Sample records for defense identification code

  1. Error-Detecting Identification Codes for Algebra Students.

    ERIC Educational Resources Information Center

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  2. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed by...

  3. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy...-1000 Air Force: SAF/AQCI, 1060 Air Force Pentagon, Washington, DC 20330-1060 Defense Logistics Agency: Defense Logistics Agency, Acquisition Policy Branch (J-3311), John J. Kingman Road, Fort Belvoir, VA 22060...

  4. Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2: Initial Operational Test and Evaluation Report

    DTIC Science & Technology

    2015-05-01

    Director, Operational Test and Evaluation Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial...Operational Test and Evaluation Report May 2015 This report on the Department of Defense (DOD) Automated Biometric Identification System...COVERED - 4. TITLE AND SUBTITLE Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial Operational Test

  5. Combat Identification Systems COMO Integrated Air Defense Model Evaluation (CISE) Study

    DTIC Science & Technology

    1989-02-01

    use K or IR , whichever one applies) E-6 CAA-SR-89- 3 Subroutine PDECLR 1/21/88 Before label 1000 Insert: IF (IR.GT.10) IR a 10 These changes were made...Internal Distribution: Unclassified Library 2 F-2 CAA-SR-89- 3 GLOSSARY 1. ABBREVIATIONS, ACRONYMS, AND SHORT TERMS ADM2 Air Defense Models Modification...STUDY REPORT ’ , CAA-Sn-89- 3 i , .- CD o COMBAT IDENTIFICATION SYSTEMS N COMO INTEGRATED AIR DEFENSE MODEL EVALUATION (CISE) STUDY FEBRUARY 1989

  6. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  7. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  8. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  9. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  10. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  11. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  12. Unique identification code for medical fundus images using blood vessel pattern for tele-ophthalmology applications.

    PubMed

    Singh, Anushikha; Dutta, Malay Kishore; Sharma, Dilip Kumar

    2016-10-01

    Identification of fundus images during transmission and storage in database for tele-ophthalmology applications is an important issue in modern era. The proposed work presents a novel accurate method for generation of unique identification code for identification of fundus images for tele-ophthalmology applications and storage in databases. Unlike existing methods of steganography and watermarking, this method does not tamper the medical image as nothing is embedded in this approach and there is no loss of medical information. Strategic combination of unique blood vessel pattern and patient ID is considered for generation of unique identification code for the digital fundus images. Segmented blood vessel pattern near the optic disc is strategically combined with patient ID for generation of a unique identification code for the image. The proposed method of medical image identification is tested on the publically available DRIVE and MESSIDOR database of fundus image and results are encouraging. Experimental results indicate the uniqueness of identification code and lossless recovery of patient identity from unique identification code for integrity verification of fundus images. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. The effect of a redundant color code on an overlearned identification task

    NASA Technical Reports Server (NTRS)

    Obrien, Kevin

    1992-01-01

    The possibility of finding redundancy gains with overlearned tasks was examined using a paradigm varying familiarity with the stimulus set. Redundant coding in a multidimensional stimulus was demonstrated to result in increased identification accuracy and decreased latency of identification when compared to stimuli varying on only one dimension. The advantages attributable to redundant coding are referred to as redundancy gain and were found for a variety of stimulus dimension combinations, including the use of hue or color as one of the dimensions. Factors that have affected redundancy gain include the discriminability of the levels of one stimulus dimension and the level of stimulus-to-response association. The results demonstrated that response time is in part a function of familiarity, but no effect of redundant color coding was demonstrated. Implications of research on coding in identification tasks for display design are discussed.

  14. Identification of a Maize Locus that Modulates the Hypersensitive Defense Response, Using Mutant-Assisted Gene Identification and Characterization (MAGIC)

    USDA-ARS?s Scientific Manuscript database

    The hypersensitive response (HR) is the most visible and arguably the most important defense response in plants, although the details of how it is controlled and executed remain patchy. In this paper a novel genetic technique called MAGIC (Mutant-Assisted Gene Identification and Characterization) i...

  15. Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures

    DTIC Science & Technology

    2015-09-01

    soundness or completeness. An incomplete analysis will produce extra edges in the CFG that might allow an attacker to slip through. An unsound analysis...Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures by Isaac Noah Evans Submitted to the Department of Electrical...Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer

  16. Identification of coding and non-coding mutational hotspots in cancer genomes.

    PubMed

    Piraino, Scott W; Furney, Simon J

    2017-01-05

    The identification of mutations that play a causal role in tumour development, so called "driver" mutations, is of critical importance for understanding how cancers form and how they might be treated. Several large cancer sequencing projects have identified genes that are recurrently mutated in cancer patients, suggesting a role in tumourigenesis. While the landscape of coding drivers has been extensively studied and many of the most prominent driver genes are well characterised, comparatively less is known about the role of mutations in the non-coding regions of the genome in cancer development. The continuing fall in genome sequencing costs has resulted in a concomitant increase in the number of cancer whole genome sequences being produced, facilitating systematic interrogation of both the coding and non-coding regions of cancer genomes. To examine the mutational landscapes of tumour genomes we have developed a novel method to identify mutational hotspots in tumour genomes using both mutational data and information on evolutionary conservation. We have applied our methodology to over 1300 whole cancer genomes and show that it identifies prominent coding and non-coding regions that are known or highly suspected to play a role in cancer. Importantly, we applied our method to the entire genome, rather than relying on predefined annotations (e.g. promoter regions) and we highlight recurrently mutated regions that may have resulted from increased exposure to mutational processes rather than selection, some of which have been identified previously as targets of selection. Finally, we implicate several pan-cancer and cancer-specific candidate non-coding regions, which could be involved in tumourigenesis. We have developed a framework to identify mutational hotspots in cancer genomes, which is applicable to the entire genome. This framework identifies known and novel coding and non-coding mutional hotspots and can be used to differentiate candidate driver regions from

  17. 76 FR 52138 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ...; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design control activity. (i) With... aviation critical safety item is to be used; and (ii) With respect to a ship critical safety item, means...-AG92 Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

  18. 76 FR 14641 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS Case 2010-D022... contract clause that clearly identifies any items being purchased that are critical safety items so that.... SUPPLEMENTARY INFORMATION: I. Background This DFARS case was initiated at the request of the Defense Contract...

  19. Prophage-mediated defense against viral attack and viral counter-defense

    PubMed Central

    Dedrick, Rebekah M.; Jacobs-Sera, Deborah; Guerrero Bustamante, Carlos A.; Garlena, Rebecca A.; Mavrich, Travis N.; Pope, Welkin H.; Reyes, Juan C Cervantes; Russell, Daniel A.; Adair, Tamarah; Alvey, Richard; Bonilla, J. Alfred; Bricker, Jerald S.; Brown, Bryony R.; Byrnes, Deanna; Cresawn, Steven G.; Davis, William B.; Dickson, Leon A.; Edgington, Nicholas P.; Findley, Ann M.; Golebiewska, Urszula; Grose, Julianne H.; Hayes, Cory F.; Hughes, Lee E.; Hutchison, Keith W.; Isern, Sharon; Johnson, Allison A.; Kenna, Margaret A.; Klyczek, Karen K.; Mageeney, Catherine M.; Michael, Scott F.; Molloy, Sally D.; Montgomery, Matthew T.; Neitzel, James; Page, Shallee T.; Pizzorno, Marie C.; Poxleitner, Marianne K.; Rinehart, Claire A.; Robinson, Courtney J.; Rubin, Michael R.; Teyim, Joseph N.; Vazquez, Edwin; Ware, Vassie C.; Washington, Jacqueline; Hatfull, Graham F.

    2017-01-01

    Temperate phages are common and prophages are abundant residents of sequenced bacterial genomes. Mycobacteriophages are viruses infecting mycobacterial hosts including Mycobacterium tuberculosis and Mycobacterium smegmatis, encompass substantial genetic diversity, and are commonly temperate. Characterization of ten Cluster N temperate mycobacteriophages reveals at least five distinct prophage-expressed viral defense systems that interfere with infection of lytic and temperate phages that are either closely-related (homotypic defense) or unrelated (heterotypic defense). Target specificity is unpredictable, ranging from a single target phage to one-third of those tested. The defense systems include a single-subunit restriction system, a heterotypic exclusion system, and a predicted (p)ppGpp synthetase, which blocks lytic phage growth, promotes bacterial survival, and enables efficient lysogeny. The predicted (p)ppGpp synthetase coded by the Phrann prophage defends against phage Tweety infection, but Tweety codes for a tetrapeptide repeat protein, gp54, that acts as a highly effective counter-defense system. Prophage-mediated viral defense offers an efficient mechanism for bacterial success in host-virus dynamics, and counter-defense promotes phage co-evolution. PMID:28067906

  20. Long non-coding RNAs as molecular players in plant defense against pathogens.

    PubMed

    Zaynab, Madiha; Fatima, Mahpara; Abbas, Safdar; Umair, Muhammad; Sharif, Yasir; Raza, Muhammad Ammar

    2018-05-31

    Long non-coding RNAs (lncRNAs) has significant role in of gene expression and silencing pathways for several biological processes in eukaryotes. lncRNAs has been reported as key player in remodeling chromatin and genome architecture, RNA stabilization and transcription regulation, including enhancer-associated activity. Host lncRNAs are reckoned as compulsory elements of plant defense. In response to pathogen attack, plants protect themselves with the help of lncRNAs -dependent immune systems in which lncRNAs regulate pathogen-associated molecular patterns (PAMPs) and other effectors. Role of lncRNAs in plant microbe interaction has been studied extensively but regulations of several lncRNAs still need extensive research. In this study we discussed and provide as overview the topical advancements and findings relevant to pathogen attack and plant defense mediated by lncRNAs. It is hoped that lncRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. Copyright © 2018. Published by Elsevier Ltd.

  1. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...

  2. Competitive code-based fast palmprint identification using a set of cover trees

    NASA Astrophysics Data System (ADS)

    Yue, Feng; Zuo, Wangmeng; Zhang, David; Wang, Kuanquan

    2009-06-01

    A palmprint identification system recognizes a query palmprint image by searching for its nearest neighbor from among all the templates in a database. When applied on a large-scale identification system, it is often necessary to speed up the nearest-neighbor searching process. We use competitive code, which has very fast feature extraction and matching speed, for palmprint identification. To speed up the identification process, we extend the cover tree method and propose to use a set of cover trees to facilitate the fast and accurate nearest-neighbor searching. We can use the cover tree method because, as we show, the angular distance used in competitive code can be decomposed into a set of metrics. Using the Hong Kong PolyU palmprint database (version 2) and a large-scale palmprint database, our experimental results show that the proposed method searches for nearest neighbors faster than brute force searching.

  3. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  4. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for...

  5. Mapping Department of Defense laboratory results to Logical Observation Identifiers Names and Codes (LOINC).

    PubMed

    Lau, Lee Min; Banning, Pam D; Monson, Kent; Knight, Elva; Wilson, Pat S; Shakib, Shaun C

    2005-01-01

    The Department of Defense (DoD) has used a common application, Composite Health Care System (CHCS), throughout all DoD facilities. However, the master files used to encode patient data in CHCS are not identical across DoD facilities. The encoded data is thus not interoperable from one DoD facility to another. To enable data interoperability in the next-generation system, CHCS II, and for the DoD to exchange laboratory results with external organizations such as the Veterans Administration (VA), the disparate master file codes for laboratory results are mapped to Logical Observation Identifier Names and Codes (LOINC) wherever possible. This paper presents some findings from our experience mapping DoD laboratory results to LOINC.

  6. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  7. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  8. Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters

    NASA Astrophysics Data System (ADS)

    Watanabe, Osamu; Fukuhara, Takahiro; Kiya, Hitoshi

    A method of identifying JPEG 2000 images with different coding parameters, such as code-block sizes, quantization-step sizes, and resolution levels, is presented. It does not produce false-negative matches regardless of different coding parameters (compression rate, code-block size, and discrete wavelet transform (DWT) resolutions levels) or quantization step sizes. This feature is not provided by conventional methods. Moreover, the proposed approach is fast because it uses the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information without embedded block coding with optimized truncation (EBCOT) decoding. The experimental results revealed the effectiveness of image identification based on the new method.

  9. Competitive region orientation code for palmprint verification and identification

    NASA Astrophysics Data System (ADS)

    Tang, Wenliang

    2015-11-01

    Orientation features of the palmprint have been widely investigated in coding-based palmprint-recognition methods. Conventional orientation-based coding methods usually used discrete filters to extract the orientation feature of palmprint. However, in real operations, the orientations of the filter usually are not consistent with the lines of the palmprint. We thus propose a competitive region orientation-based coding method. Furthermore, an effective weighted balance scheme is proposed to improve the accuracy of the extracted region orientation. Compared with conventional methods, the region orientation of the palmprint extracted using the proposed method can precisely and robustly describe the orientation feature of the palmprint. Extensive experiments on the baseline PolyU and multispectral palmprint databases are performed and the results show that the proposed method achieves a promising performance in comparison to conventional state-of-the-art orientation-based coding methods in both palmprint verification and identification.

  10. 32 CFR 635.19 - Offense codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Offense codes. 635.19 Section 635.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.19 Offense codes. (a) The offense code describes, as nearly as possible, the...

  11. Triboelectric-Based Transparent Secret Code.

    PubMed

    Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju

    2018-04-01

    Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.

  12. CRITICA: coding region identification tool invoking comparative analysis

    NASA Technical Reports Server (NTRS)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  13. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Identification of principal geographic code numbers. 228.03 Section 228.03 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT RULES ON SOURCE, ORIGIN AND NATIONALITY FOR COMMODITIES AND SERVICES FINANCED BY USAID Definitions and Scope of This Part...

  14. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  15. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  16. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    PubMed

    Zhang, Ai-bing; Feng, Jie; Ward, Robert D; Wan, Ping; Gao, Qiang; Wu, Jun; Zhao, Wei-zhong

    2012-01-01

    Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI) region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS) genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF) to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish) and two representing non-coding ITS barcodes (rust fungi and brown algae). Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ) and Maximum likelihood (ML) methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI) of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40%) for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37%) for 1094 brown algae queries, both using ITS barcodes.

  17. Violations of temporary flight restrictions and air defense identification zones : an analysis of airspace violations and pilot report data

    DOT National Transportation Integrated Search

    2005-09-30

    This document provides the results from a study into the apparent factors and causes of violations of restricted airspace, particularly temporary flight restrictions (TFRs) and air defense identification zones (ADIZs). By illuminating the reasons for...

  18. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    DTIC Science & Technology

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  19. PIPI: PTM-Invariant Peptide Identification Using Coding Method.

    PubMed

    Yu, Fengchao; Li, Ning; Yu, Weichuan

    2016-12-02

    In computational proteomics, the identification of peptides with an unlimited number of post-translational modification (PTM) types is a challenging task. The computational cost associated with database search increases exponentially with respect to the number of modified amino acids and linearly with respect to the number of potential PTM types at each amino acid. The problem becomes intractable very quickly if we want to enumerate all possible PTM patterns. To address this issue, one group of methods named restricted tools (including Mascot, Comet, and MS-GF+) only allow a small number of PTM types in database search process. Alternatively, the other group of methods named unrestricted tools (including MS-Alignment, ProteinProspector, and MODa) avoids enumerating PTM patterns with an alignment-based approach to localizing and characterizing modified amino acids. However, because of the large search space and PTM localization issue, the sensitivity of these unrestricted tools is low. This paper proposes a novel method named PIPI to achieve PTM-invariant peptide identification. PIPI belongs to the category of unrestricted tools. It first codes peptide sequences into Boolean vectors and codes experimental spectra into real-valued vectors. For each coded spectrum, it then searches the coded sequence database to find the top scored peptide sequences as candidates. After that, PIPI uses dynamic programming to localize and characterize modified amino acids in each candidate. We used simulation experiments and real data experiments to evaluate the performance in comparison with restricted tools (i.e., Mascot, Comet, and MS-GF+) and unrestricted tools (i.e., Mascot with error tolerant search, MS-Alignment, ProteinProspector, and MODa). Comparison with restricted tools shows that PIPI has a close sensitivity and running speed. Comparison with unrestricted tools shows that PIPI has the highest sensitivity except for Mascot with error tolerant search and Protein

  20. Identification Code of Interstellar Cloud within IRAF

    NASA Astrophysics Data System (ADS)

    Lee, Youngung; Jung, Jae Hoon; Kim, Hyun-Goo

    1997-12-01

    We present a code which identifies individual clouds in crowded region using IMFORT interface within Image Reduction and Analysis Facility(IRAF). We define a cloud as an object composed of all pixels in longitude, latitude, and velocity that are simply connected and that lie above some threshold temperature. The code searches the whole pixels of the data cube in efficient way to isolate individual clouds. Along with identification of clouds it is designed to estimate their mean values of longitudes, latitudes, and velocities. In addition, a function of generating individual images(or cube data) of identified clouds is added up. We also present identified individual clouds using a 12CO survey data cube of Galactic Anticenter Region(Lee et al. 1997) as a test example. We used a threshold temperature of 5 sigma rms noise level of the data. With a higher threshold temperature, we isolated subclouds of a huge cloud identified originally. As the most important parameter to identify clouds is the threshold value, its effect to the size and velocity dispersion is discussed rigorously.

  1. Defense Primer: DOD Contractors

    DTIC Science & Technology

    2017-02-10

    contractors . A defense contractor , as defined by the Code of Federal Regulations, is “any individual, firm, corporation, partnership, association...158.3, “Definitions”). Within the defense policy community, the term contractor is commonly used in two different contexts. The word can describe

  2. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  3. Environmental durability diagnostic for printed identification codes of polymer insulation for distribution pipelines

    NASA Astrophysics Data System (ADS)

    Zhuravleva, G. N.; Nagornova, I. V.; Kondratov, A. P.; Bablyuk, E. B.; Varepo, L. G.

    2017-08-01

    A research and modelling of weatherability and environmental durability of multilayer polymer insulation of both cable and pipelines with printed barcodes or color identification information were performed. It was proved that interlayer printing of identification codes in distribution pipelines insulation coatings provides high marking stability to light and atmospheric condensation. This allows to carry out their distant damage control. However, microbiological fouling of upper polymer layer hampers the distant damage pipelines identification. The color difference values and density changes of PE and PVC printed insolation due to weather and biological factors were defined.

  4. 32 CFR 636.11 - Installation traffic codes

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes 636.11 Section 636.11 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes In...

  5. The Identification and Modification of Defense Mechanisms in Counseling.

    ERIC Educational Resources Information Center

    Clark, Arthur J.

    1991-01-01

    Suggests considerations and strategies for identifying and modifying a client's defense mechanisms in counseling. Provides definitions of individual defenses and indicators for identifying the mechanisms. Literature review focuses on counseling implications of defenses. Process of defense mechanism modification is illustrated through case example.…

  6. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  7. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  8. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  9. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  10. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  11. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile and...

  12. Genome defense against exogenous nucleic acids in eukaryotes by non-coding DNA occurs through CRISPR-like mechanisms in the cytosol and the bodyguard protection in the nucleus.

    PubMed

    Qiu, Guo-Hua

    2016-01-01

    In this review, the protective function of the abundant non-coding DNA in the eukaryotic genome is discussed from the perspective of genome defense against exogenous nucleic acids. Peripheral non-coding DNA has been proposed to act as a bodyguard that protects the genome and the central protein-coding sequences from ionizing radiation-induced DNA damage. In the proposed mechanism of protection, the radicals generated by water radiolysis in the cytosol and IR energy are absorbed, blocked and/or reduced by peripheral heterochromatin; then, the DNA damage sites in the heterochromatin are removed and expelled from the nucleus to the cytoplasm through nuclear pore complexes, most likely through the formation of extrachromosomal circular DNA. To strengthen this hypothesis, this review summarizes the experimental evidence supporting the protective function of non-coding DNA against exogenous nucleic acids. Based on these data, I hypothesize herein about the presence of an additional line of defense formed by small RNAs in the cytosol in addition to their bodyguard protection mechanism in the nucleus. Therefore, exogenous nucleic acids may be initially inactivated in the cytosol by small RNAs generated from non-coding DNA via mechanisms similar to the prokaryotic CRISPR-Cas system. Exogenous nucleic acids may enter the nucleus, where some are absorbed and/or blocked by heterochromatin and others integrate into chromosomes. The integrated fragments and the sites of DNA damage are removed by repetitive non-coding DNA elements in the heterochromatin and excluded from the nucleus. Therefore, the normal eukaryotic genome and the central protein-coding sequences are triply protected by non-coding DNA against invasion by exogenous nucleic acids. This review provides evidence supporting the protective role of non-coding DNA in genome defense. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Effective Identification of Similar Patients Through Sequential Matching over ICD Code Embedding.

    PubMed

    Nguyen, Dang; Luo, Wei; Venkatesh, Svetha; Phung, Dinh

    2018-04-11

    Evidence-based medicine often involves the identification of patients with similar conditions, which are often captured in ICD (International Classification of Diseases (World Health Organization 2013)) code sequences. With no satisfying prior solutions for matching ICD-10 code sequences, this paper presents a method which effectively captures the clinical similarity among routine patients who have multiple comorbidities and complex care needs. Our method leverages the recent progress in representation learning of individual ICD-10 codes, and it explicitly uses the sequential order of codes for matching. Empirical evaluation on a state-wide cancer data collection shows that our proposed method achieves significantly higher matching performance compared with state-of-the-art methods ignoring the sequential order. Our method better identifies similar patients in a number of clinical outcomes including readmission and mortality outlook. Although this paper focuses on ICD-10 diagnosis code sequences, our method can be adapted to work with other codified sequence data.

  14. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Blackwell, C.D.

    1988-01-01

    Codes for the unique identification of public and private organizations listed in computerized data systems are presented. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new books. (Author 's abstract)

  15. Validation of ICD-9-CM coding algorithm for improved identification of hypoglycemia visits.

    PubMed

    Ginde, Adit A; Blanc, Phillip G; Lieberman, Rebecca M; Camargo, Carlos A

    2008-04-01

    Accurate identification of hypoglycemia cases by International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) codes will help to describe epidemiology, monitor trends, and propose interventions for this important complication in patients with diabetes. Prior hypoglycemia studies utilized incomplete search strategies and may be methodologically flawed. We sought to validate a new ICD-9-CM coding algorithm for accurate identification of hypoglycemia visits. This was a multicenter, retrospective cohort study using a structured medical record review at three academic emergency departments from July 1, 2005 to June 30, 2006. We prospectively derived a coding algorithm to identify hypoglycemia visits using ICD-9-CM codes (250.3, 250.8, 251.0, 251.1, 251.2, 270.3, 775.0, 775.6, and 962.3). We confirmed hypoglycemia cases by chart review identified by candidate ICD-9-CM codes during the study period. The case definition for hypoglycemia was documented blood glucose 3.9 mmol/l or emergency physician charted diagnosis of hypoglycemia. We evaluated individual components and calculated the positive predictive value. We reviewed 636 charts identified by the candidate ICD-9-CM codes and confirmed 436 (64%) cases of hypoglycemia by chart review. Diabetes with other specified manifestations (250.8), often excluded in prior hypoglycemia analyses, identified 83% of hypoglycemia visits, and unspecified hypoglycemia (251.2) identified 13% of hypoglycemia visits. The absence of any predetermined co-diagnosis codes improved the positive predictive value of code 250.8 from 62% to 92%, while excluding only 10 (2%) true hypoglycemia visits. Although prior analyses included only the first-listed ICD-9 code, more than one-quarter of identified hypoglycemia visits were outside this primary diagnosis field. Overall, the proposed algorithm had 89% positive predictive value (95% confidence interval, 86-92) for detecting hypoglycemia visits. The proposed algorithm

  16. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    PubMed

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here.

  17. Defense mechanisms and psychological adjustment in childhood.

    PubMed

    Sandstrom, Marlene J; Cramer, Phebe

    2003-08-01

    The association between maturity of defense use and psychological functioning was assessed in a group of 95 elementary school children. Defense mechanisms were measured using a valid and reliable storytelling task, and psychological adjustment was assessed through a combination of parent and self-report questionnaires. Correlational analyses indicated that children who relied on the developmentally immature defense of denial reported higher levels of self-rated social anxiety and depression and received higher ratings of parent-reported internalizing and externalizing behavior problems. However, children who made use of the developmentally mature defense of identification exhibited higher scores on perceived competence in social, academic, conduct, athletic, and global domains. Significantly, there was no relationship between children's use of denial and their level of perceived competence or between children's use of identification and their degree of maladjustment.

  18. Identification of Biomarkers for Defense Response to Plasmopara viticola in a Resistant Grape Variety.

    PubMed

    Chitarrini, Giulia; Soini, Evelyn; Riccadonna, Samantha; Franceschi, Pietro; Zulini, Luca; Masuero, Domenico; Vecchione, Antonella; Stefanini, Marco; Di Gaspero, Gabriele; Mattivi, Fulvio; Vrhovsek, Urska

    2017-01-01

    Downy mildew ( Plasmopara viticola ) is one of the most destructive diseases of the cultivated species Vitis vinifera . The use of resistant varieties, originally derived from backcrosses of North American Vitis spp., is a promising solution to reduce disease damage in the vineyards. To shed light on the type and the timing of pathogen-triggered resistance, this work aimed at discovering biomarkers for the defense response in the resistant variety Bianca, using leaf discs after inoculation with a suspension of P. viticola . We investigated primary and secondary metabolism at 12, 24, 48, and 96 h post-inoculation (hpi). We used methods of identification and quantification for lipids (LC-MS/MS), phenols (LC-MS/MS), primary compounds (GC-MS), and semi-quantification for volatile compounds (GC-MS). We were able to identify and quantify or semi-quantify 176 metabolites, among which 53 were modulated in response to pathogen infection. The earliest changes occurred in primary metabolism at 24-48 hpi and involved lipid compounds, specifically unsaturated fatty acid and ceramide; amino acids, in particular proline; and some acids and sugars. At 48 hpi, we also found changes in volatile compounds and accumulation of benzaldehyde, a promoter of salicylic acid-mediated defense. Secondary metabolism was strongly induced only at later stages. The classes of compounds that increased at 96 hpi included phenylpropanoids, flavonols, stilbenes, and stilbenoids. Among stilbenoids we found an accumulation of ampelopsin H + vaticanol C, pallidol, ampelopsin D + quadrangularin A, Z -miyabenol C, and α-viniferin in inoculated samples. Some of these compounds are known as phytoalexins, while others are novel biomarkers for the defense response in Bianca. This work highlighted some important aspects of the host response to P. viticola in a commercial variety under controlled conditions, providing biomarkers for a better understanding of the mechanism of plant defense and a potential

  19. Computer-assisted bar-coding system significantly reduces clinical laboratory specimen identification errors in a pediatric oncology hospital.

    PubMed

    Hayden, Randall T; Patterson, Donna J; Jay, Dennis W; Cross, Carl; Dotson, Pamela; Possel, Robert E; Srivastava, Deo Kumar; Mirro, Joseph; Shenep, Jerry L

    2008-02-01

    To assess the ability of a bar code-based electronic positive patient and specimen identification (EPPID) system to reduce identification errors in a pediatric hospital's clinical laboratory. An EPPID system was implemented at a pediatric oncology hospital to reduce errors in patient and laboratory specimen identification. The EPPID system included bar-code identifiers and handheld personal digital assistants supporting real-time order verification. System efficacy was measured in 3 consecutive 12-month time frames, corresponding to periods before, during, and immediately after full EPPID implementation. A significant reduction in the median percentage of mislabeled specimens was observed in the 3-year study period. A decline from 0.03% to 0.005% (P < .001) was observed in the 12 months after full system implementation. On the basis of the pre-intervention detected error rate, it was estimated that EPPID prevented at least 62 mislabeling events during its first year of operation. EPPID decreased the rate of misidentification of clinical laboratory samples. The diminution of errors observed in this study provides support for the development of national guidelines for the use of bar coding for laboratory specimens, paralleling recent recommendations for medication administration.

  20. Malnutrition: The Importance of Identification, Documentation, and Coding in the Acute Care Setting

    PubMed Central

    Kyle, Greg; Itsiopoulos, Catherine; Naunton, Mark; Luff, Narelle

    2016-01-01

    Malnutrition is a significant issue in the hospital setting. This cross-sectional, observational study determined the prevalence of malnutrition amongst 189 adult inpatients in a teaching hospital using the Patient-Generated Subjective Global Assessment tool and compared data to control groups for coding of malnutrition to determine the estimated unclaimed financial reimbursement associated with this comorbidity. Fifty-three percent of inpatients were classified as malnourished. Significant associations were found between malnutrition and increasing age, decreasing body mass index, and increased length of stay. Ninety-eight percent of malnourished patients were coded as malnourished in medical records. The results of the medical history audit of patients in control groups showed that between 0.9 and 5.4% of patients were coded as malnourished which is remarkably lower than the 52% of patients who were coded as malnourished from the point prevalence study data. This is most likely to be primarily due to lack of identification. The estimated unclaimed annual financial reimbursement due to undiagnosed or undocumented malnutrition based on the point prevalence study was AU$8,536,200. The study found that half the patients were malnourished, with older adults being particularly vulnerable. It is imperative that malnutrition is diagnosed and accurately documented and coded, so appropriate coding, funding reimbursement, and treatment can occur. PMID:27774317

  1. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response

    PubMed Central

    2014-01-01

    Background Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA“s” and PthC“s” of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Results Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA“s” and PthC“s” in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. Conclusions The identification of PthA“s” and PthC“s” targets, such as the LOB (LATERAL ORGAN BOUNDARY) and CCNBS genes that we report here, is key for the understanding

  2. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response.

    PubMed

    Pereira, Andre L A; Carazzolle, Marcelo F; Abe, Valeria Y; de Oliveira, Maria L P; Domingues, Mariane N; Silva, Jaqueline C; Cernadas, Raul A; Benedetti, Celso E

    2014-02-25

    Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA"s" and PthC"s" of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA"s" and PthC"s" in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. The identification of PthA"s" and PthC"s" targets, such as the LOB (lateral organ boundary) and CCNBS genes that we report here, is key for the understanding of the canker symptoms development during host

  3. 78 FR 64483 - Meeting of the Department of Defense Military Family Readiness Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Military Family Readiness Council AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Department of Defense is... Register Liaison Officer, Department of Defense. [FR Doc. 2013-25512 Filed 10-28-13; 8:45 am] BILLING CODE...

  4. Refining the accuracy of validated target identification through coding variant fine-mapping in type 2 diabetes.

    PubMed

    Mahajan, Anubha; Wessel, Jennifer; Willems, Sara M; Zhao, Wei; Robertson, Neil R; Chu, Audrey Y; Gan, Wei; Kitajima, Hidetoshi; Taliun, Daniel; Rayner, N William; Guo, Xiuqing; Lu, Yingchang; Li, Man; Jensen, Richard A; Hu, Yao; Huo, Shaofeng; Lohman, Kurt K; Zhang, Weihua; Cook, James P; Prins, Bram Peter; Flannick, Jason; Grarup, Niels; Trubetskoy, Vassily Vladimirovich; Kravic, Jasmina; Kim, Young Jin; Rybin, Denis V; Yaghootkar, Hanieh; Müller-Nurasyid, Martina; Meidtner, Karina; Li-Gao, Ruifang; Varga, Tibor V; Marten, Jonathan; Li, Jin; Smith, Albert Vernon; An, Ping; Ligthart, Symen; Gustafsson, Stefan; Malerba, Giovanni; Demirkan, Ayse; Tajes, Juan Fernandez; Steinthorsdottir, Valgerdur; Wuttke, Matthias; Lecoeur, Cécile; Preuss, Michael; Bielak, Lawrence F; Graff, Marielisa; Highland, Heather M; Justice, Anne E; Liu, Dajiang J; Marouli, Eirini; Peloso, Gina Marie; Warren, Helen R; Afaq, Saima; Afzal, Shoaib; Ahlqvist, Emma; Almgren, Peter; Amin, Najaf; Bang, Lia B; Bertoni, Alain G; Bombieri, Cristina; Bork-Jensen, Jette; Brandslund, Ivan; Brody, Jennifer A; Burtt, Noël P; Canouil, Mickaël; Chen, Yii-Der Ida; Cho, Yoon Shin; Christensen, Cramer; Eastwood, Sophie V; Eckardt, Kai-Uwe; Fischer, Krista; Gambaro, Giovanni; Giedraitis, Vilmantas; Grove, Megan L; de Haan, Hugoline G; Hackinger, Sophie; Hai, Yang; Han, Sohee; Tybjærg-Hansen, Anne; Hivert, Marie-France; Isomaa, Bo; Jäger, Susanne; Jørgensen, Marit E; Jørgensen, Torben; Käräjämäki, Annemari; Kim, Bong-Jo; Kim, Sung Soo; Koistinen, Heikki A; Kovacs, Peter; Kriebel, Jennifer; Kronenberg, Florian; Läll, Kristi; Lange, Leslie A; Lee, Jung-Jin; Lehne, Benjamin; Li, Huaixing; Lin, Keng-Hung; Linneberg, Allan; Liu, Ching-Ti; Liu, Jun; Loh, Marie; Mägi, Reedik; Mamakou, Vasiliki; McKean-Cowdin, Roberta; Nadkarni, Girish; Neville, Matt; Nielsen, Sune F; Ntalla, Ioanna; Peyser, Patricia A; Rathmann, Wolfgang; Rice, Kenneth; Rich, Stephen S; Rode, Line; Rolandsson, Olov; Schönherr, Sebastian; Selvin, Elizabeth; Small, Kerrin S; Stančáková, Alena; Surendran, Praveen; Taylor, Kent D; Teslovich, Tanya M; Thorand, Barbara; Thorleifsson, Gudmar; Tin, Adrienne; Tönjes, Anke; Varbo, Anette; Witte, Daniel R; Wood, Andrew R; Yajnik, Pranav; Yao, Jie; Yengo, Loïc; Young, Robin; Amouyel, Philippe; Boeing, Heiner; Boerwinkle, Eric; Bottinger, Erwin P; Chowdhury, Rajiv; Collins, Francis S; Dedoussis, George; Dehghan, Abbas; Deloukas, Panos; Ferrario, Marco M; Ferrières, Jean; Florez, Jose C; Frossard, Philippe; Gudnason, Vilmundur; Harris, Tamara B; Heckbert, Susan R; Howson, Joanna M M; Ingelsson, Martin; Kathiresan, Sekar; Kee, Frank; Kuusisto, Johanna; Langenberg, Claudia; Launer, Lenore J; Lindgren, Cecilia M; Männistö, Satu; Meitinger, Thomas; Melander, Olle; Mohlke, Karen L; Moitry, Marie; Morris, Andrew D; Murray, Alison D; de Mutsert, Renée; Orho-Melander, Marju; Owen, Katharine R; Perola, Markus; Peters, Annette; Province, Michael A; Rasheed, Asif; Ridker, Paul M; Rivadineira, Fernando; Rosendaal, Frits R; Rosengren, Anders H; Salomaa, Veikko; Sheu, Wayne H-H; Sladek, Rob; Smith, Blair H; Strauch, Konstantin; Uitterlinden, André G; Varma, Rohit; Willer, Cristen J; Blüher, Matthias; Butterworth, Adam S; Chambers, John Campbell; Chasman, Daniel I; Danesh, John; van Duijn, Cornelia; Dupuis, Josée; Franco, Oscar H; Franks, Paul W; Froguel, Philippe; Grallert, Harald; Groop, Leif; Han, Bok-Ghee; Hansen, Torben; Hattersley, Andrew T; Hayward, Caroline; Ingelsson, Erik; Kardia, Sharon L R; Karpe, Fredrik; Kooner, Jaspal Singh; Köttgen, Anna; Kuulasmaa, Kari; Laakso, Markku; Lin, Xu; Lind, Lars; Liu, Yongmei; Loos, Ruth J F; Marchini, Jonathan; Metspalu, Andres; Mook-Kanamori, Dennis; Nordestgaard, Børge G; Palmer, Colin N A; Pankow, James S; Pedersen, Oluf; Psaty, Bruce M; Rauramaa, Rainer; Sattar, Naveed; Schulze, Matthias B; Soranzo, Nicole; Spector, Timothy D; Stefansson, Kari; Stumvoll, Michael; Thorsteinsdottir, Unnur; Tuomi, Tiinamaija; Tuomilehto, Jaakko; Wareham, Nicholas J; Wilson, James G; Zeggini, Eleftheria; Scott, Robert A; Barroso, Inês; Frayling, Timothy M; Goodarzi, Mark O; Meigs, James B; Boehnke, Michael; Saleheen, Danish; Morris, Andrew P; Rotter, Jerome I; McCarthy, Mark I

    2018-04-01

    We aggregated coding variant data for 81,412 type 2 diabetes cases and 370,832 controls of diverse ancestry, identifying 40 coding variant association signals (P < 2.2 × 10 -7 ); of these, 16 map outside known risk-associated loci. We make two important observations. First, only five of these signals are driven by low-frequency variants: even for these, effect sizes are modest (odds ratio ≤1.29). Second, when we used large-scale genome-wide association data to fine-map the associated variants in their regional context, accounting for the global enrichment of complex trait associations in coding sequence, compelling evidence for coding variant causality was obtained for only 16 signals. At 13 others, the associated coding variants clearly represent 'false leads' with potential to generate erroneous mechanistic inference. Coding variant associations offer a direct route to biological insight for complex diseases and identification of validated therapeutic targets; however, appropriate mechanistic inference requires careful specification of their causal contribution to disease predisposition.

