Sample records for acquiring defense software

  1. Trade-offs between acquired and innate immune defenses in humans

    PubMed Central

    McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.

    2016-01-01

    Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325

  2. Estimating Software Effort Hours for Major Defense Acquisition Programs

    ERIC Educational Resources Information Center

    Wallshein, Corinne C.

    2010-01-01

    Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…

  3. Defense Contracting: Actions Needed to Explore Additional Opportunities to Gain Efficiencies in Acquiring Foreign Language Support

    DTIC Science & Technology

    2013-02-25

    Directive 5160.41E, Defense Language Program . 10GAO-11-456. Page 5 GAO-13-251R Defense Contracting types of foreign language support that DOD has acquired...Language Transformation Roadmap, (January 2005), and Department of Defense Directive 5160.41E, Defense Language Program . Page 15 GAO-13-251R Defense...examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help

  4. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 9

    DTIC Science & Technology

    2008-09-01

    including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson...SEP 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE CrossTalk: The Journal of Defense Software Engineering...The Journal of Defense Software Engineering September 2008 4 10 15 19 24 26 Securing Legacy C Applications Using Dynamic Data Flow Analysis This

  5. SDI (Strategic Defense Initiative) Software Technology Program Plan

    DTIC Science & Technology

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  6. Method for distributed object communications based on dynamically acquired and assembled software components

    NASA Technical Reports Server (NTRS)

    Sundermier, Amy (Inventor)

    2002-01-01

    A method for acquiring and assembling software components at execution time into a client program, where the components may be acquired from remote networked servers is disclosed. The acquired components are assembled according to knowledge represented within one or more acquired mediating components. A mediating component implements knowledge of an object model. A mediating component uses its implemented object model knowledge, acquired component class information and polymorphism to assemble components into an interacting program at execution time. The interactions or abstract relationships between components in the object model may be implemented by the mediating component as direct invocations or indirect events or software bus exchanges. The acquired components may establish communications with remote servers. The acquired components may also present a user interface representing data to be exchanged with the remote servers. The mediating components may be assembled into layers, allowing arbitrarily complex programs to be constructed at execution time.

  7. Acquiring Software Design Schemas: A Machine Learning Perspective

    NASA Technical Reports Server (NTRS)

    Harandi, Mehdi T.; Lee, Hing-Yan

    1991-01-01

    In this paper, we describe an approach based on machine learning that acquires software design schemas from design cases of existing applications. An overview of the technique, design representation, and acquisition system are presented. the paper also addresses issues associated with generalizing common features such as biases. The generalization process is illustrated using an example.

  8. Salivary Defense Proteins: Their Network and Role in Innate and Acquired Oral Immunity

    PubMed Central

    Fábián, Tibor Károly; Hermann, Péter; Beck, Anita; Fejérdy, Pál; Fábián, Gábor

    2012-01-01

    There are numerous defense proteins present in the saliva. Although some of these molecules are present in rather low concentrations, their effects are additive and/or synergistic, resulting in an efficient molecular defense network of the oral cavity. Moreover, local concentrations of these proteins near the mucosal surfaces (mucosal transudate), periodontal sulcus (gingival crevicular fluid) and oral wounds and ulcers (transudate) may be much greater, and in many cases reinforced by immune and/or inflammatory reactions of the oral mucosa. Some defense proteins, like salivary immunoglobulins and salivary chaperokine HSP70/HSPAs (70 kDa heat shock proteins), are involved in both innate and acquired immunity. Cationic peptides and other defense proteins like lysozyme, bactericidal/permeability increasing protein (BPI), BPI-like proteins, PLUNC (palate lung and nasal epithelial clone) proteins, salivary amylase, cystatins, prolin-rich proteins, mucins, peroxidases, statherin and others are primarily responsible for innate immunity. In this paper, this complex system and function of the salivary defense proteins will be reviewed. PMID:22605979

  9. Systemic acquired resistance: turning local infection into global defense.

    PubMed

    Fu, Zheng Qing; Dong, Xinnian

    2013-01-01

    Systemic acquired resistance (SAR) is an induced immune mechanism in plants. Unlike vertebrate adaptive immunity, SAR is broad spectrum, with no specificity to the initial infection. An avirulent pathogen causing local programmed cell death can induce SAR through generation of mobile signals, accumulation of the defense hormone salicylic acid, and secretion of the antimicrobial PR (pathogenesis-related) proteins. Consequently, the rest of the plant is protected from secondary infection for a period of weeks to months. SAR can even be passed on to progeny through epigenetic regulation. The Arabidopsis NPR1 (nonexpresser of PR genes 1) protein is a master regulator of SAR. Recent study has shown that salicylic acid directly binds to the NPR1 adaptor proteins NPR3 and NPR4, regulates their interactions with NPR1, and controls NPR1 protein stability. However, how NPR1 interacts with TGA transcription factors to activate defense gene expression is still not well understood. In addition, redox regulators, the mediator complex, WRKY transcription factors, endoplasmic reticulum-resident proteins, and DNA repair proteins play critical roles in SAR.

  10. 75 FR 25165 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... 215, 234, 242, and 252 Defense Federal Acquisition Regulation Supplement; Cost and Software Data... Regulation Supplement (DFARS) to set forth DoD Cost and Software Data Reporting system requirements for major... set forth the DoD requirement for offerors to: Describe the standard Cost and Software Data Reporting...

  11. 76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-05

    ... Regulation Supplement; Open Source Software Public Meeting AGENCY: Defense Acquisition Regulations System... initiate a dialogue with industry regarding the use of open source software in DoD contracts. DATES: Public... be held in the General Services Administration (GSA), Central Office Auditorium, 1800 F Street NW...

  12. Acquisition Handbook - Update. Comprehensive Approach to Reusable Defensive Software (CARDS)

    DTIC Science & Technology

    1994-03-25

    designs, and implementation components (source code, test plans, procedures and results, and system/software documentation). This handbook provides a...activities where software components are acquired, evaluated, tested and sometimes modified. In addition to serving as a facility for the acquisition and...systems from such components [1]. Implementation components are at the lowest level and consist of: specifications; detailed designs; code, test

  13. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 3

    DTIC Science & Technology

    2006-03-01

    Humphreys & Associates, Inc., 2002. 3. Humphrey , Watts S . PSP : A Self- Improvement Process for...sanderfer.html>. 5. Humphrey , Watts S . A Discipline for Software Engineering. Addison- Wesley, 1995. 6. Tuma, David, and David R. Webb. “Personal Earned Value: Why...o u r c e li n e s o f c o d e ) Figure 3: Differences for Highest Degree Attained PSP /TSP 12 CROSSTALK The Journal of Defense Software

  14. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7

    DTIC Science & Technology

    2006-07-01

    public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 4, July/August 2010

    DTIC Science & Technology

    2010-08-01

    Anita Carleton, Del Kellogg, and Jeff Schwalb Building Critical Systems as a Cyborg As outrageous as it may seem, adapting cybernetics to defense...software is a real possibility in building complex software systems. Ball discusses the history of cybernetics, what a “ cyborg ” really is, and how...What Is a Cyborg ? We want both kinds of the behavior that I’ve talked about, with predictable systems that follow established rules and proce- dures

  16. Engineering of Data Acquiring Mobile Software and Sustainable End-User Applications

    NASA Technical Reports Server (NTRS)

    Smith, Benton T.

    2013-01-01

    The criteria for which data acquiring software and its supporting infrastructure should be designed should take the following two points into account: the reusability and organization of stored online and remote data and content, and an assessment on whether abandoning a platform optimized design in favor for a multi-platform solution significantly reduces the performance of an end-user application. Furthermore, in-house applications that control or process instrument acquired data for end-users should be designed with a communication and control interface such that the application's modules can be reused as plug-in modular components in greater software systems. The application of the above mentioned is applied using two loosely related projects: a mobile application, and a website containing live and simulated data. For the intelligent devices mobile application AIDM, the end-user interface have a platform and data type optimized design, while the database and back-end applications store this information in an organized manner and manage access to that data to only to authorized user end application(s). Finally, the content for the website was derived from a database such that the content can be included and uniform to all applications accessing the content. With these projects being ongoing, I have concluded from my research that the applicable methods presented are feasible for both projects, and that a multi-platform design for the mobile application only marginally drop the performance of the mobile application.

  17. The Defense Technical Information Center: Acquiring Information and Imparting Knowledge.

    ERIC Educational Resources Information Center

    Molholm, Kurt N.; And Others

    1988-01-01

    This overview of the Defense Technical Information Center (DTIC) discusses how DTIC fits into the Department of Defense Scientific and Technical Information Program; its history, organization, users, and operations; types of information handled; subject classification; cataloging standards; Information Analysis Centers (IACs); and research and…

  18. Certified Binaries for Software Components

    DTIC Science & Technology

    2007-09-01

    is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored...by the U.S. Department of Defense. Copyright 2007 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING

  19. Pipecolic Acid Orchestrates Plant Systemic Acquired Resistance and Defense Priming via Salicylic Acid-Dependent and -Independent Pathways

    PubMed Central

    Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen

    2016-01-01

    We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. PMID:26672068

  20. Pipecolic Acid Orchestrates Plant Systemic Acquired Resistance and Defense Priming via Salicylic Acid-Dependent and -Independent Pathways.

    PubMed

    Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen

    2016-01-01

    We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. © 2016 American Society of Plant Biologists. All rights reserved.

  1. Acquiring Defense Systems: A Quest for the Best.

    DTIC Science & Technology

    1993-07-01

    Chapter 7 The Political Character of Defense Policy -Making .............. 75 PART TWO INCEPTION OF AN ORGANIZED MANAGEMENT APPROACH Chapter 8 A Historical...175 Chapter 43 Total Package Procurement Discontinued .................... 177 PART SIX DECADE OF THE SEVENTIES Chapter 44 Policy Documents...DOD Actions ....................... 193 Chapter 49 Acquisition Advisory Group Report ........................ 195 Chapter 50 Profit Policy

  2. Systemic acquired resistance in moss: further evidence for conserved defense mechanisms in plants.

    PubMed

    Winter, Peter S; Bowman, Collin E; Villani, Philip J; Dolan, Thomas E; Hauck, Nathanael R

    2014-01-01

    Vascular plants possess multiple mechanisms for defending themselves against pathogens. One well-characterized defense mechanism is systemic acquired resistance (SAR). In SAR, a plant detects the presence of a pathogen and transmits a signal throughout the plant, inducing changes in the expression of various pathogenesis-related (PR) genes. Once SAR is established, the plant is capable of mounting rapid responses to subsequent pathogen attacks. SAR has been characterized in numerous angiosperm and gymnosperm species; however, despite several pieces of evidence suggesting SAR may also exist in non-vascular plants6-8, its presence in non-vascular plants has not been conclusively demonstrated, in part due to the lack of an appropriate culture system. Here, we describe and use a novel culture system to demonstrate that the moss species Amblystegium serpens does initiate a SAR-like reaction upon inoculation with Pythium irregulare, a common soil-borne oomycete. Infection of A. serpens gametophores by P. irregulare is characterized by localized cytoplasmic shrinkage within 34 h and chlorosis and necrosis within 7 d of inoculation. Within 24 h of a primary inoculation (induction), moss gametophores grown in culture became highly resistant to infection following subsequent inoculation (challenge) by the same pathogen. This increased resistance was a response to the pathogen itself and not to physical wounding. Treatment with β-1,3 glucan, a structural component of oomycete cell walls, was equally effective at triggering SAR. Our results demonstrate, for the first time, that this important defense mechanism exists in a non-vascular plant, and, together with previous studies, suggest that SAR arose prior to the divergence of vascular and non-vascular plants. In addition, this novel moss - pathogen culture system will be valuable for future characterization of the mechanism of SAR in moss, which is necessary for a better understanding of the evolutionary history of SAR in

  3. Department of Defense Healthcare Management System Modernization (DHMSM)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization...DHMSM) DoD Component DoD The acquiring DoD Component is Program Executive Office (PEO) Department of Defense (DoD) Healthcare Management Systems (DHMS

  4. Software assurance standard

    NASA Technical Reports Server (NTRS)

    1992-01-01

    This standard specifies the software assurance program for the provider of software. It also delineates the assurance activities for the provider and the assurance data that are to be furnished by the provider to the acquirer. In any software development effort, the provider is the entity or individual that actually designs, develops, and implements the software product, while the acquirer is the entity or individual who specifies the requirements and accepts the resulting products. This standard specifies at a high level an overall software assurance program for software developed for and by NASA. Assurance includes the disciplines of quality assurance, quality engineering, verification and validation, nonconformance reporting and corrective action, safety assurance, and security assurance. The application of these disciplines during a software development life cycle is called software assurance. Subsequent lower-level standards will specify the specific processes within these disciplines.

  5. 78 FR 30898 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... Data and Computer Software AGENCY: Defense Acquisition Regulations System; Department of Defense (DoD... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information to...

  6. Acquiring the Data Needed to Support Defense Transformation

    DTIC Science & Technology

    2010-04-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Center for Technology and National Security Policy (CTNSP) National Defense University (NDU) Fort...Lesley J. McNair, Washington, DC USA 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR...makers (see Table 1 below), there is a need to collect and organize the data of interest. It is anticipated that all of the stakeholders will be

  7. Low Cost Ways to Keep Software Current.

    ERIC Educational Resources Information Center

    Schultheis, Robert A.

    1992-01-01

    Discusses strategies for providing students with current computer software technology including acquiring previous versions of software, obtaining demonstration software, using student versions, getting examination software, buying from mail order firms, buying few copies, exploring site licenses, acquiring shareware or freeware, and applying for…

  8. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...

  9. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...

  10. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...

  11. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...

  12. SOFTWARE ENGINEERING INSTITUTE (SEI)

    EPA Science Inventory

    The Software Engineering Institute (SEI) is a federally funded research and development center established in 1984 by the U.S. Department of Defense and operated by Carnegie Mellon University. SEI has a broad charter to provide leadership in the practice of software engineering t...

  13. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    DTIC Science & Technology

    2005-01-01

    developed a partnership with the Defense Acquisition University to in- tegrate DISA’s systems engineering processes, software , and network...in place, with processes being implemented: deployment management; systems engineering ; software engineering ; configuration man- agement; test and...CSS systems engineering is a transition partner with Carnegie Mellon University’s Software Engineering Insti- tute and its work on the capability

  14. Educational Software Acquisition for Microcomputers.

    ERIC Educational Resources Information Center

    Erikson, Warren; Turban, Efraim

    1985-01-01

    Examination of issues involved in acquiring appropriate microcomputer software for higher education focuses on the following points: developing your own software; finding commercially available software; using published evaluations; pre-purchase testing; customizing and adapting commercial software; post-purchase testing; and software use. A…

  15. 29 CFR 570.141 - Good faith defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...

  16. 29 CFR 570.141 - Good faith defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...

  17. 29 CFR 570.141 - Good faith defense.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...

  18. 29 CFR 570.141 - Good faith defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...

  19. Assessing Survivability Using Software Fault Injection

    DTIC Science & Technology

    2001-04-01

    UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO10875 TITLE: Assessing Survivability Using Software Fault Injection...Esc to exit .......................................................................... = 11-1 Assessing Survivability Using Software Fault Injection...Jeffrey Voas Reliable Software Technologies 21351 Ridgetop Circle, #400 Dulles, VA 20166 jmvoas@rstcorp.crom Abstract approved sources have the

  20. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    PubMed

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  1. Military Throwaways Why Acquirers Should Go Disposable

    DTIC Science & Technology

    2016-02-01

    Defense AT&L: January–February 2016 34 Military Throwaways? Why Acquirers Should Go Disposable Maj. Patrick Dugan, USAF Maj. Jon D. McComb...outdated they no longer are manufactured. Unfortunately, the military regularly deals with DMS issues. Going disposable would alleviate DMS concerns

  2. 48 CFR 208.7400 - Scope of subpart.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...

  3. 48 CFR 208.7400 - Scope of subpart.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...

  4. 48 CFR 208.7400 - Scope of subpart.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...

  5. 48 CFR 208.7400 - Scope of subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...

  6. Software for Acquiring Image Data for PIV

    NASA Technical Reports Server (NTRS)

    Wernet, Mark P.; Cheung, H. M.; Kressler, Brian

    2003-01-01

    PIV Acquisition (PIVACQ) is a computer program for acquisition of data for particle-image velocimetry (PIV). In the PIV system for which PIVACQ was developed, small particles entrained in a flow are illuminated with a sheet of light from a pulsed laser. The illuminated region is monitored by a charge-coupled-device camera that operates in conjunction with a data-acquisition system that includes a frame grabber and a counter-timer board, both installed in a single computer. The camera operates in "frame-straddle" mode where a pair of images can be obtained closely spaced in time (on the order of microseconds). The frame grabber acquires image data from the camera and stores the data in the computer memory. The counter/timer board triggers the camera and synchronizes the pulsing of the laser with acquisition of data from the camera. PIVPROC coordinates all of these functions and provides a graphical user interface, through which the user can control the PIV data-acquisition system. PIVACQ enables the user to acquire a sequence of single-exposure images, display the images, process the images, and then save the images to the computer hard drive. PIVACQ works in conjunction with the PIVPROC program which processes the images of particles into the velocity field in the illuminated plane.

  7. Department of Defense Software Factbook

    DTIC Science & Technology

    2017-07-07

    parameters, these rules of thumb may not provide a lot of value to project managers estimating their software efforts. To get the information useful to them...organization determine the total cost of a particular project , but it is a useful metric to technical managers when they are required to submit an annual...outcome. It is most likely a combination of engineering, management , and funding factors. Although a project may resist planning a schedule slip, this

  8. 48 CFR 12.212 - Computer software.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...

  9. 48 CFR 12.212 - Computer software.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...

  10. 48 CFR 12.212 - Computer software.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...

  11. 48 CFR 12.212 - Computer software.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...

  12. 48 CFR 12.212 - Computer software.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...

  13. Emerging Technologies for Software-Reliant Systems

    DTIC Science & Technology

    2011-02-24

    needs • Loose coupling • Global distribution of hardware, software and people • Horizontal integration and convergence • Virtualization...Webinar– February 2011 © 2011 Carnegie Mellon University Global Distribution of Hardware, Software and People Globalization is an essential part of...University Required Software Engineering Emphasis Due to Emerging Technologies (2) Defensive Programming • Security • Auto-adaptation • Globalization

  14. Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals

    DTIC Science & Technology

    2014-10-01

    of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance

  15. Plant innate immunity: an updated insight into defense mechanism.

    PubMed

    Muthamilarasan, Mehanathan; Prasad, Manoj

    2013-06-01

    Plants are invaded by an array of pathogens of which only a few succeed in causing disease. The attack by others is countered by a sophisticated immune system possessed by the plants. The plant immune system is broadly divided into two, viz. microbial-associated molecular-patterns-triggered immunity (MTI) and effector-triggered immunity (ETI). MTI confers basal resistance, while ETI confers durable resistance, often resulting in hypersensitive response. Plants also possess systemic acquired resistance (SAR), which provides long-term defense against a broad-spectrum of pathogens. Salicylic-acid-mediated systemic acquired immunity provokes the defense response throughout the plant system during pathogen infection at a particular site. Trans-generational immune priming allows the plant to heritably shield their progeny towards pathogens previously encountered. Plants circumvent the viral infection through RNA interference phenomena by utilizing small RNAs. This review summarizes the molecular mechanisms of plant immune system, and the latest breakthroughs reported in plant defense. We discuss the plant–pathogen interactions and integrated defense responses in the context of presenting an integral understanding in plant molecular immunity.

  16. 4DCAPTURE: a general purpose software package for capturing and analyzing two- and three-dimensional motion data acquired from video sequences

    NASA Astrophysics Data System (ADS)

    Walton, James S.; Hodgson, Peter; Hallamasek, Karen; Palmer, Jake

    2003-07-01

    4DVideo is creating a general purpose capability for capturing and analyzing kinematic data from video sequences in near real-time. The core element of this capability is a software package designed for the PC platform. The software ("4DCapture") is designed to capture and manipulate customized AVI files that can contain a variety of synchronized data streams -- including audio, video, centroid locations -- and signals acquired from more traditional sources (such as accelerometers and strain gauges.) The code includes simultaneous capture or playback of multiple video streams, and linear editing of the images (together with the ancilliary data embedded in the files). Corresponding landmarks seen from two or more views are matched automatically, and photogrammetric algorithms permit multiple landmarks to be tracked in two- and three-dimensions -- with or without lens calibrations. Trajectory data can be processed within the main application or they can be exported to a spreadsheet where they can be processed or passed along to a more sophisticated, stand-alone, data analysis application. Previous attempts to develop such applications for high-speed imaging have been limited in their scope, or by the complexity of the application itself. 4DVideo has devised a friendly ("FlowStack") user interface that assists the end-user to capture and treat image sequences in a natural progression. 4DCapture employs the AVI 2.0 standard and DirectX technology which effectively eliminates the file size limitations found in older applications. In early tests, 4DVideo has streamed three RS-170 video sources to disk for more than an hour without loss of data. At this time, the software can acquire video sequences in three ways: (1) directly, from up to three hard-wired cameras supplying RS-170 (monochrome) signals; (2) directly, from a single camera or video recorder supplying an NTSC (color) signal; and (3) by importing existing video streams in the AVI 1.0 or AVI 2.0 formats. The

  17. NASA Software Engineering Benchmarking Study

    NASA Technical Reports Server (NTRS)

    Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.

    2013-01-01

    To identify best practices for the improvement of software engineering on projects, NASA's Offices of Chief Engineer (OCE) and Safety and Mission Assurance (OSMA) formed a team led by Heather Rarick and Sally Godfrey to conduct this benchmarking study. The primary goals of the study are to identify best practices that: Improve the management and technical development of software intensive systems; Have a track record of successful deployment by aerospace industries, universities [including research and development (R&D) laboratories], and defense services, as well as NASA's own component Centers; and Identify candidate solutions for NASA's software issues. Beginning in the late fall of 2010, focus topics were chosen and interview questions were developed, based on the NASA top software challenges. Between February 2011 and November 2011, the Benchmark Team interviewed a total of 18 organizations, consisting of five NASA Centers, five industry organizations, four defense services organizations, and four university or university R and D laboratory organizations. A software assurance representative also participated in each of the interviews to focus on assurance and software safety best practices. Interviewees provided a wealth of information on each topic area that included: software policy, software acquisition, software assurance, testing, training, maintaining rigor in small projects, metrics, and use of the Capability Maturity Model Integration (CMMI) framework, as well as a number of special topics that came up in the discussions. NASA's software engineering practices compared favorably with the external organizations in most benchmark areas, but in every topic, there were ways in which NASA could improve its practices. Compared to defense services organizations and some of the industry organizations, one of NASA's notable weaknesses involved communication with contractors regarding its policies and requirements for acquired software. One of NASA's strengths

  18. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    PubMed Central

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  19. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...

  20. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...

  1. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...

  2. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...

  3. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...

  4. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  5. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  6. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  7. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  8. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  9. Third-Party Software's Trust Quagmire.

    PubMed

    Voas, J; Hurlburt, G

    2015-12-01

    Current software development has trended toward the idea of integrating independent software sub-functions to create more complete software systems. Software sub-functions are often not homegrown - instead they are developed by unknown 3 rd party organizations and reside in software marketplaces owned or controlled by others. Such software sub-functions carry plausible concern in terms of quality, origins, functionality, security, interoperability, to name a few. This article surveys key technical difficulties in confidently building systems from acquired software sub-functions by calling out the principle software supply chain actors.

  10. A Benzothiadiazole Primes Parsley Cells for Augmented Elicitation of Defense Responses

    PubMed Central

    Katz, Vera A.; Thulke, Oliver U.; Conrath, Uwe

    1998-01-01

    Systemic acquired resistance is an important component of the disease-resistance arsenal of plants, and is associated with an enhanced potency for activating local defense responses upon pathogen attack. Here we demonstrate that pretreatment with benzothiadiazole (BTH), a synthetic activator of acquired resistance in plants, augmented the sensitivity for low-dose elicitation of coumarin phytoalexin secretion by cultured parsley (Petroselinum crispum L.) cells. Enhanced coumarin secretion was associated with potentiated activation of genes encoding Phe ammonia-lyase (PAL). The augmentation of PAL gene induction was proportional to the length of pretreatment with BTH, indicating time-dependent priming of the cells. In contrast to the PAL genes, those for anionic peroxidase were directly induced by BTH in the absence of elicitor, thus confirming a dual role for BTH in the activation of plant defenses. Strikingly, the ability of various chemicals to enhance plant disease resistance correlated with their capability to potentiate parsley PAL gene elicitation, emphasizing an important role for defense response potentiation in acquired plant disease resistance. PMID:9701589

  11. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 215, 234, 242, and 252... System (DFARS Case 2008-D027) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... 1921-2, Progress Curve Report Comment: A respondent noted that DD Form 1921-2 Progress Curve Report...

  12. Acquiring Software Project Specifications in a Virtual World

    ERIC Educational Resources Information Center

    Ng, Vincent; Tang, Zoe

    2012-01-01

    In teaching software engineering, it is often interesting to introduce real life scenarios for students to experience and to learn how to collect information from respective clients. The ideal arrangement is to have some real clients willing to spend time to provide their ideas of a target system through interviews. However, this arrangement…

  13. Acquiring data in real time in Italy from the Antarctic Seismographic Argentinean Italian Network (ASAIN): testing the global capabilities of the EarthWorm and Antelope software suites.

