigns or records and maintains CAGE codes to identify commercial and... Volume 7 of DoD 4100.39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe...

  10. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to the Defense Logistics Agency (DLA) CAGE file through the DLA Network or dial-up capability; or... Logistics Information Service assigns or records and maintains CAGE codes to identify commercial and... Volume 7 of DoD 4100.39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe...

  11. 32 CFR 635.20 - Military Police Codes (MPC).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  12. 32 CFR 635.20 - Military Police Codes (MPC).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  13. 32 CFR 635.20 - Military Police Codes (MPC).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  14. 32 CFR 635.20 - Military Police Codes (MPC).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  15. 32 CFR 635.20 - Military Police Codes (MPC).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  16. Defense programs beryllium good practice guide

    SciTech Connect

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  17. Accumulate repeat accumulate codes

    NASA Technical Reports Server (NTRS)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative channel coding scheme called 'Accumulate Repeat Accumulate codes' (ARA). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes, thus belief propagation can be used for iterative decoding of ARA codes on a graph. The structure of encoder for this class can be viewed as precoded Repeat Accumulate (RA) code or as precoded Irregular Repeat Accumulate (IRA) code, where simply an accumulator is chosen as a precoder. Thus ARA codes have simple, and very fast encoder structure when they representing LDPC codes. Based on density evolution for LDPC codes through some examples for ARA codes, we show that for maximum variable node degree 5 a minimum bit SNR as low as 0.08 dB from channel capacity for rate 1/2 can be achieved as the block size goes to infinity. Thus based on fixed low maximum variable node degree, its threshold outperforms not only the RA and IRA codes but also the best known LDPC codes with the dame maximum node degree. Furthermore by puncturing the accumulators any desired high rate codes close to code rate 1 can be obtained with thresholds that stay close to the channel capacity thresholds uniformly. Iterative decoding simulation results are provided. The ARA codes also have projected graph or protograph representation that allows for high speed decoder implementation.

  18. Comparative learning of pitch and loudness identification.

    PubMed

    Houtsma, A J; Durlach, N I; Horowitz, D M

    1987-01-01

    This study investigated possible similarities between the ability to identify pitches and the ability to identify loudnesses. Systematic training of musically naive subjects indicated that frequency identification performance improves at about the same rate as intensity identification performance. Examination of frequency and intensity identification behavior of musically trained subjects showed that their ability to code pitch information efficiently does not generalize to an ability to encode loudness information more efficiently than untrained subjects. Intensity identification training curves of musically trained and untrained subjects are similar, but final performance levels are below frequency identification performance levels exhibited by musically trained subjects, especially those with absolute pitch. PMID:3819170

  19. Deciphering the genetic regulatory code using an inverse error control coding framework.

    SciTech Connect

    Rintoul, Mark Daniel; May, Elebeoba Eni; Brown, William Michael; Johnston, Anna Marie; Watson, Jean-Paul

    2005-03-01

    We have found that developing a computational framework for reconstructing error control codes for engineered data and ultimately for deciphering genetic regulatory coding sequences is a challenging and uncharted area that will require advances in computational technology for exact solutions. Although exact solutions are desired, computational approaches that yield plausible solutions would be considered sufficient as a proof of concept to the feasibility of reverse engineering error control codes and the possibility of developing a quantitative model for understanding and engineering genetic regulation. Such evidence would help move the idea of reconstructing error control codes for engineered and biological systems from the high risk high payoff realm into the highly probable high payoff domain. Additionally this work will impact biological sensor development and the ability to model and ultimately develop defense mechanisms against bioagents that can be engineered to cause catastrophic damage. Understanding how biological organisms are able to communicate their genetic message efficiently in the presence of noise can improve our current communication protocols, a continuing research interest. Towards this end, project goals include: (1) Develop parameter estimation methods for n for block codes and for n, k, and m for convolutional codes. Use methods to determine error control (EC) code parameters for gene regulatory sequence. (2) Develop an evolutionary computing computational framework for near-optimal solutions to the algebraic code reconstruction problem. Method will be tested on engineered and biological sequences.