  5. Computerized Dental Comparison: A Critical Review of Dental Coding and Ranking Algorithms Used in Victim Identification.

    PubMed

    Adams, Bradley J; Aschheim, Kenneth W

    2016-01-01

    Comparison of antemortem and postmortem dental records is a leading method of victim identification, especially for incidents involving a large number of decedents. This process may be expedited with computer software that provides a ranked list of best possible matches. This study provides a comparison of the most commonly used conventional coding and sorting algorithms used in the United States (WinID3) with a simplified coding format that utilizes an optimized sorting algorithm. The simplified system consists of seven basic codes and utilizes an optimized algorithm based largely on the percentage of matches. To perform this research, a large reference database of approximately 50,000 antemortem and postmortem records was created. For most disaster scenarios, the proposed simplified codes, paired with the optimized algorithm, performed better than WinID3 which uses more complex codes. The detailed coding system does show better performance with extremely large numbers of records and/or significant body fragmentation. © 2015 American Academy of Forensic Sciences.

  6. Identification and role of regulatory non-coding RNAs in Listeria monocytogenes.

    PubMed

    Izar, Benjamin; Mraheil, Mobarak Abu; Hain, Torsten

    2011-01-01

    Bacterial regulatory non-coding RNAs control numerous mRNA targets that direct a plethora of biological processes, such as the adaption to environmental changes, growth and virulence. Recently developed high-throughput techniques, such as genomic tiling arrays and RNA-Seq have allowed investigating prokaryotic cis- and trans-acting regulatory RNAs, including sRNAs, asRNAs, untranslated regions (UTR) and riboswitches. As a result, we obtained a more comprehensive view on the complexity and plasticity of the prokaryotic genome biology. Listeria monocytogenes was utilized as a model system for intracellular pathogenic bacteria in several studies, which revealed the presence of about 180 regulatory RNAs in the listerial genome. A regulatory role of non-coding RNAs in survival, virulence and adaptation mechanisms of L. monocytogenes was confirmed in subsequent experiments, thus, providing insight into a multifaceted modulatory function of RNA/mRNA interference. In this review, we discuss the identification of regulatory RNAs by high-throughput techniques and in their functional role in L. monocytogenes.

  7. BASiNET-BiologicAl Sequences NETwork: a case study on coding and non-coding RNAs identification.

    PubMed

    Ito, Eric Augusto; Katahira, Isaque; Vicente, Fábio Fernandes da Rocha; Pereira, Luiz Filipe Protasio; Lopes, Fabrício Martins

    2018-06-05

    With the emergence of Next Generation Sequencing (NGS) technologies, a large volume of sequence data in particular de novo sequencing was rapidly produced at relatively low costs. In this context, computational tools are increasingly important to assist in the identification of relevant information to understand the functioning of organisms. This work introduces BASiNET, an alignment-free tool for classifying biological sequences based on the feature extraction from complex network measurements. The method initially transform the sequences and represents them as complex networks. Then it extracts topological measures and constructs a feature vector that is used to classify the sequences. The method was evaluated in the classification of coding and non-coding RNAs of 13 species and compared to the CNCI, PLEK and CPC2 methods. BASiNET outperformed all compared methods in all adopted organisms and datasets. BASiNET have classified sequences in all organisms with high accuracy and low standard deviation, showing that the method is robust and non-biased by the organism. The proposed methodology is implemented in open source in R language and freely available for download at https://cran.r-project.org/package=BASiNET.

  8. Defense Mechanisms: Discussions and Bibliographies; General or Multiple, and Specific.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This publication considers some Freudian ego mechanisms. The first discussion and bibliography concerns defense mechanisms, in general or in multiple; after which, the discussions and bibliographies concern specific defense mechanisms: denial; displacement, substitution, sublimation; fixation; identification, introjection, incorporation,…

  9. Computerized bar code-based blood identification systems and near-miss transfusion episodes and transfusion errors.

    PubMed

    Nuttall, Gregory A; Abenstein, John P; Stubbs, James R; Santrach, Paula; Ereth, Mark H; Johnson, Pamela M; Douglas, Emily; Oliver, William C

    2013-04-01

    To determine whether the use of a computerized bar code-based blood identification system resulted in a reduction in transfusion errors or near-miss transfusion episodes. Our institution instituted a computerized bar code-based blood identification system in October 2006. After institutional review board approval, we performed a retrospective study of transfusion errors from January 1, 2002, through December 31, 2005, and from January 1, 2007, through December 31, 2010. A total of 388,837 U were transfused during the 2002-2005 period. There were 6 misidentification episodes of a blood product being transfused to the wrong patient during that period (incidence of 1 in 64,806 U or 1.5 per 100,000 transfusions; 95% CI, 0.6-3.3 per 100,000 transfusions). There was 1 reported near-miss transfusion episode (incidence of 0.3 per 100,000 transfusions; 95% CI, <0.1-1.4 per 100,000 transfusions). A total of 304,136 U were transfused during the 2007-2010 period. There was 1 misidentification episode of a blood product transfused to the wrong patient during that period when the blood bag and patient's armband were scanned after starting to transfuse the unit (incidence of 1 in 304,136 U or 0.3 per 100,000 transfusions; 95% CI, <0.1-1.8 per 100,000 transfusions; P=.14). There were 34 reported near-miss transfusion errors (incidence of 11.2 per 100,000 transfusions; 95% CI, 7.7-15.6 per 100,000 transfusions; P<.001). Institution of a computerized bar code-based blood identification system was associated with a large increase in discovered near-miss events. Copyright © 2013 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  10. 76 FR 21870 - Meeting of the Defense Advisory Committee on Military Personnel Testing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Defense Advisory Committee on... 102-3.150, the Department of Defense announces that the following Federal advisory committee meeting... Liaison Officer, Department of Defense. [FR Doc. 2011-9440 Filed 4-18-11; 8:45 am] BILLING CODE 5001-06-P ...

  11. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  12. An Analysis of Turkey’s Defense Systems Acquisition Policy

    DTIC Science & Technology

    2009-03-01

    i NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT An Analysis of Turkey’s Defense Systems Acquisition...2009 3. REPORT TYPE AND DATES COVERED MBA THESIS 4. TITLE AND SUBTITLE An Analysis of Turkey’s Defense Systems Acquisition Policy 6. AUTHOR(S...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The purpose of this MBA thesis is to analyze Turkey’s defense systems acquisition policy and

  13. Identification and characterization of moonlighting long non-coding RNAs based on RNA and protein interactome.

    PubMed

    Cheng, Lixin; Leung, Kwong-Sak

    2018-05-16

    Moonlighting proteins are a class of proteins having multiple distinct functions, which play essential roles in a variety of cellular and enzymatic functioning systems. Although there have long been calls for computational algorithms for the identification of moonlighting proteins, research on approaches to identify moonlighting long non-coding RNAs (lncRNAs) has never been undertaken. Here, we introduce a novel methodology, MoonFinder, for the identification of moonlighting lncRNAs. MoonFinder is a statistical algorithm identifying moonlighting lncRNAs without a priori knowledge through the integration of protein interactome, RNA-protein interactions, and functional annotation of proteins. We identify 155 moonlighting lncRNA candidates and uncover that they are a distinct class of lncRNAs characterized by specific sequence and cellular localization features. The non-coding genes that transcript moonlighting lncRNAs tend to have shorter but more exons and the moonlighting lncRNAs have a variable localization pattern with a high chance of residing in the cytoplasmic compartment in comparison to the other lncRNAs. Moreover, moonlighting lncRNAs and moonlighting proteins are rather mutually exclusive in terms of both their direct interactions and interacting partners. Our results also shed light on how the moonlighting candidates and their interacting proteins implicated in the formation and development of cancers and other diseases. The code implementing MoonFinder is supplied as an R package in the supplementary material. lxcheng@cse.cuhk.edu.hk or ksleung@cse.cuhk.edu.hk. Supplementary data are available at Bioinformatics online.

  14. 78 FR 33993 - Defense Federal Acquisition Regulation Supplement; Clarification of “F” Orders in the Procurement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 204 RIN 0750-AH80 Defense Federal Acquisition Regulation Supplement; Clarification of ``F'' Orders in the Procurement Instrument Identification Number Structure (DFARS Case 2012-D040); Correction AGENCY: Defense Acquisition Regulations System...

  15. Defense Demilitarization Manual

    DTIC Science & Technology

    1991-10-01

    dichloroethyl) sulfide ( Mustard Gas , HD or H). 16. Component. See subparagraph 32. (3) Ethyldichloroarsine. (ED). 17. Controlled Item Inventory Code (CIIC). A... Gas Cylinder Components, Grinding/ W elding for Drill Purposes ............................... A7-65 75 Rifle, Cal. .30, MI, Receiver Rail, Welding...U.S. Munitions List. (except tear gas formulations containing 1 percent or less CN or CS), sternutators and irritant smoke, CATEGORY XIX - DEFENSE

  16. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  17. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  18. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  19. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  20. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  1. Change in children's externalizing and internalizing behavior problems: the role of defense mechanisms.

    PubMed

    Cramer, Phebe

    2015-03-01

    This study investigates the relation of defense mechanism to children's externalizing and internalizing behavior problems, as assessed from mothers' report at age 9 and 12 years, based on archival data. The defense mechanisms of denial, projection, and identification were assessed from Thematic Apperception Test stories told by the children at age 9 years, using the Defense Mechanism Manual (Cramer, The development of defense mechanisms: Theory, research and assessment. New York: Springer-Verlag, 1991a; Protecting the self: Defense mechanisms in action. New York: Guilford Press, 2006). The results showed that the use of identification predicted a decrease in externalizing behaviors between age 9 and 12 years. In contrast, change in internalizing behaviors was not predicted by defense use, but the use of projection was related to fewer internalizing behaviors at both ages. These findings are consistent with the idea that behavioral intervention stressing self-regulation can be effective in reducing externalizing problems, but internalizing problems require an intervention that is sensitive to the underlying behavioral inhibition in these children.

  2. Role of defense/stress-related marker genes, proteins and secondary metabolites in defining rice self-defense mechanisms.

    PubMed

    Jwa, Nam-Soo; Agrawal, Ganesh Kumar; Tamogami, Shigeru; Yonekura, Masami; Han, Oksoo; Iwahashi, Hitoshi; Rakwal, Randeep

    2006-01-01

    Rice, a first cereal crop whose draft genome sequence from two subspecies (japonica-type cv. Nipponbare and indica-type 93-11) was available in 2002, along with its almost complete genome sequence in 2005, has drawn the attention of researchers worldwide because of its immense impact on human existence. One of the most critical research areas in rice is to discern the self-defense mechanism(s), an innate property of all living organisms. The last few decades have seen scattered research into rice responses to diverse environmental stimuli and stress factors. Our understanding on rice self-defense mechanism has increased considerably with accelerated research during recent years mainly due to identification and characterization of several defense/stress-related components, genes, proteins and secondary metabolites. As these identified components have been used to study the defense/stress pathways, their compilation in this review will undoubtedly help rice (and others) researchers to effectively use them as a potential marker for better understanding, and ultimately, in defining rice (and plant) self-defense response pathways.

  3. Operation of the Defense Acquisition System

    DTIC Science & Technology

    2008-12-08

    United States Code (l) DoD Directive 8320.02, “Data Sharing in a Net-Centric Department of Defense,” December 2, 2004 (m) DoD Instruction 5200.39...2004 (t) ISO 15418-1999- “EAN/ UCC Application Identifiers and Fact Data Identifiers and Maintenance” (u) ISO 15434-1999 – “Transfer Syntax for High...Acquisition Knowledge Sharing System7 (y) Section 644 of title 15, United States Code, “Procurement strategies; contract bundling” (z) Public Law 101-576

  4. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    ,

    1988-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  5. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    ,

    1985-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  6. Review of defense display research programs

    NASA Astrophysics Data System (ADS)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  7. Identification of novel non-coding small RNAs from Streptococcus pneumoniae TIGR4 using high-resolution genome tiling arrays

    PubMed Central

    2010-01-01

    Background The identification of non-coding transcripts in human, mouse, and Escherichia coli has revealed their widespread occurrence and functional importance in both eukaryotic and prokaryotic life. In prokaryotes, studies have shown that non-coding transcripts participate in a broad range of cellular functions like gene regulation, stress and virulence. However, very little is known about non-coding transcripts in Streptococcus pneumoniae (pneumococcus), an obligate human respiratory pathogen responsible for significant worldwide morbidity and mortality. Tiling microarrays enable genome wide mRNA profiling as well as identification of novel transcripts at a high-resolution. Results Here, we describe a high-resolution transcription map of the S. pneumoniae clinical isolate TIGR4 using genomic tiling arrays. Our results indicate that approximately 66% of the genome is expressed under our experimental conditions. We identified a total of 50 non-coding small RNAs (sRNAs) from the intergenic regions, of which 36 had no predicted function. Half of the identified sRNA sequences were found to be unique to S. pneumoniae genome. We identified eight overrepresented sequence motifs among sRNA sequences that correspond to sRNAs in different functional categories. Tiling arrays also identified approximately 202 operon structures in the genome. Conclusions In summary, the pneumococcal operon structures and novel sRNAs identified in this study enhance our understanding of the complexity and extent of the pneumococcal 'expressed' genome. Furthermore, the results of this study open up new avenues of research for understanding the complex RNA regulatory network governing S. pneumoniae physiology and virulence. PMID:20525227

  8. Defense Depot Mechanicsburg Total Quality Management Implementation Plan

    DTIC Science & Technology

    1989-06-01

    B T I TLEE 5 . FUNDING NUMBERS Defense Depot Mechanicsburg Total Quality Management Implementation Plan 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME...Form 298 (Rev. 2-89) L296- 102 Acces.ion For NYI J ... I:: ted DEFENSE DEPOT MECHANICSBURG PENNSYLVANIAL--I By_ TOTAL QUALITY MANAGEMENT K_~ t buty-n...IMPLEMENTATION PLAN Avmail-t!Ilty Codes IvLl c 2Dd/or JUN 3 0 1989 iDizt Special PURPOSE The purpose of this Total Quality Management Implementation

  9. CSTminer: a web tool for the identification of coding and noncoding conserved sequence tags through cross-species genome comparison

    PubMed Central

    Castrignanò, Tiziana; Canali, Alessandro; Grillo, Giorgio; Liuni, Sabino; Mignone, Flavio; Pesole, Graziano

    2004-01-01

    The identification and characterization of genome tracts that are highly conserved across species during evolution may contribute significantly to the functional annotation of whole-genome sequences. Indeed, such sequences are likely to correspond to known or unknown coding exons or regulatory motifs. Here, we present a web server implementing a previously developed algorithm that, by comparing user-submitted genome sequences, is able to identify statistically significant conserved blocks and assess their coding or noncoding nature through the measure of a coding potential score. The web tool, available at http://www.caspur.it/CSTminer/, is dynamically interconnected with the Ensembl genome resources and produces a graphical output showing a map of detected conserved sequences and annotated gene features. PMID:15215464

  10. Defense Logistics: A Completed Comprehensive Strategy is Needed to Guide DOD’s In-Transit Visibility Efforts

    DTIC Science & Technology

    2013-02-01

    Defense Logistics List of Abbreviations aRFID active radio frequency identification DOD Department of Defense RFID...The Navy and the Air Force each have their own Active Radio Frequency Identification ( aRFID ) Migration Program. These two programs are included...with the aRFID Program and the aRFID Infrastructure, respectively and are therefore not listed in the table. Appendix III: Comments from the

  11. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining themore » facility and executing the mission of the High-Level Waste Storage Tank Farms.« less

  12. Environmental Fluid Dynamics Code

    EPA Science Inventory

    The Environmental Fluid Dynamics Code (EFDC)is a state-of-the-art hydrodynamic model that can be used to simulate aquatic systems in one, two, and three dimensions. It has evolved over the past two decades to become one of the most widely used and technically defensible hydrodyn...

  13. 48 CFR 211.275 - Radio frequency identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Radio frequency identification. ...

  14. 22 CFR 125.3 - Exports of classified technical data and classified defense articles.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in the Department of Defense National Industrial Security Program Operating Manual (unless such.... It should also list the facility security clearance code of all U.S. parties on the license and include the Defense Security Service cognizant security office of the party responsible for packaging the...

  15. Identification of defense-related genes newly-associated with tomato flower abscission.

    PubMed

    Meir, Shimon; Philosoph-Hadas, Sonia; Sundaresan, Srivignesh; Selvaraj, K S Vijay; Burd, Shaul; Ophir, Ron; Kochanek, K S Bettina; Reid, Michael S; Jiang, Cai-Zhong; Lers, Amnon

    2011-04-01

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense responses. We identified four different defense-related genes, including: Cysteine-type endopeptidase, α-Dioxygenase 1 (α-DOX1), HopW-1-1-Interacting protein2 (WIN2), and Stomatal-derived factor-2 (SDF2), that are newly-associated with the late stage of the abscission process. The late expression of these genes, induced at 8-14 h after flower removal when pedicel abscission was already in progress, was AZ-specific, and was inhibited by treatments that prevented pedicel abscission, including 1-methylcyclopropene pretreatment or IAA application. This information supports the activation of different defense responses and strategies at the late abscission stages, which may enable efficient protection of the exposed tissue toward different environmental stresses.

  16. An Investigation of Possible Discriminating Earned Value Variables in Department of Defense Major Acquisition Program Cancellation

    DTIC Science & Technology

    2013-06-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Some major defense acquisition programs (MDAPs) are cancelled...68 VI. PRACTICAL IMPLICATIONS FOR DEFENSE ACQUISITION .....................73 A . OVERVIEW...Contract Performance Report C /SCSC Cost/Schedule Control Systems Criteria CV Cost Variance CV % Cost Variance Percentage DAE Defense Acquisition

  17. Development of Adaptive Coping From Mid to Late Life: A 70-Year Longitudinal Study of Defense Maturity and Its Psychosocial Correlates.

    PubMed

    Martin-Joy, John S; Malone, Johanna C; Cui, Xing-Jia; Johansen, Pål-Ørjan; Hill, Kevin P; Rahman, M Omar; Waldinger, Robert J; Vaillant, George E

    2017-09-01

    The present study examines changes in defense maturity from mid to late life using data from an over 70-year longitudinal study. A sample of 72 men was followed beginning in late adolescence. Participants' childhoods were coded for emotional warmth. Defense mechanisms were coded by independent raters using the Q-Sort of Defenses (, Ego mechanisms of defense: A guide for clinicians and researchers 217-233) based on interview data gathered at approximately ages 52 and 75. We examined psychosocial correlates of defenses at midlife, late life, and changes in defense from mid to late life. Overall, defenses grew more adaptive from midlife to late life. However, results differed on the basis of the emotional warmth experienced in the participants' childhoods. In midlife, men who experienced warm childhoods used more adaptive (mature) defenses; yet by late life, this difference in defensive maturity had disappeared. Men who experienced less childhood warmth were more likely to show an increase in adaptive defenses during the period from mid to late life.

  18. DELFIC: Department of Defense Fallout Prediction System. Volume I - Fundamentals

    DTIC Science & Technology

    1979-12-31

    102 H2590D. DTIC•;. 17.) 1 i{1•ELECT ’ Prepared for " JAUG 2 ? 1980 Director DEFENSE NUCLEAR AGENCY B Wai’hington, D. C. 20305 808 1O8x Destroy this...2 1. INTRODUCTION AND OVERVIEW -- --- - -------------- - --- ---- 7 2. INITIALIZATION AND CLOUD RISE...61 6 1. INTRODUCTION AND OVERVIEW DELFIC (DEfense Land Fallout Interpretative Code) is intended for re- search in local nuclear fallout

  19. Extracellular Alkalinization as a Defense Response in Potato Cells.

    PubMed

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  20. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  1. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  2. Identification and Characterization of Long Non-Coding RNAs Related to Mouse Embryonic Brain Development from Available Transcriptomic Data

    PubMed Central

    He, Hongjuan; Xiu, Youcheng; Guo, Jing; Liu, Hui; Liu, Qi; Zeng, Tiebo; Chen, Yan; Zhang, Yan; Wu, Qiong

    2013-01-01

    Long non-coding RNAs (lncRNAs) as a key group of non-coding RNAs have gained widely attention. Though lncRNAs have been functionally annotated and systematic explored in higher mammals, few are under systematical identification and annotation. Owing to the expression specificity, known lncRNAs expressed in embryonic brain tissues remain still limited. Considering a large number of lncRNAs are only transcribed in brain tissues, studies of lncRNAs in developmental brain are therefore of special interest. Here, publicly available RNA-sequencing (RNA-seq) data in embryonic brain are integrated to identify thousands of embryonic brain lncRNAs by a customized pipeline. A significant proportion of novel transcripts have not been annotated by available genomic resources. The putative embryonic brain lncRNAs are shorter in length, less spliced and show less conservation than known genes. The expression of putative lncRNAs is in one tenth on average of known coding genes, while comparable with known lncRNAs. From chromatin data, putative embryonic brain lncRNAs are associated with active chromatin marks, comparable with known lncRNAs. Embryonic brain expressed lncRNAs are also indicated to have expression though not evident in adult brain. Gene Ontology analysis of putative embryonic brain lncRNAs suggests that they are associated with brain development. The putative lncRNAs are shown to be related to possible cis-regulatory roles in imprinting even themselves are deemed to be imprinted lncRNAs. Re-analysis of one knockdown data suggests that four regulators are associated with lncRNAs. Taken together, the identification and systematic analysis of putative lncRNAs would provide novel insights into uncharacterized mouse non-coding regions and the relationships with mammalian embryonic brain development. PMID:23967161

  3. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots.

    PubMed

    Gómez-Lama Cabanás, Carmen; Schilirò, Elisabetta; Valverde-Corredor, Antonio; Mercado-Blanco, Jesús

    2014-01-01

    Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA) against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH) cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets), many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR) experiments aiming to: (1) validate the induction of these genes, and (2) shed light on their expression pattern along time (from 1 to 15 days). Induction of olive genes potentially coding for lipoxygenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase, and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e., JERF, bHLH, WRKY), as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mounts a wide array of systemic defense responses in distant tissues (stems, leaves). This sheds light on how olive plants respond to the "non-hostile" colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  4. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    PubMed Central

    Gómez-Lama Cabanás, Carmen; Schilirò, Elisabetta; Valverde-Corredor, Antonio; Mercado-Blanco, Jesús

    2014-01-01

    Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA) against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH) cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets), many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR) experiments aiming to: (1) validate the induction of these genes, and (2) shed light on their expression pattern along time (from 1 to 15 days). Induction of olive genes potentially coding for lipoxygenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase, and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e., JERF, bHLH, WRKY), as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mounts a wide array of systemic defense responses in distant tissues (stems, leaves). This sheds light on how olive plants respond to the “non-hostile” colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7. PMID:25250017

  5. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification. ...

  6. An empirical look at the Defense Mechanism Test (DMT): reliability and construct validity.

    PubMed

    Ekehammar, Bo; Zuber, Irena; Konstenius, Marja-Liisa

    2005-07-01

    Although the Defense Mechanism Test (DMT) has been in use for almost half a century, there are still quite contradictory views about whether it is a reliable instrument, and if so, what it really measures. Thus, based on data from 39 female students, we first examined DMT inter-coder reliability by analyzing the agreement among trained judges in their coding of the same DMT protocols. Second, we constructed a "parallel" photographic picture that retained all structural characteristic of the original and analyzed DMT parallel-test reliability. Third, we examined the construct validity of the DMT by (a) employing three self-report defense-mechanism inventories and analyzing the intercorrelations between DMT defense scores and corresponding defenses in these instruments, (b) studying the relationships between DMT responses and scores on trait and state anxiety, and (c) relating DMT-defense scores to measures of self-esteem. The main results showed that the DMT can be coded with high reliability by trained coders, that the parallel-test reliability is unsatisfactory compared to traditional psychometric standards, that there is a certain generalizability in the number of perceptual distortions that people display from one picture to another, and that the construct validation provided meager empirical evidence for the conclusion that the DMT measures what it purports to measure, that is, psychological defense mechanisms.

  7. Public Health Emergency Management Within the Department of Defense

    DTIC Science & Technology

    2010-03-05

    February 20071 (aa) DoD Instruction 1100.21, “ Voluntary Services in the Department of Defense,” March 11, 2002 (ab) DoD Instruction 5210.25...include eradication of disease, identification of affected animals, animal quarantine implementation, euthanasia , carcass disposal, cleaning and

  8. Open Globe Injury Patient Identification in Warfare Clinical Notes1

    PubMed Central

    Apostolova, Emilia; White, Helen A.; Morris, Patty A.; Eliason, David A.; Velez, Tom

    2017-01-01

    The aim of this study is to utilize the Defense and Veterans Eye Injury and Vision Registry clinical data derived from DoD and VA medical systems which include documentation of care while in combat, and develop methods for comprehensive and reliable Open Globe Injury (OGI) patient identification. In particular, we focus on the use of free-form clinical notes, since structured data, such as diagnoses or procedure codes, as found in early post-trauma clinical records, may not be a comprehensive and reliable indicator of OGIs. The challenges of the task include low incidence rate (few positive examples), idiosyncratic military ophthalmology vocabulary, extreme brevity of notes, specialized abbreviations, typos and misspellings. We modeled the problem as a text classification task and utilized a combination of supervised learning (SVMs) and word embeddings learnt in a unsupervised manner, achieving a precision of 92.50% and a recall of89.83%o. The described techniques are applicable to patient cohort identification with limited training data and low incidence rate. PMID:29854104

  9. Light Infantry in the Defense of Urban Europe.

    DTIC Science & Technology

    1986-12-14

    if applicable) 6c. ADDRESS (City, State, and ZIP Code ) 7b. ADDRESS (City, State, and ZIP Code ) Fort Leavenworth, Kansas 66027-6900 Ba. NAME OF FUNDING...SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) Sc. ADDRESS (City, State, and ZIP Code ) 10...PAGE COUNT wo - EFROM TO144 16. SUPPLEMENTARY NOTATION 17. COSATI CODES A*SUBJECT TERMS (Continue on reverse if necessary and identify by block

  10. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Policy-Public safety: Requirement for early identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will...

  11. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Policy-Public safety: Requirement for early identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will...

  12. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  13. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  14. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  15. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  16. Small Business and Defense Acquisitions: A Review of Policies and Current Practices

    DTIC Science & Technology

    2011-01-01

    Office of Management and Budget xviii Small Business and Defense Acquisitions: A Review of Policies and Current Practices PSC Product and Service Code...themselves as minority-owned, women-owned, veteran- owned, or small disadvantaged businesses . The resulting database gives sourcing managers a tool for...REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Small Business and Defense Acquisitions: A

  17. Federal Logistics Information System (FLIS) Procedures Manual, Volume 4. Item Identification.

    DTIC Science & Technology

    1995-01-01

    Functional I DRMS Defense Reutilization 1,15 Description and Marketing FDM Full Descriptive 2 Service Method (Item DPSC Defense Personnel 2,13,14...under DIC KRE, return code ment or segment mix of FLIS data. For interna- AU. tional cataloging, only one Output Data RequestV Code may be used per...Screening Results) with KMR (Matching NATO Maintenance and Supply Agency (NAMSA), Reference-Screening) and either KFC (File Data the custodian for control

  18. Counterfeit Electronic Parts Controls in the Department of Defense Supply Chain

    DTIC Science & Technology

    2015-06-01

    Equipment Manufacturer RFID Radio Frequency Identification SASC Senate Armed Services Committee SECDEF Secretary of Defense SWPaC Space, Weight...radio frequency identification ( RFID ). Upon the use of that printer, the RFID is checked to ensure it is a valid platform, and will not work if the... RFID is not confirmed to be valid (Richetto, 2011). Greater collaboration with industry would also help with one of the primary drivers of

  19. On fuzzy semantic similarity measure for DNA coding.

    PubMed

    Ahmad, Muneer; Jung, Low Tang; Bhuiyan, Md Al-Amin

    2016-02-01

    A coding measure scheme numerically translates the DNA sequence to a time domain signal for protein coding regions identification. A number of coding measure schemes based on numerology, geometry, fixed mapping, statistical characteristics and chemical attributes of nucleotides have been proposed in recent decades. Such coding measure schemes lack the biologically meaningful aspects of nucleotide data and hence do not significantly discriminate coding regions from non-coding regions. This paper presents a novel fuzzy semantic similarity measure (FSSM) coding scheme centering on FSSM codons׳ clustering and genetic code context of nucleotides. Certain natural characteristics of nucleotides i.e. appearance as a unique combination of triplets, preserving special structure and occurrence, and ability to own and share density distributions in codons have been exploited in FSSM. The nucleotides׳ fuzzy behaviors, semantic similarities and defuzzification based on the center of gravity of nucleotides revealed a strong correlation between nucleotides in codons. The proposed FSSM coding scheme attains a significant enhancement in coding regions identification i.e. 36-133% as compared to other existing coding measure schemes tested over more than 250 benchmarked and randomly taken DNA datasets of different organisms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Should the Department of Defense Hedge Oil Prices in Order to Save Money

    DTIC Science & Technology

    2008-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT Should the Department of Defense Hedge Oil Prices In Order...DATES COVERED MBA Professional Report 4. TITLE AND SUBTITLE Should the Department of Defense Hedge Oil Prices in Order to Save Money? 6. James...the DoD. 15. NUMBER OF PAGES 59 14. SUBJECT TERMS Futures, Options, Swaps, Hedging . Oil Prices, DoD, Procurement 16. PRICE CODE

  1. 48 CFR 211.274-2 - Policy for item unique identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy for item unique identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  2. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  3. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  4. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  5. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  6. Defense.gov Special Report: Defense Intelligence

    Science.gov Websites

    Department of Defense Submit Search Defense intelligence is critical to the Defense Department's role in and conduct successful military and security operations that protect America. Defense Intelligence News Story Intelligence Chief Describes 'Pervasive Uncertainty' of Worldwide Threats "

  7. Identification of transcriptional regulatory nodes in soybean defense networks using transient co-transactivation assays

    PubMed Central

    Wang, Yongli; Wang, Hui; Ma, Yujie; Du, Haiping; Yang, Qing; Yu, Deyue

    2015-01-01

    Plant responses to major environmental stressors, such as insect feeding, not only occur via the functions of defense genes but also involve a series of regulatory factors. Our previous transcriptome studies proposed that, in addition to two defense-related genes, GmVSPβ and GmN:IFR, a high proportion of transcription factors (TFs) participate in the incompatible soybean-common cutworm interaction networks. However, the regulatory mechanisms and effects of these TFs on those induced defense-related genes remain unknown. In the present work, we isolated and identified 12 genes encoding MYB, WRKY, NAC, bZIP, and DREB TFs from a common cutworm-induced cDNA library of a resistant soybean line. Sequence analysis of the promoters of three co-expressed genes, including GmVSPα, GmVSPβ, and GmN:IFR, revealed the enrichment of various TF-binding sites for defense and stress responses. To further identify the regulatory nodes composed of these TFs and defense gene promoters, we performed extensive transient co-transactivation assays to directly test the transcriptional activity of the 12 TFs binding at different levels to the three co-expressed gene promoters. The results showed that all 12 TFs were able to transactivate the GmVSPβ and GmN:IFR promoters. GmbZIP110 and GmMYB75 functioned as distinct regulators of GmVSPα/β and GmN:IFR expression, respectively, while GmWRKY39 acted as a common central regulator of GmVSPα/β and GmN:IFR expression. These corresponding TFs play crucial roles in coordinated plant defense regulation, which provides valuable information for understanding the molecular mechanisms involved in insect-induced transcriptional regulation in soybean. More importantly, the identified TFs and suitable promoters can be used to engineer insect-resistant plants in molecular breeding studies. PMID:26579162

  8. 76 FR 32839 - Defense Federal Acquisition Regulation Supplement; Agency Office of the Inspector General (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-06

    ... 52.203-13, Contractor Code of Business Ethics and Conduct. This final rule corrects two omissions in... Subjects in 48 CFR Parts 203 and 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition... clause 52.203-13, Contractor Code of Business Ethics and Conduct. * * * * * PART 252--SOLICITATION...

  9. Identification of ICD Codes Suggestive of Child Maltreatment

    ERIC Educational Resources Information Center

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  10. [QR-Code based patient tracking: a cost-effective option to improve patient safety].

    PubMed

    Fischer, M; Rybitskiy, D; Strauß, G; Dietz, A; Dressler, C R

    2013-03-01

    Hospitals are implementing a risk management system to avoid patient or surgery mix-ups. The trend is to use preoperative checklists. This work deals specifically with a type of patient identification, which is realized by storing patient data on a patient-fixed medium. In 127 ENT surgeries data relevant for patient identification were encrypted in a 2D-QR-Code. The code, as a separate document coming with the patient chart or as a patient wristband, has been decrypted in the OR and the patient data were presented visible for all persons. The decoding time, the compliance of the patient data, as well as the duration of the patient identification was compared with the traditional patient identification by inspection of the patient chart. A total of 125 QR codes were read. The time for the decrypting of QR-Code was 5.6 s, the time for the screen view for patient identification was 7.9 s, and for a comparison group of 75 operations traditional patient identification was 27.3 s. Overall, there were 6 relevant information errors in the two parts of the experiment. This represents a ratio of 0.6% for 8 relevant classes per each encrypted QR code. This work allows a cost effective way to technically support patient identification based on electronic patient data. It was shown that the use in the clinical routine is possible. The disadvantage is a potential misinformation from incorrect or missing information in the HIS, or due to changes of the data after the code was created. The QR-code-based patient tracking is seen as a useful complement to the already widely used identification wristband. © Georg Thieme Verlag KG Stuttgart · New York.

  11. Insights from human studies into the host defense against candidiasis.

    PubMed

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. 48 CFR 209.571-6 - Identification of organizational conflicts of interest.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... organizational conflicts of interest. 209.571-6 Section 209.571-6 Federal Acquisition Regulations System DEFENSE... Organizational and Consultant Conflicts of Interest 209.571-6 Identification of organizational conflicts of interest. When evaluating organizational conflicts of interest for major defense acquisition programs or...

  13. Department of Defense Dependents Schools Special Education Dispute Management System.

    ERIC Educational Resources Information Center

    Dependents Schools (DOD), Washington, DC.

    The regulations outline procedures and policies for resolving disputes in special education in the U.S. Department of Defense Dependents schools. Processes involved in conferences, mediation, and due process hearings concerning issues of identification, eligibility, individualized education programs, or programing are outlined. At each of the…

  14. Four year-olds use norm-based coding for face identity.

    PubMed

    Jeffery, Linda; Read, Ainsley; Rhodes, Gillian

    2013-05-01

    Norm-based coding, in which faces are coded as deviations from an average face, is an efficient way of coding visual patterns that share a common structure and must be distinguished by subtle variations that define individuals. Adults and school-aged children use norm-based coding for face identity but it is not yet known if pre-school aged children also use norm-based coding. We reasoned that the transition to school could be critical in developing a norm-based system because school places new demands on children's face identification skills and substantially increases experience with faces. Consistent with this view, face identification performance improves steeply between ages 4 and 7. We used face identity aftereffects to test whether norm-based coding emerges between these ages. We found that 4 year-old children, like adults, showed larger face identity aftereffects for adaptors far from the average than for adaptors closer to the average, consistent with use of norm-based coding. We conclude that experience prior to age 4 is sufficient to develop a norm-based face-space and that failure to use norm-based coding cannot explain 4 year-old children's poor face identification skills. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Identification of an insect-produced olfactory cue that primes plant defenses

    USDA-ARS?s Scientific Manuscript database

    It is increasingly clear that plants can perceive and respond to olfactory cues. Yet, knowledge about the specificity and sensitivity of such perception remains limited. We previously documented priming of anti-herbivore defenses in tall goldenrod plants (Solidago altissima) by volatile emissions fr...