    NASA Astrophysics Data System (ADS)

    Percy Plasencia Linares, Milton; Russi, Marino; Pesaresi, Damiano; Cravos, Claudio

    2010-05-01

    The Italian National Institute for Oceanography and Experimental Geophysics (Istituto Nazionale di Oceanografia e di Geofisica Sperimentale, OGS) is running the Antarctic Seismographic Argentinean Italian Network (ASAIN), made of 7 seismic stations located in the Scotia Sea region in Antarctica and in Tierra del Fuego - Argentina: data from these stations are transferred in real time to the OGS headquarters in Trieste (Italy) via satellite links provided by the Instituto Antártico Argentino (IAA). Data is collected and archived primarily in Güralp Compress Format (GCF) through the Scream! software at OGS and IAA, and transmitted also in real time to the Observatories and Research Facilities for European Seismology (ORFEUS). The main real time seismic data acquisition and processing system of the ASAIN network is based on the EarthWorm 7.3 (Open Source) software suite installed on a Linux server at the OGS headquarters in Trieste. It runs several software modules for data collection, data archiving, data publication on dedicated web servers: wave_serverV, Winston Wave Server, and data analysis and realtime monitoring through Swarm program. OGS is also running, in close cooperation with the Friuli-Venezia Giulia Civil Defense, the North East (NI) Italy seismic network, making use of the Antelope commercial software suite from BRTT as the main acquisition system. As a test to check the global capabilities of the Antelope software suite, we also set up an instance of Antelope acquiring data in real time from both the regional ASAIN seismic network in Antarctica and a subset of the Global Seismic Network (GSN) funded by the Incorporated Research Institution for Seismology (IRIS). The facilities of the IRIS Data Management System, and specifically the IRIS Data Management Center, were used for real time access to waveform required in this study. The first tests indicated that more than 80% of the earthquakes with magnitude M>5.0 listed in the Preliminary Determination

  14. Astronomy Software

    NASA Technical Reports Server (NTRS)

    1995-01-01

    Software Bisque's TheSky, SkyPro and Remote Astronomy Software incorporate technology developed for the Hubble Space Telescope. TheSky and SkyPro work together to orchestrate locating, identifying and acquiring images of deep sky objects. With all three systems, the user can directly control computer-driven telescopes and charge coupled device (CCD) cameras through serial ports. Through the systems, astronomers and students can remotely operate a telescope at the Mount Wilson Observatory Institute.

  15. National Software Reference Library (NSRL)

    National Institute of Standards and Technology Data Gateway

    National Software Reference Library (NSRL) (PC database for purchase)   A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.

  16. Repository-based software engineering program

    NASA Technical Reports Server (NTRS)

    Wilson, James

    1992-01-01

    The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.

  17. A Handbook For Acquiring Demand-Responsive Transit Software, Tcrp Report 18

    DOT National Transportation Integrated Search

    1996-01-01

    THIS HANDBOOK WILL BE OF INTEREST TO AGENCIES ENGAGED IN MANAGING AND OPERATING DEMAND-RESPONSIVE TRANSIT (DRT) SERVICES. THE HANDBOOK IS INTENDED TO ASSIST DRTPROVIDERS WITH ASSESSMENT OF SOFTWARE NEEDS AND PROCUREMENT OF SOFTWARE TO MEET THOSE NEED...

  18. Antiterrorist Software

    NASA Technical Reports Server (NTRS)

    Clark, David A.

    1998-01-01

    In light of the escalation of terrorism, the Department of Defense spearheaded the development of new antiterrorist software for all Government agencies by issuing a Broad Agency Announcement to solicit proposals. This Government-wide competition resulted in a team that includes NASA Lewis Research Center's Computer Services Division, who will develop the graphical user interface (GUI) and test it in their usability lab. The team launched a program entitled Joint Sphere of Security (JSOS), crafted a design architecture (see the following figure), and is testing the interface. This software system has a state-ofthe- art, object-oriented architecture, with a main kernel composed of the Dynamic Information Architecture System (DIAS) developed by Argonne National Laboratory. DIAS will be used as the software "breadboard" for assembling the components of explosions, such as blast and collapse simulations.

  19. Technical Concept Document. Central Archive for Reusable Defense Software (CARDS)

    DTIC Science & Technology

    1994-02-28

    FeNbry 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive for...February 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive...accordance with the DFARS Special Works Clause Developed by: This document, developed under the Software Technology for Adaptable, Reliable Systems

  20. 75 FR 6185 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ...; Defense Federal Acquisition Regulation Supplement; Rights in Technical Data and Computer Software (OMB... 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and... rights in technical data and computer software. DoD needs this information to implement 10 U.S.C. 2320...

  1. Automated Software Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  2. Framework for Small-Scale Experiments in Software Engineering: Guidance and Control Software Project: Software Engineering Case Study

    NASA Technical Reports Server (NTRS)

    Hayhurst, Kelly J.

    1998-01-01

    Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.

  3. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  4. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  5. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  6. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  7. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  8. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  9. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  10. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  11. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  12. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  13. 48 CFR 208.7402 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208... services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI... software and related services. ESI does not dictate the products or services to be acquired. ...

  14. 48 CFR 208.7401 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... a contract that is used to acquire designated commercial software or related services such as... Officer to develop processes for DoD-wide software asset management. Software maintenance means services...

  15. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    PubMed

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  16. OSI for hardware/software interoperability

    NASA Astrophysics Data System (ADS)

    Wood, Richard J.; Harvey, Donald L.; Linderman, Richard W.; Gardener, Gary A.; Capraro, Gerard T.

    1994-03-01

    There is a need in public safety for real-time data collection and transmission from one or more sensors. The Rome Laboratory and the Ballistic Missile Defense Organization are pursuing an effort to bring the benefits of Open System Architectures (OSA) to embedded systems within the Department of Defense. When developed properly OSA provides interoperability, commonality, graceful upgradeability, survivability and hardware/software transportability to greatly minimize life cycle costs, integration and supportability. Architecture flexibility can be achieved to take advantage of commercial accomplishments by basing these developments on vendor-neutral commercially accepted standards and protocols.

  17. NASA Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Rosenberg, Linda

    1997-01-01

    If software is a critical element in a safety critical system, it is imperative to implement a systematic approach to software safety as an integral part of the overall system safety programs. The NASA-STD-8719.13A, "NASA Software Safety Standard", describes the activities necessary to ensure that safety is designed into software that is acquired or developed by NASA, and that safety is maintained throughout the software life cycle. A PDF version, is available on the WWW from Lewis. A Guidebook that will assist in the implementation of the requirements in the Safety Standard is under development at the Lewis Research Center (LeRC). After completion, it will also be available on the WWW from Lewis.

  18. An Assessment of Software Safety as Applied to the Department of Defense Software Development Process

    DTIC Science & Technology

    1992-12-01

    provide program 5 managers some level of confidence that their software will operate at an acceptable level of risk. A number of structured safety...safety within the constraints of operational effectiveness, schedule, and cost through timely application of system safety management and engineering...Master of Science in Software Systems Management Peter W. Colan, B.S.E. Robert W. Prouhet, B.S. Captain, USAF Captain, USAF December 1992 Approved for

  19. 76 FR 14588 - Defense Federal Acquisition Regulation Supplement; Nonavailability Exception for Procurement of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Defense Authorization Act for Fiscal Year 2011. Section 847 provides a nonavailability exception to the requirement at 10 U.S.C. 2533a (Berry Amendment) to acquire only domestic hand or measuring tools. DATES... DFARS 225.7002-2 to implement section 847 of the National Defense Authorization Act for Fiscal Year 2011...

  20. Proposal for a New ’Rights in Software’ Clause for Software Acquisitions by the Department of Defense.

    DTIC Science & Technology

    1986-09-01

    point here Is that the capital cost of design and development (including the cost of software tools and/or CAD/CAM programs which aided in the development...and capitalization , software Is in many ways more Ike a hardware component than it is Ike the tech- nical documentation which supports the hardware...Invoked, the owner of intelectual property rights in software may attach appropriate copyright notices to software delivered under this contract. 2.2.2

  1. Computer-Aided Process and Tools for Mobile Software Acquisition

    DTIC Science & Technology

    2013-04-01

    Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani Naval Postgraduate School Published April 1, 2013 Approved for public...ManTech International Corporation Computer-Aided Process and Tools for Mobile Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani...Mobile Software Acquisition Christopher Bonine — Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense

  2. 77 FR 38734 - Defense Federal Acquisition Regulation Supplement; Acquisition of Tents and Other Temporary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-29

    ... Structures (DFARS Case 2012-D015) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... structures. DATES: Effective date: June 29, 2012. Comment date: Comments are due by August 28, 2012..., when acquiring tents and other temporary structures, regardless of whether purchased by DoD or by...

  3. Space Station Software Recommendations

    NASA Technical Reports Server (NTRS)

    Voigt, S. (Editor)

    1985-01-01

    Four panels of invited experts and NASA representatives focused on the following topics: software management, software development environment, languages, and software standards. Each panel deliberated in private, held two open sessions with audience participation, and developed recommendations for the NASA Space Station Program. The major thrusts of the recommendations were as follows: (1) The software management plan should establish policies, responsibilities, and decision points for software acquisition; (2) NASA should furnish a uniform modular software support environment and require its use for all space station software acquired (or developed); (3) The language Ada should be selected for space station software, and NASA should begin to address issues related to the effective use of Ada; and (4) The space station software standards should be selected (based upon existing standards where possible), and an organization should be identified to promulgate and enforce them. These and related recommendations are described in detail in the conference proceedings.

  4. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  5. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes

    PubMed Central

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens. PMID:28360923

  6. Survey of Software Assurance Techniques for Highly Reliable Systems

    NASA Technical Reports Server (NTRS)

    Nelson, Stacy

    2004-01-01

    This document provides a survey of software assurance techniques for highly reliable systems including a discussion of relevant safety standards for various industries in the United States and Europe, as well as examples of methods used during software development projects. It contains one section for each industry surveyed: Aerospace, Defense, Nuclear Power, Medical Devices and Transportation. Each section provides an overview of applicable standards and examples of a mission or software development project, software assurance techniques used and reliability achieved.

  7. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 9

    DTIC Science & Technology

    2005-09-01

    2004. 12. Humphrey , Watts . Introduction to the Personal Software Process SM. Addison- Wesley 1997. 13. Humphrey , Watts . Introduction to the Team...Personal Software ProcessSM (PSPSM)is a software development process orig- inated by Watts Humphrey at the Software Engineering Institute (SEI) in the...meets its commitments and bring a sense of control and predictability into an apparently chaotic project.u References 1. Humphrey , Watts . Coaching

  8. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 1

    DTIC Science & Technology

    2008-01-01

    project manage- ment and the individual components of the software life-cycle model ; it will be awarded for...software professionals that had been formally educated in software project manage- ment. The study indicated that our industry is lacking in program managers...soft- ware developments get bigger, more complicated, and more dependent on senior software pro- fessionals to get the project on the right path

  9. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bos, Nathan; Paul, Celeste; Gersh, John

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one ofmore » two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.« less

  10. 48 CFR 208.7401 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...

  11. 48 CFR 208.7401 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...

  12. 48 CFR 208.7401 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...

  13. 48 CFR 208.7401 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...

  14. Long-distance communication and signal amplification in systemic acquired resistance

    PubMed Central

    Shah, Jyoti; Zeier, Jürgen

    2013-01-01

    Systemic acquired resistance (SAR) is an inducible defense mechanism in plants that confers enhanced resistance against a variety of pathogens. SAR is activated in the uninfected systemic (distal) organs in response to a prior (primary) infection elsewhere in the plant. SAR is associated with the activation of salicylic acid (SA) signaling and the priming of defense responses for robust activation in response to subsequent infections. The activation of SAR requires communication by the primary infected tissues with the distal organs. The vasculature functions as a conduit for the translocation of factors that facilitate long-distance intra-plant communication. In recent years, several metabolites putatively involved in long-distance signaling have been identified. These include the methyl ester of SA (MeSA), the abietane diterpenoid dehydroabietinal (DA), the dicarboxylic acid azelaic acid (AzA), and a glycerol-3-phosphate (G3P)-dependent factor. Long-distance signaling by some of these metabolites also requires the lipid-transfer protein DIR1 (DEFECTIVE IN INDUCED RESISTANCE 1). The relative contribution of these factors in long-distance signaling is likely influenced by environmental conditions, for example light. In the systemic leaves, the AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1)-dependent production of the lysine catabolite pipecolic acid (Pip), FLAVIN-DEPENDENT MONOOXYGENASE1 (FMO1) signaling, as well as SA synthesis and downstream signaling are required for the activation of SAR. This review summarizes the involvement and interaction between long-distance SAR signals and details the recently discovered role of Pip in defense amplification and priming that allows plants to acquire immunity at the systemic level. Recent advances in SA signaling and perception are also highlighted. PMID:23440336

  15. 76 FR 65186 - Request for Public Comments on How the Department of Defense Can Improve the Way It Procures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... received will be considered by DoD in the formation of a recommendation to the Secretary of Defense if a... States to provide defense articles and defense services to friendly countries and international... Assistance and related activities. The articles and services acquired via FMS sales are procured through the...

  16. Plant defense activators: applications and prospects in cereal crops

    USDA-ARS?s Scientific Manuscript database

    This review addresses the current understanding of the plant immune response and the molecular mechanisms responsible for systemic acquired resistance as well as the phenomenon of "priming" in plant defense. A detailed discussion of the role of salicylic acid in activating the plant transcription c...

  17. Systemic acquired tolerance to virulent bacterial pathogens in tomato.

    PubMed

    Block, Anna; Schmelz, Eric; O'Donnell, Phillip J; Jones, Jeffrey B; Klee, Harry J

    2005-07-01

    Recent studies on the interactions between plants and pathogenic microorganisms indicate that the processes of disease symptom development and pathogen growth can be uncoupled. Thus, in many instances, the symptoms associated with disease represent an active host response to the presence of a pathogen. These host responses are frequently mediated by phytohormones. For example, ethylene and salicylic acid (SA) mediate symptom development but do not influence bacterial growth in the interaction between tomato (Lycopersicon esculentum) and virulent Xanthomonas campestris pv vesicatoria (Xcv). It is not apparent why extensive tissue death is integral to a defense response if it does not have the effect of limiting pathogen proliferation. One possible function for this hormone-mediated response is to induce a systemic defense response. We therefore assessed the systemic responses of tomato to Xcv. SA- and ethylene-deficient transgenic lines were used to investigate the roles of these phytohormones in systemic signaling. Virulent and avirulent Xcv did induce a systemic response as evidenced by expression of defense-associated pathogenesis-related genes in an ethylene- and SA-dependent manner. This systemic response reduced cell death but not bacterial growth during subsequent challenge with virulent Xcv. This systemic acquired tolerance (SAT) consists of reduced tissue damage in response to secondary challenge with a virulent pathogen with no effect upon pathogen growth. SAT was associated with a rapid ethylene and pathogenesis-related gene induction upon challenge. SAT was also induced by infection with Pseudomonas syringae pv tomato. These data show that SAT resembles systemic acquired resistance without inhibition of pathogen growth.

  18. Maintaining the Health of Software Monitors

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Rungta, Neha

    2013-01-01

    Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors use information from the specification and implementation of the monitored software to detect violations, predict possible failures, and help the system recover from faults. Changes to the monitored software, such as adding new functionality or fixing defects, therefore, have the potential to impact the correctness of both the monitored software and the SWHM monitor. In this work, we describe how the results of a software change impact analysis technique, Directed Incremental Symbolic Execution (DiSE), can be applied to monitored software to identify the potential impact of the changes on the SWHM monitor software. The results of DiSE can then be used by other analysis techniques, e.g., testing, debugging, to help preserve and improve the integrity of the SWHM monitor as the monitored software evolves.

  19. Design and Acquisition of Software for Defense Systems

    DTIC Science & Technology

    2018-02-14

    enterprise business systems and related information technology (IT) services, the role software plays in enabling and enhancing weapons systems often...3 The information in this chart was compiled from Christian Hagen, Jeff Sorenson, Steven Hurt...understanding to make an informed choice of final architecture. The Task Force found commercial practice starts with several competing architectures and

  20. Software Process Improvement: Supporting the Linking of the Software and the Business Strategies

    NASA Astrophysics Data System (ADS)

    Albuquerque, Adriano Bessa; Rocha, Ana Regina; Lima, Andreia Cavalcanti

    The market is becoming more and more competitive, a lot of products and services depend of the software product and the software is one of the most important assets, which influence the organizations’ businesses. Considering this context, we can observe that the companies must to deal with the software, developing or acquiring, carefully. One of the perspectives that can help to take advantage of the software, supporting effectively the business, is to invest on the organization’s software processes. This paper presents an approach to evaluate and improve the processes assets of the software organizations, based on internationally well-known standards and process models. This approach is supported by automated tools from the TABA Workstation and is part of a wider improvement strategy constituted of three layers (organizational layer, process execution layer and external entity layer). Moreover, this paper presents the experience of use and their results.

  1. Next-generation systemic acquired resistance.

    PubMed

    Luna, Estrella; Bruce, Toby J A; Roberts, Michael R; Flors, Victor; Ton, Jurriaan

    2012-02-01

    Systemic acquired resistance (SAR) is a plant immune response to pathogen attack. Recent evidence suggests that plant immunity involves regulation by chromatin remodeling and DNA methylation. We investigated whether SAR can be inherited epigenetically following disease pressure by Pseudomonas syringae pv tomato DC3000 (PstDC3000). Compared to progeny from control-treated Arabidopsis (Arabidopsis thaliana; C(1)), progeny from PstDC3000-inoculated Arabidopsis (P(1)) were primed to activate salicylic acid (SA)-inducible defense genes and were more resistant to the (hemi)biotrophic pathogens Hyaloperonospora arabidopsidis and PstDC3000. This transgenerational SAR was sustained over one stress-free generation, indicating an epigenetic basis of the phenomenon. Furthermore, P(1) progeny displayed reduced responsiveness of jasmonic acid (JA)-inducible genes and enhanced susceptibility to the necrotrophic fungus Alternaria brassicicola. This shift in SA- and JA-dependent gene responsiveness was not associated with changes in corresponding hormone levels. Instead, chromatin immunoprecipitation analyses revealed that SA-inducible promoters of PATHOGENESIS-RELATED GENE1, WRKY6, and WRKY53 in P(1) plants are enriched with acetylated histone H3 at lysine 9, a chromatin mark associated with a permissive state of transcription. Conversely, the JA-inducible promoter of PLANT DEFENSIN1.2 showed increased H3 triple methylation at lysine 27, a mark related to repressed gene transcription. P(1) progeny from the defense regulatory mutant non expressor of PR1 (npr1)-1 failed to develop transgenerational defense phenotypes, demonstrating a critical role for NPR1 in expression of transgenerational SAR. Furthermore, the drm1drm2cmt3 mutant that is affected in non-CpG DNA methylation mimicked the transgenerational SAR phenotype. Since PstDC3000 induces DNA hypomethylation in Arabidopsis, our results suggest that transgenerational SAR is transmitted by hypomethylated genes that direct priming

  2. Simple solution to the medical instrumentation software problem

    NASA Astrophysics Data System (ADS)

    Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.

    1995-04-01

    Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.

  3. 48 CFR 208.7403 - Acquisition procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7403 Acquisition procedures. Follow the procedures at PGI 208.7403 when acquiring commercial software and related services. [71 FR 39005, July 11, 2006] ...

  4. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 11

    DTIC Science & Technology

    2005-11-01

    languages. Our discipline of software engineering has really experienced phenomenal growth right before our eyes. A sign that software design has...approach on a high level of abstraction. The main emphasis is on the identification and allocation of a needed functionality (e.g., a target tracker ), rather...messaging software that is the backbone of teenage culture. As increasing security constraints will increase the cost of developing and main- taining any

  5. Strategy for a DOD Software Initiative. Volume 2. Appendices

    DTIC Science & Technology

    1983-10-01

    Druffel 9 PERFORMING ORGANIZATION NAME AND ADDRESS 1 10 . PROGRAM ELEMENT. PROJECT. TASK AREA 6 WORK UN17 NUMBERS Office of Under Secretary of Defense...New Approach j Lwering DoD Software Costs, Honeywell Aerospace and Defense Group, March 1982. 3 10 p - -q Recognizing that the opportunities and needs...Epstein, M. Fallon, R. A. Farrar, B. L. Fischer, Herman Fisher, Dave Fowler, Northrup, III Fox, Joseph Frager, David S. Frank, Geoffrey A. Fredette

  6. AdaNET phase 0 support for the AdaNET Dynamic Software Inventory (DSI) management system prototype. Catalog of available reusable software components

    NASA Technical Reports Server (NTRS)

    Hanley, Lionel

    1989-01-01

    The Ada Software Repository is a public-domain collection of Ada software and information. The Ada Software Repository is one of several repositories located on the SIMTEL20 Defense Data Network host computer at White Sands Missile Range, and available to any host computer on the network since 26 November 1984. This repository provides a free source for Ada programs and information. The Ada Software Repository is divided into several subdirectories. These directories are organized by topic, and their names and a brief overview of their topics are contained. The Ada Software Repository on SIMTEL20 serves two basic roles: to promote the exchange and use (reusability) of Ada programs and tools (including components) and to promote Ada education.

  7. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    ERIC Educational Resources Information Center

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  8. CSAM Metrology Software Tool

    NASA Technical Reports Server (NTRS)

    Vu, Duc; Sandor, Michael; Agarwal, Shri

    2005-01-01

    CSAM Metrology Software Tool (CMeST) is a computer program for analysis of false-color CSAM images of plastic-encapsulated microcircuits. (CSAM signifies C-mode scanning acoustic microscopy.) The colors in the images indicate areas of delamination within the plastic packages. Heretofore, the images have been interpreted by human examiners. Hence, interpretations have not been entirely consistent and objective. CMeST processes the color information in image-data files to detect areas of delamination without incurring inconsistencies of subjective judgement. CMeST can be used to create a database of baseline images of packages acquired at given times for comparison with images of the same packages acquired at later times. Any area within an image can be selected for analysis, which can include examination of different delamination types by location. CMeST can also be used to perform statistical analyses of image data. Results of analyses are available in a spreadsheet format for further processing. The results can be exported to any data-base-processing software.

  9. AdaNET Dynamic Software Inventory (DSI) prototype component acquisition plan

    NASA Technical Reports Server (NTRS)

    Hanley, Lionel

    1989-01-01

    A component acquisition plan contains the information needed to evaluate, select, and acquire software and hardware components necessary for successful completion of the AdaNET Dynamic Software Inventory (DSI) Management System Prototype. This plan will evolve and be applicable to all phases of the DSI prototype development. Resources, budgets, schedules, and organizations related to component acquisition activities are provided. A purpose and description of a software or hardware component which is to be acquired are presented. Since this is a plan for acquisition of all components, this section is not applicable. The procurement activities and events conducted by the acquirer are described and who is responsible is identified, where the activity will be performed, and when the activities will occur for each planned procurement. Acquisition requirements describe the specific requirements and standards to be followed during component acquisition. The activities which will take place during component acquisition are described. A list of abbreviations and acronyms, and a glossary are contained.

  10. Near-Earth object intercept trajectory design for planetary defense

    NASA Astrophysics Data System (ADS)

    Vardaxis, George; Wie, Bong

    2014-08-01

    Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.

  11. Gaining Control and Predictability of Software-Intensive Systems Development and Sustainment

    DTIC Science & Technology

    2015-02-04

    implementation of the baselines, audits , and technical reviews within an overarching systems engineering process (SEP; Defense Acquisition University...warfighters’ needs. This management and metrics effort supplements and supports the system’s technical development through the baselines, audits and...other areas that could be researched and added into the nine-tier model. Areas including software metrics, quality assurance , software-oriented

  12. Monoterpenes Support Systemic Acquired Resistance within and between Plants

    PubMed Central

    Ghirardo, Andrea; Knappe, Claudia; Koch, Kerstin; Dey, Sanjukta; Parker, Jane E.

    2017-01-01

    This study investigates the role of volatile organic compounds in systemic acquired resistance (SAR), a salicylic acid (SA)-associated, broad-spectrum immune response in systemic, healthy tissues of locally infected plants. Gas chromatography coupled to mass spectrometry analyses of SAR-related emissions of wild-type and non-SAR-signal-producing mutant plants associated SAR with monoterpene emissions. Headspace exposure of Arabidopsis thaliana to a mixture of the bicyclic monoterpenes α-pinene and β-pinene induced defense, accumulation of reactive oxygen species, and expression of SA- and SAR-related genes, including the SAR regulatory AZELAIC ACID INDUCED1 (AZI1) gene and three of its paralogs. Pinene-induced resistance was dependent on SA biosynthesis and signaling and on AZI1. Arabidopsis geranylgeranyl reductase1 mutants with reduced monoterpene biosynthesis were SAR-defective but mounted normal local resistance and methyl salicylate-induced defense responses, suggesting that monoterpenes act in parallel with SA. The volatile emissions from SAR signal-emitting plants induced defense in neighboring plants, and this was associated with the presence of α-pinene, β-pinene, and camphene in the emissions of the “sender” plants. Our data suggest that monoterpenes, particularly pinenes, promote SAR, acting through ROS and AZI1, and likely function as infochemicals in plant-to-plant signaling, thus allowing defense signal propagation between neighboring plants. PMID:28536145

  13. Monoterpenes Support Systemic Acquired Resistance within and between Plants.

    PubMed

    Riedlmeier, Marlies; Ghirardo, Andrea; Wenig, Marion; Knappe, Claudia; Koch, Kerstin; Georgii, Elisabeth; Dey, Sanjukta; Parker, Jane E; Schnitzler, Jörg-Peter; Vlot, A Corina

    2017-06-01

    This study investigates the role of volatile organic compounds in systemic acquired resistance (SAR), a salicylic acid (SA)-associated, broad-spectrum immune response in systemic, healthy tissues of locally infected plants. Gas chromatography coupled to mass spectrometry analyses of SAR-related emissions of wild-type and non-SAR-signal-producing mutant plants associated SAR with monoterpene emissions. Headspace exposure of Arabidopsis thaliana to a mixture of the bicyclic monoterpenes α-pinene and β-pinene induced defense, accumulation of reactive oxygen species, and expression of SA- and SAR-related genes, including the SAR regulatory AZELAIC ACID INDUCED1 ( AZI1 ) gene and three of its paralogs. Pinene-induced resistance was dependent on SA biosynthesis and signaling and on AZI1 Arabidopsis geranylgeranyl reductase1 mutants with reduced monoterpene biosynthesis were SAR-defective but mounted normal local resistance and methyl salicylate-induced defense responses, suggesting that monoterpenes act in parallel with SA The volatile emissions from SAR signal-emitting plants induced defense in neighboring plants, and this was associated with the presence of α-pinene, β-pinene, and camphene in the emissions of the "sender" plants. Our data suggest that monoterpenes, particularly pinenes, promote SAR, acting through ROS and AZI1 , and likely function as infochemicals in plant-to-plant signaling, thus allowing defense signal propagation between neighboring plants. © 2017 American Society of Plant Biologists. All rights reserved.