  20. Behavioral genomics of honeybee foraging and nest defense

    NASA Astrophysics Data System (ADS)

    Hunt, Greg J.; Amdam, Gro V.; Schlipalius, David; Emore, Christine; Sardesai, Nagesh; Williams, Christie E.; Rueppell, Olav; Guzmán-Novoa, Ernesto; Arechavaleta-Velasco, Miguel; Chandra, Sathees; Fondrk, M. Kim; Beye, Martin; Page, Robert E.

    2007-04-01

    The honeybee has been the most important insect species for study of social behavior. The recently released draft genomic sequence for the bee will accelerate honeybee behavioral genetics. Although we lack sufficient tools to manipulate this genome easily, quantitative trait loci (QTLs) that influence natural variation in behavior have been identified and tested for their effects on correlated behavioral traits. We review what is known about the genetics and physiology of two behavioral traits in honeybees, foraging specialization (pollen versus nectar), and defensive behavior, and present evidence that map-based cloning of genes is more feasible in the bee than in other metazoans. We also present bioinformatic analyses of candidate genes within QTL confidence intervals (CIs). The high recombination rate of the bee made it possible to narrow the search to regions containing only 17-61 predicted peptides for each QTL, although CIs covered large genetic distances. Knowledge of correlated behavioral traits, comparative bioinformatics, and expression assays facilitated evaluation of candidate genes. An overrepresentation of genes involved in ovarian development and insulin-like signaling components within pollen foraging QTL regions suggests that an ancestral reproductive gene network was co-opted during the evolution of foraging specialization. The major QTL influencing defensive/aggressive behavior contains orthologs of genes involved in central nervous system activity and neurogenesis. Candidates at the other two defensive-behavior QTLs include modulators of sensory signaling ( Am5HT 7 serotonin receptor, AmArr4 arrestin, and GABA-B-R1 receptor). These studies are the first step in linking natural variation in honeybee social behavior to the identification of underlying genes.

  1. Concatenated Coding Using Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Thompson, Michael W.

    1997-01-01

    In the late seventies and early eighties a technique known as Trellis Coded Modulation (TCM) was developed for providing spectrally efficient error correction coding. Instead of adding redundant information in the form of parity bits, redundancy is added at the modulation stage thereby increasing bandwidth efficiency. A digital communications system can be designed to use bandwidth-efficient multilevel/phase modulation such as Amplitude Shift Keying (ASK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK) or Quadrature Amplitude Modulation (QAM). Performance gain can be achieved by increasing the number of signals over the corresponding uncoded system to compensate for the redundancy introduced by the code. A considerable amount of research and development has been devoted toward developing good TCM codes for severely bandlimited applications. More recently, the use of TCM for satellite and deep space communications applications has received increased attention. This report describes the general approach of using a concatenated coding scheme that features TCM and RS coding. Results have indicated that substantial (6-10 dB) performance gains can be achieved with this approach with comparatively little bandwidth expansion. Since all of the bandwidth expansion is due to the RS code we see that TCM based concatenated coding results in roughly 10-50% bandwidth expansion compared to 70-150% expansion for similar concatenated scheme which use convolution code. We stress that combined coding and modulation optimization is important for achieving performance gains while maintaining spectral efficiency.