  16. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    DTIC Science & Technology

    2010-01-01

    SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE 13 . ABSTRACT After ten years the ESDP has reached an important...premier_ministre/2008/11- novembre /16­ juncker/index.html - accessed 14 September 2009. 2 Javier Solana, “Preface,” in: What Ambitions for European Defense in...security of the Union, including the eventual framing of a common defense policy ….” 13 First and foremost the Treaty required member nations to build

  17. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe use of CAGE codes. (b..., Federal Center, 74 Washington Avenue, North, Battle Creek, MI 49017-3084. Their telephone number is: toll-free 1-888-352-9333); (B) The on-line access to the CAGE file through the Defense Logistics Information...

  18. 78 FR 36113 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... Date: June 17, 2013. FOR FURTHER INFORMATION CONTACT: Ms. Kortnee Stewart, Defense Acquisition... 2. Section 222.7404(c) is amended by inserting the words ``and PGI 222.7404(c)'' after the word ``procedures''. [FR Doc. 2013-14295 Filed 6-14-13; 8:45 am] BILLING CODE 5001-06-P ...

  19. Evaluation of Computational Codes for Underwater Hull Analysis Model Applications

    DTIC Science & Technology

    2014-02-05

    desirable that the code can be run on a Windows operating system on the laptop, desktop, or workstation. The focus on Windows machines allows for...transition to such systems as operated on the Navy-Marine Corp Internet (NMCI). For each code the initial cost and yearly maintenance are identified...suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports

  20. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1907.13... ORDER 12958 Filing of Challenges § 1907.13 Identification of material at issue. Authorized holders shall append the documents at issue and clearly mark those portions subject to the challenge. If information...

  1. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1802.13... EXECUTIVE ORDER 12958 Filing Of Challenges § 1802.13 Identification of material at issue. Authorized holders shall append the documents at issue and clearly mark those portions subject to the challenge. If...

  2. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    PubMed

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  3. Identification of defense-related genes newly-associated with tomato flower abscission

    USDA-ARS?s Scientific Manuscript database

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense res...

  4. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  5. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  6. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  7. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  8. Attachment style and defense mechanisms in parents who abuse their children.

    PubMed

    Cramer, Phebe; Kelly, Francis D

    2010-09-01

    Adult attachment style, defense mechanisms, and personal history of abuse was studied in a group of abusive parents. As a group, these parents made unusually high use of the defense of denial; this was especially true of those with a Fearful attachment style. However, the use of Identification was characteristic of those with a Preoccupied attachment style. Further, personal abuse history was related to adult attachment style. Those who reported having been abused as a child were less likely to have a Secure attachment style, and a history of physical or sexual abuse was associated with a Preoccupied style. In general, these findings support the deactivating/hyperactivating defensive theory of Mikulincer et al (Emotion Regulation in Couples and Families: Pathways to Dysfunction and Health. 2006; pp 77-99. Washington (WA): American Psychological Association).

  9. Total Quality Management Implementation Plan: Defense Depot, Ogden

    DTIC Science & Technology

    1989-07-01

    NUMBERS Total Quality Management Implementation Plan Defense Depot Ogden 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...PAGES TQM (Total Quality Management ), Continuous Process Improvement, Depot Operations, Process Action Teams 16. PRICE CODE 17. SECURITY...034 A Message From The Commander On Total Quality Management i fully support the DLA aoproacii to Total Quality Management . As stated by General

  10. Translating dynamic defense patterns from rodents to people.

    PubMed

    Blanchard, D Caroline

    2017-05-01

    Specific defensive behaviors of rodents are shaped by features of the eliciting threat stimuli and situation. Threat scenarios confirmed these relationships in people, with results substantially replicated in 4 additional scenario studies. Subsequent human studies involve computer games measuring fear as flight from threat stimuli and anxiety as alternation between two threats. Stabilometric studies have shown reduction in sway (freezing) to inescapable (e.g. with gun pointed at subject) threatening photographs; but enhanced lateral sway (flight attempts) to escapable threats; (gun pointed away from subject). Relationships between threat ambiguity, risk assessment, and anxiety have been validated by identification of videos of facial expressions to ambiguous threats, as anxiety; and systematic biases toward threat stimuli by anxious individuals. Enhanced rumination, interpretable as unsuccessful risk assessment, is a dynamic component of both anxiety and depression, particularly in women. While there is less experimental work on defensive threat/attack, a transdiagnostic "Fear of Harm" phenotype of aggression associated with fear suggests that this is a component of pathological as well as normal human defensive behavior. Copyright © 2016. Published by Elsevier Ltd.

  11. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracting office uses to identify an offeror. The three types of contractor identification codes are CAGE... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  12. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  13. 48 CFR 243.170 - Identification of foreign military sale (FMS) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Identification of foreign military sale (FMS) requirements. 243.170 Section 243.170 Federal Acquisition Regulations System DEFENSE....170 Identification of foreign military sale (FMS) requirements. Follow the procedures at PGI 243.170...

  14. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy

    DTIC Science & Technology

    2015-12-01

    Development, Test, and Evaluation RFID Radio Frequency Identification SEP Supporting Execution Plan Strategy Strategy to Improve Asset...migration of active Radio Frequency Identification ( RFID )19 from a proprietary communication standard protocol to an international standard to...technologies enabling hands-off processing of materiel deploying through the Defense Transportation System. Materiel marked with RFID tags may be remotely

  15. IRIG Serial Time Code Formats

    DTIC Science & Technology

    2016-08-01

    codes contain control functions (CFs) that are reserved for encoding various controls, identification, and other special- purpose functions. Time...set of CF bits for the encoding of various control, identification, and other special- purpose functions. The control bits may be programmed in any... recycles yearly. • There are 18 CFs occur between position identifiers P6 and P8. Any CF bit or combination of bits can be programmed to read a

  16. 76 FR 58137 - Defense Federal Acquisition Regulation Supplement; Positive Law Codification of Title 41 U.S.C...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-20

    ... Supplement; Positive Law Codification of Title 41 U.S.C. (DFARS Case 2011-D036) AGENCY: Defense Acquisition... DFARS to the new Codification of Title 41, United States Code, ``Public Contracts.'' DATES: Effective... of Title 41, United States Code (U.S.C.), entitled ``Public Contracts.'' The purpose of this final...

  17. Feasibility and validation of virtual autopsy for dental identification using the Interpol dental codes.

    PubMed

    Franco, Ademir; Thevissen, Patrick; Coudyzer, Walter; Develter, Wim; Van de Voorde, Wim; Oyen, Raymond; Vandermeulen, Dirk; Jacobs, Reinhilde; Willems, Guy

    2013-05-01

    Virtual autopsy is a medical imaging technique, using full body computed tomography (CT), allowing for a noninvasive and permanent observation of all body parts. For dental identification clinically and radiologically observed ante-mortem (AM) and post-mortem (PM) oral identifiers are compared. The study aimed to verify if a PM dental charting can be performed on virtual reconstructions of full-body CT's using the Interpol dental codes. A sample of 103 PM full-body CT's was collected from the forensic autopsy files of the Department of Forensic Medicine University Hospitals, KU Leuven, Belgium. For validation purposes, 3 of these bodies underwent a complete dental autopsy, a dental radiological and a full-body CT examination. The bodies were scanned in a Siemens Definition Flash CT Scanner (Siemens Medical Solutions, Germany). The images were examined on 8- and 12-bit screen resolution as three-dimensional (3D) reconstructions and as axial, coronal and sagittal slices. InSpace(®) (Siemens Medical Solutions, Germany) software was used for 3D reconstruction. The dental identifiers were charted on pink PM Interpol forms (F1, F2), using the related dental codes. Optimal dental charting was obtained by combining observations on 3D reconstructions and CT slices. It was not feasible to differentiate between different kinds of dental restoration materials. The 12-bit resolution enabled to collect more detailed evidences, mainly related to positions within a tooth. Oral identifiers, not implemented in the Interpol dental coding were observed. Amongst these, the observed (3D) morphological features of dental and maxillofacial structures are important identifiers. The latter can become particularly more relevant towards the future, not only because of the inherent spatial features, yet also because of the increasing preventive dental treatment, and the decreasing application of dental restorations. In conclusion, PM full-body CT examinations need to be implemented in the

  18. Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation

    DTIC Science & Technology

    2006-06-16

    Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline

  19. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    PubMed

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  20. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Code imprint required. 206.10 Section 206.10 Food...: GENERAL IMPRINTING OF SOLID ORAL DOSAGE FORM DRUG PRODUCTS FOR HUMAN USE § 206.10 Code imprint required... imprint that, in conjunction with the product's size, shape, and color, permits the unique identification...

  1. Defense on the Move: Ant-Based Cyber Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less

  2. Co-expression analysis and identification of fecundity-related long non-coding RNAs in sheep ovaries

    PubMed Central

    Miao, Xiangyang; Luo, Qingmiao; Zhao, Huijing; Qin, Xiaoyu

    2016-01-01

    Small Tail Han sheep, including the FecBBFecBB (Han BB) and FecB+ FecB+ (Han++) genotypes, and Dorset sheep exhibit different fecundities. To identify novel long non-coding RNAs (lncRNAs) associated with sheep fecundity to better understand their molecular mechanisms, a genome-wide analysis of mRNAs and lncRNAs from Han BB, Han++ and Dorset sheep was performed. After the identification of differentially expressed mRNAs and lncRNAs, 16 significant modules were explored by using weighted gene coexpression network analysis (WGCNA) followed by functional enrichment analysis of the genes and lncRNAs in significant modules. Among these selected modules, the yellow and brown modules were significantly related to sheep fecundity. lncRNAs (e.g., NR0B1, XLOC_041882, and MYH15) in the yellow module were mainly involved in the TGF-β signalling pathway, and NYAP1 and BCORL1 were significantly associated with the oxytocin signalling pathway, which regulates several genes in the coexpression network of the brown module. Overall, we identified several gene modules associated with sheep fecundity, as well as networks consisting of hub genes and lncRNAs that may contribute to sheep prolificacy by regulating the target mRNAs related to the TGF-β and oxytocin signalling pathways. This study provides an alternative strategy for the identification of potential candidate regulatory lncRNAs. PMID:27982099

  3. Co-expression analysis and identification of fecundity-related long non-coding RNAs in sheep ovaries.

    PubMed

    Miao, Xiangyang; Luo, Qingmiao; Zhao, Huijing; Qin, Xiaoyu

    2016-12-16

    Small Tail Han sheep, including the FecB B FecB B (Han BB) and FecB + FecB + (Han++) genotypes, and Dorset sheep exhibit different fecundities. To identify novel long non-coding RNAs (lncRNAs) associated with sheep fecundity to better understand their molecular mechanisms, a genome-wide analysis of mRNAs and lncRNAs from Han BB, Han++ and Dorset sheep was performed. After the identification of differentially expressed mRNAs and lncRNAs, 16 significant modules were explored by using weighted gene coexpression network analysis (WGCNA) followed by functional enrichment analysis of the genes and lncRNAs in significant modules. Among these selected modules, the yellow and brown modules were significantly related to sheep fecundity. lncRNAs (e.g., NR0B1, XLOC_041882, and MYH15) in the yellow module were mainly involved in the TGF-β signalling pathway, and NYAP1 and BCORL1 were significantly associated with the oxytocin signalling pathway, which regulates several genes in the coexpression network of the brown module. Overall, we identified several gene modules associated with sheep fecundity, as well as networks consisting of hub genes and lncRNAs that may contribute to sheep prolificacy by regulating the target mRNAs related to the TGF-β and oxytocin signalling pathways. This study provides an alternative strategy for the identification of potential candidate regulatory lncRNAs.

  4. COME: a robust coding potential calculation tool for lncRNA identification and characterization based on multiple features.

    PubMed

    Hu, Long; Xu, Zhiyu; Hu, Boqin; Lu, Zhi John

    2017-01-09

    Recent genomic studies suggest that novel long non-coding RNAs (lncRNAs) are specifically expressed and far outnumber annotated lncRNA sequences. To identify and characterize novel lncRNAs in RNA sequencing data from new samples, we have developed COME, a coding potential calculation tool based on multiple features. It integrates multiple sequence-derived and experiment-based features using a decompose-compose method, which makes it more accurate and robust than other well-known tools. We also showed that COME was able to substantially improve the consistency of predication results from other coding potential calculators. Moreover, COME annotates and characterizes each predicted lncRNA transcript with multiple lines of supporting evidence, which are not provided by other tools. Remarkably, we found that one subgroup of lncRNAs classified by such supporting features (i.e. conserved local RNA secondary structure) was highly enriched in a well-validated database (lncRNAdb). We further found that the conserved structural domains on lncRNAs had better chance than other RNA regions to interact with RNA binding proteins, based on the recent eCLIP-seq data in human, indicating their potential regulatory roles. Overall, we present COME as an accurate, robust and multiple-feature supported method for the identification and characterization of novel lncRNAs. The software implementation is available at https://github.com/lulab/COME. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  5. Practical guide to bar coding for patient medication safety.

    PubMed

    Neuenschwander, Mark; Cohen, Michael R; Vaida, Allen J; Patchett, Jeffrey A; Kelly, Jamie; Trohimovich, Barbara

    2003-04-15

    Bar coding for the medication administration step of the drug-use process is discussed. FDA will propose a rule in 2003 that would require bar-code labels on all human drugs and biologicals. Even with an FDA mandate, manufacturer procrastination and possible shifts in product availability are likely to slow progress. Such delays should not preclude health systems from adopting bar-code-enabled point-of-care (BPOC) systems to achieve gains in patient safety. Bar-code technology is a replacement for traditional keyboard data entry. The elements of bar coding are content, which determines the meaning; data format, which refers to the embedded data and symbology, which describes the "font" in which the machine-readable code is written. For a BPOC system to deliver an acceptable level of patient protection, the hospital must first establish reliable processes for a patient identification band, caregiver badge, and medication bar coding. Medications can have either drug-specific or patient-specific bar codes. Both varieties result in the desired code that supports patient's five rights of drug administration. When medications are not available from the manufacturer in immediate-container bar-coded packaging, other means of applying the bar code must be devised, including the use of repackaging equipment, overwrapping, manual bar coding, and outsourcing. Virtually all medications should be bar coded, the bar code on the label should be easily readable, and appropriate policies, procedures, and checks should be in place. Bar coding has the potential to be not only cost-effective but to produce a return on investment. By bar coding patient identification tags, caregiver badges, and immediate-container medications, health systems can substantially increase patient safety during medication administration.

  6. 78 FR 30231 - Defense Federal Acquisition Regulation Supplement: Clarification of “F” Orders in the Procurement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Identification Number Structure (DFARS Case 2012-D040) AGENCY: Defense Acquisition Regulations System, Department... data by the ``F'' in 9th position does not provide a sufficiently discrete result. DoD uses other data...

  7. Pacific Northwest ecoclass codes for seral and potential natural communities.

    Treesearch

    Frederick C. Hall

    1998-01-01

    Lists codes for identification of potential natural communities (plant association, habitat types), their seral status, and vegetation structure in and around the Pacific Northwest. Codes are a six-digit alphanumeric system using the first letter of tree species, life-form, seral status, and structure so that most codes can be directly interpreted. Seven appendices...

  8. Oil and gas field code master list, 1993

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  9. Literal readout of identification signals in Morse code

    NASA Technical Reports Server (NTRS)

    Meissner, C. W., Jr.

    1969-01-01

    Instrument, designed for mounting in aircraft instrument panels, decodes identification signals received in Morse from VOR or ILS transmitters as they are received and displays the literal equivalent. Without elaboration it cannot decode numbers.

  10. Identification coding schemes for modulated reflectance systems

    DOEpatents

    Coates, Don M [Santa Fe, NM; Briles, Scott D [Los Alamos, NM; Neagley, Daniel L [Albuquerque, NM; Platts, David [Santa Fe, NM; Clark, David D [Santa Fe, NM

    2006-08-22

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  11. Weighted SAW reflector gratings for orthogonal frequency coded SAW tags and sensors

    NASA Technical Reports Server (NTRS)

    Puccio, Derek (Inventor); Malocha, Donald (Inventor)

    2011-01-01

    Weighted surface acoustic wave reflector gratings for coding identification tags and sensors to enable unique sensor operation and identification for a multi-sensor environment. In an embodiment, the weighted reflectors are variable while in another embodiment the reflector gratings are apodized. The weighting technique allows the designer to decrease reflectively and allows for more chips to be implemented in a device and, consequently, more coding diversity. As a result, more tags and sensors can be implemented using a given bandwidth when compared with uniform reflectors. Use of weighted reflector gratings with OFC makes various phase shifting schemes possible, such as in-phase and quadrature implementations of coded waveforms resulting in reduced device size and increased coding.

  12. Defense Primer: The National Defense Budget Function (050)

    DTIC Science & Technology

    2017-03-17

    in parenthesis). This defense primer addresses the National Defense Budget (050), which is frequently used to explain trends in military spending...but which also includes some activities not conducted by the Department of Defense. What Is the Purpose of the Budget Function System? The budget

  13. 75 FR 74021 - Renewal of Department of Defense Federal Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... reason. Board members appointed by the Secretary of Defense, who are not full-time or permanent part-time... travel and per diem for official travel, in accordance with Title 5, United States Code, Section 5703... Officer, pursuant to DoD policy, shall be a full-time or permanent part-time DoD employee, and shall be...

  14. DEFENSIVE SPIROKETALS FROM Asceles glaber (PHASMATODEA): ABSOLUTE CONFIGURATION AND EFFECTS ON ANTS AND MOSQUITOES

    PubMed Central

    DOSSEY, AARON T.; WHITAKER, JOHN M.; DANCEL, MARIA CRISTINA A.; VANDER MEER, ROBERT K.; BERNIER, ULRICH R.; GOTTARDO, MARCO; ROUSH, WILLIAM R.

    2012-01-01

    Insects are the largest and most diverse group of organisms on earth, with over 1,000,000 species identified to date. Stick insects (“walkingsticks” or “phasmids”, Order Phasmatodea) are well known for and name derived from their uncanny stereotypical use of camouflage as a primary line of defense from predation. However, many species also possess a potent chemical defense spray. Recently we discovered that the defensive spray of Asceles glaber contains spiroketals (confirmed major component: (2S,6R)-(−)(E)-2-methyl-1,7-dioxaspiro[5.5]undecane and tentative minor component: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this paper we 1) illustrate the identification of spiroketals and glucose in the defense spray of A. glaber using Nuclear Magnetic Resonance (NMR), Gas Chromatography/Mass Spectrometry (GC/MS), and comparison with a synthetic reference sample, 2) provide the elucidation of the absolute configuration of the major spiroketal in that defense spray and 3) demonstrate the effect of this compound and its enantiomer on both fire ants (Solenopsis invicta) and mosquitoes (Aedes aegypti). PMID:22976590

  15. [Relationships between defense mechanisms and coping strategies, facing exam anxiety performance].

    PubMed

    Grebot, E; Paty, B; Girarddephanix, N

    2006-01-01

    Defence mechanisms and coping strategies rely on different theoretical backgrounds and describe distinct psychological processes. Cramer has based a distinction on the following dimensions: conscious processes vs. not; intentionality vs. not; hierarchical conception vs. not. On the contrary to these distinctions, the two notions of defense mechanisms and coping strategies are defined as similar in the Diagnostical and Statistical Manual (DSM IV). This assimilation between coping and defenses in the DSM IV is not confirmed by some researches, namely the one by Callahan and Chabrol. It indeed proves a relationship between adaptive coping and mature defenses, as well as between maladaptive coping and immature defenses. Similarly, Plutchik offered theoretical correspondences between eight defense mechanisms and eight coping strategies: (a) Defenses: repression, isolation, introjection and Coping escape; (b) Defense denial and Coping minimalization; (c) Defense undoing and coping substitution; (d) Defenses: regression, acting out and coping social support; (e) Defenses: compensation, identification, fantasy and coping replacement; (f) Defenses: intellectualization, sublimation, annulation, rationalisation and coping: planification; (g) Defense projection and coping blame; (h) Defense: reactional formation and coping inversion. this research aims at testing the relations observed by Callahan and Chabrol and some theoretical correspondences proposed by Plutchik between defences and coping strategies in a population of students similar to the one used by Callahan and Chabrol. It also aims at studying the relationships between coping strategies and conscious derives of defense mechanisms, such as defined by Bond (1995). Defenses were evaluated the first day of the examination week. the population includes 184 women students in human sciences (sociology and psychology). defenses were evaluated with the Defense Style Questionnaire by Bond (DSQ 40). Its French version is made

  16. An Analysis of the Defense Acquisition Strategy for Unmanned Systems

    DTIC Science & Technology

    2013-11-20

    Product Service Code RAA Rapid Acquisition Authority RCS Radar Cross Section REF Rapid Equipping Force RFID Radio Frequency Identification RDT...the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID technology...enabling miniaturized Free Space Optical Communications systems capable of scaling across data rates, distances, and platforms and integrating with radio

  17. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  18. Violations of Temporary Flight Restrictions and Air Defense Identification Zones: An Analysis of Airspace Violations and Pilot Report Data

    NASA Technical Reports Server (NTRS)

    Zuschlag, Michael

    2005-01-01

    This document provides the results from a study into the apparent factors and causes of violations of restricted airspace, particularly temporary flight restrictions (TFRs) and air defense identification zones (ADIZs). By illuminating the reasons for these violations, this study aims to take the first step towards reducing them. The study assesses the basic characteristics of restricted airspace violations as well as the probable causes and factors contributing to violations. Results from the study imply most violations occur where the restriction has been in place for a significant amount of time prior to the violation. Additionally, the study results imply most violations are not due to the pilot simply being unaware of the airspace at the time of violation. In most violations, pilots are aware of the presence of the restricted airspace but have incorrect information about it, namely, its exact boundaries or procedures for authorized penetration. These results imply that the best means to reduce violations of restricted airspace is to improve the effectiveness of providing pilots the details required to avoid the airspace.

  19. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  20. Mst1 shuts off cytosolic antiviral defense through IRF3 phosphorylation

    PubMed Central

    Meng, Fansen; Zhou, Ruyuan; Wu, Shiying; Zhang, Qian; Jin, Qiuheng; Zhou, Yao; Plouffe, Steven W.; Liu, Shengduo; Song, Hai; Xia, Zongping; Zhao, Bin; Ye, Sheng; Feng, Xin-Hua; Guan, Kun-Liang; Zou, Jian

    2016-01-01

    Cytosolic RNA/DNA sensing elicits primary defense against viral pathogens. Interferon regulatory factor 3 (IRF3), a key signal mediator/transcriptional factor of the antiviral-sensing pathway, is indispensible for interferon production and antiviral defense. However, how the status of IRF3 activation is controlled remains elusive. Through a functional screen of the human kinome, we found that mammalian sterile 20-like kinase 1 (Mst1), but not Mst2, profoundly inhibited cytosolic nucleic acid sensing. Mst1 associated with IRF3 and directly phosphorylated IRF3 at Thr75 and Thr253. This Mst1-mediated phosphorylation abolished activated IRF3 homodimerization, its occupancy on chromatin, and subsequent IRF3-mediated transcriptional responses. In addition, Mst1 also impeded virus-induced activation of TANK-binding kinase 1 (TBK1), further attenuating IRF3 activation. As a result, Mst1 depletion or ablation enabled an enhanced antiviral response and defense in cells and mice. Therefore, the identification of Mst1 as a novel physiological negative regulator of IRF3 activation provides mechanistic insights into innate antiviral defense and potential antiviral prevention strategies. PMID:27125670

  1. Natural language processing of clinical notes for identification of critical limb ischemia.

    PubMed

    Afzal, Naveed; Mallipeddi, Vishnu Priya; Sohn, Sunghwan; Liu, Hongfang; Chaudhry, Rajeev; Scott, Christopher G; Kullo, Iftikhar J; Arruda-Olson, Adelaide M

    2018-03-01

    Critical limb ischemia (CLI) is a complication of advanced peripheral artery disease (PAD) with diagnosis based on the presence of clinical signs and symptoms. However, automated identification of cases from electronic health records (EHRs) is challenging due to absence of a single definitive International Classification of Diseases (ICD-9 or ICD-10) code for CLI. In this study, we extend a previously validated natural language processing (NLP) algorithm for PAD identification to develop and validate a subphenotyping NLP algorithm (CLI-NLP) for identification of CLI cases from clinical notes. We compared performance of the CLI-NLP algorithm with CLI-related ICD-9 billing codes. The gold standard for validation was human abstraction of clinical notes from EHRs. Compared to billing codes the CLI-NLP algorithm had higher positive predictive value (PPV) (CLI-NLP 96%, billing codes 67%, p < 0.001), specificity (CLI-NLP 98%, billing codes 74%, p < 0.001) and F1-score (CLI-NLP 90%, billing codes 76%, p < 0.001). The sensitivity of these two methods was similar (CLI-NLP 84%; billing codes 88%; p < 0.12). The CLI-NLP algorithm for identification of CLI from narrative clinical notes in an EHR had excellent PPV and has potential for translation to patient care as it will enable automated identification of CLI cases for quality projects, clinical decision support tools and support a learning healthcare system. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  2. Ground-Based Missile Defense (National Missile Defense): Is It Feasible?

    DTIC Science & Technology

    2004-03-19

    Westview Press), 191. 47 Ibid. 192. 48 Dr. Nicholas Berry, National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia...153. 18 19 BIBLIOGRAPHY Berry, Nicholas. National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia, Center for

  3. Extracellular ATP Acts on Jasmonate Signaling to Reinforce Plant Defense.

    PubMed

    Tripathi, Diwaker; Zhang, Tong; Koo, Abraham J; Stacey, Gary; Tanaka, Kiwamu

    2018-01-01

    Damaged cells send various signals to stimulate defense responses. Recent identification and genetic studies of the plant purinoceptor, P2K1 (also known as DORN1), have demonstrated that extracellular ATP is a signal involved in plant stress responses, including wounding, perhaps to evoke plant defense. However, it remains largely unknown how extracellular ATP induces plant defense responses. Here, we demonstrate that extracellular ATP induces plant defense mediated through activation of the intracellular signaling of jasmonate (JA), a well-characterized defense hormone. In Arabidopsis ( Arabidopsis thaliana ) leaves, ATP pretreatment induced resistance against the necrotrophic fungus, Botrytis cinerea The induced resistance was enhanced in the P2K1 receptor overexpression line, but reduced in the receptor mutant, dorn1 - 3 Mining the transcriptome data revealed that ATP induces a set of JA-induced genes. In addition, the P2K1-associated coexpression network contains defense-related genes, including those encoding jasmonate ZIM-domain (JAZ) proteins, which play key roles as repressors of JA signaling. We examined whether extracellular ATP impacts the stability of JAZ1 in Arabidopsis. The results showed that the JAZ1 stability decreased in response to ATP addition in a proteasome-dependent manner. This reduction required intracellular signaling via second messengers-cytosolic calcium, reactive oxygen species, and nitric oxide. Interestingly, the ATP-induced JAZ1 degradation was attenuated in the JA receptor mutant, coi1 , but not in the JA biosynthesis mutant, aos , or upon addition of JA biosynthesis inhibitors. Immunoprecipitation analysis demonstrated that ATP increases the interaction between COI1 and JAZ1, suggesting direct cross talk between extracellular ATP and JA in intracellular signaling events. Taken together, these results suggest that extracellular ATP signaling directly impacts the JA signaling pathway to maximize plant defense responses. © 2018

  4. Suture Coding: A Novel Educational Guide for Suture Patterns.

    PubMed

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good

  5. Assistant Secretary of Defense for Homeland Defense and Global Security

    Science.gov Websites

    Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland

  6. An improved method for identification of small non-coding RNAs in bacteria using support vector machine

    NASA Astrophysics Data System (ADS)

    Barman, Ranjan Kumar; Mukhopadhyay, Anirban; Das, Santasabuj

    2017-04-01

    Bacterial small non-coding RNAs (sRNAs) are not translated into proteins, but act as functional RNAs. They are involved in diverse biological processes like virulence, stress response and quorum sensing. Several high-throughput techniques have enabled identification of sRNAs in bacteria, but experimental detection remains a challenge and grossly incomplete for most species. Thus, there is a need to develop computational tools to predict bacterial sRNAs. Here, we propose a computational method to identify sRNAs in bacteria using support vector machine (SVM) classifier. The primary sequence and secondary structure features of experimentally-validated sRNAs of Salmonella Typhimurium LT2 (SLT2) was used to build the optimal SVM model. We found that a tri-nucleotide composition feature of sRNAs achieved an accuracy of 88.35% for SLT2. We validated the SVM model also on the experimentally-detected sRNAs of E. coli and Salmonella Typhi. The proposed model had robustly attained an accuracy of 81.25% and 88.82% for E. coli K-12 and S. Typhi Ty2, respectively. We confirmed that this method significantly improved the identification of sRNAs in bacteria. Furthermore, we used a sliding window-based method and identified sRNAs from complete genomes of SLT2, S. Typhi Ty2 and E. coli K-12 with sensitivities of 89.09%, 83.33% and 67.39%, respectively.

  7. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  8. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  9. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  10. An Analysis of the Defense Acquisition Strategy for Unmanned Systems

    DTIC Science & Technology

    2014-03-01

    product service code RAA Rapid Acquisition Authority RCS radar cross section REF Rapid Equipping Force RFID radio frequency identification RDT...commercialization of the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID...companies following the September 11 , 2001 attacks. It is important to note that despite advances in GPS technology and long-range communications

  11. Study of the measurement of defense style using Bond's Defense Style Questionnaire.

    PubMed

    Nishimura, R

    1998-08-01

    Two hundred and seventy healthy university students were surveyed in December 1995 using Bond's Defense Style Questionnaire (DSQ) to measure the subjects' defense mechanisms. At the same time, a survey using Byrne's R-S Scale (Repression-Sensitization Scale) of the MMPI (Minnesota multiphasic personality inventory) and five psychiatric symptom indexes (anxiety, sense of inadequacy, sensitivity, depression and impulsive anger) selected from the CMI (Cornell Medical Index-Health Questionnaire) was conducted. Three factors were extracted from the DSQ through factor analysis: immature defenses, neurotic defenses, and mature defenses. The results of analysis of variance revealed the following: (i) for anxiety and anxiety related symptoms, both immature defenses and neurotic defenses indicated principal effect; (ii) for impulsive anger and depression, immature defenses presented principal effect; and (iii) for sensitivity and impulsive anger, interaction between a mature defense style and neurotic defense style was noted. The relationship between defense styles and psychiatric symptoms in healthy people is studied in this paper.

  12. ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite

    PubMed Central

    2010-01-01

    Background Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents, experimental techniques, and data analysis software. Using isotopically-coded ("heavy and light") versions of the crosslinker and cleavable crosslinking reagents is analytically advantageous for mass spectrometric applications and provides a "handle" that can be used to distinguish crosslinked peptides of different types, and to increase the confidence of the identification of the crosslinks. Results Here, we describe a program suite designed for the analysis of mass spectrometric data obtained with isotopically-coded cleavable crosslinkers. The suite contains three programs called: DX, DXDX, and DXMSMS. DX searches the mass spectra for the presence of ion signal doublets resulting from the light and heavy isotopic forms of the isotopically-coded crosslinking reagent used. DXDX searches for possible mass matches between cleaved and uncleaved isotopically-coded crosslinks based on the established chemistry of the cleavage reaction for a given crosslinking reagent. DXMSMS assigns the crosslinks to the known protein sequences, based on the isotopically-coded and un-coded MS/MS fragmentation data of uncleaved and cleaved peptide crosslinks. Conclusion The combination of these three programs, which are tailored to the analytical features of the specific isotopically-coded cleavable crosslinking reagents used, represents a powerful software tool for automated high-accuracy peptide crosslink identification. See: http://www.creativemolecules.com/CM_Software.htm PMID:20109223

  13. A QR code identification technology in package auto-sorting system

    NASA Astrophysics Data System (ADS)

    di, Yi-Juan; Shi, Jian-Ping; Mao, Guo-Yong

    2017-07-01

    Traditional manual sorting operation is not suitable for the development of Chinese logistics. For better sorting packages, a QR code recognition technology is proposed to identify the QR code label on the packages in package auto-sorting system. The experimental results compared with other algorithms in literatures demonstrate that the proposed method is valid and its performance is superior to other algorithms.

  14. Phonological coding during reading.

    PubMed

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  15. Sandia National Laboratories analysis code data base

    NASA Astrophysics Data System (ADS)

    Peterson, C. W.

    1994-11-01

    Sandia National Laboratories' mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The laboratories' strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia's technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems, and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code 'ownership' and release status, and references describing the physical models and numerical implementation.

  16. Major influence of interobserver reliability on polytrauma identification with the Injury Severity Score (ISS): Time for a centralised coding in trauma registries?

    PubMed

    Maduz, Roman; Kugelmeier, Patrick; Meili, Severin; Döring, Robert; Meier, Christoph; Wahl, Peter

    2017-04-01

    The Abbreviated Injury Scale (AIS) and the Injury Severity Score (ISS) find increasingly widespread use to assess trauma burden and to perform interhospital benchmarking through trauma registries. Since 2015, public resource allocation in Switzerland shall even be derived from such data. As every trauma centre is responsible for its own coding and data input, this study aims at evaluating interobserver reliability of AIS and ISS coding. Interobserver reliability of the AIS and ISS is analysed from a cohort of 50 consecutive severely injured patients treated in 2012 at our institution, coded retrospectively by 3 independent and specifically trained observers. Considering a cutoff ISS≥16, only 38/50 patients (76%) were uniformly identified as polytraumatised or not. Increasing the cut off to ≥20, this increased to 41/50 patients (82%). A difference in the AIS of ≥ 1 was present in 261 (16%) of possible codes. Excluding the vast majority of uninjured body regions, uniformly identical AIS severity values were attributed in 67/193 (35%) body regions, or 318/579 (55%) possible observer pairings. Injury severity all too often is neither identified correctly nor consistently when using the AIS. This leads to wrong identification of severely injured patients using the ISS. Improving consistency of coding through centralisation is recommended before scores based on the AIS are to be used for interhospital benchmarking and resource allocation in the treatment of severely injured patients. Copyright © 2017. Published by Elsevier Ltd.

  17. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  18. The Redox Code.

    PubMed

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  19. 33 CFR 181.31 - Manufacturer identification code assignment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.31 Manufacturer... manufacturer's name and U.S. address along with the general types and lengths of boats that will be manufactured. (b) For boats manufactured outside of the jurisdiction of the United States, a U.S. importer must...

  20. Current Research on Non-Coding Ribonucleic Acid (RNA).

    PubMed

    Wang, Jing; Samuels, David C; Zhao, Shilin; Xiang, Yu; Zhao, Ying-Yong; Guo, Yan

    2017-12-05

    Non-coding ribonucleic acid (RNA) has without a doubt captured the interest of biomedical researchers. The ability to screen the entire human genome with high-throughput sequencing technology has greatly enhanced the identification, annotation and prediction of the functionality of non-coding RNAs. In this review, we discuss the current landscape of non-coding RNA research and quantitative analysis. Non-coding RNA will be categorized into two major groups by size: long non-coding RNAs and small RNAs. In long non-coding RNA, we discuss regular long non-coding RNA, pseudogenes and circular RNA. In small RNA, we discuss miRNA, transfer RNA, piwi-interacting RNA, small nucleolar RNA, small nuclear RNA, Y RNA, single recognition particle RNA, and 7SK RNA. We elaborate on the origin, detection method, and potential association with disease, putative functional mechanisms, and public resources for these non-coding RNAs. We aim to provide readers with a complete overview of non-coding RNAs and incite additional interest in non-coding RNA research.

  1. 3 CFR - Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code Presidential Documents Other Presidential Documents Memorandum of June 19, 2013 Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code Memorandum for the Secretary of Defense B...

  2. Dynamic defense workshop :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-artmore » work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.« less

  3. Enhancing lineup identification accuracy: two codes are better than one.

    PubMed

    Melara, R D; DeWitt-Rickards, T S; O'Brien, T P

    1989-10-01

    Ways of improving identification accuracy were explored by comparing the conventional visual lineup with an auditory/visual lineup, one that paired color photographs with voice recordings. This bimodal lineup necessitated sequential presentation of lineup members; Experiment 1 showed that performance in sequential lineups was better than performance in traditional simultaneous lineups. In Experiments 2A and 2B unimodal and bimodal lineups were compared by using a multiple-lineup paradigm: Ss viewed 3 videotaped episodes depicting standard police procedures and were tested in 4 sequential lineups. Bimodal lineups were more diagnostic than either visual or auditory lineups alone. The bimodal lineup led to a 126% improvement in number of correct identifications over the conventional visual lineup, with no concomitant increase in number of false identifications. These results imply strongly that bimodal procedures should be adopted in real-world lineups. The nature of memorial processes underlying this bimodal advantage is discussed.