  14. Defense Acquisition Research Journal. Volume 22, Number 4, Issue 75, October 2015

    DTIC Science & Technology

    2015-10-01

    forma nce pa ra meters ba sed on operational requirements related to the mission. These thresholds will inform the develop- ment of KPPs, KSAs...success of a software development project. 400 Defense ARJ, October 2015, Vol. 22 No. 4 : 394–415 A Publication of the Defense Acquisition University...define when development is complete (Resnick et al., 2011), and when a story is added to a sprint the acceptance criteria can be adjusted. This is

  15. Immune defense in leaf-cutting ants: a cross-fostering approach.

    PubMed

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández; Nash, David R; Boomsma, Jacobus J

    2011-06-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily social defense, a Pseudonocardia bacteria that helps to control pathogens in the ants' fungus garden, showed a significant colony of origin by rearing environment interaction, whereby ants that acquired the bacteria of a foster colony obtained a less abundant cover of bacteria: one explanation for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses. © 2011 The Author(s). Evolution© 2011 The Society for the Study of Evolution.

  16. Large Scale Portability of Hospital Information System Software

    PubMed Central

    Munnecke, Thomas H.; Kuhn, Ingeborg M.

    1986-01-01

    As part of its Decentralized Hospital Computer Program (DHCP) the Veterans Administration installed new hospital information systems in 169 of its facilities during 1984 and 1985. The application software for these systems is based on the ANS MUMPS language, is public domain, and is designed to be operating system and hardware independent. The software, developed by VA employees, is built upon a layered approach, where application packages layer on a common data dictionary which is supported by a Kernel of software. Communications between facilities are based on public domain Department of Defense ARPA net standards for domain naming, mail transfer protocols, and message formats, layered on a variety of communications technologies.

  17. Defensive Practice as ‘Fear-Based’ Practice: Social Work's Open Secret?

    PubMed Central

    Whittaker, Andrew; Havard, Tirion

    2016-01-01

    Defensive practice has received attention through the Munro review of child protection, which has identified that current organisational cultures increase the likelihood of defensive practice. Whilst the wider socio-political climate that gives rise to defensive practice has been explored within the literature, little attention has been paid to the everyday realities of defensive practice. This paper reports the findings of a study into final year social work students' attitudes towards defensive practice within social work. Three focus groups were completed with a total of ninety final-year students that collected qualitative and quantitative data using interactive software. This paper examines how participants perceived defensive practice, both in general and when faced with real-life vignettes. Participants distinguished between pro-active behaviour (sins of commission) and passive behaviour (sins of omission), generally regarding the latter as less serious because it was less tangible and easier to attribute to more positive motives. Whilst the literature identifies defensive practice as deliberate behaviour, the focus group discussions suggest that it is a subtler and less conscious process. Whilst there was there was a general consensus about the nature of defensive practice, there was considerable disagreement about specific vignettes and several competing explanations are explored. PMID:27559220

  18. Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process

    DTIC Science & Technology

    2010-04-23

    Departments; the Chairman, Joint Chiefs of Staff (CJCS) and Joint Staff; the Unified Combatant Commands ( UCCs ); the Defense Agencies; and DOD field...Systems Congressional Research Service 24 industrialists in their own states and districts got their fair share , or more, of the military contracts...be a market for its products as a catalyst; this market was born when the comparatively small and unsophisticated U.S. peacetime ‘militia’ envisioned

  19. CARDS: A blueprint and environment for domain-specific software reuse

    NASA Technical Reports Server (NTRS)

    Wallnau, Kurt C.; Solderitsch, Anne Costa; Smotherman, Catherine

    1992-01-01

    CARDS (Central Archive for Reusable Defense Software) exploits advances in domain analysis and domain modeling to identify, specify, develop, archive, retrieve, understand, and reuse domain-specific software components. An important element of CARDS is to provide visibility into the domain model artifacts produced by, and services provided by, commercial computer-aided software engineering (CASE) technology. The use of commercial CASE technology is important to provide rich, robust support for the varied roles involved in a reuse process. We refer to this kind of use of knowledge representation systems as supporting 'knowledge-based integration.'

  20. Defense.gov Special Report: Defense Intelligence

    Science.gov Websites

    Department of Defense Submit Search Defense intelligence is critical to the Defense Department's role in and conduct successful military and security operations that protect America. Defense Intelligence News Story Intelligence Chief Describes 'Pervasive Uncertainty' of Worldwide Threats "

  1. GPS Software Packages Deliver Positioning Solutions

    NASA Technical Reports Server (NTRS)

    2010-01-01

    "To determine a spacecraft s position, the Jet Propulsion Laboratory (JPL) developed an innovative software program called the GPS (global positioning system)-Inferred Positioning System and Orbit Analysis Simulation Software, abbreviated as GIPSY-OASIS, and also developed Real-Time GIPSY (RTG) for certain time-critical applications. First featured in Spinoff 1999, JPL has released hundreds of licenses for GIPSY and RTG, including to Longmont, Colorado-based DigitalGlobe. Using the technology, DigitalGlobe produces satellite imagery with highly precise latitude and longitude coordinates and then supplies it for uses within defense and intelligence, civil agencies, mapping and analysis, environmental monitoring, oil and gas exploration, infrastructure management, Internet portals, and navigation technology."

  2. A Corpus-Based Comparative Study of "Learn" and "Acquire"

    ERIC Educational Resources Information Center

    Yang, Bei

    2016-01-01

    As an important yet intricate linguistic feature in English language, synonymy poses a great challenge for second language learners. Using the 100 million-word British National Corpus (BNC) as data and the software Sketch Engine (SkE) as an analyzing tool, this article compares the usage of "learn" and "acquire" used in natural…

  3. Software Design Description for the Tidal Open-boundary Prediction System (TOPS)

    DTIC Science & Technology

    2010-05-04

    Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--10-9209 Approved for public release; distribution is unlimited. Software ...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite...RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (include area code) b. ABSTRACT c. THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design

  4. Assessing the Utility of an Event-Step ASMD Model by Analysis of Surface Combatant Shared Self-Defense

    DTIC Science & Technology

    2001-09-01

    Oriented Discrete Event Simulation,” Master’s Thesis in Operations Research, Naval Postgraduate School Monterey, CA, 1996. 12. Arntzen , A., “Software...Dependent Hit Probabilities”, Naval Research Logistics, Vol. 31, pp. 363-371, 1984. 3 Arntzen , A., “Software Components for Air Defense Planning

  5. Strategy alternatives for homeland air and cruise missile defense.

    PubMed

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  6. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 7

    DTIC Science & Technology

    2007-07-01

    away from the current Global Command and Control System family of systems, this effort will also require a significant change in both mindset and...which complicate the already significant logistic problems in austere environ- ments. Several efforts are beginning to produce rapidly deployable...currency, and applicability to keep pace with the changing environment and address significant challenges they face. Defense Information Systems Agency

  7. Experimental research control software system

    NASA Astrophysics Data System (ADS)

    Cohn, I. A.; Kovalenko, A. G.; Vystavkin, A. N.

    2014-05-01

    A software system, intended for automation of a small scale research, has been developed. The software allows one to control equipment, acquire and process data by means of simple scripts. The main purpose of that development is to increase experiment automation easiness, thus significantly reducing experimental setup automation efforts. In particular, minimal programming skills are required and supervisors have no reviewing troubles. Interactions between scripts and equipment are managed automatically, thus allowing to run multiple scripts simultaneously. Unlike well-known data acquisition commercial software systems, the control is performed by an imperative scripting language. This approach eases complex control and data acquisition algorithms implementation. A modular interface library performs interaction with external interfaces. While most widely used interfaces are already implemented, a simple framework is developed for fast implementations of new software and hardware interfaces. While the software is in continuous development with new features being implemented, it is already used in our laboratory for automation of a helium-3 cryostat control and data acquisition. The software is open source and distributed under Gnu Public License.

  8. Acquired immunologic tolerance: with particular reference to transplantation

    PubMed Central

    Starzl, Thomas E.

    2009-01-01

    The first unequivocally successful bone marrow cell transplantation in humans was recorded in 1968 by the University of Minnesota team of Robert A. Good (Gatti et al. Lancet 2: 1366–1369, 1968). This achievement was a direct extension of mouse models of acquired immunologic tolerance that were established 15 years earlier. In contrast, organ (i.e. kidney) transplantation was accomplished precociously in humans (in 1959) before demonstrating its feasibility in any experimental model and in the absence of a defensible immunologic rationale. Due to the striking differences between the outcomes with the two kinds of procedure, the mechanisms of organ engraftment were long thought to differ from the leukocyte chimerism-associated ones of bone marrow transplantation. This and other concepts of alloengraftment and acquired tolerance have changed over time. Current concepts and their clinical implications can be understood and discussed best from the perspective provided by the life and times of Bob Good. PMID:17917005

  9. Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process

    DTIC Science & Technology

    2009-07-10

    and Joint Staff; the Unified Combatant Commands ( UCCs ); the Defense Agencies; and DOD field activities. 18 If there is a conflict between DOD’s top...fair share , or more, of the military contracts there were to be won.71 Congress appeared to have been aware of issues relating to such a basic...However for this establishment to occur, there had to be a market for its products as a catalyst; this market was born when the comparatively small

  10. Toward immunogenetic studies of amphibian chytridiomycosis: Linking innate and acquired immunity

    USGS Publications Warehouse

    Richmond, J.Q.; Savage, Anna E.; Zamudio, Kelly R.; Rosenblum, E.B.

    2009-01-01

    Recent declines in amphibian diversity and abundance have contributed significantly to the global loss of biodiversity. The fungal disease chytridiomycosis is widely considered to be a primary cause of these declines, yet the critical question of why amphibian species differ in susceptibility remains unanswered. Considerable evidence links environmental conditions and interspecific variability of the innate immune system to differential infection responses, but other sources of individual, population, or species-typical variation may also be important. In this article we review the preliminary evidence supporting a role for acquired immune defenses against chytridiomycosis, and advocate for targeted investigation of genes controlling acquired responses, as well as those that functionally bridge the innate and acquired immune systems. Immunogenetic data promise to answer key questions about chytridiomycosis susceptibility and host-pathogen coevolution, and will draw much needed attention to the importance of considering evolutionary processes in amphibian conservation management and practice. ?? 2009 by American Institute of Biological Sciences.

  11. Analysis-Software for Hyperspectral Algal Reflectance Probes v. 1.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timlin, Jerilyn A.; Reichardt, Thomas A.; Jenson, Travis J.

    This software provides onsite analysis of the hyperspectral reflectance data acquired on an outdoor algal pond by a multichannel, fiber-coupled spectroradiometer. The analysis algorithm is based on numerical inversion of a reflectance model, in which the above-water reflectance is expressed as a function of the single backscattering albedo, which is dependent on the backscatter and absorption coefficients of the algal culture, which are in turn related to the algal biomass and pigment optical activity, respectively. Prior to the development of this software, while raw multichannel data were displayed in real time, analysis required a post-processing procedure to extract the relevantmore » parameters. This software provides the capability to track the temporal variation of such culture parameters in real time, as raw data are being acquired, or can be run in a post processing mode. The software allows the user to select between different algal species, incorporate the appropriate calibration data, and observe the quality of the resulting model inversions.« less

  12. Software Literacy and Student Learning in the Tertiary Environment: Powerpoint and Beyond

    ERIC Educational Resources Information Center

    Khoo, Elaine; Hight, Craig; Cowie, Bronwen; Torrens, Rob; Ferrarelli, Lisabeth

    2014-01-01

    In this paper, we explore the relationship between student success in acquiring software literacy and students' broader engagement and understanding of knowledge across different disciplines. We report on the first phase of a project that examines software literacies associated with Microsoft PowerPoint as a common software package encountered and…

  13. Extending Team Software Process (TSP) to Systems Engineering: A NAVAIR Experience Report

    DTIC Science & Technology

    2010-03-01

    instrumental in formulating the concepts and approaches presented in this report: Dan Burton, Anita Carleton, Timothy Chick, Mike Fehring, Watts Humphrey ...Senate,” GAO-04-393, Defense Acquisitions, 2004. http://www.gao.gov/new.items/d04393.pdf [ Humphrey 06] W. S . Humphrey , TSP: Leading a Development... Humphrey 08] W. S . Humphrey , “The Process Revolution,” CrossTalk The Journal of Defense Software Engineering, August 2008, Volume 28 Number 8

  14. Artificial intelligence and expert systems in-flight software testing

    NASA Technical Reports Server (NTRS)

    Demasie, M. P.; Muratore, J. F.

    1991-01-01

    The authors discuss the introduction of advanced information systems technologies such as artificial intelligence, expert systems, and advanced human-computer interfaces directly into Space Shuttle software engineering. The reconfiguration automation project (RAP) was initiated to coordinate this move towards 1990s software technology. The idea behind RAP is to automate several phases of the flight software testing procedure and to introduce AI and ES into space shuttle flight software testing. In the first phase of RAP, conventional tools to automate regression testing have already been developed or acquired. There are currently three tools in use.

  15. Training Plan. Central Archive for Reusable Defense Software (CARDS)

    DTIC Science & Technology

    1994-01-29

    Modeling Software Reuse Technology: Feature Oriented Domain Analysis ( FODA ). SEI, Carnegie Mellon University, May 1992. 8. Component Provider’s...events to the services of the domain. 4. Feature Oriented Domain Analysis ( FODA ) [COHEN92] The FODA method produces feature models. Feature models provide...Architecture FODA Feature-Oriented Domain Analysis GOTS Government-Off-The-Shelf Pap A-49 STARS-VC-B003/001/00 29 imaty 1994 MS Master of Science NEC

  16. Seven Processes that Enable NASA Software Engineering Technologies

    NASA Technical Reports Server (NTRS)

    Housch, Helen; Godfrey, Sally

    2011-01-01

    This slide presentation reviews seven processes that NASA uses to ensure that software is developed, acquired and maintained as specified in the NPR 7150.2A requirement. The requirement is to ensure that all software be appraised for the Capability Maturity Model Integration (CMMI). The enumerated processes are: (7) Product Integration, (6) Configuration Management, (5) Verification, (4) Software Assurance, (3) Measurement and Analysis, (2) Requirements Management and (1) Planning & Monitoring. Each of these is described and the group(s) that are responsible is described.

  17. Software for Simulation of Hyperspectral Images

    NASA Technical Reports Server (NTRS)

    Richtsmeier, Steven C.; Singer-Berk, Alexander; Bernstein, Lawrence S.

    2002-01-01

    A package of software generates simulated hyperspectral images for use in validating algorithms that generate estimates of Earth-surface spectral reflectance from hyperspectral images acquired by airborne and spaceborne instruments. This software is based on a direct simulation Monte Carlo approach for modeling three-dimensional atmospheric radiative transport as well as surfaces characterized by spatially inhomogeneous bidirectional reflectance distribution functions. In this approach, 'ground truth' is accurately known through input specification of surface and atmospheric properties, and it is practical to consider wide variations of these properties. The software can treat both land and ocean surfaces and the effects of finite clouds with surface shadowing. The spectral/spatial data cubes computed by use of this software can serve both as a substitute for and a supplement to field validation data.

  18. Genetic Determinism and the Innate-Acquired Distinction in Medicine

    PubMed Central

    2009-01-01

    This article illustrates in which sense genetic determinism is still part of the contemporary interactionist consensus in medicine. Three dimensions of this consensus are discussed: kinds of causes, a continuum of traits ranging from monogenetic diseases to car accidents, and different kinds of determination due to different norms of reaction. On this basis, this article explicates in which sense the interactionist consensus presupposes the innate–acquired distinction. After a descriptive Part 1, Part 2 reviews why the innate–acquired distinction is under attack in contemporary philosophy of biology. Three arguments are then presented to provide a limited and pragmatic defense of the distinction: an epistemic, a conceptual, and a historical argument. If interpreted in a certain manner, and if the pragmatic goals of prevention and treatment (ideally specifying what medicine and health care is all about) are taken into account, then the innate–acquired distinction can be a useful epistemic tool. It can help, first, to understand that genetic determination does not mean fatalism, and, second, to maintain a system of checks and balances in the continuing nature–nurture debates. PMID:20234831

  19. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 2

    DTIC Science & Technology

    2005-02-01

    Richard J. Adams , Sergio Alvarado, Suellen Eslinger, and Joanne Tagami all with The Aerospace Corporation, and Scott A. Whitmire at ODS Software...Kiczales, G., and M. Kersten . “Show Me the Structure.” Software Develop- ment Apr. 2000. Notes 1. Please note that the M1-M11 number- ing of concepts did...VA: Integrated Computer Engineering, Inc., 2 Aug. 2000 (http://www.spmn.com). 3 Adams , Richard J., Suellen Eslinger, Karen L. Owens, and Mary A. Rich

  20. Research on moving target defense based on SDN

    NASA Astrophysics Data System (ADS)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  1. Defense Acquisition Workforce: Better Identification, Development, and Oversight Needed for Personnel Involved in Acquiring Services

    DTIC Science & Technology

    2011-09-01

    suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway...maintenance or operations support for a missile range to grass cutting, and many things in between. According to the Defense Science Board, buying...may be found on the last Belva M. Martin page of this report. Staff acknowledgements are listed in appendix VII. t Director, Acquisition and

  2. CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 6. November/December 2011

    DTIC Science & Technology

    2011-11-01

    Software Development.” Software Quality Professional Journal, American Society for Quality (ASQ), (March 2010) 4-14. 3. Nair, Gopalakrishnan T.R...Inspection Performance Metric”. Software Quality Professional Journal, American Society for Quality (ASQ), Volume 13, Issue 2, (March 2011) 14-26...the discovery process and are marketed by compa- nies such as Black Duck Software, OpenLogic, Palamida, and Protecode, among others.7 A number of open

  3. Auctions in Defense Acquisition: Theory and Experimental Evidence

    DTIC Science & Technology

    2002-01-01

    Department of Defense (DoD) has recently begun purchasing with online auctions — receiving offers from suppli- ers for things ranging from computers to...equipment for U.S. Navy vessels. The Navy was the first to try online auctions for procuring airplane and ship parts. The Army’s first venture into...system. The Air Force first tested the online auction waters in Au- gust 2000 to acquire computer equipment and saved about $88,000, or 27 percent of

  4. CrossTalk. The Journal of Defense Software Engineering. Volume 13, Number 6, June 2000

    DTIC Science & Technology

    2000-06-01

    Techniques for Efficiently Generating and Testing Software This paper presents a proven process that uses advanced tools to design, develop and test... optimal software. by Keith R. Wegner Large Software Systems—Back to Basics Development methods that work on small problems seem to not scale well to...Ability Requirements for Teamwork: Implications for Human Resource Management, Journal of Management, Vol. 20, No. 2, 1994. 11. Ferguson, Pat, Watts S

  5. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 6, June 2007

    DTIC Science & Technology

    2007-06-01

    California. He has co-authored the book Software Cost Estimation With COCOMO II with Barry Boehm and others. Clark helped define the COCOMO II model...Software Engineering at the University of Southern California. She worked with Barry Boehm and Chris Abts to develop and calibrate a cost-estimation...2003/02/ schorsch.html>. 2. See “Software Engineering, A Practitioners Approach” by Roger Pressman for a good description of coupling, cohesion

  6. Improving the Agency's Software Acquisition Capability

    NASA Technical Reports Server (NTRS)

    Hankinson, Allen

    2003-01-01

    External development of software has oftc n led to unsatisfactory results and great frustration for the assurE 7ce community. Contracts frequently omit critical assuranc 4 processes or the right to oversee software development activitie: At a time when NASA depends more and more on software to in plement critical system functions, combination of three factors ex; cerbate this problem: I ) the ever-increasing trend to acquire rather than develop software in-house, 2) the trend toward performance based contracts, and 3) acquisition vehicles that only state softwar 2 requirements while leaving development standards and assur! ince methodologies up to the contractor. We propose to identify specific methods at d tools that NASA projects can use to mitigate the adverse el ects of the three problems. TWO broad classes of methoddt ols will be explored. The first will be those that provide NASA p ojects with insight and oversight into contractors' activities. The st cond will be those that help projects objectively assess, and thus i nprwe, their software acquisition capability. Of particular interest is the Software Engineering Institute's (SEI) Software Acqt isition Capability Maturity Model (SA-CMMO).

  7. Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples

    DTIC Science & Technology

    2010-04-01

    are never Software CTE candidates 19 Algorithm Example: Filters • Definitions – Filters in Signal Processing • A filter is a mathematical algorithm...Segment Segment • SOA as a CTE? – Google produced 40 million (!) hits in 0.2 sec for “SOA”. Even if we discount hits on the Society of Actuaries and

  8. Origin and functional diversification of an amphibian defense peptide arsenal.

    PubMed

    Roelants, Kim; Fry, Bryan G; Ye, Lumeng; Stijlemans, Benoit; Brys, Lea; Kok, Philippe; Clynen, Elke; Schoofs, Liliane; Cornelis, Pierre; Bossuyt, Franky

    2013-01-01

    The skin secretion of many amphibians contains an arsenal of bioactive molecules, including hormone-like peptides (HLPs) acting as defense toxins against predators, and antimicrobial peptides (AMPs) providing protection against infectious microorganisms. Several amphibian taxa seem to have independently acquired the genes to produce skin-secreted peptide arsenals, but it remains unknown how these originated from a non-defensive ancestral gene and evolved diverse defense functions against predators and pathogens. We conducted transcriptome, genome, peptidome and phylogenetic analyses to chart the full gene repertoire underlying the defense peptide arsenal of the frog Silurana tropicalis and reconstruct its evolutionary history. Our study uncovers a cluster of 13 transcriptionally active genes, together encoding up to 19 peptides, including diverse HLP homologues and AMPs. This gene cluster arose from a duplicated gastrointestinal hormone gene that attained a HLP-like defense function after major remodeling of its promoter region. Instead, new defense functions, including antimicrobial activity, arose by mutation of the precursor proteins, resulting in the proteolytic processing of secondary peptides alongside the original ones. Although gene duplication did not trigger functional innovation, it may have subsequently facilitated the convergent loss of the original function in multiple gene lineages (subfunctionalization), completing their transformation from HLP gene to AMP gene. The processing of multiple peptides from a single precursor entails a mechanism through which peptide-encoding genes may establish new functions without the need for gene duplication to avoid adaptive conflicts with older ones.

  9. Origin and Functional Diversification of an Amphibian Defense Peptide Arsenal

    PubMed Central

    Roelants, Kim; Fry, Bryan G.; Ye, Lumeng; Stijlemans, Benoit; Brys, Lea; Kok, Philippe; Clynen, Elke; Schoofs, Liliane; Cornelis, Pierre; Bossuyt, Franky

    2013-01-01

    The skin secretion of many amphibians contains an arsenal of bioactive molecules, including hormone-like peptides (HLPs) acting as defense toxins against predators, and antimicrobial peptides (AMPs) providing protection against infectious microorganisms. Several amphibian taxa seem to have independently acquired the genes to produce skin-secreted peptide arsenals, but it remains unknown how these originated from a non-defensive ancestral gene and evolved diverse defense functions against predators and pathogens. We conducted transcriptome, genome, peptidome and phylogenetic analyses to chart the full gene repertoire underlying the defense peptide arsenal of the frog Silurana tropicalis and reconstruct its evolutionary history. Our study uncovers a cluster of 13 transcriptionally active genes, together encoding up to 19 peptides, including diverse HLP homologues and AMPs. This gene cluster arose from a duplicated gastrointestinal hormone gene that attained a HLP-like defense function after major remodeling of its promoter region. Instead, new defense functions, including antimicrobial activity, arose by mutation of the precursor proteins, resulting in the proteolytic processing of secondary peptides alongside the original ones. Although gene duplication did not trigger functional innovation, it may have subsequently facilitated the convergent loss of the original function in multiple gene lineages (subfunctionalization), completing their transformation from HLP gene to AMP gene. The processing of multiple peptides from a single precursor entails a mechanism through which peptide-encoding genes may establish new functions without the need for gene duplication to avoid adaptive conflicts with older ones. PMID:23935531

  10. SARA: a software environment for the analysis of relaxation data acquired with accordion spectroscopy

    PubMed Central

    Harden, Bradley J.

    2014-01-01

    We present SARA (Software for Accordion Relaxation Analysis), an interactive and user-friendly MATLAB software environment designed for analyzing relaxation data obtained with accordion spectroscopy. Accordion spectroscopy can be used to measure nuclear magnetic resonance (NMR) relaxation rates in a fraction of the time required by traditional methods, yet data analysis can be intimidating and no unified software packages are available to assist investigators. Hence, the technique has not achieved widespread use within the NMR community. SARA offers users a selection of analysis protocols spanning those presented in the literature thus far, with modifications permitting a more general application to crowded spectra such as those of proteins. We discuss the advantages and limitations of each fitting method and suggest a protocol combining the strengths of each procedure to achieve optimal results. In the end, SARA provides an environment for facile extraction of relaxation rates and should promote routine application of accordion relaxation spectroscopy. PMID:24408364

  11. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  12. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  13. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  14. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and defense...

  15. 48 CFR 245.102 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... acquired from a small business concern or a commercial item acquired under FAR part 12 or part 8. (1) The... property. The Defense Contract Management Agency (DCMA) eTools software application is the DoD data... procedures for reporting loss of Government property to eTools are set forth in the clause at 252.245-7002...