  2. Coset Codes Viewed as Terminated Convolutional Codes

    NASA Technical Reports Server (NTRS)

    Fossorier, Marc P. C.; Lin, Shu

    1996-01-01

    In this paper, coset codes are considered as terminated convolutional codes. Based on this approach, three new general results are presented. First, it is shown that the iterative squaring construction can equivalently be defined from a convolutional code whose trellis terminates. This convolutional code determines a simple encoder for the coset code considered, and the state and branch labelings of the associated trellis diagram become straightforward. Also, from the generator matrix of the code in its convolutional code form, much information about the trade-off between the state connectivity and complexity at each section, and the parallel structure of the trellis, is directly available. Based on this generator matrix, it is shown that the parallel branches in the trellis diagram of the convolutional code represent the same coset code C(sub 1), of smaller dimension and shorter length. Utilizing this fact, a two-stage optimum trellis decoding method is devised. The first stage decodes C(sub 1), while the second stage decodes the associated convolutional code, using the branch metrics delivered by stage 1. Finally, a bidirectional decoding of each received block starting at both ends is presented. If about the same number of computations is required, this approach remains very attractive from a practical point of view as it roughly doubles the decoding speed. This fact is particularly interesting whenever the second half of the trellis is the mirror image of the first half, since the same decoder can be implemented for both parts.

  3. Phagocytic defense in the lung.

    PubMed

    Reynolds, H Y

    1985-01-01

    Phagocytic defense in the normal lung is shared principally by two kinds of cells - alveolar macrophages that reside on the air surface and roam the alveoli and PMNs that circulate in the intravascular space or are stored transiently in areas adjacent to the capillary-alveolar interface (marginated in capillaries) and can reach the alveolar space quickly. The nature of the stimulating microorganism or aerosol particle reaching the alveolar surface may determine which phagocytic cell ultimately responds to contain the intruder. Ingestion and containment (either intracellular killing or enzymatic degradation) are the goals, and an 'opsonin' may be necessary to enhance the efficiency of phagocytosis. In the lung this is very complex, reflecting the interdependence on immune and nonimmune opsonins. For immune mediated phagocytosis by alveolar macrophages, IgG antibody is preferable. Among the four subclasses of IgG, certain ones seem to bind preferentially to macrophages, whereas others are already adherent to the cells as cytophilic antibody. In the respiratory tract milieu of subjects with CF, the interaction of immune and nonimmune opsonins is much more complex because of proteolytic enzymes that can degrade antibodies creating various fragments. Now that we are in an era of very specific humoral replacement therapy with intravenous IgG that contains IgG subclasses and the potential for using monoclonal antibodies for very precisely directed replacement, special attention must be given to identifying the appropriate class and subclass of antibody that may be required. This may be relatively simple when forms of passive immune therapy are being considered. More difficult will be devising ways to actively immunize patients (or animals) and manipulate their antibody responses so that selective immunoglobulin subclasses are produced. To obtain such control over the humoral immune response will require much more basic work in animal models. More attention to the form of

  4. Hepcidin and Host Defense against Infectious Diseases

    PubMed Central

    Michels, Kathryn; Nemeth, Elizabeta; Ganz, Tomas; Mehrad, Borna

    2015-01-01

    Hepcidin is the master regulator of iron homeostasis in vertebrates. The synthesis of hepcidin is induced by systemic iron levels and by inflammatory stimuli. While the role of hepcidin in iron regulation is well established, its contribution to host defense is emerging as complex and multifaceted. In this review, we summarize the literature on the role of hepcidin as a mediator of antimicrobial immunity. Hepcidin induction during infection causes depletion of extracellular iron, which is thought to be a general defense mechanism against many infections by withholding iron from invading pathogens. Conversely, by promoting iron sequestration in macrophages, hepcidin may be detrimental to cellular defense against certain intracellular infections, although critical in vivo studies are needed to confirm this concept. It is not yet clear whether hepcidin exerts any iron-independent effects on host defenses. PMID:26291319