  4. Wartime Tracking of Class I Surface Shipments from Production or Procurement to Destination

    DTIC Science & Technology

    1992-04-01

    Armed Forces I ICAF-FAP National Defense University 6c. ADDRESS (City, State, ard ZIP Code ) 7b. ADDRESS (City, State, and ZIP Code ) Fort Lesley J...INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) 9c. ADDRESS (City, State, and ZIP Code ) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK...COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP 19. ABSTRACT (Continue on reverse

  5. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  6. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  7. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  8. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  9. 22 CFR 120.44 - Foreign defense article or defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... defense service means any article or service described on the U.S. Munitions List of non-U.S. origin... U.S. and foreign origin defense articles and defense services described on the U.S. Munitions List...

  10. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  11. 48 CFR 52.204-18 - Commercial and Government Entity Code Maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... assigned to entities located in the United States or its outlying areas by the Defense Logistics Agency... NATO Support Agency (NSPA) to entities located outside the United States and its outlying areas that... code on the contract. (c) Contractors located in the United States or its outlying areas that are not...

  12. Two-dimensional QR-coded metamaterial absorber

    NASA Astrophysics Data System (ADS)

    Sui, Sai; Ma, Hua; Wang, Jiafu; Pang, Yongqiang; Zhang, Jieqiu; Qu, Shaobo

    2016-01-01

    In this paper, the design of metamaterial absorbers is proposed based on QR coding and topology optimization. Such absorbers look like QR codes and can be recognized by decoding softwares as well as mobile phones. To verify the design, two lightweight wideband absorbers are designed, which can achieve wideband absorption above 90 % in 6.68-19.30 and 7.00-19.70 GHz, respectively. More importantly, polarization-independent absorption over 90 % can be maintained under incident angle within 55°. The QR code absorber not only can achieve wideband absorption, but also can carry information such as texts and Web sites. They are of important values in applications such identification and electromagnetic protection.

  13. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    PubMed

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  14. Defensive Spiroketals from Asceles glaber (Phasmatodea): Absolute Configuration and Effects on Ants and Mosquitoes

    USDA-ARS?s Scientific Manuscript database

    Recently we discovered that the defensive spray of Asceles glaber, a stick insect native to Thailand, contains two spiroketals (major: 2(S)-(-)-(E,E)-2- methyl-1,7-dioxaspiro[5.5]undecane and minor: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this report we: 1) illustrate the identification o...

  15. A review of automatic patient identification options for public health care centers with restricted budgets.

    PubMed

    García-Betances, Rebeca I; Huerta, Mónica K

    2012-01-01

    A comparative review is presented of available technologies suitable for automatic reading of patient identification bracelet tags. Existing technologies' backgrounds, characteristics, advantages and disadvantages, are described in relation to their possible use by public health care centers with budgetary limitations. A comparative assessment is presented of suitable automatic identification systems based on graphic codes, both one- (1D) and two-dimensional (2D), printed on labels, as well as those based on radio frequency identification (RFID) tags. The analysis looks at the tradeoffs of these technologies to provide guidance to hospital administrator looking to deploy patient identification technology. The results suggest that affordable automatic patient identification systems can be easily and inexpensively implemented using 2D code printed on low cost bracelet labels, which can then be read and automatically decoded by ordinary mobile smart phones. Because of mobile smart phones' present versatility and ubiquity, the implantation and operation of 2D code, and especially Quick Response® (QR) Code, technology emerges as a very attractive alternative to automate the patients' identification processes in low-budget situations.

  16. A Review of Automatic Patient Identification Options for Public Health Care Centers with Restricted Budgets

    PubMed Central

    García-Betances, Rebeca I.; Huerta, Mónica K.

    2012-01-01

    A comparative review is presented of available technologies suitable for automatic reading of patient identification bracelet tags. Existing technologies’ backgrounds, characteristics, advantages and disadvantages, are described in relation to their possible use by public health care centers with budgetary limitations. A comparative assessment is presented of suitable automatic identification systems based on graphic codes, both one- (1D) and two-dimensional (2D), printed on labels, as well as those based on radio frequency identification (RFID) tags. The analysis looks at the tradeoffs of these technologies to provide guidance to hospital administrator looking to deploy patient identification technology. The results suggest that affordable automatic patient identification systems can be easily and inexpensively implemented using 2D code printed on low cost bracelet labels, which can then be read and automatically decoded by ordinary mobile smart phones. Because of mobile smart phones’ present versatility and ubiquity, the implantation and operation of 2D code, and especially Quick Response® (QR) Code, technology emerges as a very attractive alternative to automate the patients’ identification processes in low-budget situations. PMID:23569629

  17. Optimal defense theory explains deviations from latitudinal herbivory defense hypothesis.

    PubMed

    Kooyers, Nicholas J; Blackman, Benjamin K; Holeski, Liza M

    2017-04-01

    The latitudinal herbivory defense hypothesis (LHDH) postulates that the prevalence of species interactions, including herbivory, is greater at lower latitudes, leading to selection for increased levels of plant defense. While latitudinal defense clines may be caused by spatial variation in herbivore pressure, optimal defense theory predicts that clines could also be caused by ecogeographic variation in the cost of defense. For instance, allocation of resources to defense may not increase plant fitness when growing seasons are short and plants must reproduce quickly. Here we use a common garden experiment to survey genetic variation for constitutive and induced phenylpropanoid glycoside (PPG) concentrations across 35 Mimulus guttatus populations over a ~13° latitudinal transect. Our sampling regime is unique among studies of the LHDH in that it allows us to disentangle the effects of growing season length from those of latitude, temperature, and elevation. For five of the seven PPGs surveyed, we find associations between latitude and plant defense that are robust to population structure. However, contrary to the LHDH, only two PPGs were found at higher levels in low latitude populations, and total PPG concentrations were higher at higher latitudes. PPG levels are strongly correlated with growing season length, with higher levels of PPGs in plants from areas with longer growing seasons. Further, flowering time is positively correlated with the concentration of nearly all PPGs, suggesting that there may be a strong trade-off between development time and defense production. Our results reveal that ecogeographic patterns in plant defense may reflect variation in the cost of producing defense compounds in addition to variation in herbivore pressure. Thus, the biogeographic pattern predicted by the LHDH may not be accurate because the underlying factors driving variation in defense, in this case, growing season length, are not always associated with latitude in the same

  18. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    NASA Astrophysics Data System (ADS)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  19. Ballistic missile defense effectiveness

    NASA Astrophysics Data System (ADS)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  20. Signal Prediction With Input Identification

    NASA Technical Reports Server (NTRS)

    Juang, Jer-Nan; Chen, Ya-Chin

    1999-01-01

    A novel coding technique is presented for signal prediction with applications including speech coding, system identification, and estimation of input excitation. The approach is based on the blind equalization method for speech signal processing in conjunction with the geometric subspace projection theory to formulate the basic prediction equation. The speech-coding problem is often divided into two parts, a linear prediction model and excitation input. The parameter coefficients of the linear predictor and the input excitation are solved simultaneously and recursively by a conventional recursive least-squares algorithm. The excitation input is computed by coding all possible outcomes into a binary codebook. The coefficients of the linear predictor and excitation, and the index of the codebook can then be used to represent the signal. In addition, a variable-frame concept is proposed to block the same excitation signal in sequence in order to reduce the storage size and increase the transmission rate. The results of this work can be easily extended to the problem of disturbance identification. The basic principles are outlined in this report and differences from other existing methods are discussed. Simulations are included to demonstrate the proposed method.

  1. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  2. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  3. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  4. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  5. Genome-wide identification of conserved intronic non-coding sequences using a Bayesian segmentation approach.

    PubMed

    Algama, Manjula; Tasker, Edward; Williams, Caitlin; Parslow, Adam C; Bryson-Richardson, Robert J; Keith, Jonathan M

    2017-03-27

    Computational identification of non-coding RNAs (ncRNAs) is a challenging problem. We describe a genome-wide analysis using Bayesian segmentation to identify intronic elements highly conserved between three evolutionarily distant vertebrate species: human, mouse and zebrafish. We investigate the extent to which these elements include ncRNAs (or conserved domains of ncRNAs) and regulatory sequences. We identified 655 deeply conserved intronic sequences in a genome-wide analysis. We also performed a pathway-focussed analysis on genes involved in muscle development, detecting 27 intronic elements, of which 22 were not detected in the genome-wide analysis. At least 87% of the genome-wide and 70% of the pathway-focussed elements have existing annotations indicative of conserved RNA secondary structure. The expression of 26 of the pathway-focused elements was examined using RT-PCR, providing confirmation that they include expressed ncRNAs. Consistent with previous studies, these elements are significantly over-represented in the introns of transcription factors. This study demonstrates a novel, highly effective, Bayesian approach to identifying conserved non-coding sequences. Our results complement previous findings that these sequences are enriched in transcription factors. However, in contrast to previous studies which suggest the majority of conserved sequences are regulatory factor binding sites, the majority of conserved sequences identified using our approach contain evidence of conserved RNA secondary structures, and our laboratory results suggest most are expressed. Functional roles at DNA and RNA levels are not mutually exclusive, and many of our elements possess evidence of both. Moreover, ncRNAs play roles in transcriptional and post-transcriptional regulation, and this may contribute to the over-representation of these elements in introns of transcription factors. We attribute the higher sensitivity of the pathway-focussed analysis compared to the genome

  6. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    PubMed

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  7. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 15 2013-04-01 2013-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification number...

  8. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 15 2014-04-01 2014-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification number...

  9. DNA barcode goes two-dimensions: DNA QR code web server.

    PubMed

    Liu, Chang; Shi, Linchun; Xu, Xiaolan; Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications.

  10. DNA Barcode Goes Two-Dimensions: DNA QR Code Web Server

    PubMed Central

    Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, “DNA barcode” actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications. PMID:22574113

  11. 78 FR 76715 - Presidential Determination Pursuant to Section 1245(d)(4)(B) and (C) of the National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-18

    ... National Defense Authorization Act for Fiscal Year 2012, Public Law 112-81, and consistent with my... HOUSE, Washington, November 29, 2013. [FR Doc. 2013-30276 Filed 12-17-13; 11:15 am] Billing code 4710-10 ...

  12. Defense without aggression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, H.

    1988-09-01

    In introducing this group of articles on nonoffensive defense the author notes that the prospect of nuclear disarmament in Europe is boosting ideas, which have been around for a decade, from theory to politics. This special section of articles looks at an emerging theory that may reduce reliance on nuclear weapons by bringing stability to the conventional standoff in central Europe. The idea is to rearrange conventional forces so that they can defend but not attack. Under such monikers as nonoffensive defense (the main term used in these articles), nonprovocative defense, defensive defense, reasonable sufficiency, and mutual defensive superiority, thesemore » proposals suggest that nations can restructure weapons, personnel, and strategy to assure their own military security without posing a threat to other nations. 5 refs.« less

  13. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    DTIC Science & Technology

    2016-04-28

    Page 1 GAO- 16 -339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense...Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century , the Department of Defense (DOD) has been...81, § 232 (a) (2011). 2 GAO- 16 -339R Ballistic Missile Defense baselines, we analyzed the testing goals for selected elements, which are

  14. The Redox Code

    PubMed Central

    Jones, Dean P.

    2015-01-01

    Abstract Significance: The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O2 and H2O2 contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Recent Advances: Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Critical Issues: Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Future Directions: Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine. Antioxid. Redox Signal. 23, 734–746. PMID:25891126

  15. A two-dimensional neuropsychology of defense: fear/anxiety and defensive distance.

    PubMed

    McNaughton, Neil; Corr, Philip J

    2004-05-01

    We present in this paper a picture of the neural systems controlling defense that updates and simplifies Gray's "Neuropsychology of Anxiety". It is based on two behavioural dimensions: 'defensive distance' as defined by the Blanchards and 'defensive direction'. Defensive direction is a categorical dimension with avoidance of threat corresponding to fear and approach to threat corresponding to anxiety. These two psychological dimensions are mapped to underlying neural dimensions. Defensive distance is mapped to neural level, with the shortest defensive distances involving the lowest neural level (periaqueductal grey) and the largest defensive distances the highest neural level (prefrontal cortex). Defensive direction is mapped to separate parallel streams that run across these levels. A significant departure from prior models is the proposal that both fear and anxiety are represented at all levels. The theory is presented in a simplified form that does not incorporate the interactions that must occur between non-adjacent levels of the system. It also requires expansion to include the dimension of escapability of threat. Our current development and these proposed future extensions do not change the core concepts originally proposed by Gray and, we argue, demonstrate their enduring value.

  16. The C-terminal sequence of several human serine proteases encodes host defense functions.

    PubMed

    Kasetty, Gopinath; Papareddy, Praveen; Kalle, Martina; Rydengård, Victoria; Walse, Björn; Svensson, Bo; Mörgelin, Matthias; Malmsten, Martin; Schmidtchen, Artur

    2011-01-01

    Serine proteases of the S1 family have maintained a common structure over an evolutionary span of more than one billion years, and evolved a variety of substrate specificities and diverse biological roles, involving digestion and degradation, blood clotting, fibrinolysis and epithelial homeostasis. We here show that a wide range of C-terminal peptide sequences of serine proteases, particularly from the coagulation and kallikrein systems, share characteristics common with classical antimicrobial peptides of innate immunity. Under physiological conditions, these peptides exert antimicrobial effects as well as immunomodulatory functions by inhibiting macrophage responses to bacterial lipopolysaccharide. In mice, selected peptides are protective against lipopolysaccharide-induced shock. Moreover, these S1-derived host defense peptides exhibit helical structures upon binding to lipopolysaccharide and also permeabilize liposomes. The results uncover new and fundamental aspects on host defense functions of serine proteases present particularly in blood and epithelia, and provide tools for the identification of host defense molecules of therapeutic interest. Copyright © 2011 S. Karger AG, Basel.

  17. Thermoelectric pump performance analysis computer code

    NASA Technical Reports Server (NTRS)

    Johnson, J. L.

    1973-01-01

    A computer program is presented that was used to analyze and design dual-throat electromagnetic dc conduction pumps for the 5-kwe ZrH reactor thermoelectric system. In addition to a listing of the code and corresponding identification of symbols, the bases for this analytical model are provided.

  18. Raman scattering spectroscopy for explosives identification

    NASA Astrophysics Data System (ADS)

    Nagli, L.; Gaft, M.

    2007-04-01

    Real time detection and identification of explosives at a standoff distance is a major issue in efforts to develop defense against so-called Improvised Explosive Devices (IED). It is recognized that the only technique, which is potentially capable to standoff detection of minimal amounts of explosives is laser-based spectroscopy. LDS technique belongs to trace detection, namely to its micro-particles variety. We applied gated Raman and time-resolved luminescence spectroscopy for detection of main explosive materials, both factory and homemade. Raman system was developed and tested by LDS for field remote detection and identification of minimal amounts of explosives on relevant surfaces at a distance of up to 30 meters.

  19. Section 847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors

    DTIC Science & Technology

    2016-03-31

    847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors M A R C H 3 1 , 2 0 1 6 Report No. DODIG-2016-070...Senior Defense Officials Seeking Employment with Defense Contractors Visit us at www.dodig.mil March 31, 2016 Objectives The objectives of our project...description of future duties from a Defense contractor . • Some ethics officials issued nonspecific post-Government employment guidance as a Section 847

  20. "I want to be a daddy!": meanings of masculine identifications in girls.

    PubMed

    Rees, K

    1987-07-01

    This paper suggests revisions in our understanding of feminine identity formation, the girl's negative oedipus complex, and masculine identifications in girls. Analytic material from the cases of three girls is used to explore the various origins and intrapsychic functions of masculine identifications at each phase of the girl's development. Accounts of feminine development based on such concepts as castration shock, primary femininity, primary identification with mother, or core gender identity are seen as oversimplified. Feminine and masculine identifications are neither primary nor secondary, but the product of a long line of development, of ongoing conflict resolution, and of defensive transformations.

  1. Review of flat panel display programs and defense applications

    NASA Astrophysics Data System (ADS)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  2. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., used to retrieve data encoded on machine-readable media. Concatenated unique item identifier means— (1... Defense Logistics Information System (DLIS) Commercial and Government Entity (CAGE) Code). Issuing agency... identifier. Item means a single hardware article or a single unit formed by a grouping of subassemblies...

  3. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  4. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  5. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  6. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  7. An Approach to Defensible Nondiscriminatory Identification Model for the Gifted.

    ERIC Educational Resources Information Center

    Long, Robert R.

    To develop an approach for a nondiscriminatory identification model for gifted students in Rome (GA) City Schools, mean IQ scores on the Otis-Lennon Mental Ability test were compared for fourth, fifth, and tenth grade students divided into four groups: White advantaged, White disadvantaged, Black advantaged, and Black disadvantaged. A significant…

  8. 22 CFR 126.17 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and the...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...; (ii) Technical data (including data packages, technical papers, manuals, presentations, specifications... person who receives defense articles, including technical data, but who does not have access to such... (other than technical data) shall be individually labeled with the appropriate identification detailed in...

  9. 22 CFR 126.16 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and Australia.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... section; (ii) Technical data (including data packages, technical papers, manuals, presentations..., defense articles, including technical data, for the sole purpose of effecting onward movement to members... (other than technical data) shall be individually labeled with the appropriate identification detailed in...

  10. Teaching Psychological Defense Mechanisms: "The Defense Mechanisms Game."

    ERIC Educational Resources Information Center

    Waugh, Charles G.

    1980-01-01

    Presents the rules for an educational game in which students reinforce psychology lecture material by creating and dramatizing defense mechanisms such as reaction formation, displacement, and fantasy. Provides definitions and examples of the various defense mechanisms that can be portrayed. (JP)

  11. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    PubMed

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  12. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  13. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  14. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  15. Problems of Air Defense - and - Appedicies. Volumes I-III

    DTIC Science & Technology

    1951-08-01

    have tee3.essarily involved sctiutiny of isuch areas as Fleet problems ancd air defense of forward bases, the major emphasisuof the study has been on ...identification procedures, in the period until the first attack, is that taey be pePrf ect to anout one : case in .100,000 in dits ’not_- friend fromn...t oniust dietto its alternaite ai-rporlt. Mn any case , "’ilthin. a sotinterva1 ^4 C t týuv I (a pendimt on the speed of data Process~ig - erh-ns

  16. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  17. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  18. The disclosure of diagnosis codes can breach research participants' privacy.

    PubMed

    Loukides, Grigorios; Denny, Joshua C; Malin, Bradley

    2010-01-01

    De-identified clinical data in standardized form (eg, diagnosis codes), derived from electronic medical records, are increasingly combined with research data (eg, DNA sequences) and disseminated to enable scientific investigations. This study examines whether released data can be linked with identified clinical records that are accessible via various resources to jeopardize patients' anonymity, and the ability of popular privacy protection methodologies to prevent such an attack. The study experimentally evaluates the re-identification risk of a de-identified sample of Vanderbilt's patient records involved in a genome-wide association study. It also measures the level of protection from re-identification, and data utility, provided by suppression and generalization. Privacy protection is quantified using the probability of re-identifying a patient in a larger population through diagnosis codes. Data utility is measured at a dataset level, using the percentage of retained information, as well as its description, and at a patient level, using two metrics based on the difference between the distribution of Internal Classification of Disease (ICD) version 9 codes before and after applying privacy protection. More than 96% of 2800 patients' records are shown to be uniquely identified by their diagnosis codes with respect to a population of 1.2 million patients. Generalization is shown to reduce further the percentage of de-identified records by less than 2%, and over 99% of the three-digit ICD-9 codes need to be suppressed to prevent re-identification. Popular privacy protection methods are inadequate to deliver a sufficiently protected and useful result when sharing data derived from complex clinical systems. The development of alternative privacy protection models is thus required.

  19. Report of the Defense Review Committee for the Code of Conduct. Volume 2. Supplement,

    DTIC Science & Technology

    1976-01-01

    think of all the innocent people killed, schools and churches destroyed, medical aid stations ruined ...." "During the (preflight) briefings, I was...other people could live by the Code of Conduct, then I could too, but I don’t think you could ever find anybody who was ever released that lived...Code of Conduct; it was trying just to survive." " I think there is a need for some sort of document to assist people , particularly people who could

  20. Intellectual system of identification of Arabic graphics

    NASA Astrophysics Data System (ADS)

    Abdoullayeva, Gulchin G.; Aliyev, Telman A.; Gurbanova, Nazakat G.

    2001-08-01

    The studies made by using the domain of graphic images allowed creating facilities of the artificial intelligence for letters, letter combinations etc. for various graphics and prints. The work proposes a system of recognition and identification of symbols of the Arabic graphics, which has its own specificity as compared to Latin and Cyrillic ones. The starting stage of the recognition and the identification is coding with further entry of information into a computer. Here the problem of entry is one of the essentials. For entry of a large volume of information in the unit of time a scanner is usually employed. Along with the scanner the authors suggest their elaboration of technical facilities for effective input and coding of the information. For refinement of symbols not identified from the scanner mostly for a small bulk of information the developed coding devices are used directly in the process of writing. The functional design of the software is elaborated on the basis of the heuristic model of the creative activity of a researcher and experts in the description and estimation of states of the weakly formalizable systems on the strength of the methods of identification and of selection of geometric features.

  1. Defense Human Resources Activity > PERSEREC

    Science.gov Websites

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  2. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  3. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense...

  4. 33 CFR 337.9 - Identification and use of disposal areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) evaluation and environmental assessment or environmental impact statement should also address long-term... ARMY, DEPARTMENT OF DEFENSE PRACTICE AND PROCEDURE § 337.9 Identification and use of disposal areas. (a... life of existing disposal areas. Requests for water quality certification and/or coastal zone...

  5. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 5 2013-07-01 2013-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  6. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 5 2014-07-01 2014-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  7. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 5 2012-07-01 2012-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  8. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  9. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  10. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    NASA Technical Reports Server (NTRS)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  11. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  12. Phonological Coding Abilities: Identification of Impairments Related to Phonologically Based Reading Problems.

    ERIC Educational Resources Information Center

    Swank, Linda K.

    1994-01-01

    Relationships between phonological coding abilities and reading outcomes have implications for differential diagnosis of language-based reading problems. The theoretical construct of specific phonological coding ability is explained, including phonological encoding, phonological awareness and metaphonology, lexical access, working memory, and…

  13. Using Large Signal Code TESLA for Wide Band Klystron Simulations

    DTIC Science & Technology

    2006-04-01

    tuning procedure TESLA simulates of high power klystron [3]. accurately actual eigenmodes of the structure as a solution Wide band klystrons very often...on band klystrons with two-gap two-mode resonators. The decomposition of simulation region into an external results of TESLA simulations for NRL S ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP022454 TITLE: Using Large Signal Code TESLA for Wide Band Klystron

  14. Defense.gov - Special Report

    Science.gov Websites

    FORUM - U.S. Defense Secretary Robert M. Gates addresses the audience as Canadian Minister of National issues that Defense Secretary Robert M. Gates and Canadian Defense Minister Peter MacKay discussed during a bilateral meeting here today. Story | Transcript U.S., Canadian Defense Chiefs Answer Afghanistan

  15. Molecular Identification of the Schwannomatosis Locus

    DTIC Science & Technology

    2004-07-01

    AD Award Number: DAMD17-03-1-0445 TITLE: Molecular Identification of the Schwannomatosis Locus PRINCIPAL INVESTIGATOR: Mia M. MacCollin, M.D...COVERED (Leave blank) July 2004 Annual (1 Jul 2003 - 30 Jun 2004) 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Molecular Identification of the Schwannomatosis ...DISTRIBUTION CODE Approved for Public Release; Distribution Unlimited 13. ABSTRACT (Maximum 200 Words) Background: Schwannomatosis is a recently recognized

  16. A Locus Encoding Variable Defense Systems against Invading DNA Identified in Streptococcus suis

    PubMed Central

    Okura, Masatoshi; Nozawa, Takashi; Watanabe, Takayasu; Murase, Kazunori; Nakagawa, Ichiro; Takamatsu, Daisuke; Osaki, Makoto; Sekizaki, Tsutomu; Gottschalk, Marcelo; Hamada, Shigeyuki

    2017-01-01

    Streptococcus suis, an important zoonotic pathogen, is known to have an open pan-genome and to develop a competent state. In S. suis, limited genetic lineages are suggested to be associated with zoonosis. However, little is known about the evolution of diversified lineages and their respective phenotypic or ecological characteristics. In this study, we performed comparative genome analyses of S. suis, with a focus on the competence genes, mobile genetic elements, and genetic elements related to various defense systems against exogenous DNAs (defense elements) that are associated with gene gain/loss/exchange mediated by horizontal DNA movements and their restrictions. Our genome analyses revealed a conserved competence-inducing peptide type (pherotype) of the competence system and large-scale genome rearrangements in certain clusters based on the genome phylogeny of 58 S. suis strains. Moreover, the profiles of the defense elements were similar or identical to each other among the strains belonging to the same genomic clusters. Our findings suggest that these genetic characteristics of each cluster might exert specific effects on the phenotypic or ecological differences between the clusters. We also found certain loci that shift several types of defense elements in S. suis. Of note, one of these loci is a previously unrecognized variable region in bacteria, at which strains of distinct clusters code for different and various defense elements. This locus might represent a novel defense mechanism that has evolved through an arms race between bacteria and invading DNAs, mediated by mobile genetic elements and genetic competence. PMID:28379509

  17. Optimal patch code design via device characterization

    NASA Astrophysics Data System (ADS)

    Wu, Wencheng; Dalal, Edul N.

    2012-01-01

    In many color measurement applications, such as those for color calibration and profiling, "patch code" has been used successfully for job identification and automation to reduce operator errors. A patch code is similar to a barcode, but is intended primarily for use in measurement devices that cannot read barcodes due to limited spatial resolution, such as spectrophotometers. There is an inherent tradeoff between decoding robustness and the number of code levels available for encoding. Previous methods have attempted to address this tradeoff, but those solutions have been sub-optimal. In this paper, we propose a method to design optimal patch codes via device characterization. The tradeoff between decoding robustness and the number of available code levels is optimized in terms of printing and measurement efforts, and decoding robustness against noises from the printing and measurement devices. Effort is drastically reduced relative to previous methods because print-and-measure is minimized through modeling and the use of existing printer profiles. Decoding robustness is improved by distributing the code levels in CIE Lab space rather than in CMYK space.

  18. A Model of an Integrated Air Defense System (IADS) for the TACOPS program

    DTIC Science & Technology

    1991-09-01

    SUBJECT TERMS (Continue on reverse If necessary and Identify by block number) FIELD GROUP SUB-GROUP Integrated Air Defense System, iADS, TACOPS...needed. Selection criteria for picking a Measurement Of Effectiveness (MOE) are presented. Acceslon For I NTIS CRA&I DTIC TAB 0 Unannouticed 1 ...Justification B y ............................................... Di.,t ibiation Av.iabilily Codes Avai i:.djor Dist A- 1 THESIS DISCLAIMER The reader is cautioned

  19. The development of non-coding RNA ontology.

    PubMed

    Huang, Jingshan; Eilbeck, Karen; Smith, Barry; Blake, Judith A; Dou, Dejing; Huang, Weili; Natale, Darren A; Ruttenberg, Alan; Huan, Jun; Zimmermann, Michael T; Jiang, Guoqian; Lin, Yu; Wu, Bin; Strachan, Harrison J; de Silva, Nisansa; Kasukurthi, Mohan Vamsi; Jha, Vikash Kumar; He, Yongqun; Zhang, Shaojie; Wang, Xiaowei; Liu, Zixing; Borchert, Glen M; Tan, Ming

    2016-01-01

    Identification of non-coding RNAs (ncRNAs) has been significantly improved over the past decade. On the other hand, semantic annotation of ncRNA data is facing critical challenges due to the lack of a comprehensive ontology to serve as common data elements and data exchange standards in the field. We developed the Non-Coding RNA Ontology (NCRO) to handle this situation. By providing a formally defined ncRNA controlled vocabulary, the NCRO aims to fill a specific and highly needed niche in semantic annotation of large amounts of ncRNA biological and clinical data.

  20. The re-identification risk of Canadians from longitudinal demographics

    PubMed Central

    2011-01-01

    Background The public is less willing to allow their personal health information to be disclosed for research purposes if they do not trust researchers and how researchers manage their data. However, the public is more comfortable with their data being used for research if the risk of re-identification is low. There are few studies on the risk of re-identification of Canadians from their basic demographics, and no studies on their risk from their longitudinal data. Our objective was to estimate the risk of re-identification from the basic cross-sectional and longitudinal demographics of Canadians. Methods Uniqueness is a common measure of re-identification risk. Demographic data on a 25% random sample of the population of Montreal were analyzed to estimate population uniqueness on postal code, date of birth, and gender as well as their generalizations, for periods ranging from 1 year to 11 years. Results Almost 98% of the population was unique on full postal code, date of birth and gender: these three variables are effectively a unique identifier for Montrealers. Uniqueness increased for longitudinal data. Considerable generalization was required to reach acceptably low uniqueness levels, especially for longitudinal data. Detailed guidelines and disclosure policies on how to ensure that the re-identification risk is low are provided. Conclusions A large percentage of Montreal residents are unique on basic demographics. For non-longitudinal data sets, the three character postal code, gender, and month/year of birth represent sufficiently low re-identification risk. Data custodians need to generalize their demographic information further for longitudinal data sets. PMID:21696636

  1. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, John F.; Ng, Lawrence C.

    1998-01-01

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching.

  2. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, J.F.; Ng, L.C.

    1998-03-17

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching. 35 figs.

  3. RNA-Seq identification of candidate defense genes targeted by endophytic Bacillus cereus-mediated induced systemic resistance against Meloidogyne incognita in tomato.

    PubMed

    Hu, Haijing; Wang, Cong; Li, Xia; Tang, Yunyun; Wang, Yufang; Chen, Shuanglin; Yan, Shuzhen

    2018-05-08

    The endophytic bacteria Bacillus cereus BCM2 has shown great potential as a defense against the parasitic nematode Meloidogyne incognita. Here, we studied the endophytic bacteria-mediated plant defense against M. incognita and searched for defense-related candidate genes using RNA-Seq. The induced systemic resistance of BCM2 against M. incognita was tested using the split-root method. Pre-inoculated BCM2 on the inducer side was associated with a dramatic reduction in galls and egg masses at the responder side, but inoculated BCM2 alone did not produce the same effect. In order to investigate which plant defense-related genes are specifically activated by BCM2, four RNA samples from tomato roots were sequenced, and four high quality total clean bases were obtained, ranging from 6.64 to 6.75 Gb, with an average of 21558 total genes. The 34 candidate defense-related genes were identified by pair-wise comparison among libraries, representing the targets for BCM2 priming resistance against M. incognita. Functional characterization revealed that the plant-pathogen interaction pathway (ID: ko04626) was significantly enriched for BCM2-mediated M. incognita resistance. This study demonstrates that B. cereus BCM2 maintains a harmonious host-microbe relationship with tomato, but appeared to prime the plant, resulting in more vigorous defense response toward the infection nematode. This article is protected by copyright. All rights reserved.

  4. Accuracy of Administrative Billing Codes to Detect Urinary Tract Infection Hospitalizations

    PubMed Central

    Hall, Matthew; Auger, Katherine A.; Hain, Paul D.; Jerardi, Karen E.; Myers, Angela L.; Rahman, Suraiya S.; Williams, Derek J.; Shah, Samir S.

    2011-01-01

    BACKGROUND: Hospital billing data are frequently used for quality measures and research, but the accuracy of the use of discharge codes to identify urinary tract infections (UTIs) is unknown. OBJECTIVE: To determine the accuracy of International Classification of Diseases, 9th revision (ICD-9) discharge codes to identify children hospitalized with UTIs. METHODS: This multicenter study conducted in 5 children's hospitals included children aged 3 days to 18 years who had been admitted to the hospital, undergone a urinalysis or urine culture, and discharged from the hospital. Data were obtained from the pediatric health information system database and medical record review. With the use of 2 gold-standard methods, the positive predictive value (PPV) was calculated for individual and combined UTI codes and for common UTI identification strategies. PPV was measured for all groupings for which the UTI code was the principal discharge diagnosis. RESULTS: There were 833 patients in the study. The PPV was 50.3% with the use of the gold standard of laboratory-confirmed UTIs but increased to 85% with provider confirmation. Restriction of the study cohort to patients with a principle diagnosis of UTI improved the PPV for laboratory-confirmed UTI (61.2%) and provider-confirmed UTI (93.2%), as well as the ability to benchmark performance. Other common identification strategies did not markedly affect the PPV. CONCLUSIONS: ICD-9 codes can be used to identify patients with UTIs but are most accurate when UTI is the principal discharge diagnosis. The identification strategies reported in this study can be used to improve the accuracy and applicability of benchmarking measures. PMID:21768320

  5. Identification of aberrantly expressed long non-coding RNAs in stomach adenocarcinoma.

    PubMed

    Gu, Jianbin; Li, Yong; Fan, Liqiao; Zhao, Qun; Tan, Bibo; Hua, Kelei; Wu, Guobin

    2017-07-25

    Stomach adenocarcinoma (STAD) is a common malignancy worldwide. This study aimed to identify the aberrantly expressed long non-coding RNAs (lncRNAs) in STAD. Total of 74 DElncRNAs and 449 DEmRNAs were identified in STAD compared with paired non-tumor tissues. The DElncRNA/DEmRNA co-expression network was constructed, which covered 519 nodes and 2993 edges. The qRT-PCR validation results of DElncRNAs were consistent with our bioinformatics analysis based on RNA-sequencing. The DEmRNAs co-expressed with DElncRNAs were significantly enriched in gastric acid secretion, complement and coagulation cascades, pancreatic secretion, cytokine-cytokine receptor interaction and Jak-STAT signaling pathway. The expression levels of the nine candidate DElncRNAs in TCGA database were compatible with our RNA-sequencing. FEZF1-AS1, HOTAIR and LINC01234 had the potential diagnosis value for STAD. The lncRNA and mRNA expression profile of 3 STAD tissues and 3 matched adjacent non-tumor tissues was obtained through high-throughput RNA-sequencing. Differentially expressed lncRNAs/mRNAs (DElncRNAs/DEmRNAs) were identified in STAD. DElncRNA/DEmRNA co-expression network construction, Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analyses were conducted to predict the biological functions of DElncRNAs. Quantitative real-time polymerase chain reaction (qRT-PCR) was subjected to validate the expression levels of DEmRNAs and DElncRNAs. Moreover, the expression of DElncRNAs was validated through The Cancer Genome Atlas (TCGA) database. The diagnosis value of candidate DElncRNAs was accessed by receiver operating characteristic (ROC) analysis. Our work might provide useful information for exploring the tumorigenesis mechanism of STAD and pave the road for identification of diagnostic biomarkers in STAD.

  6. 75 FR 32639 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... elements of the Department of Homeland Security concerned with the analysis of intelligence information... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG67 Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...

  7. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board of Visitors AGENCY: Department of Defense (DoD). ACTION... (5 U.S.C. 552b, as amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it...

  8. Isolation, identification, and quantification of potential defensive compounds in the viceroy butterfly and its larval host-plant, Carolina willow.

    PubMed

    Prudic, Kathleen L; Khera, Smriti; Sólyom, Anikó; Timmermann, Barbara N

    2007-06-01

    The viceroy-monarch and viceroy-queen butterfly associations are classic examples of mimicry. These relationships were originally classified as Batesian, or parasitic, but were later reclassified as Müllerian, or mutalistic, based on predator bioassays. The Müllerian reclassification implies that viceroy is unpalatable because it too is chemically defended like the queen and the monarch. However, unlike the queen and the monarch, the viceroy defensive chemistry has remained uncharacterized. We demonstrate that the viceroy butterfly (Limenitis archippus, Nymphalidae) not only sequesters nonvolatile defensive compounds from its larval host-plant, the Carolina willow (Salix caroliniana, Salicaceae), but also secretes volatile defensive compounds when disturbed. We developed liquid chromatography-mass spectrometry-mass spectrometry methods to identify a set of phenolic glycosides shared between the adult viceroy butterfly and the Carolina willow, and solid phase microextraction and gas chromatography-mass spectrometry methods to identify volatile phenolic compounds released from stressed viceroy butterflies. In both approaches, all structures were characterized based on their mass spectral fragmentation patterns and confirmed with authentic standards. The phenolics we found are known to deter predator attack in other prey systems, including other willow-feeding insect species. Because these compounds have a generalized defensive function at the concentrations we described, our results are consistent with the Müllerian reclassification put forth by other researchers based on bioassay results. It seems that the viceroy butterfly possesses chemical defenses different from its monarch and queen butterfly counterparts (phenolic glycosides vs. cardiac glycosides, respectively), an unusual phenomenon in mimicry warranting future study.