  16. Social transmission of a host defense against cuckoo parasitism.

    PubMed

    Davies, Nicholas B; Welbergen, Justin A

    2009-06-05

    Coevolutionary arms races between brood parasites and hosts involve genetic adaptations and counter-adaptations. However, hosts sometimes acquire defenses too rapidly to reflect genetic change. Our field experiments show that observation of cuckoo (Cuculus canorus) mobbing by neighbors on adjacent territories induced reed warblers (Acrocephalus scirpaceus) to increase the mobbing of cuckoos but not of parrots (a harmless control) on their own territory. In contrast, observation of neighbors mobbing parrots had no effect on reed warblers' responses to either cuckoos or parrots. These results indicate that social learning provides a mechanism by which hosts rapidly increase their nest defense against brood parasites. Such enemy-specific social transmission enables hosts to track fine-scale spatiotemporal variation in parasitism and may influence the coevolutionary trajectories and population dynamics of brood parasites and hosts.

  17. Soft mechanical stimulation induces a defense response against Botrytis cinerea in strawberry.

    PubMed

    Tomas-Grau, Rodrigo Hernán; Requena-Serra, Fernando José; Hael-Conrad, Verónica; Martínez-Zamora, Martín Gustavo; Guerrero-Molina, María Fernanda; Díaz-Ricci, Juan Carlos

    2018-02-01

    Genes associated with plant mechanical stimulation were found in strawberry genome. A soft mechanical stimulation (SMS) induces molecular and biochemical changes in strawberry plants, conferring protection against Botrytis cinerea. Plants have the capacity to induce a defense response after exposure to abiotic stresses acquiring resistance towards pathogens. It was reported that when leaves of Arabidopsis thaliana were wounded or treated with a soft mechanical stimulation (SMS), they could resist much better the attack of the fungal pathogen Botrytis cinerea, and this effect was accompanied by an oxidative burst and the expression of touch-inducible genes (TCH). However, no further work was carried out to better characterize the induced defense response. In this paper, we report that TCH genes were identified for first time in the genomes of the strawberry species Fragaria ananassa (e.g. FaTCH2, FaTCH3, FaTCH4 and FaCML39) and Fragaria vesca (e.g. FvTCH2, FvTCH3, FvTCH4 and FvCML39). Phylogenetic studies revealed that F. ananassa TCH genes exhibited high similarity with the orthologous of F. vesca and lower with A. thaliana ones. We also present evidence that after SMS treatment on strawberry leaves, plants activate a rapid oxidative burst, callose deposition, and the up-regulation of TCH genes as well as plant defense genes such as FaPR1, FaCHI2-2, FaCAT, FaACS1 and FaOGBG-5. The latter represents the first report showing that TCH- and defense-induced genes participate in SMS-induced resistance in plants, bringing a rational explanation why plants exposed to a SMS treatment acquired an enhance resistance toward B. cinerea.

  18. Technical Basis for Evaluating Software-Related Common-Cause Failures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Muhlheim, Michael David; Wood, Richard

    2016-04-01

    The instrumentation and control (I&C) system architecture at a nuclear power plant (NPP) incorporates protections against common-cause failures (CCFs) through the use of diversity and defense-in-depth. Even for well-established analog-based I&C system designs, the potential for CCFs of multiple systems (or redundancies within a system) constitutes a credible threat to defeating the defense-in-depth provisions within the I&C system architectures. The integration of digital technologies into the I&C systems provides many advantages compared to the aging analog systems with respect to reliability, maintenance, operability, and cost effectiveness. However, maintaining the diversity and defense-in-depth for both the hardware and software within themore » digital system is challenging. In fact, the introduction of digital technologies may actually increase the potential for CCF vulnerabilities because of the introduction of undetected systematic faults. These systematic faults are defined as a “design fault located in a software component” and at a high level, are predominately the result of (1) errors in the requirement specification, (2) inadequate provisions to account for design limits (e.g., environmental stress), or (3) technical faults incorporated in the internal system (or architectural) design or implementation. Other technology-neutral CCF concerns include hardware design errors, equipment qualification deficiencies, installation or maintenance errors, instrument loop scaling and setpoint mistakes.« less

  19. Applying formal methods and object-oriented analysis to existing flight software

    NASA Technical Reports Server (NTRS)

    Cheng, Betty H. C.; Auernheimer, Brent

    1993-01-01

    Correctness is paramount for safety-critical software control systems. Critical software failures in medical radiation treatment, communications, and defense are familiar to the public. The significant quantity of software malfunctions regularly reported to the software engineering community, the laws concerning liability, and a recent NRC Aeronautics and Space Engineering Board report additionally motivate the use of error-reducing and defect detection software development techniques. The benefits of formal methods in requirements driven software development ('forward engineering') is well documented. One advantage of rigorously engineering software is that formal notations are precise, verifiable, and facilitate automated processing. This paper describes the application of formal methods to reverse engineering, where formal specifications are developed for a portion of the shuttle on-orbit digital autopilot (DAP). Three objectives of the project were to: demonstrate the use of formal methods on a shuttle application, facilitate the incorporation and validation of new requirements for the system, and verify the safety-critical properties to be exhibited by the software.

  20. Executable Behavioral Modeling of System and Software Architecture Specifications to Inform Resourcing Decisions

    DTIC Science & Technology

    2016-09-01

    BEHAVIORAL MODELING OF SYSTEM- AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS by Monica F. Farah-Stapleton...AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS 5. FUNDING NUMBERS 6. AUTHOR(S) Monica F. Farah-Stapleton 7. PERFORMING...this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB number

  1. Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0

    DTIC Science & Technology

    2008-11-05

    Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9150 Approved for public release; distribution is unlimited. Software ...collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for...THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0 Pamela G

  2. Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0

    DTIC Science & Technology

    2008-12-31

    Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9149 Approved for public release; distribution is unlimited. Software ...suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704...LIMITATION OF ABSTRACT Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0 Paul Martin, Charlie N. Barron, Lucy F

  3. Software architecture and engineering for patient records: current and future.

    PubMed

    Weng, Chunhua; Levine, Betty A; Mun, Seong K

    2009-05-01

    During the "The National Forum on the Future of the Defense Health Information System," a track focusing on "Systems Architecture and Software Engineering" included eight presenters. These presenters identified three key areas of interest in this field, which include the need for open enterprise architecture and a federated database design, net centrality based on service-oriented architecture, and the need for focus on software usability and reusability. The eight panelists provided recommendations related to the suitability of service-oriented architecture and the enabling technologies of grid computing and Web 2.0 for building health services research centers and federated data warehouses to facilitate large-scale collaborative health care and research. Finally, they discussed the need to leverage industry best practices for software engineering to facilitate rapid software development, testing, and deployment.

  4. Computer-Based Educational Software System. Final Report.

    ERIC Educational Resources Information Center

    Brandt, Richard C.; Davis, Bradley N.

    CBESS (Computer-Based Educational Software System) is a set of 22 programs addressing authoring, instructional delivery, and instructional management. The programs are divided into five groups: (1) Computer-Based Memorization System (CBMS), which helps students acquire and maintain declarative (factual) knowledge (11 programs); (2) Language Skills…

  5. Agile Software Development in Defense Acquisition: A Mission Assurance Perspective

    DTIC Science & Technology

    2012-03-23

    based information retrieval system, we might say that this program works like a hive of bees , going out for pollen and bringing it back to the hive...developers ® Six Siqma is reqistered in the U. S. Patent and Trademark Office by Motorola ^_ 33 @ AEROSPACE Major Areas in a Typical Software...requirements - Capturing and evaluating quality metrics, identifying common problem areas **» Despite its positive impact on quality, pair programming

  6. Organizational structure and operation of defense/aerospace information centers in the United States of America

    NASA Technical Reports Server (NTRS)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  7. The Gulf War's impact on ballistic missile defense systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Likourezos, G.

    1993-01-01

    During Desert Storm the United States and its allies had an overwhelming advantage over the Iraqi armed forces. Nonetheless, the Iraqis managed to strike Israel and Saudi Arabia with Scud missiles. Because of the changing political climate and the expanding transfer of technology among nations, there is great concern by the US Government about missile proliferation and the ability of any country to obtain weapons of mass destruction. The US Government tried to downplay this concern for many years until the recent events in the Middle East affirmed its seriousness. The truth is that every year countries once thought tomore » pose no international threat are acquiring biological, chemical, and nuclear weapons. Moreover, state-sponsored terrorist organizations could conceivably acquire these weapons in the future. In response to these concerns and in light of the lessons learned from the Gulf War, President George Bush in January 1991 redirected the SDI Program to concentrate on providing protection from limited ballistic missile strikes, rather than from an all-out nuclear missile attack by the Soviet Union. The Patriot air defense system, after knocking out Iraqi Scuds in the Gulf War with a near perfect record, appears for now to be the working model for the development of advanced ballistic missile defense systems - direct-kill missiles and projectiles instead of laser and particle beams. Even though the Patriot's use in Desert Storm has been argued by some to have been militarily insignificant, it has managed to change the viewpoint of many political and scientific leaders into believing that ballistic missile defense systems are needed to defend peaceful population centers and military installations from missile strikes like the ones on Israel and Saudi Arabia. 18 refs.« less

  8. The Department of Defense Chemical and Biological Defense Program: An Enabler of the Third Offset Strategy.

    PubMed

    Roos, Jason; Chue, Calvin; DiEuliis, Diane; Emanuel, Peter

    The US Department of Defense (DOD) established programs to defend against chemical and biological weapons 100 years ago because military leaders understood that the operational capability of the US military is diminished when service member health is compromised. These threats to operational readiness can be from an overt attack using chemical and biological threats but may also arise from natural exposures. In the current era of rapidly emerging technologies, adversaries are not only rediscovering chemical and biological weapons; they are also displaying an increased propensity to employ them to cause strategic instability among deployed forces or nations undergoing conflict. The United States's investments in its Chemical and Biological Defense Program (CBDP) can be a critical enabler of the third offset strategy, which is a DOD initiative that seeks to maximize force capability to offset emerging threats. To realize this vision, the CBDP must make fundamental changes in acquiring and employing effective technologies so that enemy use of chemical and biological agents against US assets is no longer a viable option. Maximization of US force health status will provide a strategic advantage over theater opponents more vulnerable to operational degradation from chemical and biological threats.

  9. Defense on the Move: Ant-Based Cyber Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less

  10. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center, atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  11. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  12. Proceedings of the Workshop on Software Engineering Foundations for End-User Programming (SEEUP 2009)

    DTIC Science & Technology

    2009-11-01

    interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a...an interesting conti- nuum between how many different requirements a program must satisfy: the more complex and diverse the requirements, the more... Gender differences in approaches to end-user software development have also been reported in debugging feature usage [1] and in end-user web programming

  13. Critical Software for Human Spaceflight

    NASA Technical Reports Server (NTRS)

    Preden, Antonio; Kaschner, Jens; Rettig, Felix; Rodriggs, Michael

    2017-01-01

    The NASA Orion vehicle that will fly to the moon in the next years is propelled along its mission by the European Service Module (ESM), developed by ESA and its prime contractor Airbus Defense and Space. This paper describes the development of the Propulsion Drive Electronics (PDE) Software that provides the interface between the propulsion hardware of the European Service Module with the Orion flight computers, and highlights the challenges that have been faced during the development. Particularly, the specific aspects relevant to Human Spaceflight in an international cooperation are presented, as the compliance to both European and US standards and the software criticality classification to the highest category A. An innovative aspect of the PDE SW is its Time- Triggered Ethernet interface with the Orion Flight Computers, which has never been flown so far on any European spacecraft. Finally the verification aspects are presented, applying the most exigent quality requirements defined in the European Cooperation for Space Standardization (ECSS) standards such as the structural coverage analysis of the object code and the recourse to an independent software verification and validation activity carried on in parallel by a different team.

  14. An assessment of space shuttle flight software development processes

    NASA Technical Reports Server (NTRS)

    1993-01-01

    In early 1991, the National Aeronautics and Space Administration's (NASA's) Office of Space Flight commissioned the Aeronautics and Space Engineering Board (ASEB) of the National Research Council (NRC) to investigate the adequacy of the current process by which NASA develops and verifies changes and updates to the Space Shuttle flight software. The Committee for Review of Oversight Mechanisms for Space Shuttle Flight Software Processes was convened in Jan. 1992 to accomplish the following tasks: (1) review the entire flight software development process from the initial requirements definition phase to final implementation, including object code build and final machine loading; (2) review and critique NASA's independent verification and validation process and mechanisms, including NASA's established software development and testing standards; (3) determine the acceptability and adequacy of the complete flight software development process, including the embedded validation and verification processes through comparison with (1) generally accepted industry practices, and (2) generally accepted Department of Defense and/or other government practices (comparing NASA's program with organizations and projects having similar volumes of software development, software maturity, complexity, criticality, lines of code, and national standards); (4) consider whether independent verification and validation should continue. An overview of the study, independent verification and validation of critical software, and the Space Shuttle flight software development process are addressed. Findings and recommendations are presented.

  15. Defense Primer: The National Defense Budget Function (050)

    DTIC Science & Technology

    2017-03-17

    in parenthesis). This defense primer addresses the National Defense Budget (050), which is frequently used to explain trends in military spending...but which also includes some activities not conducted by the Department of Defense. What Is the Purpose of the Budget Function System? The budget

  16. Modelling acquired dyslexia: a software tool for developing grapheme-phoneme correspondences.

    PubMed Central

    D'Autrechy, C. L.; Reggia, J. A.; Berndt, R. S.

    1991-01-01

    In extending a computer model of acquired dyslexia, it has become necessary to develop a way to group printed characters in a word so that the character groups essentially have a one-to-one correspondence with the word's phonemes (speech sounds). This requires deriving a set of correspondences (legal character groupings, legal associations of character groups with phonemes, etc.) that yield a single grouping or "segmentation" of characters when applied to any English word. To facilitate and partially automate this task, a segmentation program has been developed that uses an interchangeable set of correspondences. The program segments words according to these correspondences and tabulates their success over large sets of words. The program has been used successfully to segment a 20,000 word corpus, demonstrating that this approach can be used effectively and efficiently. PMID:1807611

  17. CrossTalk. The Journal of Defense Software Engineering. Volume 27, Number 2. March/April 2014

    DTIC Science & Technology

    2014-04-01

    Consequently, it is no wonder that we subconsciously and consciously expect that same level of consistency to hold in the cyber domains, though...including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum compilers. He is currently a co-PI for a DARPA-funded

  18. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  19. Ground-Based Missile Defense (National Missile Defense): Is It Feasible?

    DTIC Science & Technology

    2004-03-19

    Westview Press), 191. 47 Ibid. 192. 48 Dr. Nicholas Berry, National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia...153. 18 19 BIBLIOGRAPHY Berry, Nicholas. National Missile Defense: What Does It All Mean ? National Missile Defense: Views from Asia, Center for

  20. CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 4

    DTIC Science & Technology

    2013-07-01

    quality of most software explode into the broader consciousness . This awareness came thanks to the coincidence of the rise of universal Internet...facilitates the accomplishment of stage 4, Continuous Improvement. A quantum advance for project management is readily avail- able through the

  1. Assistant Secretary of Defense for Homeland Defense and Global Security

    Science.gov Websites

    Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland

  2. Study of the measurement of defense style using Bond's Defense Style Questionnaire.

    PubMed

    Nishimura, R

    1998-08-01

    Two hundred and seventy healthy university students were surveyed in December 1995 using Bond's Defense Style Questionnaire (DSQ) to measure the subjects' defense mechanisms. At the same time, a survey using Byrne's R-S Scale (Repression-Sensitization Scale) of the MMPI (Minnesota multiphasic personality inventory) and five psychiatric symptom indexes (anxiety, sense of inadequacy, sensitivity, depression and impulsive anger) selected from the CMI (Cornell Medical Index-Health Questionnaire) was conducted. Three factors were extracted from the DSQ through factor analysis: immature defenses, neurotic defenses, and mature defenses. The results of analysis of variance revealed the following: (i) for anxiety and anxiety related symptoms, both immature defenses and neurotic defenses indicated principal effect; (ii) for impulsive anger and depression, immature defenses presented principal effect; and (iii) for sensitivity and impulsive anger, interaction between a mature defense style and neurotic defense style was noted. The relationship between defense styles and psychiatric symptoms in healthy people is studied in this paper.

  3. Computer-Aided Process and Tools for Mobile Software Acquisition

    DTIC Science & Technology

    2013-07-30

    moldo^j= pmlkploba=obmloq=pbofbp= Computer-Aided Process and Tools for Mobile Software Acquisition 30 July 2013 LT Christopher Bonine , USN, Dr...Christopher Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense Operations Command in Norfolk, VA. He has...interests are in development and implementation of cyber security policy. Bonine has a master’s in computer science from the Naval Postgraduate School

  4. Quantification of moving target cyber defenses

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Cybenko, George

    2015-05-01

    Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential "game-changers" in an effort to increase the attacker's workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.

  5. Mining dynamic noteworthy functions in software execution sequences

    PubMed Central

    Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely. PMID:28278276

  6. Mining dynamic noteworthy functions in software execution sequences.

    PubMed

    Zhang, Bing; Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely.

  7. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  8. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 4

    DTIC Science & Technology

    2005-04-01

    older automated cost- estimating tools are no longer being actively marketed but are still in use such as CheckPoint, COCOMO, ESTIMACS, REVIC, and SPQR ...estimation tools: SPQR /20, Checkpoint, and Knowl- edgePlan. These software estimation tools pioneered the use of function point metrics for sizing and

  9. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 11

    DTIC Science & Technology

    2006-11-01

    8>. 7. Wallace, Delores R. Practical Soft- ware Reliability Modeling. Proc. of the 26th Annual NASA Goddard Software Engineering Workshop, Nov. 2001...STAR WARS TO STAR TREK To Request Back Issues on Topics Not Listed Above, Please Contact <stsc. customerservice@hill.af.mil>. About the Authors Kym

  10. Information Technology Management: DoD Organization Information Assurance Management of Information Technology Goods and Services Acquired Through Interagency Agreements

    DTIC Science & Technology

    2006-02-23

    Information Technology Management Department of Defense Office of Inspector General February 23, 2006 AccountabilityIntegrityQuality DoD...Organization Information Assurance Management of Information Technology Goods and Services Acquired Through Interagency Agreements (D-2006-052) Report...REPORT TYPE 3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management: DoD Organization Information

  11. Information Technology. DOD Needs to Strengthen Management of Its Statutorily Mandated Software and System Process Improvement Efforts

    DTIC Science & Technology

    2009-09-01

    NII)/CIO Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer CMMI Capability Maturity Model...a Web-based portal to share knowledge about software process-related methodologies, such as the SEI’s Capability Maturity Model Integration ( CMMI ...19 SEI’s IDEALSM model, and Lean Six Sigma.20 For example, the portal features content areas such as software acquisition management, the SEI CMMI

  12. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 4

    DTIC Science & Technology

    2009-06-01

    ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER...collaborate and produce quality results on a DoD project. by Dr. William R. Nichols, Anita D. Carleton, Watts S. Humphrey, and James W. Over Measuring...through both demanding software customers—and my own com- plaints during two- minute waits at the drive-thru window. Sometimes we just can- not get things

  13. Dynamic defense workshop :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-artmore » work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.« less

  14. A software communication tool for the tele-ICU.

    PubMed

    Pimintel, Denise M; Wei, Shang Heng; Odor, Alberto

    2013-01-01

    The Tele Intensive Care Unit (tele-ICU) supports a high volume, high acuity population of patients. There is a high-volume of incoming and outgoing calls, especially during the evening and night hours, through the tele-ICU hubs. The tele-ICU clinicians must be able to communicate effectively to team members in order to support the care of complex and critically ill patients while supporting and maintaining a standard to improve time to intervention. This study describes a software communication tool that will improve the time to intervention, over the paper-driven communication format presently used in the tele-ICU. The software provides a multi-relational database of message instances to mine information for evaluation and quality improvement for all entities that touch the tele-ICU. The software design incorporates years of critical care and software design experience combined with new skills acquired in an applied Health Informatics program. This software tool will function in the tele-ICU environment and perform as a front-end application that gathers, routes, and displays internal communication messages for intervention by priority and provider.

  15. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  16. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  17. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  18. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms...

  19. 22 CFR 120.44 - Foreign defense article or defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... defense service means any article or service described on the U.S. Munitions List of non-U.S. origin... U.S. and foreign origin defense articles and defense services described on the U.S. Munitions List...

  20. Software Intensive Systems Data Quality and Estimation Research in Support of Future Defense Cost Analysis

    DTIC Science & Technology

    2012-03-13

    Legacy Maintenance and Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level...NDI)-intensive systems Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This...be furnished by NDI components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software

  1. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  2. Fault Tolerant Hardware/Software Architecture for Flight Critical Function

    DTIC Science & Technology

    1985-09-01

    Applications Studies Programme. The results of AGARD work are reported to the member nations and the NATO Authorities through the AGARD series of...systems, and is being advocated as a defense against design deficiencies which can plague software. - -- -- z--mm-L ___ K A critical application area for...day of the lecture series concludes with part I of a paper on the ;use of the Ada programming language In flight critical applications . Ada has been

  3. The Company Approach to Software Engineering Project Courses

    ERIC Educational Resources Information Center

    Broman, D.; Sandahl, K.; Abu Baker, M.

    2012-01-01

    Teaching larger software engineering project courses at the end of a computing curriculum is a way for students to learn some aspects of real-world jobs in industry. Such courses, often referred to as capstone courses, are effective for learning how to apply the skills they have acquired in, for example, design, test, and configuration management.…

  4. Prophage-mediated defense against viral attack and viral counter-defense

    PubMed Central

    Dedrick, Rebekah M.; Jacobs-Sera, Deborah; Guerrero Bustamante, Carlos A.; Garlena, Rebecca A.; Mavrich, Travis N.; Pope, Welkin H.; Reyes, Juan C Cervantes; Russell, Daniel A.; Adair, Tamarah; Alvey, Richard; Bonilla, J. Alfred; Bricker, Jerald S.; Brown, Bryony R.; Byrnes, Deanna; Cresawn, Steven G.; Davis, William B.; Dickson, Leon A.; Edgington, Nicholas P.; Findley, Ann M.; Golebiewska, Urszula; Grose, Julianne H.; Hayes, Cory F.; Hughes, Lee E.; Hutchison, Keith W.; Isern, Sharon; Johnson, Allison A.; Kenna, Margaret A.; Klyczek, Karen K.; Mageeney, Catherine M.; Michael, Scott F.; Molloy, Sally D.; Montgomery, Matthew T.; Neitzel, James; Page, Shallee T.; Pizzorno, Marie C.; Poxleitner, Marianne K.; Rinehart, Claire A.; Robinson, Courtney J.; Rubin, Michael R.; Teyim, Joseph N.; Vazquez, Edwin; Ware, Vassie C.; Washington, Jacqueline; Hatfull, Graham F.

    2017-01-01

    Temperate phages are common and prophages are abundant residents of sequenced bacterial genomes. Mycobacteriophages are viruses infecting mycobacterial hosts including Mycobacterium tuberculosis and Mycobacterium smegmatis, encompass substantial genetic diversity, and are commonly temperate. Characterization of ten Cluster N temperate mycobacteriophages reveals at least five distinct prophage-expressed viral defense systems that interfere with infection of lytic and temperate phages that are either closely-related (homotypic defense) or unrelated (heterotypic defense). Target specificity is unpredictable, ranging from a single target phage to one-third of those tested. The defense systems include a single-subunit restriction system, a heterotypic exclusion system, and a predicted (p)ppGpp synthetase, which blocks lytic phage growth, promotes bacterial survival, and enables efficient lysogeny. The predicted (p)ppGpp synthetase coded by the Phrann prophage defends against phage Tweety infection, but Tweety codes for a tetrapeptide repeat protein, gp54, that acts as a highly effective counter-defense system. Prophage-mediated viral defense offers an efficient mechanism for bacterial success in host-virus dynamics, and counter-defense promotes phage co-evolution. PMID:28067906

  5. Bacterial α2-macroglobulins: colonization factors acquired by horizontal gene transfer from the metazoan genome?

    PubMed Central

    Budd, Aidan; Blandin, Stephanie; Levashina, Elena A; Gibson, Toby J

    2004-01-01

    Background Invasive bacteria are known to have captured and adapted eukaryotic host genes. They also readily acquire colonizing genes from other bacteria by horizontal gene transfer. Closely related species such as Helicobacter pylori and Helicobacter hepaticus, which exploit different host tissues, share almost none of their colonization genes. The protease inhibitor α2-macroglobulin provides a major metazoan defense against invasive bacteria, trapping attacking proteases required by parasites for successful invasion. Results Database searches with metazoan α2-macroglobulin sequences revealed homologous sequences in bacterial proteomes. The bacterial α2-macroglobulin phylogenetic distribution is patchy and violates the vertical descent model. Bacterial α2-macroglobulin genes are found in diverse clades, including purple bacteria (proteobacteria), fusobacteria, spirochetes, bacteroidetes, deinococcids, cyanobacteria, planctomycetes and thermotogae. Most bacterial species with bacterial α2-macroglobulin genes exploit higher eukaryotes (multicellular plants and animals) as hosts. Both pathogenically invasive and saprophytically colonizing species possess bacterial α2-macroglobulins, indicating that bacterial α2-macroglobulin is a colonization rather than a virulence factor. Conclusions Metazoan α2-macroglobulins inhibit proteases of pathogens. The bacterial homologs may function in reverse to block host antimicrobial defenses. α2-macroglobulin was probably acquired one or more times from metazoan hosts and has then spread widely through other colonizing bacterial species by more than 10 independent horizontal gene transfers. yfhM-like bacterial α2-macroglobulin genes are often found tightly linked with pbpC, encoding an atypical peptidoglycan transglycosylase, PBP1C, that does not function in vegetative peptidoglycan synthesis. We suggest that YfhM and PBP1C are coupled together as a periplasmic defense and repair system. Bacterial α2-macroglobulins might

  6. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  7. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10

    DTIC Science & Technology

    2005-10-01

    1: Disciplines Contributing to Software Assurance When a natural disaster strikes, a cor-poration normally places a disaster recovery plan into effect...survivability, and contrasts survivability with the traditional disaster recovery and business continuity disciplines . A system survivability design...specialty engi- neering disciplines and their requirements. These disciplines include availability, reliabil- ity, maintainability, and accountability as

  8. RTSPM: real-time Linux control software for scanning probe microscopy.

    PubMed

    Chandrasekhar, V; Mehta, M M

    2013-01-01

    Real time computer control is an essential feature of scanning probe microscopes, which have become important tools for the characterization and investigation of nanometer scale samples. Most commercial (and some open-source) scanning probe data acquisition software uses digital signal processors to handle the real time data processing and control, which adds to the expense and complexity of the control software. We describe here scan control software that uses a single computer and a data acquisition card to acquire scan data. The computer runs an open-source real time Linux kernel, which permits fast acquisition and control while maintaining a responsive graphical user interface. Images from a simulated tuning-fork based microscope as well as a standard topographical sample are also presented, showing some of the capabilities of the software.