  5. Happiness and Defense Styles in Psychiatrists.

    PubMed

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness. PMID:26731124

  6. Hepcidin and Host Defense against Infectious Diseases.

    PubMed

    Michels, Kathryn; Nemeth, Elizabeta; Ganz, Tomas; Mehrad, Borna

    2015-08-01

    Hepcidin is the master regulator of iron homeostasis in vertebrates. The synthesis of hepcidin is induced by systemic iron levels and by inflammatory stimuli. While the role of hepcidin in iron regulation is well established, its contribution to host defense is emerging as complex and multifaceted. In this review, we summarize the literature on the role of hepcidin as a mediator of antimicrobial immunity. Hepcidin induction during infection causes depletion of extracellular iron, which is thought to be a general defense mechanism against many infections by withholding iron from invading pathogens. Conversely, by promoting iron sequestration in macrophages, hepcidin may be detrimental to cellular defense against certain intracellular infections, although critical in vivo studies are needed to confirm this concept. It is not yet clear whether hepcidin exerts any iron-independent effects on host defenses. PMID:26291319

  7. The Soviet Union and ballistic missile defense

    SciTech Connect

    Parrott, B.

    1987-01-01

    In recent debate over strategic defense, the Soviet dimension has not been adequately examined. Based on an analysis of Soviet statements and Soviet weaponry, the study surveys Soviet perceptions of the shifting relationship between the superpowers and the effect of BMD on that relationship. The author then traces the evolution of Soviet policies toward ballistic missile defense and the introduction of weapons into space. After exploring the internal budgetary debates that will affect future Soviet decisions on BMD and space systems, the book outlines Soviet responses, political as well as military, to the Strategic Defense Initiative and concludes with recommendations for U.S. policy toward BMD and arms negotiations. Contents: The Central Issues; Soviet Views of the Geopolitical Context; Soviet Policy Toward Soviet BMD and the Military Uses of Space; The resource Allocation Debate and Soviet BMD Decisions; Soviet Responses to the Strategic Defense Initiative; U.S. Policy and the Future of the Superpower Arms Competition.

  8. Uncertainties in building a strategic defense.

    PubMed

    Zraket, C A

    1987-03-27

    Building a strategic defense against nuclear ballistic missiles involves complex and uncertain functional, spatial, and temporal relations. Such a defensive system would evolve and grow over decades. It is too complex, dynamic, and interactive to be fully understood initially by design, analysis, and experiments. Uncertainties exist in the formulation of requirements and in the research and design of a defense architecture that can be implemented incrementally and be fully tested to operate reliably. The analysis and measurement of system survivability, performance, and cost-effectiveness are critical to this process. Similar complexities exist for an adversary's system that would suppress or use countermeasures against a missile defense. Problems and opportunities posed by these relations are described, with emphasis on the unique characteristics and vulnerabilities of space-based systems. PMID:17795594

  9. Department of Defense Helps "Fight" Poverty Too

    ERIC Educational Resources Information Center

    Opportunity, 1971

    1971-01-01

    Begun in April, 1969, the Department of Defense Domestic Action Program's activities include: loan of equipment to Community Action Agencies; use of DOD facilities for training and recreation; assistance in technical areas; and, general aid. (JM)

  10. 78 FR 54968 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: September 9,...

  11. 78 FR 38235 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: June 26, 2013....

  12. 78 FR 30232 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective: May 22, 2013....

  13. Review of flat panel display programs and defense applications

    NASA Astrophysics Data System (ADS)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  14. Avian Antimicrobial Host Defense Peptides: From Biology to Therapeutic Applications

    PubMed Central

    Zhang, Guolong; Sunkara, Lakshmi T.

    2014-01-01

    Host defense peptides (HDPs) are an important first line of defense with antimicrobial and immunomoduatory properties. Because they act on the microbial membranes or host immune cells, HDPs pose a low risk of triggering microbial resistance and therefore, are being actively investigated as a novel class of antimicrobials and vaccine adjuvants. Cathelicidins and β-defensins are two major families of HDPs in avian species. More than a dozen HDPs exist in birds, with the genes in each HDP family clustered in a single chromosomal segment, apparently as a result of gene duplication and diversification. In contrast to their mammalian counterparts that adopt various spatial conformations, mature avian cathelicidins are mostly α-helical. Avian β-defensins, on the other hand, adopt triple-stranded β-sheet structures similar to their mammalian relatives. Besides classical β-defensins, a group of avian-specific β-defensin-related peptides, namely ovodefensins, exist with a different six-cysteine motif. Like their mammalian counterparts, avian cathelicidins and defensins are derived from either myeloid or epithelial origin expressed in a majority of tissues with broad-spectrum antibacterial and immune regulatory activities. Structure-function relationship studies with several avian HDPs have led to identification of the peptide analogs with potential for use as antimicrobials and vaccine adjuvants. Dietary modulation of endogenous HDP synthesis has also emerged as a promising alternative approach to disease control and prevention in chickens. PMID:24583933