  9. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... Sunshine Act of 1976 (5 U.S.C. 552b), and 41 CFR 102- 3.65, the Department of Defense announces that it is...

  10. 77 FR 30361 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaty With the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-22

    ... DEPARTMENT OF DEFENSE Defense Acquisitions Regulations System 48 CFR Parts 225 and 252 RIN 0750... United Kingdom (DFARS 2012-D034) AGENCY: Defense Acquisition Regulations System; Department of Defense... Acquisition Regulations System, Attn: (Insert case manager's name), OUSD (AT&L) DPAP/DARS, Room 3B855, 3060...

  11. Bar code-based pre-transfusion check in pre-operative autologous blood donation.

    PubMed

    Ohsaka, Akimichi; Furuta, Yoshiaki; Ohsawa, Toshiya; Kobayashi, Mitsue; Abe, Katsumi; Inada, Eiichi

    2010-10-01

    The objective of this study was to demonstrate the feasibility of a bar code-based identification system for the pre-transfusion check at the bedside in the setting of pre-operative autologous blood donation (PABD). Between July 2003 and December 2008 we determined the compliance rate and causes of failure of electronic bedside checking for PABD transfusion. A total of 5627 (9% of all transfusions) PABD units were administered without a single mistransfusion. The overall rate of compliance with electronic checking was 99%. The bar code-based identification system was applicable to the pre-transfusion check for PABD transfusion. Copyright © 2010 Elsevier Ltd. All rights reserved.

  12. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  13. Self-Reported Pleasantness Ratings and Examiner-Coded Defensiveness in Response to Touch in Children with ASD: Effects of Stimulus Material and Bodily Location

    ERIC Educational Resources Information Center

    Cascio, Carissa J.; Lorenzi, Jill; Baranek, Grace T.

    2016-01-01

    Tactile defensiveness, characterized by behavioral hyperresponsiveness and negative emotional responses to touch, is a common manifestation of aberrant sensory processing in autism spectrum disorders (ASD) and other developmental disabilities (DD). Variations in tactile defensiveness with the properties of the stimulus and the bodily site of…

  14. Self-reported immature defense style as a predictor of outcome in short-term and long-term psychotherapy.

    PubMed

    Laaksonen, Maarit A; Sirkiä, Carlos; Knekt, Paul; Lindfors, Olavi

    2014-07-01

    Identification of pretreatment patient characteristics predictive of psychotherapy outcome could help to guide treatment choices. This study evaluates patients' initial level of immature defense style as a predictor of the outcome of short-term versus long-term psychotherapy. In the Helsinki Psychotherapy Study, 326 adult outpatients with mood or anxiety disorder were randomized to individual short-term (psychodynamic or solution-focused) or long-term (psychodynamic) psychotherapy. Their defense style was assessed at baseline using the 88-item Defense Style Questionnaire and classified as low or high around the median value of the respective score. Both specific (Beck Depression Inventory [BDI], Hamilton Depression Rating Scale [HDRS], Symptom Check List Anxiety Scale [SCL-90-Anx], Hamilton Anxiety Rating Scale [HARS]) and global (Symptom Check List Global Severity Index [SCL-90-GSI], Global Assessment of Functioning Scale [GAF]) psychiatric symptoms were measured at baseline and 3-7 times during a 3-year follow-up. Patients with high use of immature defense style experienced greater symptom reduction in long-term than in short-term psychotherapy by the end of the 3-year follow-up (50% vs. 34%). Patients with low use of immature defense style experienced faster symptom reduction in short-term than in long-term psychotherapy during the first year of follow-up (34% vs. 19%). Knowledge of patients' initial level of immature defense style may potentially be utilized in tailoring treatments. Further research on defense styles as outcome predictors in psychotherapies of different types is needed.

  15. Radio Frequency Identification Applications in Pavements

    DOT National Transportation Integrated Search

    2014-08-01

    Radio frequency identification (RFID) technology is widely used for inventory control, tool and material tracking, and other similar applications where line-of-sight optical bar codes are inconvenient or impractical. Several applications of RFID tech...

  16. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  17. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  18. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  19. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  20. The role of identification in dynamic psychiatry and psychotherapy.

    PubMed

    Corradi, Richard B

    2011-01-01

    Identification-a psychic process in which a person takes on characteristics of another-is a concept important to the understanding of human nature. It plays an important role in how our personalities develop, in our ability to deal with life's stresses, and in how we interact with other people. Knowledge of its manifestations is essential to dynamic psychiatry and to its applications in psychotherapy. This article defines identification and reviews its role in development and as a defense. It discusses its role in the psychopathology of disorders commonly encountered in psychotherapy practice-depression and anxiety states reactive to losses in life, and borderline states. Clinical vignettes illustrate how identification functions in these conditions, and also how identifications reveal themselves in the transference and are utilized in psychotherapy. A teaching vignette illustrates how important it is that residents learning the art of psychotherapy appreciate the therapeutic potential of identification. The article maintains that, although it often goes unrecognized, identification with the therapist is one of the most effective therapeutic devices in the transference.

  1. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  2. Oil and gas field code master list 1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The Oil and Gas Field Code Master List 1997 is the sixteenth annual listing of all identified oil and gas fields in the US. It is updated with field information collected through October 1997. The purpose of this publication is to provide unique, standardized codes for identification of domestic fields. Use of these field codes fosters consistency of field identification by government and industry. As a result of their widespread adoption they have in effect become a national standard. The use of field names and codes listed in this publication is required on survey forms and other reports regarding field-specificmore » data collected by EIA. There are 58,366 field records in this year`s FCML, 437 more than last year. The FCML includes: field records for each State and county in which a field resides; field records for each offshore area block in the Gulf of Mexico in which a field resides; field records for each alias field name (definition of alias is listed); fields crossing State boundaries that may be assigned different names by the respective State naming authorities. This report also contains an Invalid Field Record List of 4 records that have been removed from the FCML since last year`s report. These records were found to be either technically incorrect or to represent field names which were never recognized by State naming authorities.« less

  3. Identification of Hospitalizations for Intentional Self-Harm when E-Codes are Incompletely Recorded

    PubMed Central

    Patrick, Amanda R.; Miller, Matthew; Barber, Catherine W.; Wang, Philip S.; Canning, Claire F.; Schneeweiss, Sebastian

    2010-01-01

    Context Suicidal behavior has gained attention as an adverse outcome of prescription drug use. Hospitalizations for intentional self-harm, including suicide, can be identified in administrative claims databases using external cause of injury codes (E-codes). However, rates of E-code completeness in US government and commercial claims databases are low due to issues with hospital billing software. Objective To develop an algorithm to identify intentional self-harm hospitalizations using recorded injury and psychiatric diagnosis codes in the absence of E-code reporting. Methods We sampled hospitalizations with an injury diagnosis (ICD-9 800–995) from 2 databases with high rates of E-coding completeness: 1999–2001 British Columbia, Canada data and the 2004 U.S. Nationwide Inpatient Sample. Our gold standard for intentional self-harm was a diagnosis of E950-E958. We constructed algorithms to identify these hospitalizations using information on type of injury and presence of specific psychiatric diagnoses. Results The algorithm that identified intentional self-harm hospitalizations with high sensitivity and specificity was a diagnosis of poisoning; toxic effects; open wound to elbow, wrist, or forearm; or asphyxiation; plus a diagnosis of depression, mania, personality disorder, psychotic disorder, or adjustment reaction. This had a sensitivity of 63%, specificity of 99% and positive predictive value (PPV) of 86% in the Canadian database. Values in the US data were 74%, 98%, and 73%. PPV was highest (80%) in patients under 25 and lowest those over 65 (44%). Conclusions The proposed algorithm may be useful for researchers attempting to study intentional self-harm in claims databases with incomplete E-code reporting, especially among younger populations. PMID:20922709

  4. 47 CFR 95.119 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... station identification is the call sign assigned to the GMRS station or system. (c) A unit number may be...: (1) Voice in the English language; or (2) International Morse code telegraphy. (e) A station need not...

  5. Effects of various electrode configurations on music perception, intonation and speaker gender identification.

    PubMed

    Landwehr, Markus; Fürstenberg, Dirk; Walger, Martin; von Wedel, Hasso; Meister, Hartmut

    2014-01-01

    Advances in speech coding strategies and electrode array designs for cochlear implants (CIs) predominantly aim at improving speech perception. Current efforts are also directed at transmitting appropriate cues of the fundamental frequency (F0) to the auditory nerve with respect to speech quality, prosody, and music perception. The aim of this study was to examine the effects of various electrode configurations and coding strategies on speech intonation identification, speaker gender identification, and music quality rating. In six MED-EL CI users electrodes were selectively deactivated in order to simulate different insertion depths and inter-electrode distances when using the high definition continuous interleaved sampling (HDCIS) and fine structure processing (FSP) speech coding strategies. Identification of intonation and speaker gender was determined and music quality rating was assessed. For intonation identification HDCIS was robust against the different electrode configurations, whereas fine structure processing showed significantly worse results when a short electrode depth was simulated. In contrast, speaker gender recognition was not affected by electrode configuration or speech coding strategy. Music quality rating was sensitive to electrode configuration. In conclusion, the three experiments revealed different outcomes, even though they all addressed the reception of F0 cues. Rapid changes in F0, as seen with intonation, were the most sensitive to electrode configurations and coding strategies. In contrast, electrode configurations and coding strategies did not show large effects when F0 information was available over a longer time period, as seen with speaker gender. Music quality relies on additional spectral cues other than F0, and was poorest when a shallow insertion was simulated.

  6. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holzrichter, J.F.; Ng, L.C.

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used formore » purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching. 35 figs.« less

  7. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    ERIC Educational Resources Information Center

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  8. IBR5 Modulates Temperature-Dependent, R Protein CHS3-Mediated Defense Responses in Arabidopsis.

    PubMed

    Liu, Jingyan; Yang, Haibian; Bao, Fei; Ao, Kevin; Zhang, Xiaoyan; Zhang, Yuelin; Yang, Shuhua

    2015-10-01

    Plant responses to low temperature are tightly associated with defense responses. We previously characterized the chilling-sensitive mutant chs3-1 resulting from the activation of the Toll and interleukin 1 receptor-nucleotide binding-leucine-rich repeat (TIR-NB-LRR)-type resistance (R) protein harboring a C-terminal LIM (Lin-11, Isl-1 and Mec-3 domains) domain. Here we report the identification of a suppressor of chs3, ibr5-7 (indole-3-butyric acid response 5), which largely suppresses chilling-activated defense responses. IBR5 encodes a putative dual-specificity protein phosphatase. The accumulation of CHS3 protein at chilling temperatures is inhibited by the IBR5 mutation. Moreover, chs3-conferred defense phenotypes were synergistically suppressed by mutations in HSP90 and IBR5. Further analysis showed that IBR5, with holdase activity, physically associates with CHS3, HSP90 and SGT1b (Suppressor of the G2 allele of skp1) to form a complex that protects CHS3. In addition to the positive role of IBR5 in regulating CHS3, IBR5 is also involved in defense responses mediated by R genes, including SNC1 (Suppressor of npr1-1, Constitutive 1), RPS4 (Resistance to P. syringae 4) and RPM1 (Resistance to Pseudomonas syringae pv. maculicola 1). Thus, the results of the present study reveal a role for IBR5 in the regulation of multiple R protein-mediated defense responses.

  9. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    PubMed Central

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  10. Disaster victim identification of military aircrew, 1945-2002.

    PubMed

    Smith, Adrian

    2003-11-01

    Aviation accident fatalities are characterized by substantial tissue disruption and fragmentation, limiting the usefulness of traditional identification methods. This study examines the success of disaster victim identification (DVI) in military aviation accident fatalities in the Australian Defense Force (ADF). Accident reports and autopsy records of aircrew fatalities during the period 1945-2002 were examined to identify difficulties experienced during the DVI process or injuries that would prevent identification of remains using non-DNA methods. The ADF had 301 aircraft fatalities sustained in 144 accidents during the period 1945-2002. The autopsy reports for 117 fatalities were reviewed (covering 73.7% of aircrew fatalities from 1960-2002). Of the 117 victims, 38 (32.4%) sustained injuries which were severe enough to prevent identification by traditional (non-DNA) comparative scientific DVI techniques of fingerprint and dental analysis. Many of the ADF fatalities who could not be positively identified in the past could be identified today through the use of DNA techniques. Successful DNA identification, however, depends on having a reference DNA profile. This paper recommends the establishment of a DNA repository to store reference blood samples to facilitate the identification of ADF aircrew remains without causing additional distress to family members.

  11. LIME: Semiautomated line measurement and identification from stellar spectra

    NASA Astrophysics Data System (ADS)

    Sahin, T.

    2017-09-01

    We present LIME (Line Measurements from ECHELLE Spectra), an IDL-based code, as a powerful tool for semiautomated stellar line measurement and identification. Interactively selected line positions (i.e. wavelengths) are compared with a master line list of the user's selections. Each unknown line that the user interactively chooses is displayed with potential identifications provided by the code in the vicinity of the selected line. The best identification is evaluated on the basis of several criteria (e.g., atomic/molecular line information, wavelength displacement, and theoretical equivalent width for solar atmospheric values). We examined the identifications by LIME in the spectra of post-red supergiant star HD 179821 over a range of signal-to-noise values and wavelength ranges. We found that the results obtained by LIME show virtually complete agreement with the manual identifications for which the conventional and also tedious approach is to use a revised multiplet table as an initial guide and perform a systematic search that makes use of the lower excitation potential and gf-values. Comparison to previous identifications for HD 179821 in the literature revealed not only lines that were unmeasurable and/or blended but also misidentifications. While a manual identification process takes a relatively longer time to be accomplished by an experienced spectroscopist, LIME can provide a rapid extraction of line information in a few hours with moderate user interaction.

  12. Synchronization of developmental processes and defense signaling by growth regulating transcription factors.

    PubMed

    Liu, Jinyi; Rice, J Hollis; Chen, Nana; Baum, Thomas J; Hewezi, Tarek

    2014-01-01

    Growth regulating factors (GRFs) are a conserved class of transcription factor in seed plants. GRFs are involved in various aspects of tissue differentiation and organ development. The implication of GRFs in biotic stress response has also been recently reported, suggesting a role of these transcription factors in coordinating the interaction between developmental processes and defense dynamics. However, the molecular mechanisms by which GRFs mediate the overlaps between defense signaling and developmental pathways are elusive. Here, we report large scale identification of putative target candidates of Arabidopsis GRF1 and GRF3 by comparing mRNA profiles of the grf1/grf2/grf3 triple mutant and those of the transgenic plants overexpressing miR396-resistant version of GRF1 or GRF3. We identified 1,098 and 600 genes as putative targets of GRF1 and GRF3, respectively. Functional classification of the potential target candidates revealed that GRF1 and GRF3 contribute to the regulation of various biological processes associated with defense response and disease resistance. GRF1 and GRF3 participate specifically in the regulation of defense-related transcription factors, cell-wall modifications, cytokinin biosynthesis and signaling, and secondary metabolites accumulation. GRF1 and GRF3 seem to fine-tune the crosstalk between miRNA signaling networks by regulating the expression of several miRNA target genes. In addition, our data suggest that GRF1 and GRF3 may function as negative regulators of gene expression through their association with other transcription factors. Collectively, our data provide new insights into how GRF1 and GRF3 might coordinate the interactions between defense signaling and plant growth and developmental pathways.

  13. Nonenzymatic microorganism identification based on ribosomal RNA

    NASA Astrophysics Data System (ADS)

    Ives, Jeffrey T.; Pierini, Alicia M.; Stokes, Jeffrey A.; Wahlund, Thomas M.; Read, Betsy; Bechtel, James H.; Bronk, Burt V.

    1999-11-01

    Effective defense against biological warfare (BW) agents requires rapid, fieldable and accurate systems. For micro- organisms like bacteria and viruses, ribosomal RNA (rRNA) provides a valuable target with multiple advantages of species specificity and intrinsic target amplification. Vegetative and spore forms of bacteria contain approximately 104 copies of rRNA. Direct detection of rRNA copies can eliminate some of the interference and preparation difficulties involved in enzymatic amplification methods. In order to apply the advantages of rRNA to BW defense, we are developing a fieldable system based on 16S rRNA, physical disruption of the micro-organism, solid phase hybridization, and fluorescence detection. Our goals include species-specific identification, complete operation from raw sample to identification in 15 minutes or less, and compact, fieldable instrumentation. Initial work on this project has investigated the lysis and hybridization steps, the species-specificity of oligonucleotides probes, and the development of a novel electromagnetic method to physically disrupt the micro- organisms. Target bacteria have been Escherichia coli (E. coli) and Bacillus subtilis (B. subtilis). Continuing work includes further development of methods to rapidly disrupt the micro-organisms and release the rRNA, improved integration and processing, and extension to bacterial and mammalian viruses like MS2 and vesicular stomatitis virus.

  14. A genetic scale of reading frame coding.

    PubMed

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. Copyright © 2014 Elsevier

  15. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... December 16, 2013 Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  16. Peripheral and central mediators of lipopolysaccharide induced suppression of defensive rage behavior in the cat.

    PubMed

    Bhatt, S; Bhatt, R S; Zalcman, S S; Siegel, A

    2009-11-10

    Based upon recent findings in our laboratory that cytokines microinjected into the medial hypothalamus or periaqueductal gray (PAG) powerfully modulate defensive rage behavior in cat, the present study determined the effects of peripherally released cytokines following lipopolysaccharide (LPS) challenge upon defensive rage. The study involved initial identification of the effects of peripheral administration of LPS upon defensive rage by electrical stimulation from PAG and subsequent determination of the peripheral and central mechanisms governing this process. The results revealed significant elevation in response latencies for defensive rage from 60 to 300 min, post LPS injection, with no detectable signs of sickness behavior present at 60 min. In contrast, head turning behavior elicited by stimulation of adjoining midbrain sites was not affected by LPS administration, suggesting a specificity of the effects of LPS upon defensive rage. Direct administration of LPS into the medial hypothalamus had no effect on defensive rage, suggesting that the effects of LPS were mediated by peripheral cytokines rather than by any direct actions upon hypothalamic neurons. Complete blockade of the suppressive effects of LPS by peripheral pretreatment with an Anti-tumor necrosis factor-alpha (TNFalpha) antibody but not with an anti- interleukin-1 (IL-1) antibody demonstrated that the effects of LPS were mediated through TNF-alpha rather than through an IL-1 mechanism. A determination of the central mechanisms governing LPS suppression revealed that pretreatment of the medial hypothalamus with PGE(2) or 5-HT(1A) receptor antagonists each completely blocked the suppressive effects of LPS, while microinjections of a TNF-alpha antibody into the medial hypothalamus were ineffective. Microinjections of -Iodo-N-[2-[4-(methoxyphenyl)-1-piperazinyl]ethyl]-N-(2-pyridinyl) benzamide monohydrochloride (p-MPPI) into lateral hypothalamus (to test for anatomical specificity) had no effect upon

  17. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 219 and Appendix I to Chapter 2 RIN 0750-AH59 Defense Federal Acquisition Regulation Supplement; Extension of the Department of... Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is issuing this final rule...

  18. Defense Contract Management Agency

    Science.gov Websites

    , May 24. Click the photo above for more information. Members of the Defense Contract Management Agency for more information. Members of the Defense Contract Management Agency International Region conduct Skip to main content (Press Enter). Toggle navigation Defense Contract Management Agency Search

  19. Recognizing Plant Defense Priming.

    PubMed

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. 3 CFR - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export... Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act Memorandum for the...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  1. MicroRNA regulated defense responses in Triticum aestivum L. during Puccinia graminis f.sp. tritici infection.

    PubMed

    Gupta, Om Prakash; Permar, Vipin; Koundal, Vikas; Singh, Uday Dhari; Praveen, Shelly

    2012-02-01

    Plants have evolved diverse mechanism to recognize pathogen attack and triggers defense responses. These defense responses alter host cellular function regulated by endogenous, small, non-coding miRNAs. To understand the mechanism of miRNAs regulated cellular functions during stem rust infection in wheat, we investigated eight different miRNAs viz. miR159, miR164, miR167, miR171, miR444, miR408, miR1129 and miR1138, involved in three different independent cellular defense response to infection. The investigation reveals that at the initiation of disease, accumulation of miRNAs might be playing a key role in hypersensitive response (HR) from host, which diminishes at the maturation stage. This suggests a possible host-fungal synergistic relation leading to susceptibility. Differential expression of these miRNAs in presence and absence of R gene provides a probable explanation of miRNA regulated R gene mediated independent pathways.

  2. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    PubMed Central

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  3. Dilemmas of Japanese Defense.

    ERIC Educational Resources Information Center

    Kiyoshi, Nasu

    1978-01-01

    Traces Japan's attitude toward and preparation for national defense from the 1930s to 1978. Topics discussed include Japan's indifference to defense since World War II, America's responsibility to defend Japan in case of military attack, the possibility of a Soviet attack on Japan, and public opinion about defense in Japan. Journal availability:…

  4. Self-reported immature defense style as a predictor of outcome in short-term and long-term psychotherapy

    PubMed Central

    Laaksonen, Maarit A; Sirkiä, Carlos; Knekt, Paul; Lindfors, Olavi

    2014-01-01

    Objective Identification of pretreatment patient characteristics predictive of psychotherapy outcome could help to guide treatment choices. This study evaluates patients' initial level of immature defense style as a predictor of the outcome of short-term versus long-term psychotherapy. Method In the Helsinki Psychotherapy Study, 326 adult outpatients with mood or anxiety disorder were randomized to individual short-term (psychodynamic or solution-focused) or long-term (psychodynamic) psychotherapy. Their defense style was assessed at baseline using the 88-item Defense Style Questionnaire and classified as low or high around the median value of the respective score. Both specific (Beck Depression Inventory [BDI], Hamilton Depression Rating Scale [HDRS], Symptom Check List Anxiety Scale [SCL-90-Anx], Hamilton Anxiety Rating Scale [HARS]) and global (Symptom Check List Global Severity Index [SCL-90-GSI], Global Assessment of Functioning Scale [GAF]) psychiatric symptoms were measured at baseline and 3–7 times during a 3-year follow-up. Results Patients with high use of immature defense style experienced greater symptom reduction in long-term than in short-term psychotherapy by the end of the 3-year follow-up (50% vs. 34%). Patients with low use of immature defense style experienced faster symptom reduction in short-term than in long-term psychotherapy during the first year of follow-up (34% vs. 19%). Conclusion Knowledge of patients' initial level of immature defense style may potentially be utilized in tailoring treatments. Further research on defense styles as outcome predictors in psychotherapies of different types is needed. PMID:25161816

  5. In silico identification and characterization of conserved miRNAs and their target genes in sweet potato (Ipomoea batatas L.) Expressed Sequence Tags (ESTs)

    PubMed Central

    Dehury, Budheswar; Panda, Debashis; Sahu, Jagajjit; Sahu, Mousumi; Sarma, Kishore; Barooah, Madhumita; Sen, Priyabrata; Modi, Mahendra Kumar

    2013-01-01

    The endogenous small non-coding micro RNAs (miRNAs), which are typically ~21–24 nt nucleotides, play a crucial role in regulating the intrinsic normal growth of cells and development of the plants as well as in maintaining the integrity of genomes. These small non-coding RNAs function as the universal specificity factors in post-transcriptional gene silencing. Discovering miRNAs, identifying their targets, and further inferring miRNA functions is a routine process to understand normal biological processes of miRNAs and their roles in the development of plants. Comparative genomics based approach using expressed sequence tags (EST) and genome survey sequences (GSS) offer a cost-effective platform for identification and characterization of miRNAs and their target genes in plants. Despite the fact that sweet potato (Ipomoea batatas L.) is an important staple food source for poor small farmers throughout the world, the role of miRNA in various developmental processes remains largely unknown. In this paper, we report the computational identification of miRNAs and their target genes in sweet potato from their ESTs. Using comparative genomics-based approach, 8 potential miRNA candidates belonging to miR168, miR2911, and miR156 families were identified from 23 406 ESTs in sweet potato. A total of 42 target genes were predicted and their probable functions were illustrated. Most of the newly identified miRNAs target transcription factors as well as genes involved in plant growth and development, signal transduction, metabolism, defense, and stress response. The identification of miRNAs and their targets is expected to accelerate the pace of miRNA discovery, leading to an improved understanding of the role of miRNA in development and physiology of sweet potato, as well as stress response. PMID:24067297

  6. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  7. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  8. 76 FR 9680 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-22

    ... Subjects in 48 CFR Part 217 Government procurement. Mary Overstreet, Editor, Defense Acquisition... Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...: Final rule. SUMMARY: DoD is adopting without change an interim rule amending the Defense Federal...

  9. Integrating non-coding RNAs in JAK-STAT regulatory networks

    PubMed Central

    Witte, Steven; Muljo, Stefan A

    2014-01-01

    Being a well-characterized pathway, JAK-STAT signaling serves as a valuable paradigm for studying the architecture of gene regulatory networks. The discovery of untranslated or non-coding RNAs, namely microRNAs and long non-coding RNAs, provides an opportunity to elucidate their roles in such networks. In principle, these regulatory RNAs can act as downstream effectors of the JAK-STAT pathway and/or affect signaling by regulating the expression of JAK-STAT components. Examples of interactions between signaling pathways and non-coding RNAs have already emerged in basic cell biology and human diseases such as cancer, and can potentially guide the identification of novel biomarkers or drug targets for medicine. PMID:24778925

  10. 21 CFR 801.57 - Discontinuation of legacy FDA identification numbers assigned to devices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Discontinuation of legacy FDA identification... Device Identification § 801.57 Discontinuation of legacy FDA identification numbers assigned to devices... been assigned an FDA labeler code to facilitate use of NHRIC or NDC numbers may continue to use that...

  11. Behavioral genomics of honeybee foraging and nest defense

    NASA Astrophysics Data System (ADS)

    Hunt, Greg J.; Amdam, Gro V.; Schlipalius, David; Emore, Christine; Sardesai, Nagesh; Williams, Christie E.; Rueppell, Olav; Guzmán-Novoa, Ernesto; Arechavaleta-Velasco, Miguel; Chandra, Sathees; Fondrk, M. Kim; Beye, Martin; Page, Robert E.

    2007-04-01

    The honeybee has been the most important insect species for study of social behavior. The recently released draft genomic sequence for the bee will accelerate honeybee behavioral genetics. Although we lack sufficient tools to manipulate this genome easily, quantitative trait loci (QTLs) that influence natural variation in behavior have been identified and tested for their effects on correlated behavioral traits. We review what is known about the genetics and physiology of two behavioral traits in honeybees, foraging specialization (pollen versus nectar), and defensive behavior, and present evidence that map-based cloning of genes is more feasible in the bee than in other metazoans. We also present bioinformatic analyses of candidate genes within QTL confidence intervals (CIs). The high recombination rate of the bee made it possible to narrow the search to regions containing only 17-61 predicted peptides for each QTL, although CIs covered large genetic distances. Knowledge of correlated behavioral traits, comparative bioinformatics, and expression assays facilitated evaluation of candidate genes. An overrepresentation of genes involved in ovarian development and insulin-like signaling components within pollen foraging QTL regions suggests that an ancestral reproductive gene network was co-opted during the evolution of foraging specialization. The major QTL influencing defensive/aggressive behavior contains orthologs of genes involved in central nervous system activity and neurogenesis. Candidates at the other two defensive-behavior QTLs include modulators of sensory signaling ( Am5HT 7 serotonin receptor, AmArr4 arrestin, and GABA-B-R1 receptor). These studies are the first step in linking natural variation in honeybee social behavior to the identification of underlying genes.

  12. Pipecolic acid, an endogenous mediator of defense amplification and priming, is a critical regulator of inducible plant immunity.

    PubMed

    Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen

    2012-12-01

    Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid-induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR.

  13. Binary Code Extraction and Interface Identification for Security Applications

    DTIC Science & Technology

    2009-10-02

    the functions extracted during the end-to-end applications and at the bottom some additional functions extracted from the OpenSSL library. fact that as...mentioned in Section 5.1 through Section 5.3 and some additional functions that we extract from the OpenSSL library for evaluation purposes. The... OpenSSL functions, the false positives and negatives are measured by comparison with the original C source code. For the malware samples, no source is

  14. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  15. Federal Logistics Information Systems. FLIS Procedures Manual. Document Identifier Code Input/Output Formats (Variable Length). Volume 9.

    DTIC Science & Technology

    1997-04-01

    DATA COLLABORATORS 0001N B NQ 8380 NUMBER OF DATA RECEIVERS 0001N B NQ 2533 AUTHORIZED ITEM IDENTIFICATION DATA COLLABORATOR CODE 0002 ,X B 03 18 TD...01 NC 8268 DATA ELEMENT TERMINATOR CODE 000iX VT 9505 TYPE OF SCREENING CODE 0001A 01 NC 8268 DATA ELEMENT TERMINATOR CODE 000iX VT 4690 OUTPUT DATA... 9505 TYPE OF SCREENING CODE 0001A 2 89 2910 REFERENCE NUMBER CATEGORY CODE (RNCC) 0001X 2 89 4780 REFERENCE NUMBER VARIATION CODE (RNVC) 0001 N 2 89

  16. Empowering self-defense training.

    PubMed

    Thompson, Martha E

    2014-03-01

    The purpose of self-defense training is to expand people's options, yet it is often framed as a solely physical, and limiting, response to violence. I draw on my own experience as a self-defense instructor and that of others in the self-defense movement to argue that an empowerment approach to self-defense training contributes to the anti-violence movement in multiple ways: providing a pathway to increase women's and girls' safety and their potential for becoming powerful and effective social change agents right now, providing an informed and embodied understanding of violence, and offering comprehensive options to recognize, prevent, and interrupt violence.

  17. [Projective identification in human relations].

    PubMed

    Göka, Erol; Yüksel, Fatih Volkan; Göral, F Sevinç

    2006-01-01

    Melanie Klein, one of the pioneers of Object Relations Theory, first defined "projective identification", which is regarded as one of the most efficacious psychoanalytic concepts after the discovery of the "unconscious". Examination of the literature on "projective identification" shows that there are various perspectives and theories suggesting different uses of this concept. Some clinicians argue that projective identification is a primitive defense mechanism observed in severe psychopathologies like psychotic disorder and borderline personality disorder, where the intra-psychic structure has been damaged severely. Others suggest it to be an indispensable part of the transference and counter-transference between the therapist and the patient during psychotherapy and it can be used as a treatment material in the therapy by a skillful therapist. The latter group expands the use of the concept through normal daily relationships by stating that projective identification is one type of communication and part of the main human relation mechanism operating in all close relationships. Therefore, they suggest that projective identification has benign forms experienced in human relations as well as malign forms seen in psychopathologies. Thus, discussions about the definition of the concept appear complex. In order to clarify and overcome the complexity of the concept, Melanie Klein's and other most important subsequent approaches are discussed in this review article. Thereby, the article aims to explain its important function in understanding the psychopathologies, psychotherapeutic relationships and different areas of normal human relations.

  18. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory... 102-3.50(d), the Department of Defense gives notice that it is renewing the charter for the Board of...: Jim Freeman, Deputy Committee Management Officer for the Department of Defense, 703-601-6128...

  19. In Defense of Japan

    DTIC Science & Technology

    2018-01-03

    national elections. The party majority gives Abe the potential to formally amend Article 9 of the Japanese constitution to authorize the Japanese Self ...Pacific. Japanese Constitution; Article 9; The United States and Japan Bi-lateral defense treaty; Collective Self Defense; Pacifism; Japanese Self ...involvement in collective self -defense (CSD). Factors leading up to this decision are a rapidly evolving strategic and political environment in

  20. An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

    DTIC Science & Technology

    2005-03-01

    codes speed up consumer shopping, package shipping, and inventory tracking. RFID offers many advantages over bar codes, as the table below shows...sunlight” (Accenture, 2001, p. 4). Finally, one of the most significant advantages of RFID is the advent of anti-collision. Anti-collision allows an...RFID reader to read and/or write to multiple tags at one time, which is not possible for bar codes. Despite the many advantages RFID over bar codes

  1. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority...

  2. Report on Defense Business Operations to the Congressional Defense Committees

    DTIC Science & Technology

    2009-03-15

    7 . PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Department of Defense,Business Information Agency,Washington,DC 8. PERFORMING ORGANIZATION...Defense Business Transformation 7 Table 2-2: System Modernizations and Initiatives by Business Enterprise Priority* Personnel Visibility...and people to ensure reliable and accurate delivery of acceptable goods and services. The procurement functional area establishes requirements for

  3. A Future North American Defense Arrangement: Applying a Canadian Defense Policy Process Model

    DTIC Science & Technology

    2005-04-01

    American defense policy outlined by Hays, Vallance and Van Tassel in their comprehensive text entitled American Defense Policy. What is Canadian...outputs, lenses and feedback within an international and domestic environment. Adapted From Hays, Vallance , Van Tassel American Defence Policy, 1997...10th ed. (Springfield, Massachusetts: Merriam-Webster, Inc), 901. 2 Peter L Hays, B.J. Vallance , A.R. Van Tassel, eds., American Defense Policy, 7th

  4. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Elongator Plays a Positive Role in Exogenous NAD-Induced Defense Responses in Arabidopsis.

    PubMed

    An, Chuanfu; Ding, Yezhang; Zhang, Xudong; Wang, Chenggang; Mou, Zhonglin

    2016-05-01

    Extracellular NAD is emerging as an important signal molecule in animal cells, but its role in plants has not been well-established. Although it has been shown that exogenous NAD(+) activates defense responses in Arabidopsis, components in the exogenous NAD(+)-activated defense pathway remain to be fully discovered. In a genetic screen for mutants insensitive to exogenous NAD(+) (ien), we isolated a mutant named ien2. Map-based cloning revealed that IEN2 encodes ELONGATA3 (ELO3)/AtELP3, a subunit of the Arabidopsis Elongator complex, which functions in multiple biological processes, including histone modification, DNA (de)methylation, and transfer RNA modification. Mutations in the ELO3/AtELP3 gene compromise exogenous NAD(+)-induced expression of pathogenesis-related (PR) genes and resistance to the bacterial pathogen Pseudomonas syringae pv. maculicola ES4326, and transgenic expression of the coding region of ELO3/AtELP3 in elo3/Atelp3 restores NAD(+) responsiveness to the mutant plants, demonstrating that ELO3/AtELP3 is required for exogenous NAD(+)-induced defense responses. Furthermore, mutations in genes encoding the other five Arabidopsis Elongator subunits (ELO2/AtELP1, AtELP2, ELO1/AtELP4, AtELP5, and AtELP6) also compromise exogenous NAD(+)-induced PR gene expression and resistance to P. syringae pv. maculicola ES4326. These results indicate that the Elongator complex functions as a whole in exogenous NAD(+)-activated defense signaling in Arabidopsis.

  6. Defense Acquisition Workforce: Better Identification, Development, and Oversight Needed for Personnel Involved in Acquiring Services

    DTIC Science & Technology

    2011-09-01

    suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway...maintenance or operations support for a missile range to grass cutting, and many things in between. According to the Defense Science Board, buying...may be found on the last Belva M. Martin page of this report. Staff acknowledgements are listed in appendix VII. t Director, Acquisition and

  7. Plant identification credibility in ethnobotany: a closer look at Polish ethnographic studies

    PubMed Central

    2010-01-01

    Background This paper is an attempt to estimate the percentage of erroneously identified taxa in ethnographic studies concerning the use of plants and to propose a code for recording credibility of identification in historical ethnobotany publications. Methods A sample of Polish-language ethnobotanical literature (45 published sources from 1874-2005) and four collections of voucher specimens (from 1894-1975) were analyzed. Errors were detected in the publications by comparing the data with existing knowledge on the distribution of plant names and species ranges. The voucher specimens were re-examined. A one-letter code was invented for quick identification of the credibility of data published in lists of species compiled from historical or ethnographic sources, according to the source of identification: voucher specimen, Latin binominal, botanical expert, obvious widespread name, folk name, mode of use, range, physical description or photograph. To test the use of the code an up-to-date list of wild food plants used in Poland was made. Results A significant difference between the ratio of mistakes in the voucher specimen collections and the ratio of detectable mistakes in the studies without herbarium documentation was found. At least 2.3% of taxa in the publications were identified erroneously (mean rate was 6.2% per publication), and in half of these mistakes even the genus was not correct. As many as 10.0% of voucher specimens (on average 9.2% per collection) were originally erroneously identified, but three quarters of the identification mistakes remained within-genus. The species of the genera Thymus, Rumex and Rubus were most often confused within the genus. Not all of the invented credibility codes were used in the list of wild food plants, but they may be useful for other researchers. The most often used codes were the ones signifying identification by: voucher specimen, botanical expert and by a common name used throughout the country. Conclusions The

  8. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    PubMed

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  9. Recognizing the enemy within: licensing RNA-guided genome defense

    PubMed Central

    Dumesic, Phillip A.; Madhani, Hiten D.