  9. CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 3. May/June 2014

    DTIC Science & Technology

    2014-06-01

    field of software engineering. by Delores M. Etter, Jennifer Webb, and John Howard The Problem of Prolific Process What is the optimal amount and...Programming Will Never Be Obsolete The creativity of software developers will always be needed to solve problems of the future and to then translate those...utilized to address some of the complex problems associated with biometric database construction. 1. A Next Generation Multispectral Iris Biometric

  10. CrossTalk. The Journal of Defense Software Engineering. Volume 23, Number 6, Nov/Dec 2010

    DTIC Science & Technology

    2010-11-01

    Model of archi- tectural design. It guides developers to apply effort to their software architecture commensurate with the risks faced by...Driven Model is the promotion of risk to prominence. It is possible to apply the Risk-Driven Model to essentially any software development process...succeed without any planned architecture work, while many high-risk projects would fail without it . The Risk-Driven Model walks a middle path

  11. gr-MRI: A software package for magnetic resonance imaging using software defined radios

    NASA Astrophysics Data System (ADS)

    Hasselwander, Christopher J.; Cao, Zhipeng; Grissom, William A.

    2016-09-01

    The goal of this work is to develop software that enables the rapid implementation of custom MRI spectrometers using commercially-available software defined radios (SDRs). The developed gr-MRI software package comprises a set of Python scripts, flowgraphs, and signal generation and recording blocks for GNU Radio, an open-source SDR software package that is widely used in communications research. gr-MRI implements basic event sequencing functionality, and tools for system calibrations, multi-radio synchronization, and MR signal processing and image reconstruction. It includes four pulse sequences: a single-pulse sequence to record free induction signals, a gradient-recalled echo imaging sequence, a spin echo imaging sequence, and an inversion recovery spin echo imaging sequence. The sequences were used to perform phantom imaging scans with a 0.5 Tesla tabletop MRI scanner and two commercially-available SDRs. One SDR was used for RF excitation and reception, and the other for gradient pulse generation. The total SDR hardware cost was approximately 2000. The frequency of radio desynchronization events and the frequency with which the software recovered from those events was also measured, and the SDR's ability to generate frequency-swept RF waveforms was validated and compared to the scanner's commercial spectrometer. The spin echo images geometrically matched those acquired using the commercial spectrometer, with no unexpected distortions. Desynchronization events were more likely to occur at the very beginning of an imaging scan, but were nearly eliminated if the user invoked the sequence for a short period before beginning data recording. The SDR produced a 500 kHz bandwidth frequency-swept pulse with high fidelity, while the commercial spectrometer produced a waveform with large frequency spike errors. In conclusion, the developed gr-MRI software can be used to develop high-fidelity, low-cost custom MRI spectrometers using commercially-available SDRs.

  12. gr-MRI: A software package for magnetic resonance imaging using software defined radios.

    PubMed

    Hasselwander, Christopher J; Cao, Zhipeng; Grissom, William A

    2016-09-01

    The goal of this work is to develop software that enables the rapid implementation of custom MRI spectrometers using commercially-available software defined radios (SDRs). The developed gr-MRI software package comprises a set of Python scripts, flowgraphs, and signal generation and recording blocks for GNU Radio, an open-source SDR software package that is widely used in communications research. gr-MRI implements basic event sequencing functionality, and tools for system calibrations, multi-radio synchronization, and MR signal processing and image reconstruction. It includes four pulse sequences: a single-pulse sequence to record free induction signals, a gradient-recalled echo imaging sequence, a spin echo imaging sequence, and an inversion recovery spin echo imaging sequence. The sequences were used to perform phantom imaging scans with a 0.5Tesla tabletop MRI scanner and two commercially-available SDRs. One SDR was used for RF excitation and reception, and the other for gradient pulse generation. The total SDR hardware cost was approximately $2000. The frequency of radio desynchronization events and the frequency with which the software recovered from those events was also measured, and the SDR's ability to generate frequency-swept RF waveforms was validated and compared to the scanner's commercial spectrometer. The spin echo images geometrically matched those acquired using the commercial spectrometer, with no unexpected distortions. Desynchronization events were more likely to occur at the very beginning of an imaging scan, but were nearly eliminated if the user invoked the sequence for a short period before beginning data recording. The SDR produced a 500kHz bandwidth frequency-swept pulse with high fidelity, while the commercial spectrometer produced a waveform with large frequency spike errors. In conclusion, the developed gr-MRI software can be used to develop high-fidelity, low-cost custom MRI spectrometers using commercially-available SDRs. Copyright

  13. Optimal defense theory explains deviations from latitudinal herbivory defense hypothesis.

    PubMed

    Kooyers, Nicholas J; Blackman, Benjamin K; Holeski, Liza M

    2017-04-01

    The latitudinal herbivory defense hypothesis (LHDH) postulates that the prevalence of species interactions, including herbivory, is greater at lower latitudes, leading to selection for increased levels of plant defense. While latitudinal defense clines may be caused by spatial variation in herbivore pressure, optimal defense theory predicts that clines could also be caused by ecogeographic variation in the cost of defense. For instance, allocation of resources to defense may not increase plant fitness when growing seasons are short and plants must reproduce quickly. Here we use a common garden experiment to survey genetic variation for constitutive and induced phenylpropanoid glycoside (PPG) concentrations across 35 Mimulus guttatus populations over a ~13° latitudinal transect. Our sampling regime is unique among studies of the LHDH in that it allows us to disentangle the effects of growing season length from those of latitude, temperature, and elevation. For five of the seven PPGs surveyed, we find associations between latitude and plant defense that are robust to population structure. However, contrary to the LHDH, only two PPGs were found at higher levels in low latitude populations, and total PPG concentrations were higher at higher latitudes. PPG levels are strongly correlated with growing season length, with higher levels of PPGs in plants from areas with longer growing seasons. Further, flowering time is positively correlated with the concentration of nearly all PPGs, suggesting that there may be a strong trade-off between development time and defense production. Our results reveal that ecogeographic patterns in plant defense may reflect variation in the cost of producing defense compounds in addition to variation in herbivore pressure. Thus, the biogeographic pattern predicted by the LHDH may not be accurate because the underlying factors driving variation in defense, in this case, growing season length, are not always associated with latitude in the same

  14. Integrated fiducial sample mount and software for correlated microscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timothy R McJunkin; Jill R. Scott; Tammy L. Trowbridge

    2014-02-01

    A novel design sample mount with integrated fiducials and software for assisting operators in easily and efficiently locating points of interest established in previous analytical sessions is described. The sample holder and software were evaluated with experiments to demonstrate the utility and ease of finding the same points of interest in two different microscopy instruments. Also, numerical analysis of expected errors in determining the same position with errors unbiased by a human operator was performed. Based on the results, issues related to acquiring reproducibility and best practices for using the sample mount and software were identified. Overall, the sample mountmore » methodology allows data to be efficiently and easily collected on different instruments for the same sample location.« less

  15. Ballistic missile defense effectiveness

    NASA Astrophysics Data System (ADS)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  16. The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation

    PubMed Central

    Hanington, Patrick C.; Zhang, Si-Ming

    2010-01-01

    In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081

  17. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  18. Cost Reporting Elements and Activity Cost Tradeoffs for Defense System Software. Volume I. Study Results.

    DTIC Science & Technology

    1977-05-01

    C31) programs; (4) simulator/ trainer programs ; and (5) automatic test equipment software. Each of these five types of software represents a problem...coded in the same source language, say JOVIAL, then source—language statements would be a better measure, since that would automatically compensate...whether done at no (visible) cost or by renegotiation of the contract. Fig. 2.3 illustrates these with solid lines. It is conjec- tured that the change

  19. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    PubMed

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  20. Biotechnology software in the digital age: are you winning?

    PubMed

    Scheitz, Cornelia Johanna Franziska; Peck, Lawrence J; Groban, Eli S

    2018-01-16

    There is a digital revolution taking place and biotechnology companies are slow to adapt. Many pharmaceutical, biotechnology, and industrial bio-production companies believe that software must be developed and maintained in-house and that data are more secure on internal servers than on the cloud. In fact, most companies in this space continue to employ large IT and software teams and acquire computational infrastructure in the form of in-house servers. This is due to a fear of the cloud not sufficiently protecting in-house resources and the belief that their software is valuable IP. Over the next decade, the ability to quickly adapt to changing market conditions, with agile software teams, will quickly become a compelling competitive advantage. Biotechnology companies that do not adopt the new regime may lose on key business metrics such as return on invested capital, revenue, profitability, and eventually market share.

  1. Defense without aggression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, H.

    1988-09-01

    In introducing this group of articles on nonoffensive defense the author notes that the prospect of nuclear disarmament in Europe is boosting ideas, which have been around for a decade, from theory to politics. This special section of articles looks at an emerging theory that may reduce reliance on nuclear weapons by bringing stability to the conventional standoff in central Europe. The idea is to rearrange conventional forces so that they can defend but not attack. Under such monikers as nonoffensive defense (the main term used in these articles), nonprovocative defense, defensive defense, reasonable sufficiency, and mutual defensive superiority, thesemore » proposals suggest that nations can restructure weapons, personnel, and strategy to assure their own military security without posing a threat to other nations. 5 refs.« less

  2. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    DTIC Science & Technology

    2016-04-28

    Page 1 GAO- 16 -339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense...Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century , the Department of Defense (DOD) has been...81, § 232 (a) (2011). 2 GAO- 16 -339R Ballistic Missile Defense baselines, we analyzed the testing goals for selected elements, which are

  3. Software-assisted small bowel motility analysis using free-breathing MRI: feasibility study.

    PubMed

    Bickelhaupt, Sebastian; Froehlich, Johannes M; Cattin, Roger; Raible, Stephan; Bouquet, Hanspeter; Bill, Urs; Patak, Michael A

    2014-01-01

    To validate a software prototype allowing for small bowel motility analysis in free breathing by comparing it to manual measurements. In all, 25 patients (15 male, 10 female; mean age 39 years) were included in this Institutional Review Board-approved, retrospective study. Magnetic resonance imaging (MRI) was performed on a 1.5T system after standardized preparation acquiring motility sequences in free breathing over 69-84 seconds. Small bowel motility was analyzed manually and with the software. Functional parameters, measurement time, and reproducibility were compared using the coefficient of variance and paired Student's t-test. Correlation was analyzed using Pearson's correlation coefficient and linear regression. The 25 segments were analyzed twice both by hand and using the software with automatic breathing correction. All assessed parameters significantly correlated between the methods (P < 0.01), but the scattering of repeated measurements was significantly (P < 0.01) lower using the software (3.90%, standard deviation [SD] ± 5.69) than manual examinations (9.77%, SD ± 11.08). The time needed was significantly less (P < 0.001) with the software (4.52 minutes, SD ± 1.58) compared to manual measurement, lasting 17.48 minutes for manual (SD ± 1.75 minutes). The use of the software proves reliable and faster small bowel motility measurements in free-breathing MRI compared to manual analyses. The new technique allows for analyses of prolonged sequences acquired in free breathing, improving the informative value of the examinations by amplifying the evaluable data. Copyright © 2013 Wiley Periodicals, Inc.

  4. Physiological and molecular mechanism of defense in cotton against Verticillium dahliae.

    PubMed

    Shaban, Muhammad; Miao, Yuhuan; Ullah, Abid; Khan, Anam Qadir; Menghwar, Hakim; Khan, Aamir Hamid; Ahmed, Muhammad Mahmood; Tabassum, Muhammad Adnan; Zhu, Longfu

    2018-04-01

    Cotton, a natural fiber producing crop of huge importance for textile industry, has been reckoned as the backbone in the economy of many developing countries. Verticillium wilt caused by Verticillium dahliae reflected as the most devastating disease of cotton crop in several parts of the world. Average losses due to attack of this disease are tremendous every year. There is urgent need to develop strategies for effective control of this disease. In the last decade, progress has been made to understand the interaction between cotton-V. dahliae and several growth and pathogenicity related genes were identified. Still, most of the molecular components and mechanisms of cotton defense against Verticillium wilt are poorly understood. However, from existing knowledge, it is perceived that cotton defense mechanism primarily depends on the pre-formed defense structures including thick cuticle, synthesis of phenolic compounds and delaying or hindering the expansion of the invader through advanced measures such as reinforcement of cell wall structure, accumulation of reactive oxygen species (ROS), release of phytoalexins, the hypersensitive response and the development of broad spectrum resistance named as, systemic acquired resistance (SAR). Investigation of these defense tactics provide valuable information about the improvement of cotton breeding strategies for the development of durable, cost effective, and broad spectrum resistant varieties. Consequently, this management approach will help to reduce the use of fungicides and also minimize other environmental hazards. In the present paper, we summarized the V. dahliae virulence mechanism and comprehensively discussed the cotton molecular mechanisms of defense such as physiological, biochemical responses with the addition of signaling pathways that are implicated towards attaining resistance against Verticillium wilt. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  5. A two-dimensional neuropsychology of defense: fear/anxiety and defensive distance.

    PubMed

    McNaughton, Neil; Corr, Philip J

    2004-05-01

    We present in this paper a picture of the neural systems controlling defense that updates and simplifies Gray's "Neuropsychology of Anxiety". It is based on two behavioural dimensions: 'defensive distance' as defined by the Blanchards and 'defensive direction'. Defensive direction is a categorical dimension with avoidance of threat corresponding to fear and approach to threat corresponding to anxiety. These two psychological dimensions are mapped to underlying neural dimensions. Defensive distance is mapped to neural level, with the shortest defensive distances involving the lowest neural level (periaqueductal grey) and the largest defensive distances the highest neural level (prefrontal cortex). Defensive direction is mapped to separate parallel streams that run across these levels. A significant departure from prior models is the proposal that both fear and anxiety are represented at all levels. The theory is presented in a simplified form that does not incorporate the interactions that must occur between non-adjacent levels of the system. It also requires expansion to include the dimension of escapability of threat. Our current development and these proposed future extensions do not change the core concepts originally proposed by Gray and, we argue, demonstrate their enduring value.

  6. Space station software reliability analysis based on failures observed during testing at the multisystem integration facility

    NASA Technical Reports Server (NTRS)

    Tamayo, Tak Chai

    1987-01-01

    Quality of software not only is vital to the successful operation of the space station, it is also an important factor in establishing testing requirements, time needed for software verification and integration as well as launching schedules for the space station. Defense of management decisions can be greatly strengthened by combining engineering judgments with statistical analysis. Unlike hardware, software has the characteristics of no wearout and costly redundancies, thus making traditional statistical analysis not suitable in evaluating reliability of software. A statistical model was developed to provide a representation of the number as well as types of failures occur during software testing and verification. From this model, quantitative measure of software reliability based on failure history during testing are derived. Criteria to terminate testing based on reliability objectives and methods to estimate the expected number of fixings required are also presented.

  7. VLBI Analysis with the Multi-Technique Software GEOSAT

    NASA Technical Reports Server (NTRS)

    Kierulf, Halfdan Pascal; Andersen, Per-Helge; Boeckmann, Sarah; Kristiansen, Oddgeir

    2010-01-01

    GEOSAT is a multi-technique geodetic analysis software developed at Forsvarets Forsknings Institutt (Norwegian defense research establishment). The Norwegian Mapping Authority has now installed the software and has, together with Forsvarets Forsknings Institutt, adapted the software to deliver datum-free normal equation systems in SINEX format. The goal is to be accepted as an IVS Associate Analysis Center and to provide contributions to the IVS EOP combination on a routine basis. GEOSAT is based on an upper diagonal factorized Kalman filter which allows estimation of time variable parameters like the troposphere and clocks as stochastic parameters. The tropospheric delays in various directions are mapped to tropospheric zenith delay using ray-tracing. Meteorological data from ECMWF with a resolution of six hours is used to perform the ray-tracing which depends both on elevation and azimuth. Other models are following the IERS and IVS conventions. The Norwegian Mapping Authority has submitted test SINEX files produced with GEOSAT to IVS. The results have been compared with the existing IVS combined products. In this paper the outcome of these comparisons is presented.

  8. An Empirical Verification of a-priori Learning Models on Mailing Archives in the Context of Online Learning Activities of Participants in Free\\Libre Open Source Software (FLOSS) Communities

    ERIC Educational Resources Information Center

    Mukala, Patrick; Cerone, Antonio; Turini, Franco

    2017-01-01

    Free\\Libre Open Source Software (FLOSS) environments are increasingly dubbed as learning environments where practical software engineering skills can be acquired. Numerous studies have extensively investigated how knowledge is acquired in these environments through a collaborative learning model that define a learning process. Such a learning…

  9. CASS—CFEL-ASG software suite

    NASA Astrophysics Data System (ADS)

    Foucar, Lutz; Barty, Anton; Coppola, Nicola; Hartmann, Robert; Holl, Peter; Hoppe, Uwe; Kassemeyer, Stephan; Kimmel, Nils; Küpper, Jochen; Scholz, Mirko; Techert, Simone; White, Thomas A.; Strüder, Lothar; Ullrich, Joachim

    2012-10-01

    The Max Planck Advanced Study Group (ASG) at the Center for Free Electron Laser Science (CFEL) has created the CFEL-ASG Software Suite CASS to view, process and analyse multi-parameter experimental data acquired at Free Electron Lasers (FELs) using the CFEL-ASG Multi Purpose (CAMP) instrument Strüder et al. (2010) [6]. The software is based on a modular design so that it can be adjusted to accommodate the needs of all the various experiments that are conducted with the CAMP instrument. In fact, this allows the use of the software in all experiments where multiple detectors are involved. One of the key aspects of CASS is that it can be used either 'on-line', using a live data stream from the free-electron laser facility's data acquisition system to guide the experiment, and 'off-line', on data acquired from a previous experiment which has been saved to file. Program summary Program title: CASS Catalogue identifier: AEMP_v1_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEMP_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public Licence, version 3 No. of lines in distributed program, including test data, etc.: 167073 No. of bytes in distributed program, including test data, etc.: 1065056 Distribution format: tar.gz Programming language: C++. Computer: Intel x86-64. Operating system: GNU/Linux (for information about restrictions see outlook). RAM: >8 GB Classification: 2.3, 3, 15, 16.4. External routines: Qt-Framework[1], SOAP[2], (optional HDF5[3], VIGRA[4], ROOT[5], QWT[6]) Nature of problem: Analysis and visualisation of scientific data acquired at Free-Electron-Lasers Solution method: Generalise data access and storage so that a variety of small programming pieces can be linked to form a complex analysis chain. Unusual features: Complex analysis chains can be built without recompiling the program Additional comments: An updated extensive documentation of CASS is available

  10. Section 847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors

    DTIC Science & Technology

    2016-03-31

    847 Requirements for Senior Defense Officials Seeking Employment with Defense Contractors M A R C H 3 1 , 2 0 1 6 Report No. DODIG-2016-070...Senior Defense Officials Seeking Employment with Defense Contractors Visit us at www.dodig.mil March 31, 2016 Objectives The objectives of our project...description of future duties from a Defense contractor . • Some ethics officials issued nonspecific post-Government employment guidance as a Section 847

  11. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 6

    DTIC Science & Technology

    2006-06-01

    improvement methods. The total volume of projects studied now exceeds 12,000. Software Productivity Research, LLC Phone: (877) 570-5459 (973) 273-5829...While performing quality con- sulting, Olson has helped organizations measurably improve quality and productivity , save millions of dollars in costs of...This article draws parallels between the outrageous events on the Jerry Springer Show and problems faced by process improvement programs. by Paul

  12. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR). VISAR may help law enforcement agencies catch criminals by improving the quality of video recorded at crime scenes. In this photograph, the single frame at left, taken at night, was brightened in order to enhance details and reduce noise or snow. To further overcome the video defects in one frame, Law enforcement officials can use VISAR software to add information from multiple frames to reveal a person. Images from less than a second of videotape were added together to create the clarified image at right. VISAR stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. VISAR could also have applications in medical and meteorological imaging. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. The software can be used for defense application by improving recornaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  13. Teaching Psychological Defense Mechanisms: "The Defense Mechanisms Game."

    ERIC Educational Resources Information Center

    Waugh, Charles G.

    1980-01-01

    Presents the rules for an educational game in which students reinforce psychology lecture material by creating and dramatizing defense mechanisms such as reaction formation, displacement, and fantasy. Provides definitions and examples of the various defense mechanisms that can be portrayed. (JP)

  14. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 9

    DTIC Science & Technology

    2006-09-01

    it does. Several freely down- loadable methodologies have emerged to support the developer in modeling threats to applications and other soft...SECURIS. Model -Driven Develop - ment and Analysis of Secure Information Systems <www.sintef.no/ content/page1_1824.aspx>. 10. The SECURIS Project ...By applying these methods to the SDLC , we can actively reduce the number of known vulnerabilities in software as it is developed . For

  15. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  16. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  17. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  18. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  19. Defense Human Resources Activity > PERSEREC

    Science.gov Websites

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  20. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  1. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense...

  2. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 6

    DTIC Science & Technology

    2005-06-01

    Bollinger The MITRE Corporation1 Progress brings new dangers: Powerful home computers, inexpensive high-speed Internet access, telecommuting , and software...been using for years. Sure enough, GIANT was able to finish removing the hard - core spyware. At some point, my Internet security package had been... The sad truth is that if you do nothing more than attach a Windows PC to the Internet over a high- speed line, it will be subjected to the first

  3. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2

    DTIC Science & Technology

    2012-04-01

    attacks is expanding to engulf the compact world of smartphones . by Aditya K. Sood and Richard J. Enbody A Practical Approach to Securing and Managing...provide a vulnerable entry point to our mobile device informa- tion systems. As a result, hackers are able to quickly exploit software on smartphones ...MOBILE WORLD 4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones . This paper

  4. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 8

    DTIC Science & Technology

    2008-08-01

    effort. No one ever replaced the dirty string and no one washed the cup ... The BASE -1 system came up on time, under budget, and exceeded all operating...the base where he worked was written, maintained, and com- pletely understood by one individual. Unfortunately, that individual was in a bad car ...sponsor: Software Engineering and System Assurance. USN co- sponsor: Naval Air Systems Command. USAF co- sponsors: Oklahoma City-Air Logistics Center

  5. Contracting for Agile Software Development in the Department of Defense: An Introduction

    DTIC Science & Technology

    2015-08-01

    Requirements are fixed at a more granular level; reviews of the work product happen more frequently and assess each individual increment rather than a “ big bang ...boundaries than “ big - bang ” development. The implementation of incremental or progressive reviews enables just that—any issues identified at the time of the...the contract needs to support the delivery of deployable software at defined increments/intervals, rather than incentivizing “ big - bang ” efforts or

  6. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  7. Control of Citrus Huanglongbing via Trunk Injection of Plant Defense Activators and Antibiotics.

    PubMed

    Hu, J; Jiang, J; Wang, N

    2018-02-01

    Citrus huanglongbing (HLB) or greening is a devastating disease of citrus worldwide and no effective control measure is currently available. Plant defense activators environmentally friendly compounds capable of inducing resistance against many plant pathogens. Earlier studies showed that foliar spray of plant defense inducers could slow down HLB disease progress. In this study, eight plant defense activators and three antibiotics were evaluated in three field trials for their effect to control HLB by trunk injection of young and mature sweet orange trees. Results showed that four trunk injections of several activators, including salicylic acid, oxalic acid, acibenzolar-S-methyl, and potassium phosphate, provided significant control of HLB by suppressing 'Candidatus Liberibacter asiaticus' titer and disease progress. Trunk injection of penicillin, streptomycin, and oxytetracycline hydrochloride resulted in excellent control of HLB. In general, antibiotics were more effective in reduction of 'Ca. L. asiaticus' titer and HLB symptom expressions than plant defense activators. These treatments also resulted in increased yield and better fruit quality. Injection of both salicylic acid and acibenzolar-S-methyl led to significant induction of pathogenesis-related (PR) genes PR-1 and PR-2 genes. Meanwhile, injection of either potassium phosphate or oxalic acid resulted in significant induction of PR-2 or PR-15 gene expression, respectively. These results suggested that HLB diseased trees remained inducible for systemic acquired resistance under field conditions. In summary, this study presents information regarding controlling HLB via trunk injection of plant defense activators and antibiotics, which helps citrus growers in decision making regarding developing an effective HLB management program.

  8. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  9. A bridge role metric model for nodes in software networks.

    PubMed

    Li, Bo; Feng, Yanli; Ge, Shiyu; Li, Dashe

    2014-01-01

    A bridge role metric model is put forward in this paper. Compared with previous metric models, our solution of a large-scale object-oriented software system as a complex network is inherently more realistic. To acquire nodes and links in an undirected network, a new model that presents the crucial connectivity of a module or the hub instead of only centrality as in previous metric models is presented. Two previous metric models are described for comparison. In addition, it is obvious that the fitting curve between the Bre results and degrees can well be fitted by a power law. The model represents many realistic characteristics of actual software structures, and a hydropower simulation system is taken as an example. This paper makes additional contributions to an accurate understanding of module design of software systems and is expected to be beneficial to software engineering practices.