  15. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  16. Mechanisms of plant defense against insect herbivores

    PubMed Central

    War, Abdul Rashid; Paulraj, Michael Gabriel; Ahmad, Tariq; Buhroo, Abdul Ahad; Hussain, Barkat; Ignacimuthu, Savarimuthu; Sharma, Hari Chand

    2012-01-01

    Plants respond to herbivory through various morphological, biochemicals, and molecular mechanisms to counter/offset the effects of herbivore attack. The biochemical mechanisms of defense against the herbivores are wide-ranging, highly dynamic, and are mediated both by direct and indirect defenses. The defensive compounds are either produced constitutively or in response to plant damage, and affect feeding, growth, and survival of herbivores. In addition, plants also release volatile organic compounds that attract the natural enemies of the herbivores. These strategies either act independently or in conjunction with each other. However, our understanding of these defensive mechanisms is still limited. Induced resistance could be exploited as an important tool for the pest management to minimize the amounts of insecticides used for pest control. Host plant resistance to insects, particularly, induced resistance, can also be manipulated with the use of chemical elicitors of secondary metabolites, which confer resistance to insects. By understanding the mechanisms of induced resistance, we can predict the herbivores that are likely to be affected by induced responses. The elicitors of induced responses can be sprayed on crop plants to build up the natural defense system against damage caused by herbivores. The induced responses can also be engineered genetically, so that the defensive compounds are constitutively produced in plants against are challenged by the herbivory. Induced resistance can be exploited for developing crop cultivars, which readily produce the inducible response upon mild infestation, and can act as one of components of integrated pest management for sustainable crop production. PMID:22895106

  17. Discussion on LDPC Codes and Uplink Coding

    NASA Technical Reports Server (NTRS)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  18. Manually operated coded switch

    DOEpatents

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  19. Binary primitive alternant codes

    NASA Technical Reports Server (NTRS)

    Helgert, H. J.

    1975-01-01

    In this note we investigate the properties of two classes of binary primitive alternant codes that are generalizations of the primitive BCH codes. For these codes we establish certain equivalence and invariance relations and obtain values of d and d*, the minimum distances of the prime and dual codes.

  20. 47 CFR 22.313 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... continuity of any public communication in progress, provided that station identification is transmitted at the conclusion of that public communication. (c) Station identification must be transmitted by telephony using the English language or by telegraphy using the international Morse code, and in a form...

  1. 22 CFR 126.17 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and the...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., regulations issued by the Bureau of Alcohol, Tobacco, Firearms and Explosives found at 27 CFR parts 447, 478... the standard marking or identification shall read: “//CLASSIFICATION LEVEL USML//REL GBR and USA... shall be “//SECRET USML//REL GBR and USA Treaty Community//.” (ii) Unclassified defense articles...

  2. Algebraic geometric codes

    NASA Technical Reports Server (NTRS)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  3. Oil and gas field code master list, 1993

    SciTech Connect

    Not Available

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  4. Spectral derivative feature coding for hyperspectral signature analysis

    NASA Astrophysics Data System (ADS)

    Chang, Chein-I.; Chakravarty, Sumit

    2006-08-01

    This paper presents a new approach to hyperspectral signature analysis, called Spectral Derivative Feature Coding (SDFC). It makes use of gradient changes in adjacent bands to characterize spectral variations so as to improve spectral discrimination and identification. In order to evaluate its performance, two binary coding methods, SPectral Analysis Manager (SPAM) and Spectral Feature-based Binary Coding (SFBC) are used to conduct comparative analysis. The experimental results demonstrate the proposed SDFC performs more effectively in capturing spectral characteristics.