    2014-01-01

    How do cells distinguish normal genes from transposons? Although much has been learned about RNAi-related RNA silencing pathways responsible for genome defense, this fundamental question remains. The literature points to several classes of mechanisms. In some cases, double-stranded RNA structures produced by transposon inverted repeats or antisense integration trigger endo-siRNA biogenesis. In other instances, DNA features associated with transposons—such as their unusual copy number, chromosomal arrangement, and/or chromatin environment—license RNA silencing. Finally, recent studies have identified improper transcript processing events, such as stalled pre-mRNA splicing, as signals for siRNA production. Thus, the suboptimal gene expression properties of selfish elements can enable their identification by RNA silencing pathways. PMID:24280023

  10. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    PubMed

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  11. 75 FR 32416 - Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board AGENCY: Department of Defense (DoD). ACTION: Notice of advisory committee meeting. SUMMARY: The Defense Science Board Task Force on the Survivability of DoD Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons...

  12. Defense Business Transformation

    DTIC Science & Technology

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  13. More Than Bar Codes: Integrating Global Standards-Based Bar Code Technology Into National Health Information Systems in Ethiopia and Pakistan to Increase End-to-End Supply Chain Visibility.

    PubMed

    Hara, Liuichi; Guirguis, Ramy; Hummel, Keith; Villanueva, Monica

    2017-12-28

    The United Nations Population Fund (UNFPA) and the United States Agency for International Development (USAID) DELIVER PROJECT work together to strengthen public health commodity supply chains by standardizing bar coding under a single set of global standards. From 2015, UNFPA and USAID collaborated to pilot test how tracking and tracing of bar coded health products could be operationalized in the public health supply chains of Ethiopia and Pakistan and inform the ecosystem needed to begin full implementation. Pakistan had been using proprietary bar codes for inventory management of contraceptive supplies but transitioned to global standards-based bar codes during the pilot. The transition allowed Pakistan to leverage the original bar codes that were preprinted by global manufacturers as opposed to printing new bar codes at the central warehouse. However, barriers at lower service delivery levels prevented full realization of end-to-end data visibility. Key barriers at the district level were the lack of a digital inventory management system and absence of bar codes at the primary-level packaging level, such as single blister packs. The team in Ethiopia developed an open-sourced smartphone application that allowed the team to scan bar codes using the mobile phone's camera and to push the captured data to the country's data mart. Real-time tracking and tracing occurred from the central warehouse to the Addis Ababa distribution hub and to 2 health centers. These pilots demonstrated that standardized product identification and bar codes can significantly improve accuracy over manual stock counts while significantly streamlining the stock-taking process, resulting in efficiencies. The pilots also showed that bar coding technology by itself is not sufficient to ensure data visibility. Rather, by using global standards for identification and data capture of pharmaceuticals and medical devices, and integrating the data captured into national and global tracking systems

  14. More Than Bar Codes: Integrating Global Standards-Based Bar Code Technology Into National Health Information Systems in Ethiopia and Pakistan to Increase End-to-End Supply Chain Visibility

    PubMed Central

    Hara, Liuichi; Guirguis, Ramy; Hummel, Keith; Villanueva, Monica

    2017-01-01

    The United Nations Population Fund (UNFPA) and the United States Agency for International Development (USAID) DELIVER PROJECT work together to strengthen public health commodity supply chains by standardizing bar coding under a single set of global standards. From 2015, UNFPA and USAID collaborated to pilot test how tracking and tracing of bar coded health products could be operationalized in the public health supply chains of Ethiopia and Pakistan and inform the ecosystem needed to begin full implementation. Pakistan had been using proprietary bar codes for inventory management of contraceptive supplies but transitioned to global standards-based bar codes during the pilot. The transition allowed Pakistan to leverage the original bar codes that were preprinted by global manufacturers as opposed to printing new bar codes at the central warehouse. However, barriers at lower service delivery levels prevented full realization of end-to-end data visibility. Key barriers at the district level were the lack of a digital inventory management system and absence of bar codes at the primary-level packaging level, such as single blister packs. The team in Ethiopia developed an open-sourced smartphone application that allowed the team to scan bar codes using the mobile phone's camera and to push the captured data to the country's data mart. Real-time tracking and tracing occurred from the central warehouse to the Addis Ababa distribution hub and to 2 health centers. These pilots demonstrated that standardized product identification and bar codes can significantly improve accuracy over manual stock counts while significantly streamlining the stock-taking process, resulting in efficiencies. The pilots also showed that bar coding technology by itself is not sufficient to ensure data visibility. Rather, by using global standards for identification and data capture of pharmaceuticals and medical devices, and integrating the data captured into national and global tracking systems

  15. Role for ion transport in porcine vocal fold epithelial defense to acid challenge.

    PubMed

    Erickson-Levendoski, Elizabeth; Sivasankar, M Preeti

    2012-02-01

    The vocal fold epithelium is routinely exposed to gastric contents, including acid and pepsin, during laryngopharyngeal reflux events. The epithelium may possess intrinsic defenses to reflux. The first objective of the current study was to examine whether vocal fold epithelial ion transport is one potential mechanism of defense to gastric contents. The second objective was to determine whether ion transport in response to gastric contents is associated with the secretion of bicarbonate. Prospective design in excised porcine larynges. Laboratory. Porcine vocal folds (N = 56) were exposed on the luminal surface to acid, pepsin, or sham challenges. Ion transport at baseline and following challenge exposure was measured using electrophysiological techniques. To examine specific ion transport mechanisms, vocal folds were pretreated with either a sodium channel blocker or bicarbonate channel blocker. Within 60 seconds of acid but not pepsin exposure, there was a significant increase in ion transport. This rapid increase in ion transport was transient and related to bicarbonate secretion. The current data suggest that porcine vocal folds immediately increase bicarbonate secretion following exposure to acid. Bicarbonate secretion may act to neutralize acid. These findings contribute to the identification of the mechanisms underlying vocal fold defense to reflux and offer implications for the development of treatments for reflux-induced vocal fold injury.

  16. Identification - obstacle to individuation, or: on how to become 'me'.

    PubMed

    Cavalli, Alessandra

    2017-04-01

    This paper will explore the use of identification with aspects of a lost object as a defensive strategy to cope with traumatic loss, and will show how in the depth of the analytic work this identification can be accessed and made conscious. Descriptions of work with a three-year-old boy illustrate how the sudden loss of his mother's breasts had made weaning un-accessible to him, and how, in the absence of a good experience of separation, the process of mourning had not been able to take place. Instead, identification with aspects of the lost breast was used as a defence against pain, and this state of affairs was proving a hindrance to individuation. In the discussion of the case material, the use of identification as a defence will be highlighted, and a differentiation made between abandonment and separation as this illuminates the link between mourning and individuation. © 2017, The Society of Analytical Psychology.

  17. Soybean seed coat chitinase as a defense protein against the stored product pest Callosobruchus maculatus.

    PubMed

    Silva, Nadia Cm; Conceição, Jamile G; Ventury, Kayan Eudorico; De Sá, Leonardo Fr; Oliveira, Eduardo Ag; Santos, Izabela S; Gomes, Valdirene M; Costa, Monique N; Ferreira, Andre Ts; Perales, Jonas; Xavier-Filho, Jose; Fernandes, Kátia Vs; Oliveira, Antonia Ea

    2018-06-01

    Chitinases (EC 3.2.1.14) are enzymes involved in the breaking of the β-1,4-glycosidic linkages of chitin. In insects, chitin is present mainly in the cuticle and in peritrophic membranes and peritrophic gel. Enzymes with the potential to damage peritrophic membranes and gel, such as chitinase, have been associated with plant defense systems. Identification and characterization of seed coat chitinase as a plant defense molecule may indicate a more effective target for manipulation strategies, which may lead to the prevention of consumption of embryonic tissues by larvae and consequently minimization of seed damage. We studied the efficiency of soybean seed coat chitinase as a defense molecule against the insect Callosobruchus maculatus. The seed coat chitinase was isolated and identified by mass spectrometry, immunoreacted with an anti-chitinase antibody and shown to have activity against chitin azure and 4-methylumbelliferyl β-D-N,N',N''-triacetylchitotrioside. A chitinase fraction incorporated in artificial cotyledons at 0.1% reduced larval survival by approximately 77%, and at 0.5%, the reduction in larval mass was 60%. Fluorescein isothiocyanate (FITC)-labeled chitinase was detected in the guts and feces of larvae. At 25% in thick artificial seed coats, chitinase showed a high toxicity to larvae, with mortality of 90% and a reduction of larval mass of 87%. Seed coat chitinase is an important seed defense molecule not only in the cotyledons but also in seed coats, acting as part of the array of defense mechanisms against Callosobruchus maculatus. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  18. Colour coding scrubs as a means of improving perioperative communication.

    PubMed

    Litak, Dominika

    2011-05-01

    Effective communication within the operating department is essential for achieving patient safety. A large part of the perioperative communication is non-verbal. One type of non-verbal communication is 'object communication', the most common form of which is clothing. The colour coding of clothing such as scrubs has the potential to optimise perioperative communication with the patients and between the staff. A colour contains a coded message, and is a visual cue for an immediate identification of personnel. This is of key importance in the perioperative environment. The idea of colour coded scrubs in the perioperative setting has not been much explored to date and, given the potential contributiontowards improvement of patient outcomes, deserves consideration.

  19. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms... changed only by amendments made pursuant to section 38 of the Arms Export Control Act (22 U.S.C. 2778...

  20. Accuracy of diagnosis codes to identify febrile young infants using administrative data.

    PubMed

    Aronson, Paul L; Williams, Derek J; Thurm, Cary; Tieder, Joel S; Alpern, Elizabeth R; Nigrovic, Lise E; Schondelmeyer, Amanda C; Balamuth, Fran; Myers, Angela L; McCulloh, Russell J; Alessandrini, Evaline A; Shah, Samir S; Browning, Whitney L; Hayes, Katie L; Feldman, Elana A; Neuman, Mark I

    2015-12-01

    Administrative data can be used to determine optimal management of febrile infants and aid clinical practice guideline development. Determine the most accurate International Classification of Diseases, Ninth Revision (ICD-9) diagnosis coding strategies for identification of febrile infants. Retrospective cross-sectional study. Eight emergency departments in the Pediatric Health Information System. Infants aged <90 days evaluated between July 1, 2012 and June 30, 2013 were randomly selected for medical record review from 1 of 4 ICD-9 diagnosis code groups: (1) discharge diagnosis of fever, (2) admission diagnosis of fever without discharge diagnosis of fever, (3) discharge diagnosis of serious infection without diagnosis of fever, and (4) no diagnosis of fever or serious infection. The ICD-9 diagnosis code groups were compared in 4 case-identification algorithms to a reference standard of fever ≥100.4°F documented in the medical record. Algorithm predictive accuracy was measured using sensitivity, specificity, and negative and positive predictive values. Among 1790 medical records reviewed, 766 (42.8%) infants had fever. Discharge diagnosis of fever demonstrated high specificity (98.2%, 95% confidence interval [CI]: 97.8-98.6) but low sensitivity (53.2%, 95% CI: 50.0-56.4). A case-identification algorithm of admission or discharge diagnosis of fever exhibited higher sensitivity (71.1%, 95% CI: 68.2-74.0), similar specificity (97.7%, 95% CI: 97.3-98.1), and the highest positive predictive value (86.9%, 95% CI: 84.5-89.3). A case-identification strategy that includes admission or discharge diagnosis of fever should be considered for febrile infant studies using administrative data, though underclassification of patients is a potential limitation. © 2015 Society of Hospital Medicine.

  1. Proteomic identification of early salicylate- and flg22-responsive redox-sensitive proteins in Arabidopsis

    PubMed Central

    Liu, Pei; Zhang, Huoming; Yu, Boying; Xiong, Liming; Xia, Yiji

    2015-01-01

    Accumulation of reactive oxygen species (ROS) is one of the early defense responses against pathogen infection in plants. The mechanism about the initial and direct regulation of the defense signaling pathway by ROS remains elusive. Perturbation of cellular redox homeostasis by ROS is believed to alter functions of redox-sensitive proteins through their oxidative modifications. Here we report an OxiTRAQ-based proteomic study in identifying proteins whose cysteines underwent oxidative modifications in Arabidopsis cells during the early response to salicylate or flg22, two defense pathway elicitors that are known to disturb cellular redox homeostasis. Among the salicylate- and/or flg22-responsive redox-sensitive proteins are those involved in transcriptional regulation, chromatin remodeling, RNA processing, post-translational modifications, and nucleocytoplasmic shuttling. The identification of the salicylate-/flg22-responsive redox-sensitive proteins provides a foundation from which further study can be conducted toward understanding biological significance of their oxidative modifications during the plant defense response. PMID:25720653

  2. Optimal Defense Strategies in an Idealized Microbial Food Web under Trade-Off between Competition and Defense

    PubMed Central

    Våge, Selina; Storesund, Julia E.; Giske, Jarl; Thingstad, T. Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of “Keystone Predation” (KP) and “Killing-the-Winner” (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean. PMID:24999739

  3. Neural representation of objects in space: a dual coding account.

    PubMed Central

    Humphreys, G W

    1998-01-01

    I present evidence on the nature of object coding in the brain and discuss the implications of this coding for models of visual selective attention. Neuropsychological studies of task-based constraints on: (i) visual neglect; and (ii) reading and counting, reveal the existence of parallel forms of spatial representation for objects: within-object representations, where elements are coded as parts of objects, and between-object representations, where elements are coded as independent objects. Aside from these spatial codes for objects, however, the coding of visual space is limited. We are extremely poor at remembering small spatial displacements across eye movements, indicating (at best) impoverished coding of spatial position per se. Also, effects of element separation on spatial extinction can be eliminated by filling the space with an occluding object, indicating that spatial effects on visual selection are moderated by object coding. Overall, there are separate limits on visual processing reflecting: (i) the competition to code parts within objects; (ii) the small number of independent objects that can be coded in parallel; and (iii) task-based selection of whether within- or between-object codes determine behaviour. Between-object coding may be linked to the dorsal visual system while parallel coding of parts within objects takes place in the ventral system, although there may additionally be some dorsal involvement either when attention must be shifted within objects or when explicit spatial coding of parts is necessary for object identification. PMID:9770227

  4. Defense Mechanisms of Pregnant Mothers Predict Attachment Security, Social-Emotional Competence, and Behavior Problems in Their Toddlers.

    PubMed

    Porcerelli, John H; Huth-Bocks, Alissa; Huprich, Steven K; Richardson, Laura

    2016-02-01

    For at-risk (single parent, low income, low support) mothers, healthy adaptation and the ability to manage stress have clear implications for parenting and the social-emotional well-being of their young offspring. The purpose of this longitudinal study was to examine associations between defense mechanisms in pregnant women and their toddlers' attachment security, social-emotional, and behavioral adjustment. Participants were 84 pregnant women during their last trimester of pregnancy, recruited from community agencies primarily serving low-income families. Women were followed prospectively from pregnancy through 2 years after birth and completed several multimethod assessments during that period. Observations of mother-child interactions were also coded after the postnatal visits. Multiple regression analyses revealed that mothers' defense mechanisms were significantly associated with several toddler outcomes. Mature, healthy defenses were significantly associated with greater toddler attachment security and social-emotional competence and fewer behavior problems, and less mature defenses (disavowal in particular) were associated with lower levels of attachment security and social-emotional competence. Associations remained significant, or were only slightly attenuated, after controlling for demographic variables and partner abuse during pregnancy. The study findings suggest that defensive functioning in parents preparing for and parenting toddlers influences the parent-child attachment relationship and social-emotional adjustment in the earliest years of life. Possible mechanisms for these associations may include parental attunement and mentalization, as well as specific caregiving behavior toward the child. Defensive functioning during times of increased stress (such as the prenatal to postnatal period) may be especially important for understanding parental influences on the child.

  5. Defense Business Board

    Science.gov Websites

    Assessment on the Creation of an Under Secretary of Defense for Business Management & Information OUR Defense team for 2017. View Study Best Practices for Real Property Management Best Practices for Real Property Management There is now an opportunity to modernize the management of the Department's real

  6. The Anatomy of Self-Defense

    ERIC Educational Resources Information Center

    Sparks Stein, Pamela; Richardson, April D.; Challman, Sandra D.

    2008-01-01

    The following study describes a creative application of anatomical principles in the instruction of self-defense. Undergraduates at the University of Kentucky were invited to a special lecture that featured a series of self-defense moves introduced by a local police officer. Following a demonstration of each self-defense tactic, the students were…

  7. Quantum-dot-tagged microbeads for multiplexed optical coding of biomolecules.

    PubMed

    Han, M; Gao, X; Su, J Z; Nie, S

    2001-07-01

    Multicolor optical coding for biological assays has been achieved by embedding different-sized quantum dots (zinc sulfide-capped cadmium selenide nanocrystals) into polymeric microbeads at precisely controlled ratios. Their novel optical properties (e.g., size-tunable emission and simultaneous excitation) render these highly luminescent quantum dots (QDs) ideal fluorophores for wavelength-and-intensity multiplexing. The use of 10 intensity levels and 6 colors could theoretically code one million nucleic acid or protein sequences. Imaging and spectroscopic measurements indicate that the QD-tagged beads are highly uniform and reproducible, yielding bead identification accuracies as high as 99.99% under favorable conditions. DNA hybridization studies demonstrate that the coding and target signals can be simultaneously read at the single-bead level. This spectral coding technology is expected to open new opportunities in gene expression studies, high-throughput screening, and medical diagnostics.

  8. Molecular Mechanisms for Microbe Recognition and Defense by the Red Seaweed Laurencia dendroidea.

    PubMed

    de Oliveira, Louisi Souza; Tschoeke, Diogo Antonio; Magalhães Lopes, Ana Carolina Rubem; Sudatti, Daniela Bueno; Meirelles, Pedro Milet; Thompson, Cristiane C; Pereira, Renato Crespo; Thompson, Fabiano L

    2017-01-01

    The ability to recognize and respond to the presence of microbes is an essential strategy for seaweeds to survive in the marine environment, but understanding of molecular seaweed-microbe interactions is limited. Laurencia dendroidea clones were inoculated with the marine bacterium Vibrio madracius . The seaweed RNA was sequenced, providing an unprecedentedly high coverage of the transcriptome of Laurencia , and the gene expression levels were compared between control and inoculated samples after 24, 48, and 72 h. Transcriptomic changes in L. dendroidea in the presence of V. madracius include the upregulation of genes that participate in signaling pathways described here for the first time as a response of seaweeds to microbes. Genes coding for defense-related transcription activators, reactive oxygen species metabolism, terpene biosynthesis, and energy conversion pathways were upregulated in inoculated samples of L. dendroidea , indicating an integrated defensive system in seaweeds. This report contributes significantly to the current knowledge about the molecular mechanisms involved in the highly dynamic seaweed-bacterium interactions. IMPORTANCE Marine bacteria are part of the healthy microbiota associated with seaweeds, but some species, such as Vibrio spp., are frequently associated with disease outbreaks, especially in economically valuable cultures. In this context, the ability of seaweeds to recognize microbes and, when necessary, activate defense mechanisms is essential for their survival. However, studies dedicated to understanding the molecular components of the immune response in seaweeds are rare and restricted to indirect stimulus. This work provides an unprecedentedly large-scale evaluation of the transcriptional changes involved in microbe recognition, cellular signaling, and defense in the red seaweed Laurencia dendroidea in response to the marine bacterium Vibrio madracius . By expanding knowledge about seaweed-bacterium interactions and about the

  9. Identifying psychotic defenses in a clinical interview.

    PubMed

    Berney, Sylvie; de Roten, Yves; Beretta, Véronique; Kramer, Ueli; Despland, Jean-Nicolas

    2014-05-01

    The Defense Mechanisms Rating Scales (DMRS), one of the most widely used and validated instruments in the study of defense mechanisms, does not include psychotic defenses. The Psychotic-DMRS (P-DMRS) has been developed to include 6 psychotic defense mechanisms: psychotic denial, autistic withdrawal, distortion, delusional projection, fragmentation, and concretization. We discuss psychotic defenses, including the difference between psychotic defenses and psychotic symptoms. Six clinical illustrations demonstrate how the 6 P-DMRS defenses can be identified in patients' narratives selected from the transcripts of dynamic interviews. Implications with respect to patient evaluation and treatment are discussed. © 2014 Wiley Periodicals, Inc.

  10. Identification of Novel Long Non-coding and Circular RNAs in Human Papillomavirus-Mediated Cervical Cancer

    PubMed Central

    Wang, Hongbo; Zhao, Yingchao; Chen, Mingyue; Cui, Jie

    2017-01-01

    Cervical cancer is the third most common cancer worldwide and the fourth leading cause of cancer-associated mortality in women. Accumulating evidence indicates that long non-coding RNAs (lncRNAs) and circular RNAs (circRNAs) may play key roles in the carcinogenesis of different cancers; however, little is known about the mechanisms of lncRNAs and circRNAs in the progression and metastasis of cervical cancer. In this study, we explored the expression profiles of lncRNAs, circRNAs, miRNAs, and mRNAs in HPV16 (human papillomavirus genotype 16) mediated cervical squamous cell carcinoma and matched adjacent non-tumor (ATN) tissues from three patients with high-throughput RNA sequencing (RNA-seq). In total, we identified 19 lncRNAs, 99 circRNAs, 28 miRNAs, and 304 mRNAs that were commonly differentially expressed (DE) in different patients. Among the non-coding RNAs, 3 lncRNAs and 44 circRNAs are novel to our knowledge. Functional enrichment analysis showed that DE lncRNAs, miRNAs, and mRNAs were enriched in pathways crucial to cancer as well as other gene ontology (GO) terms. Furthermore, the co-expression network and function prediction suggested that all 19 DE lncRNAs could play different roles in the carcinogenesis and development of cervical cancer. The competing endogenous RNA (ceRNA) network based on DE coding and non-coding RNAs showed that each miRNA targeted a number of lncRNAs and circRNAs. The link between part of the miRNAs in the network and cervical cancer has been validated in previous studies, and these miRNAs targeted the majority of the novel non-coding RNAs, thus suggesting that these novel non-coding RNAs may be involved in cervical cancer. Taken together, our study shows that DE non-coding RNAs could be further developed as diagnostic and therapeutic biomarkers of cervical cancer. The complex ceRNA network also lays the foundation for future research of the roles of coding and non-coding RNAs in cervical cancer. PMID:28970820

  11. The Emerging Shield. The Air Force and the Evolution of Continental Air Defense 1945-1960

    DTIC Science & Technology

    1991-01-01

    flight plans other than those reported to the Presque Isle site. No one blamed the pilots; they had reported their changes in flighit to Canadian flight...monitor stations. Communications between the stations and ADC’s Presque Isle radar site had failed, and the course changes were not identified in the...Identification Zone: 134 "Pregnant Goose": 20 GOC on coast of: 156 Presque Isle , Maine: 170-71 Northw st emergency air defense for: Project CHARLEs: 145

  12. Short-lived non-coding transcripts (SLiTs): Clues to regulatory long non-coding RNA.

    PubMed

    Tani, Hidenori

    2017-03-22

    Whole transcriptome analyses have revealed a large number of novel long non-coding RNAs (lncRNAs). Although the importance of lncRNAs has been documented in previous reports, the biological and physiological functions of lncRNAs remain largely unknown. The role of lncRNAs seems an elusive problem. Here, I propose a clue to the identification of regulatory lncRNAs. The key point is RNA half-life. RNAs with a long half-life (t 1/2 > 4 h) contain a significant proportion of ncRNAs, as well as mRNAs involved in housekeeping functions, whereas RNAs with a short half-life (t 1/2 < 4 h) include known regulatory ncRNAs and regulatory mRNAs. This novel class of ncRNAs with a short half-life can be categorized as Short-Lived non-coding Transcripts (SLiTs). I consider that SLiTs are likely to be rich in functionally uncharacterized regulatory RNAs. This review describes recent progress in research into SLiTs.

  13. Reduction in specimen labeling errors after implementation of a positive patient identification system in phlebotomy.

    PubMed

    Morrison, Aileen P; Tanasijevic, Milenko J; Goonan, Ellen M; Lobo, Margaret M; Bates, Michael M; Lipsitz, Stuart R; Bates, David W; Melanson, Stacy E F

    2010-06-01

    Ensuring accurate patient identification is central to preventing medical errors, but it can be challenging. We implemented a bar code-based positive patient identification system for use in inpatient phlebotomy. A before-after design was used to evaluate the impact of the identification system on the frequency of mislabeled and unlabeled samples reported in our laboratory. Labeling errors fell from 5.45 in 10,000 before implementation to 3.2 in 10,000 afterward (P = .0013). An estimated 108 mislabeling events were prevented by the identification system in 1 year. Furthermore, a workflow step requiring manual preprinting of labels, which was accompanied by potential labeling errors in about one quarter of blood "draws," was removed as a result of the new system. After implementation, a higher percentage of patients reported having their wristband checked before phlebotomy. Bar code technology significantly reduced the rate of specimen identification errors.

  14. Good neighbors make good defenses: associational refuges reduce defense investment in African savanna plants.

    PubMed

    Coverdale, Tyler C; Goheen, Jacob R; Palmer, Todd M; Pringle, Robert M

    2018-06-25

    Intraspecific variation in plant defense phenotype is common and has wide-ranging ecological consequences. Yet prevailing theories of plant defense allocation, which primarily account for interspecific differences in defense phenotype, often fail to predict intraspecific patterns. Furthermore, although individual variation in defense phenotype is often attributed to ecological interactions, few general mechanisms have been proposed to explain the ubiquity of variable defense phenotype within species. Here, we show experimentally that associational refuges and induced resistance interact to create predictable intraspecific variation in defense phenotype in African savanna plants. Physically defended species from four families (Acanthaceae, Asparagaceae, Cactaceae, and Solanaceae) growing in close association with spinescent Acacia trees had 39-78% fewer spines and thorns than did isolated conspecifics. For a subset of these species, we used a series of manipulative experiments to show that this variability is maintained primarily by a reduction in induced responses among individuals that seldom experience mammalian herbivory, whether due to association with Acacia trees or to experimental herbivore exclusion. Unassociated plants incurred 4- to 16-fold more browsing damage than did associated individuals and increased spine density by 16-38% within one month following simulated browsing. In contrast, experimental clipping induced no net change in spine density among plants growing beneath Acacia canopies or inside long-term herbivore exclosures. Associated and unassociated individuals produced similar numbers of flowers and seeds, but seedling recruitment and survival were vastly greater in refuge habitats, suggesting a net fitness benefit of association. We conclude that plant-plant associations consistently decrease defense investment in this system by reducing both the frequency of herbivory and the intensity of induced responses, and that inducible responses

  15. A novel type of pathogen defense-related cinnamyl alcohol dehydrogenase.

    PubMed

    Logemann, E; Reinold, S; Somssich, I E; Hahlbrock, K

    1997-08-01

    We describe an aromatic alcohol dehydrogenase with properties indicating a novel type of function in the defense response of plants to pathogens. To obtain the enzyme free of contamination with possible isoforms, a parsley (Petroselinum crispum) cDNA comprising the entire coding region of the elicitor-responsive gene, ELI3, was expressed in Escherichia coli. In accord with large amino acid sequence similarities with established cinnamyl and benzyl alcohol dehydrogenases from other plants, the enzyme efficiently reduced various cinnamyl and benzyl aldehydes using NADPH as a co-substrate. Highest substrate affinities were observed for cinnamaldehyde, 4-coumaraldehyde and coniferaldehyde, whereas sinapaldehyde, one of the most efficient substrates of several previously analyzed cinnamyl alcohol dehydrogenases and a characteristic precursor molecule of angiosperm lignin, was not converted. A single form of ELI3 mRNA was strongly and rapidly induced in fungal elicitor-treated parsley cells. These results, together with earlier findings that the ELI3 gene is strongly activated both in elicitor-treated parsley cells and at fungal infection sites in parsley leaves, but not in lignifying tissue, suggest a specific role of this enzyme in pathogen defense-related phenylpropanoid metabolism.

  16. ISBT 128 Standard for Coding Medical Products of Human Origin

    PubMed Central

    Ashford, Paul; Delgado, Matthew

    2017-01-01

    Background ISBT 128 is an international standard for the terminology, coding, labeling, and identification of medical products of human origin (MPHO). Full implementation of ISBT 128 improves traceability, transparency, vigilance and surveillance, and interoperability. Methods ICCBBA maintains the ISBT 128 standard through the activities of a network of expert volunteers, including representatives from professional scientific societies, governments and users, to standardize and maintain MPHO identification. These individuals are organized into Technical Advisory Groups and work within a structured framework as part of a quality-controlled standards development process. Results The extensive involvement of international scientific and professional societies in the development of the standard has ensured that ISBT 128 has gained widespread recognition. The user community has developed confidence in the ability of the standard to adapt to new developments in their fields of interest. The standard is fully compatible with Single European Code requirements for tissues and cells and is utilized by many European tissue establishments. ISBT 128's flexibility and robustness has allowed for expansions into subject areas such as cellular therapy, regenerative medicine, and tissue banking. Conclusion ISBT 128 is the internationally recognized standard for coding MPHO and has gained widespread use globally throughout the past two decades. PMID:29344013

  17. Report on DoD Civilians Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies

    DTIC Science & Technology

    1990-01-03

    Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies References: (a) DoD Instruction 7730.29, subject as above, June 25...b). B. APPLICABILITY This Instruction applies to the Office of the Secretary of Defense (OSD), the Inspector General of the Department of Defense (IG...direct hire civilians employed by the Office of the Secretary of Defense and other Defense organizations for submission to the Department of Labor. 2

  18. An Analysis of Serial Number Tracking Automatic Identification Technology as Used in Naval Aviation Programs

    DTIC Science & Technology

    2002-09-01

    employed by the supermarket industry in 1973. Other common linear bar code symbologies are Code 39, pioneered by the defense and automotive industries...Teller Machine ( ATM ) cards are one of the prominent uses of this technology, but to a lesser extent, the technology has been used for shop floor...additional power is transmitted to it through the probe, extending its charge. There is a risk of data loss if the CMB is not accessed from time to time

  19. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    DTIC Science & Technology

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  20. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  1. 78 FR 23675 - Importation of Defense Articles and Defense Services-U.S. Munitions Import List (2011R-20P)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... No. ATF-50F; AG Order No. 3383-2013] RIN 1140-AA46 Importation of Defense Articles and Defense... pursuant to the Arms Export Control Act (AECA) and Executive Order 13637 to designate defense articles and... whether the Secretary of State controls such defense articles or defense services for purposes of export...

  2. Cyclic lipopeptide iturin A structure-dependently induces defense response in Arabidopsis plants by activating SA and JA signaling pathways.

    PubMed

    Kawagoe, Yumi; Shiraishi, Soma; Kondo, Hiroko; Yamamoto, Shoko; Aoki, Yoshinao; Suzuki, Shunji

    2015-05-15

    Iturin A is the most well studied antifungal cyclic lipopeptide produced by Bacillus species that are frequently utilized as biological control agents. Iturin A not only shows strong antifungal activity against phytopathogens but also induces defense response in plants, thereby reducing plant disease severity. Here we report the defense signaling pathways triggered by iturin A in Arabidopsis salicylic acid (SA) or jasmonic acid (JA)-insensitive mutants. Iturin A activated the transcription of defense genes PR1 and PDF1.2 through the SA and JA signaling pathways, respectively. The role of iturin A as an elicitor was dependent on the cyclization of the seven amino acids and/or the β-hydroxy fatty acid chain. The iturin A derivative peptide, NH2-(L-Asn)-(D-Tyr)-(D-Asn)-(L-Gln)-(L-Pro)-(D-Asn)-(L-Ser)-COOH, completely suppressed PR1 and PDF1.2 gene expression in wild Arabidopsis plants. The identification of target molecules binding to iturin A and its derivative peptide is expected to shed new light on defense response in plants through the SA and JA signaling pathways. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Malnutrition coding 101: financial impact and more.

    PubMed

    Giannopoulos, Georgia A; Merriman, Louise R; Rumsey, Alissa; Zwiebel, Douglas S

    2013-12-01

    Recent articles have addressed the characteristics associated with adult malnutrition as published by the Academy of Nutrition and Dietetics (the Academy) and the American Society for Parenteral and Enteral Nutrition (A.S.P.E.N.). This article describes a successful interdisciplinary program developed by the Department of Food and Nutrition at New York-Presbyterian Hospital to maintain and monitor clinical documentation, ensure accurate International Classification of Diseases 9th Edition (ICD-9) coding, and identify subsequent incremental revenue resulting from the early identification, documentation, and treatment of malnutrition in an adult inpatient population. The first step in the process requires registered dietitians to identify patients with malnutrition; then clear and specifically worded diagnostic statements that include the type and severity of malnutrition are documented in the medical record by the physician, nurse practitioner, or physician's assistant. This protocol allows the Heath Information Management/Coding department to accurately assign ICD-9 codes associated with protein-energy malnutrition. Once clinical coding is complete, a final diagnosis related group (DRG) is generated to ensure appropriate hospital reimbursement. Successful interdisciplinary programs such as this can drive optimal care and ensure appropriate reimbursement.

  4. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    DTIC Science & Technology

    2015-06-01

    Defense. (University of California Press, Berkeley and Los Angeles , 1967). 22 but due to the Soviet Union basis system, it is not as efficient in...Making for Defense. University of California Press, Berkeley and Los Angeles , 1967. Hitch, Charles Johnston and Roland N. McKean. The Economics of...loss of defense is not an instantaneous phenomenon. This phenomenon has led to human disorder, blind and continuous personnel downsizing, reform of the

  5. The Evolution of the Contract Type Used in Defense Acquisition with a Focus on Major Defense Weapon Systems

    DTIC Science & Technology

    2012-09-01

    III. THE DEFENSE MARKETPLACE A. DEFENSE INDUSTRY OVERVIEW The market of the defense industry in the United States is different than the commercial...marketplace in a number of respects. Lorell, Lowell, Kennedy, and Levaux (2000) defined the uniqueness of the U.S. defense market in two ways. First...the U.S. defense market for weapon systems is characterized by a single buyer (Lorell et al., 2000, p. 13). “The second distinguishing feature of

  6. Long Non-Coding RNAs (lncRNAs) of Sea Cucumber: Large-Scale Prediction, Expression Profiling, Non-Coding Network Construction, and lncRNA-microRNA-Gene Interaction Analysis of lncRNAs in Apostichopus japonicus and Holothuria glaberrima During LPS Challenge and Radial Organ Complex Regeneration.

    PubMed

    Mu, Chuang; Wang, Ruijia; Li, Tianqi; Li, Yuqiang; Tian, Meilin; Jiao, Wenqian; Huang, Xiaoting; Zhang, Lingling; Hu, Xiaoli; Wang, Shi; Bao, Zhenmin

    2016-08-01

    Long non-coding RNA (lncRNA) structurally resembles mRNA but cannot be translated into protein. Although the systematic identification and characterization of lncRNAs have been increasingly reported in model species, information concerning non-model species is still lacking. Here, we report the first systematic identification and characterization of lncRNAs in two sea cucumber species: (1) Apostichopus japonicus during lipopolysaccharide (LPS) challenge and in heathy tissues and (2) Holothuria glaberrima during radial organ complex regeneration, using RNA-seq datasets and bioinformatics analysis. We identified A. japonicus and H. glaberrima lncRNAs that were differentially expressed during LPS challenge and radial organ complex regeneration, respectively. Notably, the predicted lncRNA-microRNA-gene trinities revealed that, in addition to targeting protein-coding transcripts, miRNAs might also target lncRNAs, thereby participating in a potential novel layer of regulatory interactions among non-coding RNA classes in echinoderms. Furthermore, the constructed coding-non-coding network implied the potential involvement of lncRNA-gene interactions during the regulation of several important genes (e.g., Toll-like receptor 1 [TLR1] and transglutaminase-1 [TGM1]) in response to LPS challenge and radial organ complex regeneration in sea cucumbers. Overall, this pioneer systematic identification, annotation, and characterization of lncRNAs in echinoderm pave the way for similar studies and future genetic, genomic, and evolutionary research in non-model species.

  7. Optimizing ATLAS code with different profilers

    NASA Astrophysics Data System (ADS)

    Kama, S.; Seuster, R.; Stewart, G. A.; Vitillo, R. A.