  10. A Bridge Role Metric Model for Nodes in Software Networks

    PubMed Central

    Li, Bo; Feng, Yanli; Ge, Shiyu; Li, Dashe

    2014-01-01

    A bridge role metric model is put forward in this paper. Compared with previous metric models, our solution of a large-scale object-oriented software system as a complex network is inherently more realistic. To acquire nodes and links in an undirected network, a new model that presents the crucial connectivity of a module or the hub instead of only centrality as in previous metric models is presented. Two previous metric models are described for comparison. In addition, it is obvious that the fitting curve between the results and degrees can well be fitted by a power law. The model represents many realistic characteristics of actual software structures, and a hydropower simulation system is taken as an example. This paper makes additional contributions to an accurate understanding of module design of software systems and is expected to be beneficial to software engineering practices. PMID:25364938

  11. MNE Scan: Software for real-time processing of electrophysiological data.

    PubMed

    Esch, Lorenz; Sun, Limin; Klüber, Viktor; Lew, Seok; Baumgarten, Daniel; Grant, P Ellen; Okada, Yoshio; Haueisen, Jens; Hämäläinen, Matti S; Dinh, Christoph

    2018-06-01

    Magnetoencephalography (MEG) and Electroencephalography (EEG) are noninvasive techniques to study the electrophysiological activity of the human brain. Thus, they are well suited for real-time monitoring and analysis of neuronal activity. Real-time MEG/EEG data processing allows adjustment of the stimuli to the subject's responses for optimizing the acquired information especially by providing dynamically changing displays to enable neurofeedback. We introduce MNE Scan, an acquisition and real-time analysis software based on the multipurpose software library MNE-CPP. MNE Scan allows the development and application of acquisition and novel real-time processing methods in both research and clinical studies. The MNE Scan development follows a strict software engineering process to enable approvals required for clinical software. We tested the performance of MNE Scan in several device-independent use cases, including, a clinical epilepsy study, real-time source estimation, and Brain Computer Interface (BCI) application. Compared to existing tools we propose a modular software considering clinical software requirements expected by certification authorities. At the same time the software is extendable and freely accessible. We conclude that MNE Scan is the first step in creating a device-independent open-source software to facilitate the transition from basic neuroscience research to both applied sciences and clinical applications. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  13. Defense.gov - Special Report

    Science.gov Websites

    FORUM - U.S. Defense Secretary Robert M. Gates addresses the audience as Canadian Minister of National issues that Defense Secretary Robert M. Gates and Canadian Defense Minister Peter MacKay discussed during a bilateral meeting here today. Story | Transcript U.S., Canadian Defense Chiefs Answer Afghanistan

  14. Commensal microbes provide first line defense against Listeria monocytogenes infection

    PubMed Central

    Littmann, Eric R.; Kim, Sohn G.; Morjaria, Sejal M.; Ling, Lilan; Gyaltshen, Yangtsho; Taur, Ying; Leiner, Ingrid M.

    2017-01-01

    Listeria monocytogenes is a foodborne pathogen that causes septicemia, meningitis and chorioamnionitis and is associated with high mortality. Immunocompetent humans and animals, however, can tolerate high doses of L. monocytogenes without developing systemic disease. The intestinal microbiota provides colonization resistance against many orally acquired pathogens, and antibiotic-mediated depletion of the microbiota reduces host resistance to infection. Here we show that a diverse microbiota markedly reduces Listeria monocytogenes colonization of the gut lumen and prevents systemic dissemination. Antibiotic administration to mice before low dose oral inoculation increases L. monocytogenes growth in the intestine. In immunodeficient or chemotherapy-treated mice, the intestinal microbiota provides nonredundant defense against lethal, disseminated infection. We have assembled a consortium of commensal bacteria belonging to the Clostridiales order, which exerts in vitro antilisterial activity and confers in vivo resistance upon transfer into germ free mice. Thus, we demonstrate a defensive role of the gut microbiota against Listeria monocytogenes infection and identify intestinal commensal species that, by enhancing resistance against this pathogen, represent potential probiotics. PMID:28588016

  15. A Proven Methodology for Developing Secure Software and Applying It to Ground Systems

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2016-01-01

    Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?

  16. A multicenter study benchmarks software tools for label-free proteome quantification.

    PubMed

    Navarro, Pedro; Kuharev, Jörg; Gillet, Ludovic C; Bernhardt, Oliver M; MacLean, Brendan; Röst, Hannes L; Tate, Stephen A; Tsou, Chih-Chiang; Reiter, Lukas; Distler, Ute; Rosenberger, George; Perez-Riverol, Yasset; Nesvizhskii, Alexey I; Aebersold, Ruedi; Tenzer, Stefan

    2016-11-01

    Consistent and accurate quantification of proteins by mass spectrometry (MS)-based proteomics depends on the performance of instruments, acquisition methods and data analysis software. In collaboration with the software developers, we evaluated OpenSWATH, SWATH 2.0, Skyline, Spectronaut and DIA-Umpire, five of the most widely used software methods for processing data from sequential window acquisition of all theoretical fragment-ion spectra (SWATH)-MS, which uses data-independent acquisition (DIA) for label-free protein quantification. We analyzed high-complexity test data sets from hybrid proteome samples of defined quantitative composition acquired on two different MS instruments using different SWATH isolation-window setups. For consistent evaluation, we developed LFQbench, an R package, to calculate metrics of precision and accuracy in label-free quantitative MS and report the identification performance, robustness and specificity of each software tool. Our reference data sets enabled developers to improve their software tools. After optimization, all tools provided highly convergent identification and reliable quantification performance, underscoring their robustness for label-free quantitative proteomics.

  17. Interleukin-1 and cutaneous inflammation: a crucial link between innate and acquired immunity.

    PubMed

    Murphy, J E; Robert, C; Kupper, T S

    2000-03-01

    As our primary interface with the environment, the skin is constantly subjected to injury and invasion by pathogens. The fundamental force driving the evolution of the immune system has been the need to protect the host against overwhelming infection. The ability of T and B cells to recombine antigen receptor genes during development provides an efficient, flexible, and powerful immune system with nearly unlimited specificity for antigen. The capacity to expand subsets of antigen-specific lymphocytes that become activated by environmental antigens (memory response) is termed "acquired" immunity. Immunologic memory, although a fundamental aspect of mammalian biology, is a relatively recent evolutionary event that permits organisms to live for years to decades. "Innate" immunity, mediated by genes that remain in germ line conformation and encode for proteins that recognize conserved structural patterns on microorganisms, is a much more ancient system of host defense. Defensins and other antimicrobial peptides, complement and opsonins, and endocytic receptors are all considered components of the innate immune system. None of these, however, are signal-transducing receptors. Most recently, a large family of cell surface receptors that mediate signaling through the NF-kappaB transcription factor has been identified. This family of proteins shares striking homology with plant and Drosophila genes that mediate innate immunity. In mammals, this family includes the type I interleukin-1 receptor, the interleukin-18 receptor, and a growing family of Toll-like receptors, two of which were recently identified as signal-transducing receptors for bacterial endotoxin. In this review, we discuss how interleukin-1 links the innate and acquired immune systems to provide synergistic host defense activities in skin.

  18. Acquired pendular nystagmus

    PubMed Central

    Kang, Sarah; Shaikh, Aasef G.

    2017-01-01

    Acquired pendular nystagmus is comprised of quasi-sinusoidal oscillations of the eyes significantly affecting gaze holding and clarity of vision. The most common causes of acquired pendular nystagmus include demyelinating disorders such as multiple sclerosis and the syndrome of ocular palatal tremor. However, several other deficits, such as pharmacological intoxication, metabolic and genetic disorders, and granulomatous disorders can lead to syndromes mimicking acquired pendular nystagmus. Study of the kinematic features of acquired pendular nystagmus has suggested a putative pathophysiology of an otherwise mysterious neurological disorder. Here we review clinical features of neurological deficits that co-occur with acquired pendular nystagmus. Subsequent discussion of the pathophysiology of individual forms of pendular nystagmus speculates on mechanisms of the underlying disease while providing insights into pharmacotherapy of nystagmus. PMID:28320194

  19. Archiving Software Systems: Approaches to Preserve Computational Capabilities

    NASA Astrophysics Data System (ADS)

    King, T. A.

    2014-12-01

    A great deal of effort is made to preserve scientific data. Not only because data is knowledge, but it is often costly to acquire and is sometimes collected under unique circumstances. Another part of the science enterprise is the development of software to process and analyze the data. Developed software is also a large investment and worthy of preservation. However, the long term preservation of software presents some challenges. Software often requires a specific technology stack to operate. This can include software, operating systems and hardware dependencies. One past approach to preserve computational capabilities is to maintain ancient hardware long past its typical viability. On an archive horizon of 100 years, this is not feasible. Another approach to preserve computational capabilities is to archive source code. While this can preserve details of the implementation and algorithms, it may not be possible to reproduce the technology stack needed to compile and run the resulting applications. This future forward dilemma has a solution. Technology used to create clouds and process big data can also be used to archive and preserve computational capabilities. We explore how basic hardware, virtual machines, containers and appropriate metadata can be used to preserve computational capabilities and to archive functional software systems. In conjunction with data archives, this provides scientist with both the data and capability to reproduce the processing and analysis used to generate past scientific results.

  20. Differences in microbiological profile between community-acquired, healthcare-associated and hospital-acquired infections.

    PubMed

    Cardoso, Teresa; Ribeiro, Orquídea; Aragão, Irene; Costa-Pereira, Altamiro; Sarmento, António

    2013-01-01

    Microbiological profiles were analysed and compared for intra-abdominal, urinary, respiratory and bloodstream infections according to place of acquisition: community-acquired, with a separate analysis of healthcare-associated, and hospital-acquired. Prospective cohort study performed at a university tertiary care hospital over 1 year. Inclusion criteria were meeting the Centers for Disease Control definition of intra-abdominal, urinary, respiratory and bloodstream infections. A total of 1035 patients were included in the study. More than 25% of intra-abdominal infections were polymicrobial; multi-drug resistant gram-negatives were 38% in community-acquired, 50% in healthcare-associated and 57% in hospital-acquired. E. coli was the most prevalent among urinary infections: 69% in community-acquired, 56% in healthcare-associated and 26% in hospital-acquired; ESBL producers' pathogens were 10% in healthcare-associated and 3% in community-acquired and hospital-acquired. In respiratory infections Streptococcus pneumoniae was the most prevalent in community-acquired (54%) and MRSA in healthcare-associated (24%) and hospital-acquired (24%). A significant association was found between MRSA respiratory infection and hospitalization in the previous year (adjusted OR = 6.3), previous instrumentation (adjusted OR = 4.3) and previous antibiotic therapy (adjusted OR = 5.7); no cases were documented among patients without risk factors. Hospital mortality rate was 10% in community-acquired, 14% in healthcare-associated and 19% in hospital-acquired infection. This study shows that healthcare-associated has a different microbiologic profile than those from community or hospital acquired for the four main focus of infection. Knowledge of this fact is important because the existing guidelines for community-acquired are not entirely applicable for this group of patients.

  1. 75 FR 32639 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... elements of the Department of Homeland Security concerned with the analysis of intelligence information... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG67 Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...

  2. Acquired pendular nystagmus.

    PubMed

    Kang, Sarah; Shaikh, Aasef G

    2017-04-15

    Acquired pendular nystagmus is comprised of quasi-sinusoidal oscillations of the eyes significantly affecting gaze holding and clarity of vision. The most common causes of acquired pendular nystagmus include demyelinating disorders such as multiple sclerosis and the syndrome of ocular palatal tremor. However, several other deficits, such as pharmacological intoxication, metabolic and genetic disorders, and granulomatous disorders can lead to syndromes mimicking acquired pendular nystagmus. Study of the kinematic features of acquired pendular nystagmus has suggested a putative pathophysiology of an otherwise mysterious neurological disorder. Here we review clinical features of neurological deficits that co-occur with acquired pendular nystagmus. Subsequent discussion of the pathophysiology of individual forms of pendular nystagmus speculates on mechanisms of the underlying disease while providing insights into pharmacotherapy of nystagmus. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Pipecolic acid, an endogenous mediator of defense amplification and priming, is a critical regulator of inducible plant immunity.

    PubMed

    Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen

    2012-12-01

    Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid-induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR.

  4. Software for Generating Troposphere Corrections for InSAR Using GPS and Weather Model Data

    NASA Technical Reports Server (NTRS)

    Moore, Angelyn W.; Webb, Frank H.; Fishbein, Evan F.; Fielding, Eric J.; Owen, Susan E.; Granger, Stephanie L.; Bjoerndahl, Fredrik; Loefgren, Johan; Fang, Peng; Means, James D.; hide

    2013-01-01

    Atmospheric errors due to the troposphere are a limiting error source for spaceborne interferometric synthetic aperture radar (InSAR) imaging. This software generates tropospheric delay maps that can be used to correct atmospheric artifacts in InSAR data. The software automatically acquires all needed GPS (Global Positioning System), weather, and Digital Elevation Map data, and generates a tropospheric correction map using a novel algorithm for combining GPS and weather information while accounting for terrain. Existing JPL software was prototypical in nature, required a MATLAB license, required additional steps to acquire and ingest needed GPS and weather data, and did not account for topography in interpolation. Previous software did not achieve a level of automation suitable for integration in a Web portal. This software overcomes these issues. GPS estimates of tropospheric delay are a source of corrections that can be used to form correction maps to be applied to InSAR data, but the spacing of GPS stations is insufficient to remove short-wavelength tropospheric artifacts. This software combines interpolated GPS delay with weather model precipitable water vapor (PWV) and a digital elevation model to account for terrain, increasing the spatial resolution of the tropospheric correction maps and thus removing short wavelength tropospheric artifacts to a greater extent. It will be integrated into a Web portal request system, allowing use in a future L-band SAR Earth radar mission data system. This will be a significant contribution to its technology readiness, building on existing investments in in situ space geodetic networks, and improving timeliness, quality, and science value of the collected data

  5. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board of Visitors AGENCY: Department of Defense (DoD). ACTION... (5 U.S.C. 552b, as amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it...

  6. Parallel-Processing Software for Creating Mosaic Images

    NASA Technical Reports Server (NTRS)

    Klimeck, Gerhard; Deen, Robert; McCauley, Michael; DeJong, Eric

    2008-01-01

    A computer program implements parallel processing for nearly real-time creation of panoramic mosaics of images of terrain acquired by video cameras on an exploratory robotic vehicle (e.g., a Mars rover). Because the original images are typically acquired at various camera positions and orientations, it is necessary to warp the images into the reference frame of the mosaic before stitching them together to create the mosaic. [Also see "Parallel-Processing Software for Correlating Stereo Images," Software Supplement to NASA Tech Briefs, Vol. 31, No. 9 (September 2007) page 26.] The warping algorithm in this computer program reflects the considerations that (1) for every pixel in the desired final mosaic, a good corresponding point must be found in one or more of the original images and (2) for this purpose, one needs a good mathematical model of the cameras and a good correlation of individual pixels with respect to their positions in three dimensions. The desired mosaic is divided into slices, each of which is assigned to one of a number of central processing units (CPUs) operating simultaneously. The results from the CPUs are gathered and placed into the final mosaic. The time taken to create the mosaic depends upon the number of CPUs, the speed of each CPU, and whether a local or a remote data-staging mechanism is used.

  7. Systemic Acquired Resistance and Salicylic Acid: Past, Present and Future.

    PubMed

    Klessig, Daniel F; Choi, Hyong Woo; Dempsey, D'Maris Amick

    2018-05-21

    Salicylic acid (SA) is a critical plant hormone that regulates numerous aspects of plant growth and development, as well as the activation of defenses against biotic and abiotic stress. Here we present a historical overview of the progress that has been made to date in elucidating SA's role in signaling plant immune responses. The ability of plants to develop acquired immunity after pathogen infection was first proposed in 1933. However, most of our knowledge about plant immune signaling was generated over the last three decades, following the discovery that SA is an endogenous defense signal. During this time-frame, researchers have identified i) two pathways through which SA can be synthesized, ii) numerous proteins that regulate SA synthesis and metabolism, and iii) some of the signaling components that function downstream of SA, including a large number of SA targets/receptors. In addition, it has become increasingly evident that SA does not signal immune responses by itself, but rather as part of an intricate network that involves many other plant hormones. Future efforts to develop a comprehensive understanding of SA-mediated immune signaling will therefore need to close knowledge gaps that exist within the SA pathway itself, as well as clarify how crosstalk among the different hormone signaling pathways leads to an immune response that is both robust and optimized for maximal efficacy, depending on identity of the attacking pathogen.

  8. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... Sunshine Act of 1976 (5 U.S.C. 552b), and 41 CFR 102- 3.65, the Department of Defense announces that it is...

  9. 77 FR 30361 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaty With the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-22

    ... DEPARTMENT OF DEFENSE Defense Acquisitions Regulations System 48 CFR Parts 225 and 252 RIN 0750... United Kingdom (DFARS 2012-D034) AGENCY: Defense Acquisition Regulations System; Department of Defense... Acquisition Regulations System, Attn: (Insert case manager's name), OUSD (AT&L) DPAP/DARS, Room 3B855, 3060...

  10. A portable low-cost 3D point cloud acquiring method based on structure light

    NASA Astrophysics Data System (ADS)

    Gui, Li; Zheng, Shunyi; Huang, Xia; Zhao, Like; Ma, Hao; Ge, Chao; Tang, Qiuxia

    2018-03-01

    A fast and low-cost method of acquiring 3D point cloud data is proposed in this paper, which can solve the problems of lack of texture information and low efficiency of acquiring point cloud data with only one pair of cheap cameras and projector. Firstly, we put forward a scene adaptive design method of random encoding pattern, that is, a coding pattern is projected onto the target surface in order to form texture information, which is favorable for image matching. Subsequently, we design an efficient dense matching algorithm that fits the projected texture. After the optimization of global algorithm and multi-kernel parallel development with the fusion of hardware and software, a fast acquisition system of point-cloud data is accomplished. Through the evaluation of point cloud accuracy, the results show that point cloud acquired by the method proposed in this paper has higher precision. What`s more, the scanning speed meets the demand of dynamic occasion and has better practical application value.

  11. Use of Writing with Symbols 2000 Software to Facilitate Emergent Literacy Development

    ERIC Educational Resources Information Center

    Parette, Howard P.; Boeckmann, Nichole M.; Hourcade, Jack J.

    2008-01-01

    This paper outlines the use of the "Writing with Symbols 2000" software to facilitate emergent literacy development. The program's use of pictures incorporated with text has great potential to help young children with and without disabilities acquire fundamental literacy concepts about print, phonemic awareness, alphabetic principle, vocabulary…

  12. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  13. Ada Implementation Guide. Software Engineering With Ada. Volume 1

    DTIC Science & Technology

    1994-04-01

    Staff, Department ofDefense Dictionary of Military and Associated Terms, Washington, D.C., 1989. STARS McDonal , C., and S . Redwine, *STARS Glossary: A...ADýA28 357> offj I Volume I I SI I t Ada Implementation II Guide 5 Software Engineering With AdaI I S DTIC QUALITY INSPECTED S 5 April 1994 g " 94...and Abbreviations ...................... I I N p a S I I I i I Libt of F4g u OW Tahl Figures 2-1 DON Directives and Instructions for Implementing Public

  14. An Ontology and a Software Framework for Competency Modeling and Management

    ERIC Educational Resources Information Center

    Paquette, Gilbert

    2007-01-01

    The importance given to competency management is well justified. Acquiring new competencies is the central goal of any education or knowledge management process. Thus, it must be embedded in any software framework as an instructional engineering tool, to inform the runtime environment of the knowledge that is processed by actors, and their…

  15. Neisseria gonorrhoeae Modulates Iron-Limiting Innate Immune Defenses in Macrophages

    PubMed Central

    Zughaier, Susu M.; Kandler, Justin L.; Shafer, William M.

    2014-01-01

    Neisseria gonorrhoeae is a strict human pathogen that causes the sexually transmitted infection termed gonorrhea. The gonococcus can survive extracellularly and intracellularly, but in both environments the bacteria must acquire iron from host proteins for survival. However, upon infection the host uses a defensive response by limiting the bioavailability of iron by a number of mechanisms including the enhanced expression of hepcidin, the master iron-regulating hormone, which reduces iron uptake from the gut and retains iron in macrophages. The host also secretes the antibacterial protein NGAL, which sequesters bacterial siderophores and therefore inhibits bacterial growth. To learn whether intracellular gonococci can subvert this defensive response, we examined expression of host genes that encode proteins involved in modulating levels of intracellular iron. We found that N. gonorrhoeae can survive in association (tightly adherent and intracellular) with monocytes and macrophages and upregulates a panel of its iron-responsive genes in this environment. We also found that gonococcal infection of human monocytes or murine macrophages resulted in the upregulation of hepcidin, NGAL, and NRAMP1 as well as downregulation of the expression of the gene encoding the short chain 3-hydroxybutyrate dehydrogenase (BDH2); BDH2 catalyzes the production of the mammalian siderophore 2,5-DHBA involved in chelating and detoxifying iron. Based on these findings, we propose that N. gonorrhoeae can subvert the iron-limiting innate immune defenses to facilitate iron acquisition and intracellular survival. PMID:24489950

  16. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  17. Evolution of RNA- and DNA-guided antivirus defense systems in prokaryotes and eukaryotes: common ancestry vs convergence.

    PubMed

    Koonin, Eugene V

    2017-02-10

    Complementarity between nucleic acid molecules is central to biological information transfer processes. Apart from the basal processes of replication, transcription and translation, complementarity is also employed by multiple defense and regulatory systems. All cellular life forms possess defense systems against viruses and mobile genetic elements, and in most of them some of the defense mechanisms involve small guide RNAs or DNAs that recognize parasite genomes and trigger their inactivation. The nucleic acid-guided defense systems include prokaryotic Argonaute (pAgo)-centered innate immunity and CRISPR-Cas adaptive immunity as well as diverse branches of RNA interference (RNAi) in eukaryotes. The archaeal pAgo machinery is the direct ancestor of eukaryotic RNAi that, however, acquired additional components, such as Dicer, and enormously diversified through multiple duplications. In contrast, eukaryotes lack any heritage of the CRISPR-Cas systems, conceivably, due to the cellular toxicity of some Cas proteins that would get activated as a result of operon disruption in eukaryotes. The adaptive immunity function in eukaryotes is taken over partly by the PIWI RNA branch of RNAi and partly by protein-based immunity. In this review, I briefly discuss the interplay between homology and analogy in the evolution of RNA- and DNA-guided immunity, and attempt to formulate some general evolutionary principles for this ancient class of defense systems. This article was reviewed by Mikhail Gelfand and Bojan Zagrovic.

  18. Dead bacteria reverse antibiotic-induced host defense impairment in burns.

    PubMed

    Chen, Lee-Wei; Chen, Pei-Hsuan; Fung, Chang-Phone; Hsu, Ching-Mei

    2014-10-01

    Burn patients can incur high rates of hospital-acquired infections. The mechanism of antibiotic exposure on inducing infection vulnerability has not been determined. This study aimed to examine the effects of antibiotic treatment on host defense mechanisms. First we treated C57/BL6 mice with combined antibiotic treatment after 30% to 35% total body surface area burn. Animals were sacrificed at 48 hours after sham or thermal injury treatment. Bacterial counts in intestinal lumen and mucosa were measured. Next, we treated animals with or without oral dead Escherichia coli or Staphylococcus aureus supplementation to stimulate Toll-like receptor in the intestinal mucosa. Toll-like receptor 4, antibacterial protein expression, nuclear factor (NF)-κB DNA-binding activity, and bacteria-killing activity in the intestinal mucosa; intestinal permeability; bacterial translocation to mesenteric lymph nodes; Klebsiella pneumoniae translocation; interleukin-6 in the blood; and phagocytic activity of alveolar macrophages, were assessed. Thermal injury increased microflora and NF-κB DNA-binding activity of the intestine. Systemic antibiotic treatment decreased gut microflora and increased bacterial translocation to mesenteric lymph nodes, intestinal permeability, and interleukin-6 levels in the blood. Antibiotic treatment also decreased bacteria-killing activity in intestinal mucosa and phagocytic activity of alveolar macrophages. Oral dead E coli and S aureus supplementation induced NF-κB DNA-binding activity, Toll-like receptor 4, and antibacterial protein expression of the intestinal mucosa. Taken together with the fact that dead bacteria reversed antibiotic-induced K pneumoniae translocation and intestinal and pulmonary defense impairment, we conclude that combined antibiotic treatment results in systemic host defense impairment in burns through the decrease in intestinal flora. We suggest that dead bacteria supplementation could induce nondefensin protein expression and

  19. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  20. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...

  1. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...

  2. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...

  3. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND... Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired. If...