  5. ARA type protograph codes

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2008-01-01

    An apparatus and method for encoding low-density parity check codes. Together with a repeater, an interleaver and an accumulator, the apparatus comprises a precoder, thus forming accumulate-repeat-accumulate (ARA codes). Protographs representing various types of ARA codes, including AR3A, AR4A and ARJA codes, are described. High performance is obtained when compared to the performance of current repeat-accumulate (RA) or irregular-repeat-accumulate (IRA) codes.

  6. QR Codes 101

    ERIC Educational Resources Information Center

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  7. DEFENSIVE SPIROKETALS FROM Asceles glaber (PHASMATODEA): ABSOLUTE CONFIGURATION AND EFFECTS ON ANTS AND MOSQUITOES

    PubMed Central

    DOSSEY, AARON T.; WHITAKER, JOHN M.; DANCEL, MARIA CRISTINA A.; VANDER MEER, ROBERT K.; BERNIER, ULRICH R.; GOTTARDO, MARCO; ROUSH, WILLIAM R.

    2012-01-01

    Insects are the largest and most diverse group of organisms on earth, with over 1,000,000 species identified to date. Stick insects (“walkingsticks” or “phasmids”, Order Phasmatodea) are well known for and name derived from their uncanny stereotypical use of camouflage as a primary line of defense from predation. However, many species also possess a potent chemical defense spray. Recently we discovered that the defensive spray of Asceles glaber contains spiroketals (confirmed major component: (2S,6R)-(−)(E)-2-methyl-1,7-dioxaspiro[5.5]undecane and tentative minor component: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this paper we 1) illustrate the identification of spiroketals and glucose in the defense spray of A. glaber using Nuclear Magnetic Resonance (NMR), Gas Chromatography/Mass Spectrometry (GC/MS), and comparison with a synthetic reference sample, 2) provide the elucidation of the absolute configuration of the major spiroketal in that defense spray and 3) demonstrate the effect of this compound and its enantiomer on both fire ants (Solenopsis invicta) and mosquitoes (Aedes aegypti). PMID:22976590

  8. Isonitrosoacetophenone drives transcriptional reprogramming in Nicotiana tabacum cells in support of innate immunity and defense.

    PubMed

    Djami-Tchatchou, Arnaud T; Maake, Mmapula P; Piater, Lizelle A; Dubery, Ian A

    2015-01-01

    Plants respond to various stress stimuli by activating broad-spectrum defense responses both locally as well as systemically. As such, identification of expressed genes represents an important step towards understanding inducible defense responses and assists in designing appropriate intervention strategies for disease management. Genes differentially expressed in tobacco cell suspensions following elicitation with isonitrosoacetophenone (INAP) were identified using mRNA differential display and pyro-sequencing. Sequencing data produced 14579 reads, which resulted in 198 contigs and 1758 singletons. Following BLAST analyses, several inducible plant defense genes of interest were identified and classified into functional categories including signal transduction, transcription activation, transcription and protein synthesis, protein degradation and ubiquitination, stress-responsive, defense-related, metabolism and energy, regulation, transportation, cytoskeleton and cell wall-related. Quantitative PCR was used to investigate the expression of 17 selected target genes within these categories. Results indicate that INAP has a sensitising or priming effect through activation of salicylic acid-, jasmonic acid- and ethylene pathways that result in an altered transcriptome, with the expression of genes involved in perception of pathogens and associated cellular re-programming in support of defense. Furthermore, infection assays with the pathogen Pseudomonas syringae pv. tabaci confirmed the establishment of a functional anti-microbial environment in planta. PMID:25658943