    2014-06-01

    After the current maintenance period, the LHC will provide higher energy collisions with increased luminosity. In order to keep up with these higher rates, ATLAS software needs to speed up substantially. However, ATLAS code is composed of approximately 6M lines, written by many different programmers with different backgrounds, which makes code optimisation a challenge. To help with this effort different profiling tools and techniques are being used. These include well known tools, such as the Valgrind suite and Intel Amplifier; less common tools like Pin, PAPI, and GOoDA; as well as techniques such as library interposing. In this paper we will mainly focus on Pin tools and GOoDA. Pin is a dynamic binary instrumentation tool which can obtain statistics such as call counts, instruction counts and interrogate functions' arguments. It has been used to obtain CLHEP Matrix profiles, operations and vector sizes for linear algebra calculations which has provided the insight necessary to achieve significant performance improvements. Complimenting this, GOoDA, an in-house performance tool built in collaboration with Google, which is based on hardware performance monitoring unit events, is used to identify hot-spots in the code for different types of hardware limitations, such as CPU resources, caches, or memory bandwidth. GOoDA has been used in improvement of the performance of new magnetic field code and identification of potential vectorization targets in several places, such as Runge-Kutta propagation code.

  8. Defense Institution Building: An Assessment

    DTIC Science & Technology

    2016-01-01

    collectively responsible for national-level defense oversight, governance, and management. Study Objectives and Research Questions The objectives of...Defense Studies , in this case) posts a per- manent representative with the command to help recruit for resident courses, suggest courses to be...foreign military officers to conduct study and research on security-related topics Program 2 Defense institutions/ education and training

  9. An Aerospace and Defense Industry Market Index for 1950-2012 and the Connection With Defense Spending

    DTIC Science & Technology

    2012-04-30

    select few financial measures, and by their infrequent production, have limited value in supporting the Defense Department’s knowledge refresh on the...their bread and butter business of defense production. The stable relationship that existed prior to the 1990s between defense production and

  10. Adaptive error correction codes for face identification

    NASA Astrophysics Data System (ADS)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  11. Billing code algorithms to identify cases of peripheral artery disease from administrative data

    PubMed Central

    Fan, Jin; Arruda-Olson, Adelaide M; Leibson, Cynthia L; Smith, Carin; Liu, Guanghui; Bailey, Kent R; Kullo, Iftikhar J

    2013-01-01

    Objective To construct and validate billing code algorithms for identifying patients with peripheral arterial disease (PAD). Methods We extracted all encounters and line item details including PAD-related billing codes at Mayo Clinic Rochester, Minnesota, between July 1, 1997 and June 30, 2008; 22 712 patients evaluated in the vascular laboratory were divided into training and validation sets. Multiple logistic regression analysis was used to create an integer code score from the training dataset, and this was tested in the validation set. We applied a model-based code algorithm to patients evaluated in the vascular laboratory and compared this with a simpler algorithm (presence of at least one of the ICD-9 PAD codes 440.20–440.29). We also applied both algorithms to a community-based sample (n=4420), followed by a manual review. Results The logistic regression model performed well in both training and validation datasets (c statistic=0.91). In patients evaluated in the vascular laboratory, the model-based code algorithm provided better negative predictive value. The simpler algorithm was reasonably accurate for identification of PAD status, with lesser sensitivity and greater specificity. In the community-based sample, the sensitivity (38.7% vs 68.0%) of the simpler algorithm was much lower, whereas the specificity (92.0% vs 87.6%) was higher than the model-based algorithm. Conclusions A model-based billing code algorithm had reasonable accuracy in identifying PAD cases from the community, and in patients referred to the non-invasive vascular laboratory. The simpler algorithm had reasonable accuracy for identification of PAD in patients referred to the vascular laboratory but was significantly less sensitive in a community-based sample. PMID:24166724

  12. Defense Primer: A Guide for New Members

    DTIC Science & Technology

    2017-03-03

    1 President’s Constitutional Authority with Regard to the Armed Forces ................................... 1 The Department of Defense ...primers to give Members of Congress an overview of key aspects of the Department of Defense and how Congress exercises authority over it. A consolidated...for New Members Congressional Research Service 2 The Department of Defense CRS In Focus IF10543, Defense Primer: The Department of Defense , by

  13. Accuracy of Diagnosis Codes to Identify Febrile Young Infants Using Administrative Data

    PubMed Central

    Aronson, Paul L.; Williams, Derek J.; Thurm, Cary; Tieder, Joel S.; Alpern, Elizabeth R.; Nigrovic, Lise E.; Schondelmeyer, Amanda C.; Balamuth, Fran; Myers, Angela L.; McCulloh, Russell J.; Alessandrini, Evaline A.; Shah, Samir S.; Browning, Whitney L.; Hayes, Katie L.; Feldman, Elana A.; Neuman, Mark I.

    2015-01-01

    Background Administrative data can be used to determine optimal management of febrile infants and aid clinical practice guideline development. Objective Determine the most accurate International Classification of Diseases, 9th revision (ICD-9) diagnosis coding strategies for identification of febrile infants. Design Retrospective cross-sectional study. Setting Eight emergency departments in the Pediatric Health Information System. Patients Infants age < 90 days evaluated between July 1, 2012 and June 30, 2013 were randomly selected for medical record review from one of four ICD-9 diagnosis code groups: 1) discharge diagnosis of fever, 2) admission diagnosis of fever without discharge diagnosis of fever, 3) discharge diagnosis of serious infection without diagnosis of fever, and 4) no diagnosis of fever or serious infection. Exposure The ICD-9 diagnosis code groups were compared in four case-identification algorithms to a reference standard of fever ≥ 100.4°F documented in the medical record. Measurements Algorithm predictive accuracy was measured using sensitivity, specificity, negative and positive predictive values. Results Among 1790 medical records reviewed, 766 (42.8%) infants had fever. Discharge diagnosis of fever demonstrated high specificity (98.2%, 95% confidence interval [CI]: 97.8-98.6) but low sensitivity (53.2%, 95% CI: 50.0-56.4). A case-identification algorithm of admission or discharge diagnosis of fever exhibited higher sensitivity (71.1%, 95% CI: 68.2-74.0), similar specificity (97.7%, 95% CI: 97.3-98.1), and the highest positive predictive value (86.9%, 95% CI: 84.5-89.3). Conclusions A case-identification strategy that includes admission or discharge diagnosis of fever should be considered for febrile infant studies using administrative data, though under-classification of patients is a potential limitation. PMID:26248691

  14. Acquisition Planning at the Defense Communications Agency.

    DTIC Science & Technology

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  15. Pipecolic Acid, an Endogenous Mediator of Defense Amplification and Priming, Is a Critical Regulator of Inducible Plant Immunity[W

    PubMed Central

    Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen

    2012-01-01

    Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid–induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR. PMID:23221596

  16. Density-dependent adjustment of inducible defenses.

    PubMed

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C; Laforsch, Christian; Kopp, Michael

    2015-08-03

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators' densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems.

  17. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  18. Nonoffensive defense is overrated

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flanagan, S.J.

    1988-09-01

    Some Western analysts argue that European security would stabilize if nations shifted to forces and doctrines that left them structurally incapable of conducting offensive military actions. Some, including American scholar Gene Sharp, have even called for replacing traditional military forces with plans for civilian-based resistance. Purely defensive postures would be reassuring to neighboring states, all of these theorists say, but such defenses would still be strong enough to defeat an attack if deterrence failed. This defensive-only stance, according to its advocates, is a purer form of deterrence by denial than now exists, since it removes even the possibility of inflictingmore » punishment in retaliation for an attack: it deters only be denying victory. But Mr. Flanagan questions whether such defense actually would serve as a credible deterrent. In addition, the various proposed schemes share some serious weaknesses, which he proceeds to discuss. 5 refs.« less

  19. Identification of Genes Potentially Responsible for extra-Oral Digestion and Overcoming Plant Defense from Salivary Glands of the Tarnished Plant Bug (Hemiptera: Miridae) Using cDNA Sequencing

    PubMed Central

    Zhu, Yu-Cheng; Yao, Jianxiu; Luttrell, Randall

    2016-01-01

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris [Palisot de Beauvois]) feeding. By facilitating the piercing, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the plant fluids are ingested by TPBs. To identify salivary gland genes, mRNA was extracted from salivary glands and cDNA library clones were sequenced. A de novo-assembling of 7,000 Sanger sequences revealed 666 high-quality unique cDNAs with an average size of 624 bp, in which the identities of 347 cDNAs were determined using Blast2GO. Kyoto Encyclopedia of Genes and Genomes analysis indicated that these genes participate in eighteen metabolic pathways. Identifications of large number of enzyme genes in TPB salivary glands evidenced functions for extra-oral digestion and feeding damage mechanism, including 45 polygalacturonase, two α- amylase, one glucosidase, one glycan enzyme, one aminopeptidase, four lipase, and many serine protease cDNAs. The presence of multiple transcripts, multigene members, and high abundance of cell wall degradation enzymes (polygalacturonases) indicated that the enzyme-rich saliva may cause damage to plants by breaking down plant cell walls to make nutrients available for feeding. We also identified genes potentially involved in insect adaptation and detoxifying xenobiotics that may allow insects to overcome plant defense responses, including four glutathione S-transferases, three esterases, one cytochrome P450, and several serine proteases. The gene profiles of TPB salivary glands revealed in this study provides a foundation for further understanding and potential development of novel enzymatic inhibitors, or other RNAi approaches that may interrupt or minimize TPB feeding damage. PMID:27324587

  20. The First Line of Defense: Higher Education in Wartime and the Development of National Defense Education, 1939-1959

    ERIC Educational Resources Information Center

    Ponte, Dana Adrienne

    2016-01-01

    This study posits that the National Defense Education Act of 1958 (NDEA) represented the culmination of nearly a century-long process through which education was linked to national defense in periods of wartime, and later retained a strategic utility for defense purposes in times of peace. That a defense rationale for federal support of public…

  1. Magnified Neural Envelope Coding Predicts Deficits in Speech Perception in Noise.

    PubMed

    Millman, Rebecca E; Mattys, Sven L; Gouws, André D; Prendergast, Garreth

    2017-08-09

    Verbal communication in noisy backgrounds is challenging. Understanding speech in background noise that fluctuates in intensity over time is particularly difficult for hearing-impaired listeners with a sensorineural hearing loss (SNHL). The reduction in fast-acting cochlear compression associated with SNHL exaggerates the perceived fluctuations in intensity in amplitude-modulated sounds. SNHL-induced changes in the coding of amplitude-modulated sounds may have a detrimental effect on the ability of SNHL listeners to understand speech in the presence of modulated background noise. To date, direct evidence for a link between magnified envelope coding and deficits in speech identification in modulated noise has been absent. Here, magnetoencephalography was used to quantify the effects of SNHL on phase locking to the temporal envelope of modulated noise (envelope coding) in human auditory cortex. Our results show that SNHL enhances the amplitude of envelope coding in posteromedial auditory cortex, whereas it enhances the fidelity of envelope coding in posteromedial and posterolateral auditory cortex. This dissociation was more evident in the right hemisphere, demonstrating functional lateralization in enhanced envelope coding in SNHL listeners. However, enhanced envelope coding was not perceptually beneficial. Our results also show that both hearing thresholds and, to a lesser extent, magnified cortical envelope coding in left posteromedial auditory cortex predict speech identification in modulated background noise. We propose a framework in which magnified envelope coding in posteromedial auditory cortex disrupts the segregation of speech from background noise, leading to deficits in speech perception in modulated background noise. SIGNIFICANCE STATEMENT People with hearing loss struggle to follow conversations in noisy environments. Background noise that fluctuates in intensity over time poses a particular challenge. Using magnetoencephalography, we demonstrate

  2. Identification of Potential Hazard using Hazard Identification and Risk Assessment

    NASA Astrophysics Data System (ADS)

    Sari, R. M.; Syahputri, K.; Rizkya, I.; Siregar, I.

    2017-03-01

    This research was conducted in the paper production’s company. These Paper products will be used as a cigarette paper. Along in the production’s process, Company provides the machines and equipment that operated by workers. During the operations, all workers may potentially injured. It known as a potential hazard. Hazard identification and risk assessment is one part of a safety and health program in the stage of risk management. This is very important as part of efforts to prevent occupational injuries and diseases resulting from work. This research is experiencing a problem that is not the identification of potential hazards and risks that would be faced by workers during the running production process. The purpose of this study was to identify the potential hazards by using hazard identification and risk assessment methods. Risk assessment is done using severity criteria and the probability of an accident. According to the research there are 23 potential hazard that occurs with varying severity and probability. Then made the determination Risk Assessment Code (RAC) for each potential hazard, and gained 3 extreme risks, 10 high risks, 6 medium risks and 3 low risks. We have successfully identified potential hazard using RAC.

  3. The identification of unfolding facial expressions.

    PubMed

    Fiorentini, Chiara; Schmidt, Susanna; Viviani, Paolo

    2012-01-01

    We asked whether the identification of emotional facial expressions (FEs) involves the simultaneous perception of the facial configuration or the detection of emotion-specific diagnostic cues. We recorded at high speed (500 frames s-1) the unfolding of the FE in five actors, each expressing six emotions (anger, surprise, happiness, disgust, fear, sadness). Recordings were coded every 10 frames (20 ms of real time) with the Facial Action Coding System (FACS, Ekman et al 2002, Salt Lake City, UT: Research Nexus eBook) to identify the facial actions contributing to each expression, and their intensity changes over time. Recordings were shown in slow motion (1/20 of recording speed) to one hundred observers in a forced-choice identification task. Participants were asked to identify the emotion during the presentation as soon as they felt confident to do so. Responses were recorded along with the associated response times (RTs). The RT probability density functions for both correct and incorrect responses were correlated with the facial activity during the presentation. There were systematic correlations between facial activities, response probabilities, and RT peaks, and significant differences in RT distributions for correct and incorrect answers. The results show that a reliable response is possible long before the full FE configuration is reached. This suggests that identification is reached by integrating in time individual diagnostic facial actions, and does not require perceiving the full apex configuration.

  4. Improving radiopharmaceutical supply chain safety by implementing bar code technology.

    PubMed

    Matanza, David; Hallouard, François; Rioufol, Catherine; Fessi, Hatem; Fraysse, Marc

    2014-11-01

    The aim of this study was to describe and evaluate an approach for improving radiopharmaceutical supply chain safety by implementing bar code technology. We first evaluated the current situation of our radiopharmaceutical supply chain and, by means of the ALARM protocol, analysed two dispensing errors that occurred in our department. Thereafter, we implemented a bar code system to secure selected key stages of the radiopharmaceutical supply chain. Finally, we evaluated the cost of this implementation, from overtime, to overheads, to additional radiation exposure to workers. An analysis of the events that occurred revealed a lack of identification of prepared or dispensed drugs. Moreover, the evaluation of the current radiopharmaceutical supply chain showed that the dispensation and injection steps needed to be further secured. The bar code system was used to reinforce product identification at three selected key stages: at usable stock entry; at preparation-dispensation; and during administration, allowing to check conformity between the labelling of the delivered product (identity and activity) and the prescription. The extra time needed for all these steps had no impact on the number and successful conduct of examinations. The investment cost was reduced (2600 euros for new material and 30 euros a year for additional supplies) because of pre-existing computing equipment. With regard to the radiation exposure to workers there was an insignificant overexposure for hands with this new organization because of the labelling and scanning processes of radiolabelled preparation vials. Implementation of bar code technology is now an essential part of a global securing approach towards optimum patient management.

  5. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii... 29 Labor 5 2011-07-01 2011-07-01 false Safety color code for marking physical hazards. 1910.144 Section 1910.144 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH...

  6. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  7. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  8. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  9. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  10. DCT-based cyber defense techniques

    NASA Astrophysics Data System (ADS)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  11. Code-Switching in Iranian Elementary EFL Classrooms: An Exploratory Investigation

    ERIC Educational Resources Information Center

    Rezvani, Ehsan; Street, Hezar Jerib; Rasekh, Abbass Eslami

    2011-01-01

    This paper presents the results of a small-scale exploratory investigation of code-switching (CS) between English and Farsi by 4 Iranian English foreign language (EFL) teachers in elementary level EFL classrooms in a language school in Isfahan, Iran. Specifically, the present study aimed at exploring the syntactical identification of switches and…

  12. Role for Ion Transport in Porcine Vocal Fold Epithelial Defense to Acid Challenge

    PubMed Central

    Erickson-Levendoski, Elizabeth; Sivasankar, M. Preeti

    2012-01-01

    Objective The vocal fold epithelium is routinely exposed to gastric contents, including acid and pepsin, during laryngopharyngeal reflux events. The epithelium may possess intrinsic defenses to reflux. The first objective of the current study was to examine whether vocal fold epithelial ion transport is one potential mechanism of defense to gastric contents. The second objective was to determine whether ion transport in response to gastric contents is associated with the secretion of bicarbonate. Study Design Prospective design in excised porcine larynges. Setting Laboratory. Subjects and Methods Porcine vocal folds (N = 56) were exposed on the luminal surface to acid, pepsin, or sham challenges. Ion transport at baseline and following challenge exposure was measured using electrophysiological techniques. To examine specific ion transport mechanisms, vocal folds were pretreated with either a sodium channel blocker or bicarbonate channel blocker. Results Within 60 seconds of acid but not pepsin exposure, there was a significant increase in ion transport. This rapid increase in ion transport was transient and related to bicarbonate secretion. Conclusion The current data suggest that porcine vocal folds immediately increase bicarbonate secretion following exposure to acid. Bicarbonate secretion may act to neutralize acid. These findings contribute to the identification of the mechanisms underlying vocal fold defense to reflux and offer implications for the development of treatments for reflux-induced vocal fold injury. PMID:22086905

  13. Strategic Missile Defense & Nuclear Deterrence

    NASA Astrophysics Data System (ADS)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  14. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  15. Defense Mechanisms: A Bibliography.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  16. The anatomy of self-defense.

    PubMed

    Stein, Pamela Sparks; Richardson, April D; Challman, Sandra D

    2008-01-01

    The following study describes a creative application of anatomical principles in the instruction of self-defense. Undergraduates at the University of Kentucky were invited to a special lecture that featured a series of self-defense moves introduced by a local police officer. Following a demonstration of each self-defense tactic, the students were briefed on the anatomy of both the victim and the assailant that contributed to the overall effectiveness of each move. This approach was unique in that students learned critical knowledge of self-defense while reinforcing anatomical principles previously introduced in class. Moreover, this integration of topics prompted students to think about their response to potentially dangerous situations on campus. (c) 2008 American Association of Anatomists.

  17. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., destruction, processing or use of defense articles; (2) The furnishing to foreign persons of any technical...) Military training of foreign units and forces, regular and irregular, including formal or informal...

  18. Variation in plant defense suppresses herbivore performance

    USGS Publications Warehouse

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  19. 75 FR 33587 - Defense Science Board; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Correction AGENCY: Department..., DoD published a notice (75 FR 32416) announcing a meeting of the Defense Science Board Task Force. In... published a notice announcing a meeting of the Defense Science Board Task Force on the Survivability of DoD...

  20. Numerical approach to reference identification of Staphylococcus, Stomatococcus, and Micrococcus spp.

    PubMed

    Rhoden, D L; Hancock, G A; Miller, J M

    1993-03-01

    A numerical-code system for the reference identification of Staphylococcus species, Stomatococcus mucilaginosus, and Micrococcus species was established by using a selected panel of conventional biochemicals. Results from 824 cultures (289 eye isolate cultures, 147 reference strains, and 388 known control strains) were used to generate a list of 354 identification code numbers. Each six-digit code number was based on results from 18 conventional biochemical reactions. Seven milliliters of purple agar base with 1% sterile carbohydrate solution added was poured into 60-mm-diameter agar plates. All biochemical tests were inoculated with 1 drop of a heavy broth suspension, incubated at 35 degrees C, and read daily for 3 days. All reactions were read and interpreted by the method of Kloos et al. (G. A. Hebert, C. G. Crowder, G. A. Hancock, W. R. Jarvis, and C. Thornsberry, J. Clin. Microbiol. 26:1939-1949, 1988; W. E. Kloos and D. W. Lambe, Jr., P. 222-237, in A. Balows, W. J. Hansler, Jr., K. L. Herrmann, H. D. Isenberg, and H. J. Shadomy, ed., Manual of Clinical Microbiology, 5th ed., 1991). This modified reference identification method was 96 to 98% accurate and could have value in reference and public health laboratory settings.

  1. Defense Financial and Investment Review. Appendix 3. Financial Community Perceptions of the Defense Industry: 1985,

    DTIC Science & Technology

    1985-03-01

    customer. The interviewed executives believe these considerations are a major cause for the rather low esteem in which the investing public holds defense...RD-RI58 246 DEFENSE FINANCIAL AND INVESTMENT REVIEN APPENDIX 3 FINRNCIAL COMMUNITY PE.. (U) LOGISTICS MANAGEMENT INST BETHESDA MD P J DAVEY ET RL... INVESTMENT REVIEW, APPENDIX 3; Financial Community Perceptions Of The Defense Industry: 1985 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(e) 8. CONTRACT

  2. Mood States Associated with Induced Defensiveness.

    ERIC Educational Resources Information Center

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  3. Self-Defense Distributed Engagement Coordinator

    DTIC Science & Technology

    2016-02-01

    its countermeasures. Whether a missile is defeated with an interceptor, undermined by a signal jammer, or diverted by a decoy, there is Self - Defense ...anti-ship threats and recommends actions to the personnel coordinating ship self - defense . This tool was recognized with a 2015 R&D 100 Award. a cost...reloading process, and may not be possible at all. The Self - Defense Distributed Engagement Coordinator (SDDEC) is designed to provide automated battle

  4. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. 50 CFR 622.450 - Gear identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Lobster Fishery of Puerto Rico and the U.S. Virgin Islands § 622.450 Gear identification. (a) Caribbean... Caribbean EEZ must display the official number specified for the vessel by Puerto Rico or the U.S. Virgin... display the official number and color code assigned to the vessel by Puerto Rico or the U.S. Virgin...

  6. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOEpatents

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  7. Identification of Computational and Experimental Reduced-Order Models

    NASA Technical Reports Server (NTRS)

    Silva, Walter A.; Hong, Moeljo S.; Bartels, Robert E.; Piatak, David J.; Scott, Robert C.

    2003-01-01

    The identification of computational and experimental reduced-order models (ROMs) for the analysis of unsteady aerodynamic responses and for efficient aeroelastic analyses is presented. For the identification of a computational aeroelastic ROM, the CFL3Dv6.0 computational fluid dynamics (CFD) code is used. Flutter results for the AGARD 445.6 Wing and for a Rigid Semispan Model (RSM) computed using CFL3Dv6.0 are presented, including discussion of associated computational costs. Modal impulse responses of the unsteady aerodynamic system are computed using the CFL3Dv6.0 code and transformed into state-space form. The unsteady aerodynamic state-space ROM is then combined with a state-space model of the structure to create an aeroelastic simulation using the MATLAB/SIMULINK environment. The MATLAB/SIMULINK ROM is then used to rapidly compute aeroelastic transients, including flutter. The ROM shows excellent agreement with the aeroelastic analyses computed using the CFL3Dv6.0 code directly. For the identification of experimental unsteady pressure ROMs, results are presented for two configurations: the RSM and a Benchmark Supercritical Wing (BSCW). Both models were used to acquire unsteady pressure data due to pitching oscillations on the Oscillating Turntable (OTT) system at the Transonic Dynamics Tunnel (TDT). A deconvolution scheme involving a step input in pitch and the resultant step response in pressure, for several pressure transducers, is used to identify the unsteady pressure impulse responses. The identified impulse responses are then used to predict the pressure responses due to pitching oscillations at several frequencies. Comparisons with the experimental data are then presented.

  8. Ginkgo biloba Responds to Herbivory by Activating Early Signaling and Direct Defenses

    PubMed Central

    Atsbaha Zebelo, Simon; Foti, Maria; Fliegmann, Judith; Bossi, Simone; Maffei, Massimo E.; Bertea, Cinzia M.

    2012-01-01

    Background Ginkgo biloba (Ginkgoaceae) is one of the most ancient living seed plants and is regarded as a living fossil. G. biloba has a broad spectrum of resistance or tolerance to many pathogens and herbivores because of the presence of toxic leaf compounds. Little is known about early and late events occurring in G. biloba upon herbivory. The aim of this study was to assess whether herbivory by the generalist Spodoptera littoralis was able to induce early signaling and direct defense in G. biloba by evaluating early and late responses. Methodology/Principal Findings Early and late responses in mechanically wounded leaves and in leaves damaged by S. littoralis included plasma transmembrane potential (Vm) variations, time-course changes in both cytosolic calcium concentration ([Ca2+]cyt) and H2O2 production, the regulation of genes correlated to terpenoid and flavonoid biosynthesis, the induction of direct defense compounds, and the release of volatile organic compounds (VOCs). The results show that G. biloba responded to hebivory with a significant Vm depolarization which was associated to significant increases in both [Ca2+]cyt and H2O2. Several defense genes were regulated by herbivory, including those coding for ROS scavenging enzymes and the synthesis of terpenoids and flavonoids. Metabolomic analyses revealed the herbivore-induced production of several flavonoids and VOCs. Surprisingly, no significant induction by herbivory was found for two of the most characteristic G. biloba classes of bioactive compounds; ginkgolides and bilobalides. Conclusions/Significance By studying early and late responses of G. biloba to herbivory, we provided the first evidence that this “living fossil” plant responds to herbivory with the same defense mechanisms adopted by the most recent angiosperms. PMID:22448229

  9. An evaluation of the quality of obstetric morbidity coding using an objective assessment tool, the Performance Indicators For Coding Quality (PICQ).

    PubMed

    Lamb, Mary K; Innes, Kerry; Saad, Patricia; Rust, Julie; Dimitropoulos, Vera; Cumerlato, Megan

    The Performance Indicators for Coding Quality (PICQ) is a data quality assessment tool developed by Australia's National Centre for Classification in Health (NCCH). PICQ consists of a number of indicators covering all ICD-10-AM disease chapters, some procedure chapters from the Australian Classification of Health Intervention (ACHI) and some Australian Coding Standards (ACS). The indicators can be used to assess the coding quality of hospital morbidity data by monitoring compliance of coding conventions and ACS; this enables the identification of particular records that may be incorrectly coded, thus providing a measure of data quality. There are 31 obstetric indicators available for the ICD-10-AM Fourth Edition. Twenty of these 31 indicators were classified as Fatal, nine as Warning and two Relative. These indicators were used to examine coding quality of obstetric records in the 2004-2005 financial year Australian national hospital morbidity dataset. Records with obstetric disease or procedure codes listed anywhere in the code string were extracted and exported from the SPSS source file. Data were then imported into a Microsoft Access database table as per PICQ instructions, and run against all Fatal and Warning and Relative (N=31) obstetric PICQ 2006 Fourth Edition Indicators v.5 for the ICD-10- AM Fourth Edition. There were 689,905 gynaecological and obstetric records in the 2004-2005 financial year, of which 1.14% were found to have triggered Fatal degree errors, 3.78% Warning degree errors and 8.35% Relative degree errors. The types of errors include completeness, redundancy, specificity and sequencing problems. It was found that PICQ is a useful initial screening tool for the assessment of ICD-10-AM/ACHI coding quality. The overall quality of codes assigned to obstetric records in the 2004- 2005 Australian national morbidity dataset is of fair quality.

  10. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adrian Miron; Joshua Valentine; John Christenson

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFCmore » codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.« less

  11. 40 CFR 52.1270 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Classification System (NAICS) codes 325193 or 312140,” APC-S-5 incorporated by reference from 40 CFR 52.21(b)(1... 40 Protection of Environment 4 2014-07-01 2014-07-01 false Identification of plan. 52.1270 Section 52.1270 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED...

  12. Variation in Plant Defense Suppresses Herbivore Performance.

    PubMed

    Pearse, Ian S; Paul, Ryan; Ode, Paul J

    2018-06-18

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory [1, 2]. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores [3, 4]. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory [5]. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging. Published by Elsevier Ltd.

  13. Schools and Civil Defense.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…

  14. Defense Workforce Training Programs.

    ERIC Educational Resources Information Center

    Fletcher, J. D.; And Others

    This report discusses the amount and kinds of Department of Defense (DoD) interactive courseware (ICW) programs that are candidates for transfer to the private sector. Candidates for transfer were identified through an analysis of the Defense Instructional Technology Information System (DITIS). Out of 4,644 ICW programs that have been reported to…

  15. Use the Bar Code System to Improve Accuracy of the Patient and Sample Identification.

    PubMed

    Chuang, Shu-Hsia; Yeh, Huy-Pzu; Chi, Kun-Hung; Ku, Hsueh-Chen

    2018-01-01

    In time and correct sample collection were highly related to patient's safety. The sample error rate was 11.1%, because misbranded patient information and wrong sample containers during January to April, 2016. We developed a barcode system of "Specimens Identify System" through process of reengineering of TRM, used bar code scanners, add sample container instructions, and mobile APP. Conclusion, the bar code systems improved the patient safety and created green environment.

  16. Meteor Shower Identification and Characterization with Python

    NASA Technical Reports Server (NTRS)

    Moorhead, Althea

    2015-01-01

    The short development time associated with Python and the number of astronomical packages available have led to increased usage within NASA. The Meteoroid Environment Office in particular uses the Python language for a number of applications, including daily meteor shower activity reporting, searches for potential parent bodies of meteor showers, and short dynamical simulations. We present our development of a meteor shower identification code that identifies statistically significant groups of meteors on similar orbits. This code overcomes several challenging characteristics of meteor showers such as drastic differences in uncertainties between meteors and between the orbital elements of a single meteor, and the variation of shower characteristics such as duration with age or planetary perturbations. This code has been proven to successfully and quickly identify unusual meteor activity such as the 2014 kappa Cygnid outburst. We present our algorithm along with these successes and discuss our plans for further code development.

  17. LACEwING: A New Moving Group Analysis Code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Riedel, Adric R.; Blunt, Sarah C.; Faherty, Jacqueline K.

    We present a new nearby young moving group (NYMG) kinematic membership analysis code, LocAting Constituent mEmbers In Nearby Groups (LACEwING), a new Catalog of Suspected Nearby Young Stars, a new list of bona fide members of moving groups, and a kinematic traceback code. LACEwING is a convergence-style algorithm with carefully vetted membership statistics based on a large numerical simulation of the Solar Neighborhood. Given spatial and kinematic information on stars, LACEwING calculates membership probabilities in 13 NYMGs and three open clusters within 100 pc. In addition to describing the inputs, methods, and products of the code, we provide comparisons ofmore » LACEwING to other popular kinematic moving group membership identification codes. As a proof of concept, we use LACEwING to reconsider the membership of 930 stellar systems in the Solar Neighborhood (within 100 pc) that have reported measurable lithium equivalent widths. We quantify the evidence in support of a population of young stars not attached to any NYMGs, which is a possible sign of new as-yet-undiscovered groups or of a field population of young stars.« less

  18. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  19. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  20. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  1. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  2. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  3. Metal-ferroelectric-metal capacitor based persistent memory for electronic product code class-1 generation-2 uhf passive radio-frequency identification tag

    NASA Astrophysics Data System (ADS)

    Yoon, Bongno; Sung, Man Young; Yeon, Sujin; Oh, Hyun S.; Kwon, Yoonjoo; Kim, Chuljin; Kim, Kyung-Ho

    2009-03-01

    With the circuits using metal-ferroelectric-metal (MFM) capacitor, rf operational signal properties are almost the same or superior to those of polysilicon-insulator-polysilicon, metal-insulator-metal, and metal-oxide-semiconductor (MOS) capacitors. In electronic product code global class-1 generation-2 uhf radio-frequency identification (RFID) protocols, the MFM can play a crucial role in satisfying the specifications of the inventoried flag's persistence times (Tpt) for each session (S0-S3, SL). In this paper, we propose and design a new MFM capacitor based memory scheme of which persistence time for S1 flag is measured at 2.2 s as well as indefinite for S2, S3, and SL flags during the period of power-on. A ferroelectric random access memory embedded RFID tag chip is fabricated with an industry-standard complementary MOS process. The chip size is around 500×500 μm2 and the measured power consumption is about 10 μW.

  4. Case series on defense mechanisms in patients for reconstructive hand transplantation: consideration on transplant defense concept.

    PubMed

    Kumnig, Martin; Jowsey, Sheila G; Moreno, Elisa; Brandacher, Gerald; Azari, Kodi; Rumpold, Gerhard

    2014-05-16

    The technical demands of reconstructive hand transplantation (RHT) and need for complex multidisciplinary care have led to intense research efforts to improve patient care and outcomes. However, RHT is an extraordinary life event which carries the potential for long-term consequences including psychological distress, which invokes coping and defense mechanisms. Little is known about the relationship between psychological defense mechanisms and health outcomes in RHT patients. In an effort to elucidate this relationship, we studied seven RHT patients who underwent standardized psychological assessment either pre- or post transplantation. No single defense concept was identified as common to all patients, which we suspect was due in part to the varied mechanisms of hand loss. All seven patients demonstrated diverse psychological reactions to RHT. The self-reported defense styles were associated with psychological adjustment. The patients who reported defenses that distorted reality described less adaptive functioning and psychological well-being. These preliminary findings reveal the varied psychological mechanisms invoked in RHT patients. An assessment of defense mechanisms should be part of multicenter evaluation protocols that address unique psychosocial aspects of RHT in large samples, in order to better guide psychological management.

  5. Defense.gov Special Report: Travels with Carter

    Science.gov Websites

    Department of Defense Submit Search Travels With Carter Deputy Defense Secretary Ashton B. Carter July 2012 After a 10-day Asia trip, Deputy Defense Secretary Ashton B. Carter said he had succeeded in informing , U.S. Troops at End of Asia-Pacific Tour U.S. Deputy Defense Secretary Ashton B. Carter got a close

  6. Applying graphics user interface ot group technology classification and coding at the Boeing aerospace company

    NASA Astrophysics Data System (ADS)

    Ness, P. H.; Jacobson, H.

    1984-10-01

    The thrust of 'group technology' is toward the exploitation of similarities in component design and manufacturing process plans to achieve assembly line flow cost efficiencies for small batch production. The systematic method devised for the identification of similarities in component geometry and processing steps is a coding and classification scheme implemented by interactive CAD/CAM systems. This coding and classification scheme has led to significant increases in computer processing power, allowing rapid searches and retrievals on the basis of a 30-digit code together with user-friendly computer graphics.

  7. Using the Defensive Style Questionnaire to evaluate the impact of sex reassignment surgery on defensive mechanisms in transsexual patients.

    PubMed

    Lobato, Maria Inês; Koff, Walter José; Crestana, Tiago; Chaves, Camila; Salvador, Jaqueline; Petry, Analídia Rodolpho; Silveira, Esalba; Henriques, Alexandre Annes; Cervo, Fábio; Böhme, Eduardo Siam; Massuda, Raffael

    2009-12-01

    To evaluate the impact of sex reassignment surgery on the defense mechanisms of 32 transsexual patients at two different points in time using the Defensive Style Questionnaire. The Defensive Style Questionnaire was applied to 32 patients upon their admission to the Gender Identity Disorder Program, and 12 months after they had undergone sex reassignment surgery. There were changes in two defense mechanisms: anticipation and idealization. However, no significant differences were observed in terms of the mature, neurotic and immature categories. One possible explanation for this result is the fact that the procedure does not resolve gender dysphoria, which is a core symptom in such patients. Another aspect is related to the early onset of the gender identity disorder, which determines a more regressive defensive structure in these patients. Sex reassignment surgery did not improve the defensive profile as measured by the Defensive Style Questionnaire.

  8. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    ERIC Educational Resources Information Center

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  9. A high-speed BCI based on code modulation VEP

    NASA Astrophysics Data System (ADS)

    Bin, Guangyu; Gao, Xiaorong; Wang, Yijun; Li, Yun; Hong, Bo; Gao, Shangkai

    2011-04-01

    Recently, electroencephalogram-based brain-computer interfaces (BCIs) have attracted much attention in the fields of neural engineering and rehabilitation due to their noninvasiveness. However, the low communication speed of current BCI systems greatly limits their practical application. In this paper, we present a high-speed BCI based on code modulation of visual evoked potentials (c-VEP). Thirty-two target stimuli were modulated by a time-shifted binary pseudorandom sequence. A multichannel identification method based on canonical correlation analysis (CCA) was used for target identification. The online system achieved an average information transfer rate (ITR) of 108 ± 12 bits min-1 on five subjects with a maximum ITR of 123 bits min-1 for a single subject.