  4. RT 6 - Software Intensive Systems Data Quality and Estimation Research in Support of Future Defense Cost Analysis

    DTIC Science & Technology

    2012-03-13

    Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level 6.7 References 7...Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This chapter summarizes each...components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software-intensive systems have

  5. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    PubMed Central

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  6. Evolving software reengineering technology for the emerging innovative-competitive era

    NASA Technical Reports Server (NTRS)

    Hwang, Phillip Q.; Lock, Evan; Prywes, Noah

    1994-01-01

    This paper reports on a multi-tool commercial/military environment combining software Domain Analysis techniques with Reusable Software and Reengineering of Legacy Software. It is based on the development of a military version for the Department of Defense (DOD). The integrated tools in the military version are: Software Specification Assistant (SSA) and Software Reengineering Environment (SRE), developed by Computer Command and Control Company (CCCC) for Naval Surface Warfare Center (NSWC) and Joint Logistics Commanders (JLC), and the Advanced Research Project Agency (ARPA) STARS Software Engineering Environment (SEE) developed by Boeing for NAVAIR PMA 205. The paper describes transitioning these integrated tools to commercial use. There is a critical need for the transition for the following reasons: First, to date, 70 percent of programmers' time is applied to software maintenance. The work of these users has not been facilitated by existing tools. The addition of Software Reengineering will also facilitate software maintenance and upgrading. In fact, the integrated tools will support the entire software life cycle. Second, the integrated tools are essential to Business Process Reengineering, which seeks radical process innovations to achieve breakthrough results. Done well, process reengineering delivers extraordinary gains in process speed, productivity and profitability. Most importantly, it discovers new opportunities for products and services in collaboration with other organizations. Legacy computer software must be changed rapidly to support innovative business processes. The integrated tools will provide commercial organizations important competitive advantages. This, in turn, will increase employment by creating new business opportunities. Third, the integrated system will produce much higher quality software than use of the tools separately. The reason for this is that producing or upgrading software requires keen understanding of extremely complex

  7. Technical Reviews and Audits for Systems, Equipment and Computer Software. Volume 1

    DTIC Science & Technology

    2009-09-15

    acquisitions and technology developments. 2. This new-issue SMC standard comprises the text of The Aerospace Corporation report number TOR-2007( 8583 )-6414...TRA) Deskbook – DUSD(S&T) (May 2005) 17. IMP & IMS Preparation and Use Guide Version 0.9 (21 October 2005) 18. ISO /IEC STD 15939 Software...1521B, TOR-2007( 8583 )-6414_Volume 1. 110.2 Purpose A. The guidelines contained herein implement the Department of Defense Directive 4120.21

  8. DoD Related Software Technology Requirements, Practices, and Prospects for the Future

    DTIC Science & Technology

    1984-06-01

    SOFIWARE REQUIREMENTS DEFINITION 61 G. DESIGN 63 H. CODING 66 I. INTEGRATION 68 "J. TESTING AND EVALUATION 69 K. CONFIGURATION CONTROL 72 "L. SOFTWARE... integrated functionality. It must be able to operate perfectly after prolonged periods of dormancy in hostile environments and when portions of the system have...aircraft to middle- eastern trouble spots. Although these examples are just highlights of defense systems, they are representative of the integral nature

  9. Multifunctional Role of 35 Kilodalton Hyaluronan in Promoting Defense of the Intestinal Epithelium.

    PubMed

    Kessler, Sean P; Obery, Dana R; Nickerson, Kourtney P; Petrey, Aaron C; McDonald, Christine; de la Motte, Carol A

    2018-04-01

    Intestinal epithelium plays a critical role in host defense against orally acquired pathogens. Dysregulation of this protective barrier is a primary driver of inflammatory bowel diseases (Crohn's and ulcerative colitis) and also infant gastrointestinal infections. Previously, our lab reported that hyaluronan (HA) isolated from human milk induces the expression of the antimicrobial peptide β-defensin in vivo and protects against Salmonella Typhimurium infection of epithelial cells in vitro. In addition, we demonstrated that commercially available 35 kDa size HA induces the expression of β-defensin, upregulates the expression of tight junction protein zonula occludens-1 (ZO-1), and attenuates murine Citrobacter rodentium infection in vivo. In this current study, we report that HA35 remains largely intact and biologically active during transit through the digestive tract where it directly induces β-defensin expression upon epithelial cell contact. We also demonstrate HA35 abrogation of murine Salmonella Typhimurium infection as well as downregulation of leaky tight junction protein claudin-2 expression. Taken together, we propose a dual role for HA in host innate immune defense at the epithelial cell surface, acting to induce antimicrobial peptide production and also block pathogen-induced leaky gut. HA35 is therefore a promising therapeutic in the defense against bacterially induced colitis in compromised adults and vulnerable newborns.

  10. An experiment in software reliability: Additional analyses using data from automated replications

    NASA Technical Reports Server (NTRS)

    Dunham, Janet R.; Lauterbach, Linda A.

    1988-01-01

    A study undertaken to collect software error data of laboratory quality for use in the development of credible methods for predicting the reliability of software used in life-critical applications is summarized. The software error data reported were acquired through automated repetitive run testing of three independent implementations of a launch interceptor condition module of a radar tracking problem. The results are based on 100 test applications to accumulate a sufficient sample size for error rate estimation. The data collected is used to confirm the results of two Boeing studies reported in NASA-CR-165836 Software Reliability: Repetitive Run Experimentation and Modeling, and NASA-CR-172378 Software Reliability: Additional Investigations into Modeling With Replicated Experiments, respectively. That is, the results confirm the log-linear pattern of software error rates and reject the hypothesis of equal error rates per individual fault. This rejection casts doubt on the assumption that the program's failure rate is a constant multiple of the number of residual bugs; an assumption which underlies some of the current models of software reliability. data raises new questions concerning the phenomenon of interacting faults.

  11. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... December 16, 2013 Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  12. Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense

    DTIC Science & Technology

    2016-12-08

    in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully

  13. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 219 and Appendix I to Chapter 2 RIN 0750-AH59 Defense Federal Acquisition Regulation Supplement; Extension of the Department of... Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is issuing this final rule...

  14. Ability of the bed bug (Hemiptera: Cimicidae) defensive secretions (E)-2-hexenal and (E)-2-octenal to attract adult bed bugs

    USDA-ARS?s Scientific Manuscript database

    Accurate and timely surveillance of bed bug infestations is critical for development of effective control strategies. While the bed bug produced volatiles (E)-2-hexenal and (E)-2-octenal are considered defensive secretions, through use of EthoVision® video-tracking software we demonstrate that low ...

  15. System Software Framework for System of Systems Avionics

    NASA Technical Reports Server (NTRS)

    Ferguson, Roscoe C.; Peterson, Benjamin L; Thompson, Hiram C.

    2005-01-01

    Project Constellation implements NASA's vision for space exploration to expand human presence in our solar system. The engineering focus of this project is developing a system of systems architecture. This architecture allows for the incremental development of the overall program. Systems can be built and connected in a "Lego style" manner to generate configurations supporting various mission objectives. The development of the avionics or control systems of such a massive project will result in concurrent engineering. Also, each system will have software and the need to communicate with other (possibly heterogeneous) systems. Fortunately, this design problem has already been solved during the creation and evolution of systems such as the Internet and the Department of Defense's successful effort to standardize distributed simulation (now IEEE 1516). The solution relies on the use of a standard layered software framework and a communication protocol. A standard framework and communication protocol is suggested for the development and maintenance of Project Constellation systems. The ARINC 653 standard is a great start for such a common software framework. This paper proposes a common system software framework that uses the Real Time Publish/Subscribe protocol for framework-to-framework communication to extend ARINC 653. It is highly recommended that such a framework be established before development. This is important for the success of concurrent engineering. The framework provides an infrastructure for general system services and is designed for flexibility to support a spiral development effort.

  16. A Roadmap for HEP Software and Computing R&D for the 2020s

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alves, Antonio Augusto, Jr; et al.

    Particle physics has an ambitious and broad experimental programme for the coming decades. This programme requires large investments in detector hardware, either to build new facilities and experiments, or to upgrade existing ones. Similarly, it requires commensurate investment in the R&D of software to acquire, manage, process, and analyse the shear amounts of data to be recorded. In planning for the HL-LHC in particular, it is critical that all of the collaborating stakeholders agree on the software goals and priorities, and that the efforts complement each other. In this spirit, this white paper describes the R&D activities required to preparemore » for this software upgrade.« less

  17. Defense Contract Management Agency

    Science.gov Websites

    , May 24. Click the photo above for more information. Members of the Defense Contract Management Agency for more information. Members of the Defense Contract Management Agency International Region conduct Skip to main content (Press Enter). Toggle navigation Defense Contract Management Agency Search

  18. Recognizing Plant Defense Priming.

    PubMed

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. 3 CFR - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export... Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act Memorandum for the...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense...

  20. Dilemmas of Japanese Defense.

    ERIC Educational Resources Information Center

    Kiyoshi, Nasu

    1978-01-01

    Traces Japan's attitude toward and preparation for national defense from the 1930s to 1978. Topics discussed include Japan's indifference to defense since World War II, America's responsibility to defend Japan in case of military attack, the possibility of a Soviet attack on Japan, and public opinion about defense in Japan. Journal availability:…

  1. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  2. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  3. 76 FR 9680 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-22

    ... Subjects in 48 CFR Part 217 Government procurement. Mary Overstreet, Editor, Defense Acquisition... Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...: Final rule. SUMMARY: DoD is adopting without change an interim rule amending the Defense Federal...

  4. In-group defense, out-group aggression, and coordination failures in intergroup conflict.

    PubMed

    De Dreu, Carsten K W; Gross, Jörg; Méder, Zsombor; Giffin, Michael; Prochazkova, Eliska; Krikeb, Jonathan; Columbus, Simon

    2016-09-20

    Intergroup conflict persists when and because individuals make costly contributions to their group's fighting capacity, but how groups organize contributions into effective collective action remains poorly understood. Here we distinguish between contributions aimed at subordinating out-groups (out-group aggression) from those aimed at defending the in-group against possible out-group aggression (in-group defense). We conducted two experiments in which three-person aggressor groups confronted three-person defender groups in a multiround contest game (n = 276; 92 aggressor-defender contests). Individuals received an endowment from which they could contribute to their group's fighting capacity. Contributions were always wasted, but when the aggressor group's fighting capacity exceeded that of the defender group, the aggressor group acquired the defender group's remaining resources (otherwise, individuals on both sides were left with the remainders of their endowment). In-group defense appeared stronger and better coordinated than out-group aggression, and defender groups survived roughly 70% of the attacks. This low success rate for aggressor groups mirrored that of group-hunting predators such as wolves and chimpanzees (n = 1,382 cases), hostile takeovers in industry (n = 1,637 cases), and interstate conflicts (n = 2,586). Furthermore, whereas peer punishment increased out-group aggression more than in-group defense without affecting success rates (Exp. 1), sequential (vs. simultaneous) decision-making increased coordination of collective action for out-group aggression, doubling the aggressor's success rate (Exp. 2). The relatively high success rate of in-group defense suggests evolutionary and cultural pressures may have favored capacities for cooperation and coordination when the group goal is to defend, rather than to expand, dominate, and exploit.

  5. In-group defense, out-group aggression, and coordination failures in intergroup conflict

    PubMed Central

    De Dreu, Carsten K. W.; Méder, Zsombor; Giffin, Michael; Prochazkova, Eliska; Krikeb, Jonathan

    2016-01-01

    Intergroup conflict persists when and because individuals make costly contributions to their group’s fighting capacity, but how groups organize contributions into effective collective action remains poorly understood. Here we distinguish between contributions aimed at subordinating out-groups (out-group aggression) from those aimed at defending the in-group against possible out-group aggression (in-group defense). We conducted two experiments in which three-person aggressor groups confronted three-person defender groups in a multiround contest game (n = 276; 92 aggressor–defender contests). Individuals received an endowment from which they could contribute to their group’s fighting capacity. Contributions were always wasted, but when the aggressor group’s fighting capacity exceeded that of the defender group, the aggressor group acquired the defender group’s remaining resources (otherwise, individuals on both sides were left with the remainders of their endowment). In-group defense appeared stronger and better coordinated than out-group aggression, and defender groups survived roughly 70% of the attacks. This low success rate for aggressor groups mirrored that of group-hunting predators such as wolves and chimpanzees (n = 1,382 cases), hostile takeovers in industry (n = 1,637 cases), and interstate conflicts (n = 2,586). Furthermore, whereas peer punishment increased out-group aggression more than in-group defense without affecting success rates (Exp. 1), sequential (vs. simultaneous) decision-making increased coordination of collective action for out-group aggression, doubling the aggressor’s success rate (Exp. 2). The relatively high success rate of in-group defense suggests evolutionary and cultural pressures may have favored capacities for cooperation and coordination when the group goal is to defend, rather than to expand, dominate, and exploit. PMID:27601640

  6. Helicobacter pylori Persistence: an Overview of Interactions between H. pylori and Host Immune Defenses

    PubMed Central

    Algood, Holly M. Scott; Cover, Timothy L.

    2006-01-01

    Helicobacter pylori is a gram-negative bacterium that persistently colonizes more than half of the global human population. In order to successfully colonize the human stomach, H. pylori must initially overcome multiple innate host defenses. Remarkably, H. pylori can persistently colonize the stomach for decades or an entire lifetime despite development of an acquired immune response. This review focuses on the immune response to H. pylori and the mechanisms by which H. pylori resists immune clearance. Three main sections of the review are devoted to (i) analysis of the immune response to H. pylori in humans, (ii) analysis of interactions of H. pylori with host immune defenses in animal models, and (iii) interactions of H. pylori with immune cells in vitro. The topics addressed in this review are important for understanding how H. pylori resists immune clearance and also are relevant for understanding the pathogenesis of diseases caused by H. pylori (peptic ulcer disease, gastric adenocarcinoma, and gastric lymphoma). PMID:17041136

  7. Empowering self-defense training.

    PubMed

    Thompson, Martha E

    2014-03-01

    The purpose of self-defense training is to expand people's options, yet it is often framed as a solely physical, and limiting, response to violence. I draw on my own experience as a self-defense instructor and that of others in the self-defense movement to argue that an empowerment approach to self-defense training contributes to the anti-violence movement in multiple ways: providing a pathway to increase women's and girls' safety and their potential for becoming powerful and effective social change agents right now, providing an informed and embodied understanding of violence, and offering comprehensive options to recognize, prevent, and interrupt violence.

  8. A multi-center study benchmarks software tools for label-free proteome quantification

    PubMed Central

    Gillet, Ludovic C; Bernhardt, Oliver M.; MacLean, Brendan; Röst, Hannes L.; Tate, Stephen A.; Tsou, Chih-Chiang; Reiter, Lukas; Distler, Ute; Rosenberger, George; Perez-Riverol, Yasset; Nesvizhskii, Alexey I.; Aebersold, Ruedi; Tenzer, Stefan

    2016-01-01

    The consistent and accurate quantification of proteins by mass spectrometry (MS)-based proteomics depends on the performance of instruments, acquisition methods and data analysis software. In collaboration with the software developers, we evaluated OpenSWATH, SWATH2.0, Skyline, Spectronaut and DIA-Umpire, five of the most widely used software methods for processing data from SWATH-MS (sequential window acquisition of all theoretical fragment ion spectra), a method that uses data-independent acquisition (DIA) for label-free protein quantification. We analyzed high-complexity test datasets from hybrid proteome samples of defined quantitative composition acquired on two different MS instruments using different SWATH isolation windows setups. For consistent evaluation we developed LFQbench, an R-package to calculate metrics of precision and accuracy in label-free quantitative MS, and report the identification performance, robustness and specificity of each software tool. Our reference datasets enabled developers to improve their software tools. After optimization, all tools provided highly convergent identification and reliable quantification performance, underscoring their robustness for label-free quantitative proteomics. PMID:27701404

  9. Pipecolic Acid, an Endogenous Mediator of Defense Amplification and Priming, Is a Critical Regulator of Inducible Plant Immunity[W

    PubMed Central

    Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen

    2012-01-01

    Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid–induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR. PMID:23221596

  10. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory... 102-3.50(d), the Department of Defense gives notice that it is renewing the charter for the Board of...: Jim Freeman, Deputy Committee Management Officer for the Department of Defense, 703-601-6128...

  11. In Defense of Japan

    DTIC Science & Technology

    2018-01-03

    national elections. The party majority gives Abe the potential to formally amend Article 9 of the Japanese constitution to authorize the Japanese Self ...Pacific. Japanese Constitution; Article 9; The United States and Japan Bi-lateral defense treaty; Collective Self Defense; Pacifism; Japanese Self ...involvement in collective self -defense (CSD). Factors leading up to this decision are a rapidly evolving strategic and political environment in

  12. Fully Automatic Software for Retinal Thickness in Eyes With Diabetic Macular Edema From Images Acquired by Cirrus and Spectralis Systems

    PubMed Central

    Lee, Joo Yong; Chiu, Stephanie J.; Srinivasan, Pratul P.; Izatt, Joseph A.; Toth, Cynthia A.; Farsiu, Sina; Jaffe, Glenn J.

    2013-01-01

    Purpose. To determine whether a novel automatic segmentation program, the Duke Optical Coherence Tomography Retinal Analysis Program (DOCTRAP), can be applied to spectral-domain optical coherence tomography (SD-OCT) images obtained from different commercially available SD-OCT in eyes with diabetic macular edema (DME). Methods. A novel segmentation framework was used to segment the retina, inner retinal pigment epithelium, and Bruch's membrane on images from eyes with DME acquired by one of two SD-OCT systems, Spectralis or Cirrus high definition (HD)-OCT. Thickness data obtained by the DOCTRAP software were compared with those produced by Spectralis and Cirrus. Measurement agreement and its dependence were assessed using intraclass correlation (ICC). Results. A total of 40 SD-OCT scans from 20 subjects for each machine were included in the analysis. Spectralis: the mean thickness in the 1-mm central area determined by DOCTRAP and Spectralis was 463.8 ± 107.5 μm and 467.0 ± 108.1 μm, respectively (ICC, 0.999). There was also a high level agreement in surrounding areas (out to 3 mm). Cirrus: the mean thickness in the 1-mm central area was 440.8 ± 183.4 μm and 442.7 ± 182.4 μm by DOCTRAP and Cirrus, respectively (ICC, 0.999). The thickness agreement in surrounding areas (out to 3 mm) was more variable due to Cirrus segmentation errors in one subject (ICC, 0.734–0.999). After manual correction of the errors, there was a high level of thickness agreement in surrounding areas (ICC, 0.997–1.000). Conclusions. The DOCTRAP may be useful to compare retinal thicknesses in eyes with DME across OCT platforms. PMID:24084089

  13. Implementation of Altimetry Data in the GIPSY POD Software Package

    NASA Technical Reports Server (NTRS)

    Stauch, Jason R.; Gold, Kenn; Born, George H.

    2001-01-01

    Altimetry data has been used extensively to acquire data about characteristics of the Earth, the Moon, and Mars. More recently, the idea of using altimetry for orbit determination has also been explored. This report discusses modifications to JPL's GIPSY/OASIS II software to include altimetry data as an observation type for precise orbit determination. The mathematical foundation of using altimetry for the purpose of orbit determination is presented, along with results.

  14. Monte Carlo Methodology Serves Up a Software Success

    NASA Technical Reports Server (NTRS)

    2003-01-01

    Widely used for the modeling of gas flows through the computation of the motion and collisions of representative molecules, the Direct Simulation Monte Carlo method has become the gold standard for producing research and engineering predictions in the field of rarefied gas dynamics. Direct Simulation Monte Carlo was first introduced in the early 1960s by Dr. Graeme Bird, a professor at the University of Sydney, Australia. It has since proved to be a valuable tool to the aerospace and defense industries in providing design and operational support data, as well as flight data analysis. In 2002, NASA brought to the forefront a software product that maintains the same basic physics formulation of Dr. Bird's method, but provides effective modeling of complex, three-dimensional, real vehicle simulations and parallel processing capabilities to handle additional computational requirements, especially in areas where computational fluid dynamics (CFD) is not applicable. NASA's Direct Simulation Monte Carlo Analysis Code (DAC) software package is now considered the Agency s premier high-fidelity simulation tool for predicting vehicle aerodynamics and aerothermodynamic environments in rarified, or low-density, gas flows.

  15. Evaluating Dense 3d Reconstruction Software Packages for Oblique Monitoring of Crop Canopy Surface

    NASA Astrophysics Data System (ADS)

    Brocks, S.; Bareth, G.

    2016-06-01

    Crop Surface Models (CSMs) are 2.5D raster surfaces representing absolute plant canopy height. Using multiple CMSs generated from data acquired at multiple time steps, a crop surface monitoring is enabled. This makes it possible to monitor crop growth over time and can be used for monitoring in-field crop growth variability which is useful in the context of high-throughput phenotyping. This study aims to evaluate several software packages for dense 3D reconstruction from multiple overlapping RGB images on field and plot-scale. A summer barley field experiment located at the Campus Klein-Altendorf of University of Bonn was observed by acquiring stereo images from an oblique angle using consumer-grade smart cameras. Two such cameras were mounted at an elevation of 10 m and acquired images for a period of two months during the growing period of 2014. The field experiment consisted of nine barley cultivars that were cultivated in multiple repetitions and nitrogen treatments. Manual plant height measurements were carried out at four dates during the observation period. The software packages Agisoft PhotoScan, VisualSfM with CMVS/PMVS2 and SURE are investigated. The point clouds are georeferenced through a set of ground control points. Where adequate results are reached, a statistical analysis is performed.

  16. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority...

  17. Report on Defense Business Operations to the Congressional Defense Committees

    DTIC Science & Technology

    2009-03-15

    7 . PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Department of Defense,Business Information Agency,Washington,DC 8. PERFORMING ORGANIZATION...Defense Business Transformation 7 Table 2-2: System Modernizations and Initiatives by Business Enterprise Priority* Personnel Visibility...and people to ensure reliable and accurate delivery of acceptable goods and services. The procurement functional area establishes requirements for

  18. CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007

    DTIC Science & Technology

    2007-03-01

    Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO

  19. Software Program: Software Management Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this NASA Software Management Guidebook is twofold. First, this document defines the core products and activities required of NASA software projects. It defines life-cycle models and activity-related methods but acknowledges that no single life-cycle model is appropriate for all NASA software projects. It also acknowledges that the appropriate method for accomplishing a required activity depends on characteristics of the software project. Second, this guidebook provides specific guidance to software project managers and team leaders in selecting appropriate life cycles and methods to develop a tailored plan for a software engineering project.

  20. A Future North American Defense Arrangement: Applying a Canadian Defense Policy Process Model

    DTIC Science & Technology

    2005-04-01

    American defense policy outlined by Hays, Vallance and Van Tassel in their comprehensive text entitled American Defense Policy. What is Canadian...outputs, lenses and feedback within an international and domestic environment. Adapted From Hays, Vallance , Van Tassel American Defence Policy, 1997...10th ed. (Springfield, Massachusetts: Merriam-Webster, Inc), 901. 2 Peter L Hays, B.J. Vallance , A.R. Van Tassel, eds., American Defense Policy, 7th

  1. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  2. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Acquire. 583.1 Section 583.1 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING SAVINGS AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly...

  3. Software Suite to Support In-Flight Characterization of Remote Sensing Systems

    NASA Technical Reports Server (NTRS)

    Stanley, Thomas; Holekamp, Kara; Gasser, Gerald; Tabor, Wes; Vaughan, Ronald; Ryan, Robert; Pagnutti, Mary; Blonski, Slawomir; Kenton, Ross

    2014-01-01

    A characterization software suite was developed to facilitate NASA's in-flight characterization of commercial remote sensing systems. Characterization of aerial and satellite systems requires knowledge of ground characteristics, or ground truth. This information is typically obtained with instruments taking measurements prior to or during a remote sensing system overpass. Acquired ground-truth data, which can consist of hundreds of measurements with different data formats, must be processed before it can be used in the characterization. Accurate in-flight characterization of remote sensing systems relies on multiple field data acquisitions that are efficiently processed, with minimal error. To address the need for timely, reproducible ground-truth data, a characterization software suite was developed to automate the data processing methods. The characterization software suite is engineering code, requiring some prior knowledge and expertise to run. The suite consists of component scripts for each of the three main in-flight characterization types: radiometric, geometric, and spatial. The component scripts for the radiometric characterization operate primarily by reading the raw data acquired by the field instruments, combining it with other applicable information, and then reducing it to a format that is appropriate for input into MODTRAN (MODerate resolution atmospheric TRANsmission), an Air Force Research Laboratory-developed radiative transport code used to predict at-sensor measurements. The geometric scripts operate by comparing identified target locations from the remote sensing image to known target locations, producing circular error statistics defined by the Federal Geographic Data Committee Standards. The spatial scripts analyze a target edge within the image, and produce estimates of Relative Edge Response and the value of the Modulation Transfer Function at the Nyquist frequency. The software suite enables rapid, efficient, automated processing of

  4. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    PubMed

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  5. Using Power Spectrum Analysis to Evaluate 18O-Water Labeling Data Acquired from Low Resolution Mass Spectrometers

    PubMed Central

    Sadygov, Rovshan G.; Zhao, Yingxin; Haidacher, Sigmund J.; Starkey, Jonathan M.; Tilton, Ronald G.; Denner, Larry

    2010-01-01

    We describe a method for ratio estimations in 18O-water labeling experiments acquired from low resolution isotopically resolved data. The method is implemented in a software package specifically designed for use in experiments making use of zoom-scan mode data acquisition. Zoom-scan mode data allows commonly used ion trap mass spectrometers to attain isotopic resolution, which make them amenable to use in labeling schemes such as 18O-water labeling, but algorithms and software developed for high resolution instruments may not be appropriate for the lower resolution data acquired in zoom-scan mode. The use of power spectrum analysis is proposed as a general approach which may be uniquely suited to these data types. The software implementation uses power spectrum to remove high-frequency noise, and band-filter contributions from co-eluting species of differing charge states. From the elemental composition of a peptide sequence we generate theoretical isotope envelopes of heavy-light peptide pairs in five different ratios; these theoretical envelopes are correlated with the filtered experimental zoom scans. To automate peptide quantification in high-throughput experiments, we have implemented our approach in a computer program, MassXplorer. We demonstrate the application of MassXplorer to two model mixtures of known proteins, and to a complex mixture of mouse kidney cortical extract. Comparison with another algorithm for ratio estimations demonstrates the increased precision and automation of MassXplorer. PMID:20568695

  6. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao

    2014-06-01

    Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.

  7. Software analysis handbook: Software complexity analysis and software reliability estimation and prediction

    NASA Technical Reports Server (NTRS)

    Lee, Alice T.; Gunn, Todd; Pham, Tuan; Ricaldi, Ron

    1994-01-01

    This handbook documents the three software analysis processes the Space Station Software Analysis team uses to assess space station software, including their backgrounds, theories, tools, and analysis procedures. Potential applications of these analysis results are also presented. The first section describes how software complexity analysis provides quantitative information on code, such as code structure and risk areas, throughout the software life cycle. Software complexity analysis allows an analyst to understand the software structure, identify critical software components, assess risk areas within a software system, identify testing deficiencies, and recommend program improvements. Performing this type of analysis during the early design phases of software development can positively affect the process, and may prevent later, much larger, difficulties. The second section describes how software reliability estimation and prediction analysis, or software reliability, provides a quantitative means to measure the probability of failure-free operation of a computer program, and describes the two tools used by JSC to determine failure rates and design tradeoffs between reliability, costs, performance, and schedule.

  8. Acquired neuropathies.

    PubMed

    Lozeron, Pierre; Trocello, Jean-Marc; Kubis, Nathalie

    2013-09-01

    Acquired neuropathies represent most of the neuropathies encountered in clinical practice. Hundreds of causes have been identified even though up to 41% of patients are still classified as idiopathic (Rajabally and Shah in J Neurol 258:1431-1436, 1). Routine evaluation relies on comprehensive medical history taking, clinical examination, nerve conduction studies and laboratory tests. Other investigations such as nerve biopsy or nerve or muscle imaging are performed in specific settings. This review focuses on recent advances in acquired neuropathies.