  9. IBR5 Modulates Temperature-Dependent, R Protein CHS3-Mediated Defense Responses in Arabidopsis

    PubMed Central

    Bao, Fei; Ao, Kevin; Zhang, Xiaoyan; Zhang, Yuelin; Yang, Shuhua

    2015-01-01

    Plant responses to low temperature are tightly associated with defense responses. We previously characterized the chilling-sensitive mutant chs3-1 resulting from the activation of the Toll and interleukin 1 receptor-nucleotide binding-leucine-rich repeat (TIR-NB-LRR)-type resistance (R) protein harboring a C-terminal LIM (Lin-11, Isl-1 and Mec-3 domains) domain. Here we report the identification of a suppressor of chs3, ibr5-7 (indole-3-butyric acid response 5), which largely suppresses chilling-activated defense responses. IBR5 encodes a putative dual-specificity protein phosphatase. The accumulation of CHS3 protein at chilling temperatures is inhibited by the IBR5 mutation. Moreover, chs3-conferred defense phenotypes were synergistically suppressed by mutations in HSP90 and IBR5. Further analysis showed that IBR5, with holdase activity, physically associates with CHS3, HSP90 and SGT1b (Suppressor of the G2 allele of skp1) to form a complex that protects CHS3. In addition to the positive role of IBR5 in regulating CHS3, IBR5 is also involved in defense responses mediated by R genes, including SNC1 (Suppressor of npr1-1, Constitutive 1), RPS4 (Resistance to P. syringae 4) and RPM1 (Resistance to Pseudomonas syringae pv. maculicola 1). Thus, the results of the present study reveal a role for IBR5 in the regulation of multiple R protein-mediated defense responses. PMID:26451844

  10. Identification of linc-NeD125, a novel long non coding RNA that hosts miR-125b-1 and negatively controls proliferation of human neuroblastoma cells.

    PubMed

    Bevilacqua, Valeria; Gioia, Ubaldo; Di Carlo, Valerio; Tortorelli, Anna F; Colombo, Teresa; Bozzoni, Irene; Laneve, Pietro; Caffarelli, Elisa

    2015-01-01

    The human genome contains some thousands of long non coding RNAs (lncRNAs). Many of these transcripts are presently considered crucial regulators of gene expression and functionally implicated in developmental processes in Eukaryotes. Notably, despite a huge number of lncRNAs are expressed in the Central Nervous System (CNS), only a few of them have been characterized in terms of molecular structure, gene expression regulation and function. In the present study, we identify linc-NeD125 as a novel cytoplasmic, neuronal-induced long intergenic non coding RNA (lincRNA). Linc-NeD125 represents the host gene for miR-125b-1, a microRNA with an established role as negative regulator of human neuroblastoma cell proliferation. Here, we demonstrate that these two overlapping non coding RNAs are coordinately induced during in vitro neuronal differentiation, and that their expression is regulated by different mechanisms. While the production of miR-125b-1 relies on transcriptional regulation, linc-NeD125 is controlled at the post-transcriptional level, through modulation of its stability. We also demonstrate that linc-NeD125 functions independently of the hosted microRNA, by reducing cell proliferation and activating the antiapoptotic factor BCL-2. PMID:26480000

  11. Finding the key to a better code: code team restructure to improve performance and outcomes.

    PubMed

    Prince, Cynthia R; Hines, Elizabeth J; Chyou, Po-Huang; Heegeman, David J

    2014-09-01

    Code teams respond to acute life threatening changes in a patient's status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team's resuscitation could be hindered. To improve the overall performance of our hospital's code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team participants, clear identification of team members and their primary responsibilities and position relative to the patient, and initiation of team training events and surprise mock codes (simulations). Team member assessments of the restructured code team and its performance were collected through self-administered electronic questionnaires. Time-to-defibrillation, defined as the time the code was called until the start of defibrillation, was measured for each code using actual time recordings from code summary sheets. Significant improvements in team member confidence in the skills specific to their role and clarity in their role's position were identified. Smaller improvements were seen in team leadership and reduction in the amount of extra talking and noise during a code. The average time-to-defibrillation during real codes decreased each year since the code team restructure. This type of code team restructure resulted in improvements in several areas that impact the functioning of the team, as well as decreased the average time-to-defibrillation, making it beneficial to many, including the team members, medical institution, and patients. PMID:24667218