  10. The Phytophthora cactorum genome provides insights into the adaptation to host defense compounds and fungicides.

    PubMed

    Yang, Min; Duan, Shengchang; Mei, Xinyue; Huang, Huichuan; Chen, Wei; Liu, Yixiang; Guo, Cunwu; Yang, Ting; Wei, Wei; Liu, Xili; He, Xiahong; Dong, Yang; Zhu, Shusheng

    2018-04-25

    Phytophthora cactorum is a homothallic oomycete pathogen, which has a wide host range and high capability to adapt to host defense compounds and fungicides. Here we report the 121.5 Mb genome assembly of the P. cactorum using the third-generation single-molecule real-time (SMRT) sequencing technology. It is the second largest genome sequenced so far in the Phytophthora genera, which contains 27,981 protein-coding genes. Comparison with other Phytophthora genomes showed that P. cactorum had a closer relationship with P. parasitica, P. infestans and P. capsici. P. cactorum has similar gene families in the secondary metabolism and pathogenicity-related effector proteins compared with other oomycete species, but specific gene families associated with detoxification enzymes and carbohydrate-active enzymes (CAZymes) underwent expansion in P. cactorum. P. cactorum had a higher utilization and detoxification ability against ginsenosides-a group of defense compounds from Panax notoginseng-compared with the narrow host pathogen P. sojae. The elevated expression levels of detoxification enzymes and hydrolase activity-associated genes after exposure to ginsenosides further supported that the high detoxification and utilization ability of P. cactorum play a crucial role in the rapid adaptability of the pathogen to host plant defense compounds and fungicides.

  11. Peptide code-on-a-microplate for protease activity analysis via MALDI-TOF mass spectrometric quantitation.

    PubMed

    Hu, Junjie; Liu, Fei; Ju, Huangxian

    2015-04-21

    A peptide-encoded microplate was proposed for MALDI-TOF mass spectrometric (MS) analysis of protease activity. The peptide codes were designed to contain a coding region and the substrate of protease for enzymatic cleavage, respectively, and an internal standard method was proposed for the MS quantitation of the cleavage products of these peptide codes. Upon the cleavage reaction in the presence of target proteases, the coding regions were released from the microplate, which were directly quantitated by using corresponding peptides with one-amino acid difference as the internal standards. The coding region could be used as the unique "Protease ID" for the identification of corresponding protease, and the amount of the cleavage product was used for protease activity analysis. Using trypsin and chymotrypsin as the model proteases to verify the multiplex protease assay, the designed "Trypsin ID" and "Chymotrypsin ID" occurred at m/z 761.6 and 711.6. The logarithm value of the intensity ratio of "Protease ID" to internal standard was proportional to trypsin and chymotrypsin concentration in a range from 5.0 to 500 and 10 to 500 nM, respectively. The detection limits for trypsin and chymotrypsin were 2.3 and 5.2 nM, respectively. The peptide-encoded microplate showed good selectivity. This proposed method provided a powerful tool for convenient identification and activity analysis of multiplex proteases.

  12. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  13. Self-Defense for Teens

    ERIC Educational Resources Information Center

    Givler, Jill I.

    2005-01-01

    Resources for self-defense training programs have become more popular and available over the last few years. Introducing a self-defense unit as part of a school physical education program is a wonderful way to address a number of psychosocial issues that prevail among teenagers today. The physical skills learned in this type of program allow…

  14. Whither Ballistic Missile Defense?

    DTIC Science & Technology

    1992-11-30

    Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing...Technical Marketing 2000: Opportunities and Strategies for a Changing World) Descriptors, Keywords: Cooper Speech Ballistic Missile Defense...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC

  15. ACHP | Defense Department Compliance with NHPA

    Science.gov Websites

    NHPA: Section 202(a)(6) Evaluation Report Defense Department Compliance with the National Historic )(6) Evaluation Report is a preliminary step in helping the Department of Defense marshall its Search skip specific nav links Home arrow Publications arrow Intro: Defense Department Compliance with

  16. The Defense Systems Acquisition and Review Council

    DTIC Science & Technology

    1976-09-15

    THE DEFENSE SYSTEMS ACQUISITION AND REVIEW COUNCIL.. A Study of Areas of Consideration Affecting the Functions and Process of Defense Major...COUNfIL: 4 Study of Areas of Considerationi Affecting/he Functions and Process of Defense _- 1 Major Systems Acquisition. , ; O,. v AUTHOR(e) I. C...Studies DSARC -- Functions and Process OSDCAIG *, Army Systems . A - =A -- he Defense Systems Acquisition Review Council (DSARC) was created to assume

  17. Defense.gov Special Report: Travels With Work

    Science.gov Websites

    Department of Defense Submit Search Travels With Work Deputy Defense Secretary Robert O. Work April 2015 Flag of Germany Germany Flag of U.S.A. USA Deputy Defense Secretary Bob Work is on a five-day trip isn't a piece of equipment - it's the men and women who serve, Deputy Defense Secretary Bob Work said

  18. The Art and Science of Defense Logistics

    DTIC Science & Technology

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  19. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    DTIC Science & Technology

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  20. Validation of coding algorithms for the identification of patients hospitalized for alcoholic hepatitis using administrative data.

    PubMed

    Pang, Jack X Q; Ross, Erin; Borman, Meredith A; Zimmer, Scott; Kaplan, Gilaad G; Heitman, Steven J; Swain, Mark G; Burak, Kelly W; Quan, Hude; Myers, Robert P

    2015-09-11

    Epidemiologic studies of alcoholic hepatitis (AH) have been hindered by the lack of a validated International Classification of Disease (ICD) coding algorithm for use with administrative data. Our objective was to validate coding algorithms for AH using a hospitalization database. The Hospital Discharge Abstract Database (DAD) was used to identify consecutive adults (≥18 years) hospitalized in the Calgary region with a diagnosis code for AH (ICD-10, K70.1) between 01/2008 and 08/2012. Medical records were reviewed to confirm the diagnosis of AH, defined as a history of heavy alcohol consumption, elevated AST and/or ALT (<300 U/L), serum bilirubin >34 μmol/L, and elevated INR. Subgroup analyses were performed according to the diagnosis field in which the code was recorded (primary vs. secondary) and AH severity. Algorithms that incorporated ICD-10 codes for cirrhosis and its complications were also examined. Of 228 potential AH cases, 122 patients had confirmed AH, corresponding to a positive predictive value (PPV) of 54% (95% CI 47-60%). PPV improved when AH was the primary versus a secondary diagnosis (67% vs. 21%; P < 0.001). Algorithms that included diagnosis codes for ascites (PPV 75%; 95% CI 63-86%), cirrhosis (PPV 60%; 47-73%), and gastrointestinal hemorrhage (PPV 62%; 51-73%) had improved performance, however, the prevalence of these diagnoses in confirmed AH cases was low (29-39%). In conclusion the low PPV of the diagnosis code for AH suggests that caution is necessary if this hospitalization database is used in large-scale epidemiologic studies of this condition.

  1. 75 FR 20578 - Federal Advisory Committee; Defense Health Board (DHB); Department of Defense Task Force on the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-20

    ... (DHB); Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces... announces a meeting of the Department of Defense Task Force on the Prevention of Suicide by Members of the... Secretary, Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One...

  2. Identifying Pediatric Severe Sepsis and Septic Shock: Accuracy of Diagnosis Codes.

    PubMed

    Balamuth, Fran; Weiss, Scott L; Hall, Matt; Neuman, Mark I; Scott, Halden; Brady, Patrick W; Paul, Raina; Farris, Reid W D; McClead, Richard; Centkowski, Sierra; Baumer-Mouradian, Shannon; Weiser, Jason; Hayes, Katie; Shah, Samir S; Alpern, Elizabeth R

    2015-12-01

    To evaluate accuracy of 2 established administrative methods of identifying children with sepsis using a medical record review reference standard. Multicenter retrospective study at 6 US children's hospitals. Subjects were children >60 days to <19 years of age and identified in 4 groups based on International Classification of Diseases, Ninth Revision, Clinical Modification codes: (1) severe sepsis/septic shock (sepsis codes); (2) infection plus organ dysfunction (combination codes); (3) subjects without codes for infection, organ dysfunction, or severe sepsis; and (4) infection but not severe sepsis or organ dysfunction. Combination codes were allowed, but not required within the sepsis codes group. We determined the presence of reference standard severe sepsis according to consensus criteria. Logistic regression was performed to determine whether addition of codes for sepsis therapies improved case identification. A total of 130 out of 432 subjects met reference SD of severe sepsis. Sepsis codes had sensitivity 73% (95% CI 70-86), specificity 92% (95% CI 87-95), and positive predictive value 79% (95% CI 70-86). Combination codes had sensitivity 15% (95% CI 9-22), specificity 71% (95% CI 65-76), and positive predictive value 18% (95% CI 11-27). Slight improvements in model characteristics were observed when codes for vasoactive medications and endotracheal intubation were added to sepsis codes (c-statistic 0.83 vs 0.87, P = .008). Sepsis specific International Classification of Diseases, Ninth Revision, Clinical Modification codes identify pediatric patients with severe sepsis in administrative data more accurately than a combination of codes for infection plus organ dysfunction. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Content Coding of Psychotherapy Transcripts Using Labeled Topic Models.

    PubMed

    Gaut, Garren; Steyvers, Mark; Imel, Zac E; Atkins, David C; Smyth, Padhraic

    2017-03-01

    Psychotherapy represents a broad class of medical interventions received by millions of patients each year. Unlike most medical treatments, its primary mechanisms are linguistic; i.e., the treatment relies directly on a conversation between a patient and provider. However, the evaluation of patient-provider conversation suffers from critical shortcomings, including intensive labor requirements, coder error, nonstandardized coding systems, and inability to scale up to larger data sets. To overcome these shortcomings, psychotherapy analysis needs a reliable and scalable method for summarizing the content of treatment encounters. We used a publicly available psychotherapy corpus from Alexander Street press comprising a large collection of transcripts of patient-provider conversations to compare coding performance for two machine learning methods. We used the labeled latent Dirichlet allocation (L-LDA) model to learn associations between text and codes, to predict codes in psychotherapy sessions, and to localize specific passages of within-session text representative of a session code. We compared the L-LDA model to a baseline lasso regression model using predictive accuracy and model generalizability (measured by calculating the area under the curve (AUC) from the receiver operating characteristic curve). The L-LDA model outperforms the lasso logistic regression model at predicting session-level codes with average AUC scores of 0.79, and 0.70, respectively. For fine-grained level coding, L-LDA and logistic regression are able to identify specific talk-turns representative of symptom codes. However, model performance for talk-turn identification is not yet as reliable as human coders. We conclude that the L-LDA model has the potential to be an objective, scalable method for accurate automated coding of psychotherapy sessions that perform better than comparable discriminative methods at session-level coding and can also predict fine-grained codes.

  4. Content Coding of Psychotherapy Transcripts Using Labeled Topic Models

    PubMed Central

    Gaut, Garren; Steyvers, Mark; Imel, Zac E; Atkins, David C; Smyth, Padhraic

    2016-01-01

    Psychotherapy represents a broad class of medical interventions received by millions of patients each year. Unlike most medical treatments, its primary mechanisms are linguistic; i.e., the treatment relies directly on a conversation between a patient and provider. However, the evaluation of patient-provider conversation suffers from critical shortcomings, including intensive labor requirements, coder error, non-standardized coding systems, and inability to scale up to larger data sets. To overcome these shortcomings, psychotherapy analysis needs a reliable and scalable method for summarizing the content of treatment encounters. We used a publicly-available psychotherapy corpus from Alexander Street press comprising a large collection of transcripts of patient-provider conversations to compare coding performance for two machine learning methods. We used the Labeled Latent Dirichlet Allocation (L-LDA) model to learn associations between text and codes, to predict codes in psychotherapy sessions, and to localize specific passages of within-session text representative of a session code. We compared the L-LDA model to a baseline lasso regression model using predictive accuracy and model generalizability (measured by calculating the area under the curve (AUC) from the receiver operating characteristic (ROC) curve). The L-LDA model outperforms the lasso logistic regression model at predicting session-level codes with average AUC scores of .79, and .70, respectively. For fine-grained level coding, L-LDA and logistic regression are able to identify specific talk-turns representative of symptom codes. However, model performance for talk-turn identification is not yet as reliable as human coders. We conclude that the L-LDA model has the potential to be an objective, scaleable method for accurate automated coding of psychotherapy sessions that performs better than comparable discriminative methods at session-level coding and can also predict fine-grained codes. PMID:26625437

  5. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    EPA Science Inventory

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  6. 48 CFR 227.7103-10 - Contractor identification and marking of technical data to be furnished with restrictive markings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and marking of technical data to be furnished with restrictive markings. 227.7103-10 Section 227.7103... DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Technical Data 227.7103-10 Contractor identification and marking of technical data to be furnished with restrictive markings...

  7. Assistant Secretary of Defense for Legislative Affairs

    Science.gov Websites

    Links Mission Congressional Links Secretary of Defense James Mattis
    Defense James Mattis" title=" Secretary of Defense James Mattis" /> The

  8. Identification of beer-spoilage bacteria using matrix-assisted laser desorption/ionization time-of-flight mass spectrometry.

    PubMed

    Wieme, Anneleen D; Spitaels, Freek; Aerts, Maarten; De Bruyne, Katrien; Van Landschoot, Anita; Vandamme, Peter

    2014-08-18

    Applicability of matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) for identification of beer-spoilage bacteria was examined. To achieve this, an extensive identification database was constructed comprising more than 4200 mass spectra, including biological and technical replicates derived from 273 acetic acid bacteria (AAB) and lactic acid bacteria (LAB), covering a total of 52 species, grown on at least three growth media. Sequence analysis of protein coding genes was used to verify aberrant MALDI-TOF MS identification results and confirmed the earlier misidentification of 34 AAB and LAB strains. In total, 348 isolates were collected from culture media inoculated with 14 spoiled beer and brewery samples. Peak-based numerical analysis of MALDI-TOF MS spectra allowed a straightforward species identification of 327 (94.0%) isolates. The remaining isolates clustered separately and were assigned through sequence analysis of protein coding genes either to species not known as beer-spoilage bacteria, and thus not present in the database, or to novel AAB species. An alternative, classifier-based approach for the identification of spoilage bacteria was evaluated by combining the identification results obtained through peak-based cluster analysis and sequence analysis of protein coding genes as a standard. In total, 263 out of 348 isolates (75.6%) were correctly identified at species level and 24 isolates (6.9%) were misidentified. In addition, the identification results of 50 isolates (14.4%) were considered unreliable, and 11 isolates (3.2%) could not be identified. The present study demonstrated that MALDI-TOF MS is well-suited for the rapid, high-throughput and accurate identification of bacteria isolated from spoiled beer and brewery samples, which makes the technique appropriate for routine microbial quality control in the brewing industry. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Mobilization of lipids and fortification of cell wall and cuticle are important in host defense against Hessian fly

    PubMed Central

    2013-01-01

    Background Wheat – Hessian fly interaction follows a typical gene-for-gene model. Hessian fly larvae die in wheat plants carrying an effective resistance gene, or thrive in susceptible plants that carry no effective resistance gene. Results Gene sets affected by Hessian fly attack in resistant plants were found to be very different from those in susceptible plants. Differential expression of gene sets was associated with differential accumulation of intermediates in defense pathways. Our results indicated that resources were rapidly mobilized in resistant plants for defense, including extensive membrane remodeling and release of lipids, sugar catabolism, and amino acid transport and degradation. These resources were likely rapidly converted into defense molecules such as oxylipins; toxic proteins including cysteine proteases, inhibitors of digestive enzymes, and lectins; phenolics; and cell wall components. However, toxicity alone does not cause immediate lethality to Hessian fly larvae. Toxic defenses might slow down Hessian fly development and therefore give plants more time for other types of defense to become effective. Conclusion Our gene expression and metabolic profiling results suggested that remodeling and fortification of cell wall and cuticle by increased deposition of phenolics and enhanced cross-linking were likely to be crucial for insect mortality by depriving Hessian fly larvae of nutrients from host cells. The identification of a large number of genes that were differentially expressed at different time points during compatible and incompatible interactions also provided a foundation for further research on the molecular pathways that lead to wheat resistance and susceptibility to Hessian fly infestation. PMID:23800119

  10. The feasibility of QR-code prescription in Taiwan.

    PubMed

    Lin, C-H; Tsai, F-Y; Tsai, W-L; Wen, H-W; Hu, M-L

    2012-12-01

    An ideal Health Care Service is a service system that focuses on patients. Patients in Taiwan have the freedom to fill their prescriptions at any pharmacies contracted with National Health Insurance. Each of these pharmacies uses its own computer system. So far, there are at least ten different systems on the market in Taiwan. To transmit the prescription information from the hospital to the pharmacy accurately and efficiently presents a great issue. This study consisted of two-dimensional applications using a QR-code to capture Patient's identification and prescription information from the hospitals as well as using a webcam to read the QR-code and transfer all data to the pharmacy computer system. Two hospitals and 85 community pharmacies participated in the study. During the trial, all participant pharmacies appraised highly of the accurate transmission of the prescription information. The contents in QR-code prescriptions from Taipei area were picked up efficiently and accurately in pharmacies at Taichung area (middle Taiwan) without software system limit and area limitation. The QR-code device received a patent (No. M376844, March 2010) from Intellectual Property Office Ministry of Economic Affair, China. Our trial has proven that QR-code prescription can provide community pharmacists an efficient, accurate and inexpensive device to digitalize the prescription contents. Consequently, pharmacists can offer better quality of pharmacy service to patients. © 2012 Blackwell Publishing Ltd.

  11. Repeated Evolution of the Pyrrolizidine Alkaloid–Mediated Defense System in Separate Angiosperm LineagesW⃞

    PubMed Central

    Reimann, Andreas; Nurhayati, Niknik; Backenköhler, Anita; Ober, Dietrich

    2004-01-01

    Species of several unrelated families within the angiosperms are able to constitutively produce pyrrolizidine alkaloids as a defense against herbivores. In pyrrolizidine alkaloid (PA) biosynthesis, homospermidine synthase (HSS) catalyzes the first specific step. HSS was recruited during angiosperm evolution from deoxyhypusine synthase (DHS), an enzyme involved in the posttranslational activation of eukaryotic initiation factor 5A. Phylogenetic analysis of 23 cDNA sequences coding for HSS and DHS of various angiosperm species revealed at least four independent recruitments of HSS from DHS: one within the Boraginaceae, one within the monocots, and two within the Asteraceae family. Furthermore, sequence analyses indicated elevated substitution rates within HSS-coding sequences after each gene duplication, with an increased level of nonsynonymous mutations. However, the contradiction between the polyphyletic origin of the first enzyme in PA biosynthesis and the structural identity of the final biosynthetic PA products needs clarification. PMID:15466410

  12. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE PAGES

    Sankaran, Jaganath; Fearey, Bryan L.

    2017-02-06

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  13. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sankaran, Jaganath; Fearey, Bryan L.

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  14. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... Prevention of Suicide by Members of the Armed Forces, a subcommittee of the Defense Health Board (DHB), will.... Additional information, agenda updates, and meeting registration are available online at the Defense Health...

  15. Indirect Plant Defense against Insect Herbivores: A Review

    USDA-ARS?s Scientific Manuscript database

    Plants respond to herbivore attack by launching two types of defenses: direct defense and indirect defense. Direct defense includes all plant traits that increase the resistance of host plants to attacking insect herbivores by affecting the physiology and/or behavior of the attackers. Indirect defe...

  16. Deciphering Systemic Wound Responses of the Pumpkin Extrafascicular Phloem by Metabolomics and Stable Isotope-Coded Protein Labeling1[C][W

    PubMed Central

    Gaupels, Frank; Sarioglu, Hakan; Beckmann, Manfred; Hause, Bettina; Spannagl, Manuel; Draper, John; Lindermayr, Christian; Durner, Jörg

    2012-01-01

    In cucurbits, phloem latex exudes from cut sieve tubes of the extrafascicular phloem (EFP), serving in defense against herbivores. We analyzed inducible defense mechanisms in the EFP of pumpkin (Cucurbita maxima) after leaf damage. As an early systemic response, wounding elicited transient accumulation of jasmonates and a decrease in exudation probably due to partial sieve tube occlusion by callose. The energy status of the EFP was enhanced as indicated by increased levels of ATP, phosphate, and intermediates of the citric acid cycle. Gas chromatography coupled to mass spectrometry also revealed that sucrose transport, gluconeogenesis/glycolysis, and amino acid metabolism were up-regulated after wounding. Combining ProteoMiner technology for the enrichment of low-abundance proteins with stable isotope-coded protein labeling, we identified 51 wound-regulated phloem proteins. Two Sucrose-Nonfermenting1-related protein kinases and a 32-kD 14-3-3 protein are candidate central regulators of stress metabolism in the EFP. Other proteins, such as the Silverleaf Whitefly-Induced Protein1, Mitogen Activated Protein Kinase6, and Heat Shock Protein81, have known defensive functions. Isotope-coded protein labeling and western-blot analyses indicated that Cyclophilin18 is a reliable marker for stress responses of the EFP. As a hint toward the induction of redox signaling, we have observed delayed oxidation-triggered polymerization of the major Phloem Protein1 (PP1) and PP2, which correlated with a decline in carbonylation of PP2. In sum, wounding triggered transient sieve tube occlusion, enhanced energy metabolism, and accumulation of defense-related proteins in the pumpkin EFP. The systemic wound response was mediated by jasmonate and redox signaling. PMID:23085839

  17. A Statistical Analysis of IrisCode and Its Security Implications.

    PubMed

    Kong, Adams Wai-Kin

    2015-03-01

    IrisCode has been used to gather iris data for 430 million people. Because of the huge impact of IrisCode, it is vital that it is completely understood. This paper first studies the relationship between bit probabilities and a mean of iris images (The mean of iris images is defined as the average of independent iris images.) and then uses the Chi-square statistic, the correlation coefficient and a resampling algorithm to detect statistical dependence between bits. The results show that the statistical dependence forms a graph with a sparse and structural adjacency matrix. A comparison of this graph with a graph whose edges are defined by the inner product of the Gabor filters that produce IrisCodes shows that partial statistical dependence is induced by the filters and propagates through the graph. Using this statistical information, the security risk associated with two patented template protection schemes that have been deployed in commercial systems for producing application-specific IrisCodes is analyzed. To retain high identification speed, they use the same key to lock all IrisCodes in a database. The belief has been that if the key is not compromised, the IrisCodes are secure. This study shows that even without the key, application-specific IrisCodes can be unlocked and that the key can be obtained through the statistical dependence detected.

  18. Code Status Reconciliation to Improve Identification and Documentation of Code Status in Electronic Health Records.

    PubMed

    Jain, Viral G; Greco, Peter J; Kaelber, David C

    2017-03-08

    Code status (CS) of a patient (part of their end-of-life wishes) can be critical information in healthcare delivery, which can change over time, especially at transitions of care. Although electronic health record (EHR) tools exist for medication reconciliation across transitions of care, much less attention is given to CS, and standard EHR tools have not been implemented for CS reconciliation (CSR). Lack of CSR creates significant potential patient safety and quality of life issues. To study the tools, workflow, and impact of clinical decision support (CDS) for CSR. We established rules for CS implementation in our EHR. At admission, a CS is required as part of a patient's admission order set. Using standard CDS tools in our EHR, we built an interruptive alert for CSR at discharge if a patient did not have the same inpatient (current) CS at discharge as that prior to admission CS. Of 80,587 admissions over a four year period (2 years prior to and post CSR implementation), CS discordance was seen in 3.5% of encounters which had full code status prior to admission, but Do Not Resuscitate (DNR) CS at discharge. In addition, 1.4% of the encounters had a different variant of the DNR CS at discharge when compared with CS prior to admission. On pre-post CSR implementation analysis, DNR CS per 1000 admissions per month increased significantly among patients discharged and in patients being admitted (mean ± SD: 85.36 ± 13.69 to 399.85 ± 182.86, p<0.001; and 1.99 ± 1.37 vs 16.70 ± 4.51, p<0.001, respectively). EHR enabled CSR is effective and represents a significant informatics opportunity to help honor patients' end-of-life wishes. CSR represents one example of non-medication reconciliation at transitions of care that should be considered in all EHRs to improve care quality and patient safety.

  19. n-Nucleotide circular codes in graph theory.

    PubMed

    Fimmel, Elena; Michel, Christian J; Strüngmann, Lutz

    2016-03-13

    The circular code theory proposes that genes are constituted of two trinucleotide codes: the classical genetic code with 61 trinucleotides for coding the 20 amino acids (except the three stop codons {TAA,TAG,TGA}) and a circular code based on 20 trinucleotides for retrieving, maintaining and synchronizing the reading frame. It relies on two main results: the identification of a maximal C(3) self-complementary trinucleotide circular code X in genes of bacteria, eukaryotes, plasmids and viruses (Michel 2015 J. Theor. Biol. 380, 156-177. (doi:10.1016/j.jtbi.2015.04.009); Arquès & Michel 1996 J. Theor. Biol. 182, 45-58. (doi:10.1006/jtbi.1996.0142)) and the finding of X circular code motifs in tRNAs and rRNAs, in particular in the ribosome decoding centre (Michel 2012 Comput. Biol. Chem. 37, 24-37. (doi:10.1016/j.compbiolchem.2011.10.002); El Soufi & Michel 2014 Comput. Biol. Chem. 52, 9-17. (doi:10.1016/j.compbiolchem.2014.08.001)). The univerally conserved nucleotides A1492 and A1493 and the conserved nucleotide G530 are included in X circular code motifs. Recently, dinucleotide circular codes were also investigated (Michel & Pirillo 2013 ISRN Biomath. 2013, 538631. (doi:10.1155/2013/538631); Fimmel et al. 2015 J. Theor. Biol. 386, 159-165. (doi:10.1016/j.jtbi.2015.08.034)). As the genetic motifs of different lengths are ubiquitous in genes and genomes, we introduce a new approach based on graph theory to study in full generality n-nucleotide circular codes X, i.e. of length 2 (dinucleotide), 3 (trinucleotide), 4 (tetranucleotide), etc. Indeed, we prove that an n-nucleotide code X is circular if and only if the corresponding graph [Formula: see text] is acyclic. Moreover, the maximal length of a path in [Formula: see text] corresponds to the window of nucleotides in a sequence for detecting the correct reading frame. Finally, the graph theory of tournaments is applied to the study of dinucleotide circular codes. It has full equivalence between the combinatorics

  20. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... announces that the Defense Health Board (DHB or Board) will meet on March 1-2, 2010, to address and.... Feeks, Executive Secretary, Defense Health Board, Five Skyline Place, 5111 Leesburg Pike, Suite 810...

  1. 48 CFR 225.7902 - Defense Trade Cooperation Treaties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Defense Trade Cooperation Treaties. 225.7902 Section 225.7902 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION EXPORT CONTROL 225.7902 Defense Trade Cooperation Treaties. This...

  2. 48 CFR 225.7902 - Defense Trade Cooperation Treaties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Defense Trade Cooperation Treaties. 225.7902 Section 225.7902 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION EXPORT CONTROL 225.7902 Defense Trade Cooperation Treaties. This...

  3. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  4. PINS Testing and Modification for Explosive Identification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E.H. Seabury; A.J. Caffrey

    2011-09-01

    The INL's Portable Isotopic Neutron Spectroscopy System (PINS)1 non-intrusively identifies the chemical fill of munitions and sealed containers. PINS is used routinely by the U.S. Army, the Defense Threat Reduction Agency, and foreign military units to determine the contents of munitions and other containers suspected to contain explosives, smoke-generating chemicals, and chemical warfare agents such as mustard and nerve gas. The objects assayed with PINS range from softball-sized M139 chemical bomblets to 200 gallon DOT 500X ton containers. INL had previously examined2 the feasibility of using a similar system for the identification of explosives, and based on this proof-of-principle test,more » the development of a dedicated system for the identification of explosives in an improvised nuclear device appears entirely feasible. INL has been tasked by NNSA NA-42 Render Safe Research and Development with the development of such a system.« less

  5. Defense Manpower Policy: Presentations from the 1976 Rand Conference on Defense Manpower

    DTIC Science & Technology

    1978-12-01

    organizations working on defense manpower issues and problems, This book contains selected presentations from ti -a Rand Confer- ence on Defense Manpower...the complete Conference agenda.) Nevertheless, the papers included here provide a reasonably good sampling of the topics and issues addressed at the...one of the key concerns in the Pentagon and on Capitol Hill. Accordingly, the purpose of this book is to shed some light on some of the major issues

  6. Comparative genomics of defense systems in archaea and bacteria

    PubMed Central

    Makarova, Kira S.; Wolf, Yuri I.; Koonin, Eugene V.

    2013-01-01

    Our knowledge of prokaryotic defense systems has vastly expanded as the result of comparative genomic analysis, followed by experimental validation. This expansion is both quantitative, including the discovery of diverse new examples of known types of defense systems, such as restriction-modification or toxin-antitoxin systems, and qualitative, including the discovery of fundamentally new defense mechanisms, such as the CRISPR-Cas immunity system. Large-scale statistical analysis reveals that the distribution of different defense systems in bacterial and archaeal taxa is non-uniform, with four groups of organisms distinguishable with respect to the overall abundance and the balance between specific types of defense systems. The genes encoding defense system components in bacterial and archaea typically cluster in defense islands. In addition to genes encoding known defense systems, these islands contain numerous uncharacterized genes, which are candidates for new types of defense systems. The tight association of the genes encoding immunity systems and dormancy- or cell death-inducing defense systems in prokaryotic genomes suggests that these two major types of defense are functionally coupled, providing for effective protection at the population level. PMID:23470997

  7. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  8. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  9. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  10. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  11. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  12. 75 FR 9399 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... of the Defense Health Board (DHB), will meet on March 11, 2010. Subject to the availability of space... INFORMATION: Due to internal DoD difficulties, beyond the control of the Defense Health Board or its...

  13. Psychoticism, Immature Defense Mechanisms and a Fearful Attachment Style are Associated with a Higher Homophobic Attitude.

    PubMed

    Ciocca, Giacomo; Tuziak, Bogdan; Limoncin, Erika; Mollaioli, Daniele; Capuano, Nicolina; Martini, Alessia; Carosa, Eleonora; Fisher, Alessandra D; Maggi, Mario; Niolu, Cinzia; Siracusano, Alberto; Lenzi, Andrea; Jannini, Emmanuele A

    2015-09-01

    Homophobic behavior and a negative attitude toward homosexuals are prevalent among the population. Despite this, few researches have investigated the psychologic aspects associated with homophobia, as psychopathologic symptoms, the defensive system, and attachment styles. The aim of this study was to investigate the psychologic factors mentioned earlier and their correlation with homophobia. Five hundred fifty-one university students recruited, aged 18-30, were asked to complete several psychometric evaluation. In particular, Homophobia Scale (HS) was used to assess homophobia levels, the Symptoms Check List Revised (SCL-90-R) for the identification of psychopathologic symptoms, the Defence Style Questionnaire (DSQ-40) for the evaluation of defense mechanisms and the Relationship Questionnaire (RQ) for attachment styles. After a regression analysis, we found a significant predictive value of psychoticism (β = 0.142; P = 0.04) and of immature defense mechanisms (β = 0.257; P < 0.0001) for homophobia, while neurotic defense mechanisms (β = -0.123; P = 0.02) and depressive symptoms (β = -0.152; P = 0.04) have an opposite role. Moreover, categorical constructs of the RQ revealed a significant difference between secure and fearful attachments styles in levels of homophobia (secure = 22.09 ± 17.22 vs. fearful = 31.07 ± 25.09; P < 0.05). Finally, a gender difference to HS scores and a significant influence of male sex was found (β = 0.213; P < 0.0001). We demonstrated the involvement of psychoticism and immature defense mechanisms in homophobic attitudes, while a contrasting role is played by neurotic defense mechanisms and depressive symptoms. Moreover, secure attachment is an indicator of low levels of homophobia compared with the subjects demonstrating a fearful style of attachment. Hence, in the assessment of homophobia and in the relevant programs of prevention, it is necessary to consider the

  14. Lessons learned from U.S. Department of Defense 911-Bio Advanced Concept Technology Demonstrations.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T.; Gasper, W.; Lacher, L.

    1999-07-06

    The US Department of Defense (DoD), in cooperation with other federal agencies, has taken many initiatives to improve its ability to support civilian response to a domestic biological terrorism incident. This paper discusses one initiative, the 911-Bio Advanced Concept Technology Demonstrations (ACTDs), conducted by the Office of the Secretary of Defense during 1997 to better understand: (1) the capability of newly developed chemical and biological collection and identification technologies in a field environment; (2) the ability of specialized DoD response teams to use these new technologies within the structure of cooperating DoD and civilian consequence management organizations; and (3) themore » adequacy of current modeling tools for predicting the dispersal of biological hazards. This paper discusses the experience of the ACTDs from the civilian community support perspective. The 911-Bio ACTD project provided a valuable opportunity for DoD and civilian officials to learn how they should use their combined capabilities to manage the aftermath of a domestic biological terrorism incident.« less

  15. Defense Research Enterprise Assessment

    DTIC Science & Technology

    2017-01-01

    ACQUISITION, TECHNOLOGY , AND LOGISTICS OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 JAN 2 5 2017...fulfill vital missions on behalf of the Warfighter. This DoD research enterprise is characterized by high-quality science, technology transition, and...smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to serve and ready

  16. Entropy based file type identification and partitioning

    DTIC Science & Technology

    2017-06-01

    energy spectrum,” Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, pp. 288–293, 2016...ABBREVIATIONS AES Advanced Encryption Standard ANN Artificial Neural Network ASCII American Standard Code for Information Interchange CWT...the identification of file types and file partitioning. This approach has applications in cybersecurity as it allows for a quick determination of

  17. Flavivirus RNAi suppression: decoding non-coding RNA.

    PubMed

    Pijlman, Gorben P

    2014-08-01

    Flaviviruses are important human pathogens that are transmitted by invertebrate vectors, mostly mosquitoes and ticks. During replication in their vector, flaviviruses are subject to a potent innate immune response known as antiviral RNA interference (RNAi). This defense mechanism is associated with the production of small interfering (si)RNA that lead to degradation of viral RNA. To what extent flaviviruses would benefit from counteracting antiviral RNAi is subject of debate. Here, the experimental evidence to suggest the existence of flavivirus RNAi suppressors is discussed. I will highlight the putative role of non-coding, subgenomic flavivirus RNA in suppression of RNAi in insect and mammalian cells. Novel insights from ongoing research will reveal how arthropod-borne viruses modulate innate immunity including antiviral RNAi. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. Strategic defense initiative: critical issues

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuckolls, J.H.

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to themore » defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)« less

  19. Differentiation of depression and anxiety groups using defense mechanisms.

    PubMed

    Olson, Trevor R; Presniak, Michelle D; MacGregor, Michael Wm

    2009-11-01

    We examined whether participants in depressed and anxious groups could be classified correctly using observer and self-report measures of defense mechanisms. A sample of 1182 university students completed the Personality Assessment Inventory and those scoring in the clinical range on either depression or anxiety indices were selected for participation. In total, 25 participants met criteria for the depressed group and 94 met criteria for the anxious group. Individual defense scores from the Defense-Q and the Defense Style Questionnaire were separately entered into 2 stepwise discriminant analyses. After cross-validation, the Defense-Q and Defense Style Questionnaire analyses classified participants with 75.0% and 71.3% accuracy, respectively. The results indicated that depression and anxiety groups can be significantly differentiated by defense use alone. Important differences in defensive functioning between these groups were confirmed and differences between observer and self-report measures of defenses mechanisms and current challenges in defense research were highlighted.

  20. Pathok Negoro mosque as the form of territorial defense region of Mataram Kingdom of Islam Java in Jogjakarta

    NASA Astrophysics Data System (ADS)

    Setyowati, E.; Hardiman, G.; Murtini, T. W.

    2018-01-01

    Territory is the space boundary of ownership. Defense concepts of an area also include territory. The defense concept of a territory of power or ownership is usually in the form of fortress, ditch, river, road, alley or gate. Many of these are seen in the forms of old city of Dutch’s inheritances. Javanese Islamic Kingdom in Yogyakarta has territory in the form of mosque. The mosque is called the Pathok Negoro as consists of 4 mosques. This territorial not same with another Islamic kingdoms. The research problem is why mosque used as a form of defense? What is the uniqueness?The purpose of the research is to reveal the form of territory of Javanese Islamic Kingdom. The benefit of this research is to get the characteristic form of territory of Javanese Islamic Kingdom in Yogyakarta. Their located in Ploso Kuning, Mlangi, babadan, Dongkelan, and Wonokromo. The research method that was used was qualitative method with grounded research, by using history and map search.In the analysis was carried out identification and comparison between mosques.The results show that there are characteristics on the location, the building orientation, the landscape, the area pattern and the shape of the building.