  12. On fuzzy semantic similarity measure for DNA coding.

    PubMed

    Ahmad, Muneer; Jung, Low Tang; Bhuiyan, Md Al-Amin

    2016-02-01

    A coding measure scheme numerically translates the DNA sequence to a time domain signal for protein coding regions identification. A number of coding measure schemes based on numerology, geometry, fixed mapping, statistical characteristics and chemical attributes of nucleotides have been proposed in recent decades. Such coding measure schemes lack the biologically meaningful aspects of nucleotide data and hence do not significantly discriminate coding regions from non-coding regions. This paper presents a novel fuzzy semantic similarity measure (FSSM) coding scheme centering on FSSM codons׳ clustering and genetic code context of nucleotides. Certain natural characteristics of nucleotides i.e. appearance as a unique combination of triplets, preserving special structure and occurrence, and ability to own and share density distributions in codons have been exploited in FSSM. The nucleotides׳ fuzzy behaviors, semantic similarities and defuzzification based on the center of gravity of nucleotides revealed a strong correlation between nucleotides in codons. The proposed FSSM coding scheme attains a significant enhancement in coding regions identification i.e. 36-133% as compared to other existing coding measure schemes tested over more than 250 benchmarked and randomly taken DNA datasets of different organisms. PMID:26773936

  13. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 15 2013-04-01 2013-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification...

  14. 76 FR 58137 - Defense Federal Acquisition Regulation Supplement; Positive Law Codification of Title 41 U.S.C...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-20

    ... Codification of Title 41 U.S.C. (DFARS Case 2011-D036) AGENCY: Defense Acquisition Regulations System... Codification of Title 41, United States Code, ``Public Contracts.'' DATES: Effective date: September 20, 2011.... Background On January 4, 2011, Public Law 111-350 enacted a new codified version of Title 41, United...

  15. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    ERIC Educational Resources Information Center

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  16. 77 FR 39487 - Defense Business Board (DBB); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... of the Secretary Defense Business Board (DBB); Notice of Meeting AGENCY: Department of Defense, DoD... meeting of the Defense Business Board (DBB). DATES: The public meeting of the Defense Business Board (hereafter referred to as ``the Board'') will be held on Thursday, July 19, 2012. The meeting will begin at...

  17. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-22

    ...The Department of State is proposing to amend the International Traffic in Arms Regulations (ITAR) to implement the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade Cooperation Treaty between the United States and the United Kingdom, and identify via a supplement the defense articles and defense services that may not be exported pursuant to the......

  18. 76 FR 3536 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-20

    ... Defense Logistics Agency--the Office of Counsel; (5) For the National Security Agency--the General Counsel; (6) For the Defense Information Systems Agency--the Counsel; (7) For the Defense Threat Reduction... Federal Acquisition Regulation Supplement; Technical Amendments AGENCY: Defense Acquisition...

  19. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... of the Secretary Defense Health Board (DHB) Meeting AGENCY: Department of Defense (DoD). ACTION..., and in accordance with section 10(a)(2) of Public Law, DoD announces that the Defense Health Board...- 3317. FOR FURTHER INFORMATION CONTACT: Commander Edmond F. Feeks, Executive Secretary, Defense...

  20. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... of the Secretary Defense Health Board (DHB) Meeting AGENCY: Department of Defense (DoD). ACTION..., a subcommittee of the Defense Health Board (DHB), will receive briefings from various speakers... registration are available online at the Defense Health Board Web site, http://www.ha.osd.mil/dhb ....