  9. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    PubMed

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  10. 75 FR 32416 - Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board AGENCY: Department of Defense (DoD). ACTION: Notice of advisory committee meeting. SUMMARY: The Defense Science Board Task Force on the Survivability of DoD Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons...

  11. Defense Business Transformation

    DTIC Science & Technology

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  12. Comparison of estimates of left ventricular ejection fraction obtained from gated blood pool imaging, different software packages and cameras.

    PubMed

    Steyn, Rachelle; Boniaszczuk, John; Geldenhuys, Theodore

    2014-01-01

    To determine how two software packages, supplied by Siemens and Hermes, for processing gated blood pool (GBP) studies should be used in our department and whether the use of different cameras for the acquisition of raw data influences the results. The study had two components. For the first component, 200 studies were acquired on a General Electric (GE) camera and processed three times by three operators using the Siemens and Hermes software packages. For the second part, 200 studies were acquired on two different cameras (GE and Siemens). The matched pairs of raw data were processed by one operator using the Siemens and Hermes software packages. The Siemens method consistently gave estimates that were 4.3% higher than the Hermes method (p < 0.001). The differences were not associated with any particular level of left ventricular ejection fraction (LVEF). There was no difference in the estimates of LVEF obtained by the three operators (p = 0.1794). The reproducibility of estimates was good. In 95% of patients, using the Siemens method, the SD of the three estimates of LVEF by operator 1 was ≤ 1.7, operator 2 was ≤ 2.1 and operator 3 was ≤ 1.3. The corresponding values for the Hermes method were ≤ 2.5, ≤ 2.0 and ≤ 2.1. There was no difference in the results of matched pairs of data acquired on different cameras (p = 0.4933) CONCLUSION: Software packages for processing GBP studies are not interchangeable. The report should include the name and version of the software package used. Wherever possible, the same package should be used for serial studies. If this is not possible, the report should include the limits of agreement of the different packages. Data acquisition on different cameras did not influence the results.

  13. Program Manager: the Journal of the Defense Systems Management College, Volume 14, Number 3, May-June 1985.

    DTIC Science & Technology

    1985-06-01

    Z2~1 31DTIC TAR 31 Unaflnonc.-d Successful The S N wDefense Challenge: Distribul Systems Spare Parts Availability Dr. Joniathian D. Kaplan Lieutenant...Developing Human Perform- hardware software has not been ing that the resulting design be capable ance Specifications ( Kaplan & Crooks, developed at this...design to perform at the components: MOS-characteristics specified criteria. Although the map, analysis-characteristics map, and E Dr. Kaplan is a

  14. Defense Science Board Task Force on The Manufacturing Technology Program: A Key to Affordably Equipping the Future Force

    DTIC Science & Technology

    2006-02-01

    technology for cost and risk reduction of products, software, and processes; long-term, multi-Service needs; and disruptive technologies , both...initiatives and for disruptive technologies , the Office of the Secretary of Defense (OSD) can better promote the importance and value of the program...multi- Service programs, research in “ disruptive ” technologies , and SBIR programs. Balance current, near term, and future needs as well as small and

  15. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The Arms... changed only by amendments made pursuant to section 38 of the Arms Export Control Act (22 U.S.C. 2778...

  16. Nucleoporin MOS7/Nup88 contributes to plant immunity and nuclear accumulation of defense regulators.

    PubMed

    Wiermer, Marcel; Germain, Hugo; Cheng, Yu Ti; García, Ana V; Parker, Jane E; Li, Xin

    2010-01-01

    Controlled nucleocytoplasmic trafficking is an important feature for fine-tuning signaling pathways in eukaryotic organisms. Nuclear pore complexes (NPCs) composed of nucleoporin proteins (Nups) are essential for the exchange of macromolecules across the nuclear envelope. A recent genetic screen in our laboratory identified a partial loss-of-function mutation in Arabidopsis MOS7/Nup88 that causes defects in basal immunity, Resistance (R) protein-mediated defense and systemic acquired resistance. In Drosophila and mammalian cells, exportin-mediated nuclear export of activated Rel/NFκB transcription factors is enhanced in nup88 mutants resulting in immune response failure. Consistent with Nup88 promoting nuclear retention of NFκB, our functional analyses revealed that MOS7/Nup88 is required for appropriate nuclear accumulation of the autoactivated R protein snc1, as well as the key immune regulators EDS1 and NPR1. These results suggest that controlling the nuclear concentrations of specific immune regulators is fundamental for defining defense outputs.

  17. The Epimmunity Theory: The Single Cell Defenses against Infectious and Genetic Diseases.

    PubMed

    Barghouthi, Sameer A

    2017-01-01

    Single cell defense against diseases defines "epimmunity." Epimmunity is complementary to the immune system and can neither be substituted by innate nor by acquired immunity. Epimmunity, the proposed new branch of immunity, is further explored and analyzed for enucleated mature mammalian erythrocytes and nucleated erythrocytes of non-mammalian vertebrates leading to the development of "The Epimmunity Theory." Enucleation of mammalian erythroblast and inactivation of nuclei in erythrocytes of non-mammalian vertebrates are major contributors to the collective immunity: epimmunity, innate, and acquired. The fact that diseases of mature erythrocytes (MEs) are rare supports the notion that a single cell can resist microbial and genetic diseases; MEs are refractory to malaria and cancer. Nucleated cells, such as B-cells, T-cells, hepatocytes, and cell developmental stages are susceptible to genetic and specific microbial diseases depending on their nuclear activities and the receptors they express; such cells show lower epimmunity relative to MEs. Epimmunity is important as a disease insulator that prevents the spread of diseases from an infected tissue to the majority of other tissues. Breakdown of epimmunity may lead to disease development.

  18. Optimal Defense Strategies in an Idealized Microbial Food Web under Trade-Off between Competition and Defense

    PubMed Central

    Våge, Selina; Storesund, Julia E.; Giske, Jarl; Thingstad, T. Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of “Keystone Predation” (KP) and “Killing-the-Winner” (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean. PMID:24999739

  19. Issues in Defining Software Architectures in a GIS Environment

    NASA Technical Reports Server (NTRS)

    Acosta, Jesus; Alvorado, Lori

    1997-01-01

    The primary mission of the Pan-American Center for Earth and Environmental Studies (PACES) is to advance the research areas that are relevant to NASA's Mission to Planet Earth program. One of the activities at PACES is the establishment of a repository for geographical, geological and environmental information that covers various regions of Mexico and the southwest region of the U.S. and that is acquired from NASA and other sources through remote sensing, ground studies or paper-based maps. The center will be providing access of this information to other government entities in the U.S. and Mexico, and research groups from universities, national laboratories and industry. Geographical Information Systems(GIS) provide the means to manage, manipulate, analyze and display geographically referenced information that will be managed by PACES. Excellent off-the-shelf software exists for a complete GIS as well as software for storing and managing spatial databases, processing images, networking and viewing maps with layered information. This allows the user flexibility in combining systems to create a GIS or to mix these software packages with custom-built application programs. Software architectural languages provide the ability to specify the computational components and interactions among these components, an important topic in the domain of GIS because of the need to integrate numerous software packages. This paper discusses the characteristics that architectural languages address with respect to the issues relating to the data that must be communicated between software systems and components when systems interact. The paper presents a background on GIS in section 2. Section 3 gives an overview of software architecture and architectural languages. Section 4 suggests issues that may be of concern when defining the software architecture of a GIS. The last section discusses the future research effort and finishes with a summary.

  20. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009

    DTIC Science & Technology

    2009-12-01

    an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210

  1. From Reform to Reduction: Reports on the Management of Navy and Department of Defense Laboratories in the Post-Cold War Era

    DTIC Science & Technology

    2008-01-01

    with many private sector companies to manufacture, field , and develop the products it acquires. As mentioned, the percentages of work outsourced ...been involved from the conceptual development all the way to operational testing and fielding of every major weapons system our Marines and Sailors...the ability to collaborate with contractors and assess the defense value of private sector technologi- cal developments . The inherently governmental

  2. Defense Business Board

    Science.gov Websites

    Assessment on the Creation of an Under Secretary of Defense for Business Management & Information OUR Defense team for 2017. View Study Best Practices for Real Property Management Best Practices for Real Property Management There is now an opportunity to modernize the management of the Department's real

  3. Transition metals at the host–pathogen interface: How Neisseria exploit human metalloproteins for acquiring iron and zinc

    PubMed Central

    Neumann, Wilma; Hadley, Rose C.; Nolan, Elizabeth M.

    2017-01-01

    Transition metals are essential nutrients for all organisms and important players in the host-microbe interaction. During bacterial infection, a tug-of-war between the host and microbe for nutrient metals occurs: the host innate immune system responds to the pathogen by reducing metal availability and the pathogen tries to outmaneuver this response. The outcome of this competition, which involves metal-sequestering host-defense proteins and microbial metal acquisition machinery, is an important variable for whether infection occurs. One strategy bacterial pathogens employ to overcome metal restriction involves hijacking abundant host metalloproteins. The obligate human pathogens Neisseria spp. express TonB-dependent transport systems that capture human metalloproteins, extract the bound metal ions, and deliver these nutrients into the bacterial cell. This Essay highlights structural and mechanistic investigations that provide insights into how Neisseria acquire iron from the Fe(III)-transport protein transferrin, the Fe(III)-chelating host-defense protein lactoferrin, and the oxygen-transport protein hemoglobin, and obtain zinc from the metal-sequestering antimicrobial protein calprotectin. PMID:28487398

  4. The Anatomy of Self-Defense

    ERIC Educational Resources Information Center

    Sparks Stein, Pamela; Richardson, April D.; Challman, Sandra D.

    2008-01-01

    The following study describes a creative application of anatomical principles in the instruction of self-defense. Undergraduates at the University of Kentucky were invited to a special lecture that featured a series of self-defense moves introduced by a local police officer. Following a demonstration of each self-defense tactic, the students were…

  5. Identifying psychotic defenses in a clinical interview.

    PubMed

    Berney, Sylvie; de Roten, Yves; Beretta, Véronique; Kramer, Ueli; Despland, Jean-Nicolas

    2014-05-01

    The Defense Mechanisms Rating Scales (DMRS), one of the most widely used and validated instruments in the study of defense mechanisms, does not include psychotic defenses. The Psychotic-DMRS (P-DMRS) has been developed to include 6 psychotic defense mechanisms: psychotic denial, autistic withdrawal, distortion, delusional projection, fragmentation, and concretization. We discuss psychotic defenses, including the difference between psychotic defenses and psychotic symptoms. Six clinical illustrations demonstrate how the 6 P-DMRS defenses can be identified in patients' narratives selected from the transcripts of dynamic interviews. Implications with respect to patient evaluation and treatment are discussed. © 2014 Wiley Periodicals, Inc.

  6. Good neighbors make good defenses: associational refuges reduce defense investment in African savanna plants.

    PubMed

    Coverdale, Tyler C; Goheen, Jacob R; Palmer, Todd M; Pringle, Robert M

    2018-06-25

    Intraspecific variation in plant defense phenotype is common and has wide-ranging ecological consequences. Yet prevailing theories of plant defense allocation, which primarily account for interspecific differences in defense phenotype, often fail to predict intraspecific patterns. Furthermore, although individual variation in defense phenotype is often attributed to ecological interactions, few general mechanisms have been proposed to explain the ubiquity of variable defense phenotype within species. Here, we show experimentally that associational refuges and induced resistance interact to create predictable intraspecific variation in defense phenotype in African savanna plants. Physically defended species from four families (Acanthaceae, Asparagaceae, Cactaceae, and Solanaceae) growing in close association with spinescent Acacia trees had 39-78% fewer spines and thorns than did isolated conspecifics. For a subset of these species, we used a series of manipulative experiments to show that this variability is maintained primarily by a reduction in induced responses among individuals that seldom experience mammalian herbivory, whether due to association with Acacia trees or to experimental herbivore exclusion. Unassociated plants incurred 4- to 16-fold more browsing damage than did associated individuals and increased spine density by 16-38% within one month following simulated browsing. In contrast, experimental clipping induced no net change in spine density among plants growing beneath Acacia canopies or inside long-term herbivore exclosures. Associated and unassociated individuals produced similar numbers of flowers and seeds, but seedling recruitment and survival were vastly greater in refuge habitats, suggesting a net fitness benefit of association. We conclude that plant-plant associations consistently decrease defense investment in this system by reducing both the frequency of herbivory and the intensity of induced responses, and that inducible responses

  7. CrossTalk. The Journal of Defense Software Engineering. Volume 16, Number 11, November 2003

    DTIC Science & Technology

    2003-11-01

    memory area, and stack pointer. These systems are classified as preemptive or nonpreemptive depending on whether they can preempt an existing task or not...of charge. The Software Technology Support Center was established at Ogden Air Logistics Center (AFMC) by Headquarters U.S. Air Force to help Air...device. A script file could be a list of commands for a command interpreter such as a batch file [15]. A communications port consists of a queue to hold

  8. Report on DoD Civilians Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies

    DTIC Science & Technology

    1990-01-03

    Employed by the Office of the Secretary of Defense (OSD) and the Defense Agencies References: (a) DoD Instruction 7730.29, subject as above, June 25...b). B. APPLICABILITY This Instruction applies to the Office of the Secretary of Defense (OSD), the Inspector General of the Department of Defense (IG...direct hire civilians employed by the Office of the Secretary of Defense and other Defense organizations for submission to the Department of Labor. 2

  9. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    DTIC Science & Technology

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  10. 78 FR 23675 - Importation of Defense Articles and Defense Services-U.S. Munitions Import List (2011R-20P)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... No. ATF-50F; AG Order No. 3383-2013] RIN 1140-AA46 Importation of Defense Articles and Defense... pursuant to the Arms Export Control Act (AECA) and Executive Order 13637 to designate defense articles and... whether the Secretary of State controls such defense articles or defense services for purposes of export...

  11. The Elicitor Protein AsES Induces a Systemic Acquired Resistance Response Accompanied by Systemic Microbursts and Micro-Hypersensitive Responses in Fragaria ananassa.

    PubMed

    Hael-Conrad, Verónica; Perato, Silvia Marisa; Arias, Marta Eugenia; Martínez-Zamora, Martín Gustavo; Di Peto, Pía de Los Ángeles; Martos, Gustavo Gabriel; Castagnaro, Atilio Pedro; Díaz-Ricci, Juan Carlos; Chalfoun, Nadia Regina

    2018-01-01

    The elicitor AsES (Acremonium strictum elicitor subtilisin) is a 34-kDa subtilisin-like protein secreted by the opportunistic fungus Acremonium strictum. AsES activates innate immunity and confers resistance against anthracnose and gray mold diseases in strawberry plants (Fragaria × ananassa Duch.) and the last disease also in Arabidopsis. In the present work, we show that, upon AsES recognition, a cascade of defense responses is activated, including: calcium influx, biphasic oxidative burst (O 2 ⋅- and H 2 O 2 ), hypersensitive cell-death response (HR), accumulation of autofluorescent compounds, cell-wall reinforcement with callose and lignin deposition, salicylic acid accumulation, and expression of defense-related genes, such as FaPR1, FaPG1, FaMYB30, FaRBOH-D, FaRBOH-F, FaCHI23, and FaFLS. All these responses occurred following a spatial and temporal program, first induced in infiltrated leaflets (local acquired resistance), spreading out to untreated lateral leaflets, and later, to distal leaves (systemic acquired resistance). After AsES treatment, macro-HR and macro-oxidative bursts were localized in infiltrated leaflets, while micro-HRs and microbursts occurred later in untreated leaves, being confined to a single cell or a cluster of a few epidermal cells that differentiated from the surrounding ones. The differentiated cells initiated a time-dependent series of physiological and anatomical changes, evolving to idioblasts accumulating H 2 O 2 and autofluorescent compounds that blast, delivering its content into surrounding cells. This kind of systemic cell-death process in plants is described for the first time in response to a single elicitor. All data presented in this study suggest that AsES has the potential to activate a wide spectrum of biochemical and molecular defense responses in F. ananassa that may explain the induced protection toward pathogens of opposite lifestyle, like hemibiotrophic and necrotrophic fungi.

  12. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    DTIC Science & Technology

    2015-06-01

    Defense. (University of California Press, Berkeley and Los Angeles , 1967). 22 but due to the Soviet Union basis system, it is not as efficient in...Making for Defense. University of California Press, Berkeley and Los Angeles , 1967. Hitch, Charles Johnston and Roland N. McKean. The Economics of...loss of defense is not an instantaneous phenomenon. This phenomenon has led to human disorder, blind and continuous personnel downsizing, reform of the

  13. The biocontrol agent Pseudomonas chlororaphis PA23 primes Brassica napus defenses through distinct gene networks.

    PubMed

    Duke, Kelly A; Becker, Michael G; Girard, Ian J; Millar, Jenna L; Dilantha Fernando, W G; Belmonte, Mark F; de Kievit, Teresa R

    2017-06-19

    The biological control agent Pseudomonas chlororaphis PA23 is capable of protecting Brassica napus (canola) from the necrotrophic fungus Sclerotinia sclerotiorum via direct antagonism. While we have elucidated bacterial genes and gene products responsible biocontrol, little is known about how the host plant responds to bacterial priming on the leaf surface, including global changes in gene activity in the presence and absence of S. sclerotiorum. Application of PA23 to the aerial surfaces of canola plants reduced the number of S. sclerotiorum lesion-forming petals by 91.1%. RNA sequencing of the host pathogen interface showed that pretreatment with PA23 reduced the number of genes upregulated in response to S. sclerotiorum by 16-fold. By itself, PA23 activated unique defense networks indicative of defense priming. Genes encoding MAMP-triggered immunity receptors detecting flagellin and peptidoglycan were downregulated in PA23 only-treated plants, consistent with post-stimulus desensitization. Downstream, we observed reactive oxygen species (ROS) production involving low levels of H 2 O 2 and overexpression of genes associated with glycerol-3-phosphate (G3P)-mediated systemic acquired resistance (SAR). Leaf chloroplasts exhibited increased thylakoid membrane structures and chlorophyll content, while lipid metabolic processes were upregulated. In addition to directly antagonizing S. sclerotiorum, PA23 primes the plant defense response through induction of unique local and systemic defense networks. This study provides novel insight into the effects of biocontrol agents applied to the plant phyllosphere. Understanding these interactions will aid in the development of biocontrol systems as an alternative to chemical pesticides for protection of important crop systems.

  14. The Evolution of the Contract Type Used in Defense Acquisition with a Focus on Major Defense Weapon Systems

    DTIC Science & Technology

    2012-09-01

    III. THE DEFENSE MARKETPLACE A. DEFENSE INDUSTRY OVERVIEW The market of the defense industry in the United States is different than the commercial...marketplace in a number of respects. Lorell, Lowell, Kennedy, and Levaux (2000) defined the uniqueness of the U.S. defense market in two ways. First...the U.S. defense market for weapon systems is characterized by a single buyer (Lorell et al., 2000, p. 13). “The second distinguishing feature of

  15. Laser velocimeter data acquisition system for the Langley 14- by 22-foot subsonic tunnel. Software reference guide version 3.3

    NASA Technical Reports Server (NTRS)

    Jumper, Judith K.

    1994-01-01

    The Laser Velocimeter Data Acquisition System (LVDAS) in the Langley 14- by 22-Foot Tunnel is controlled by a comprehensive software package. The software package was designed to control the data acquisition process during wind tunnel tests which employ a laser velocimeter measurement system. This report provides detailed explanations on how to configure and operate the LVDAS system to acquire laser velocimeter and static wind tunnel data.

  16. Involuntary eye motion correction in retinal optical coherence tomography: Hardware or software solution?

    PubMed

    Baghaie, Ahmadreza; Yu, Zeyun; D'Souza, Roshan M

    2017-04-01

    In this paper, we review state-of-the-art techniques to correct eye motion artifacts in Optical Coherence Tomography (OCT) imaging. The methods for eye motion artifact reduction can be categorized into two major classes: (1) hardware-based techniques and (2) software-based techniques. In the first class, additional hardware is mounted onto the OCT scanner to gather information about the eye motion patterns during OCT data acquisition. This information is later processed and applied to the OCT data for creating an anatomically correct representation of the retina, either in an offline or online manner. In software based techniques, the motion patterns are approximated either by comparing the acquired data to a reference image, or by considering some prior assumptions about the nature of the eye motion. Careful investigations done on the most common methods in the field provides invaluable insight regarding future directions of the research in this area. The challenge in hardware-based techniques lies in the implementation aspects of particular devices. However, the results of these techniques are superior to those obtained from software-based techniques because they are capable of capturing secondary data related to eye motion during OCT acquisition. Software-based techniques on the other hand, achieve moderate success and their performance is highly dependent on the quality of the OCT data in terms of the amount of motion artifacts contained in them. However, they are still relevant to the field since they are the sole class of techniques with the ability to be applied to legacy data acquired using systems that do not have extra hardware to track eye motion. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Peptide trafficking and translocation across membranes in cellular signaling and self-defense strategies.

    PubMed

    Abele, Rupert; Tampé, Robert

    2009-08-01

    Cells are metastable per se and a fine-tuned balance of de novo protein synthesis and degradation shapes their proteome. The primary function of peptides is to supply amino acids for de novo protein synthesis or as an energy source during starvation. Peptides are intrinsically short-lived and steadily trimmed by an armada of intra and extracellular peptidases. However, peptides acquired additional, more sophisticated tasks already early in evolution. Here, we summarize current knowledge on intracellular peptide trafficking and translocation mediated by ATP-binding cassette (ABC) transport machineries with a focus on the functions of protein degradation products as important signaling molecules in self-defense mechanisms.

  18. Defense Institution Building: An Assessment

    DTIC Science & Technology

    2016-01-01

    collectively responsible for national-level defense oversight, governance, and management. Study Objectives and Research Questions The objectives of...Defense Studies , in this case) posts a per- manent representative with the command to help recruit for resident courses, suggest courses to be...foreign military officers to conduct study and research on security-related topics Program 2 Defense institutions/ education and training

  19. A critical role for Arabidopsis MILDEW RESISTANCE LOCUS O2 in systemic acquired resistance.

    PubMed

    Gruner, Katrin; Zeier, Tatyana; Aretz, Christina; Zeier, Jürgen

    2018-04-16

    Members of the MILDEW RESISTANCE LOCUS O (MLO) gene family confer susceptibility to powdery mildews in different plant species, and their existence therefore seems to be disadvantageous for the plant. We recognized that expression of the Arabidopsis MLO2 gene is induced after inoculation with the bacterial pathogen Pseudomonas syringae, promoted by salicylic acid (SA) signaling, and systemically enhanced in the foliage of plants exhibiting systemic acquired resistance (SAR). Importantly, distinct mlo2 mutant lines were unable to systemically increase resistance to bacterial infection after inoculation with P. syringae, indicating that the function of MLO2 is necessary for biologically induced SAR in Arabidopsis. Our data also suggest that the close homolog MLO6 has a supportive but less critical role in SAR. In contrast to SAR, basal resistance to bacterial infection was not affected in mlo2. Remarkably, SAR-defective mlo2 mutants were still competent in systemically increasing the levels of the SAR-activating metabolites pipecolic acid (Pip) and SA after inoculation, and to enhance SAR-related gene expression in distal plant parts. Furthermore, although MLO2 was not required for SA- or Pip-inducible defense gene expression, it was essential for the proper induction of disease resistance by both SAR signals. We conclude that MLO2 acts as a critical downstream component in the execution of SAR to bacterial infection, being required for the translation of elevated defense responses into disease resistance. Moreover, our data suggest a function for MLO2 in the activation of plant defense priming during challenge by P. syringae. © 2018 The Authors The Plant Journal © 2018 John Wiley & Sons Ltd.

  20. An Aerospace and Defense Industry Market Index for 1950-2012 and the Connection With Defense Spending

    DTIC Science & Technology

    2012-04-30

    select few financial measures, and by their infrequent production, have limited value in supporting the Defense Department’s knowledge refresh on the...their bread and butter business of defense production. The stable relationship that existed prior to the 1990s between defense production and

  1. The Structure of the Human Vaginal Stratum Corneum and its Role in Immune Defense

    PubMed Central

    Anderson, Deborah J.; Marathe, Jai; Pudney, Jeffrey

    2014-01-01

    The superficial layers of the human vaginal epithelium, which form an interface between host and environment, are comprised of dead flattened cells that have undergone a terminal cell differentiation program called cornification. This entails extrusion of nuclei and intercellular organelles, and the depletion of functional DNA and RNA precluding the synthesis of new proteins. As a consequence, the terminally differentiated cells do not maintain robust intercellular junctions and have a diminished capacity to actively respond to microbial exposure, yet the vaginal stratum corneum (SC) mounts an effective defense against invasive microbial infections. The vaginal SC in reproductive aged women is comprised of loosely connected glycogen-filled cells which are permeable to bacterial and viral microbes as well as molecular and cellular mediators of immune defense. We propose here that the vaginal SC provides a unique microenvironment that maintains vaginal health by fostering endogenous lactobacillii and retaining critical mediators of acquired and innate immunity. A better understanding of the molecular and physicochemical properties of the vaginal SC could promote the design of more effective topical drugs and microbicides. PMID:24661416

  2. Defense Primer: A Guide for New Members

    DTIC Science & Technology

    2017-03-03

    1 President’s Constitutional Authority with Regard to the Armed Forces ................................... 1 The Department of Defense ...primers to give Members of Congress an overview of key aspects of the Department of Defense and how Congress exercises authority over it. A consolidated...for New Members Congressional Research Service 2 The Department of Defense CRS In Focus IF10543, Defense Primer: The Department of Defense , by

  3. Acquired color vision deficiency.

    PubMed

    Simunovic, Matthew P

    2016-01-01

    Acquired color vision deficiency occurs as the result of ocular, neurologic, or systemic disease. A wide array of conditions may affect color vision, ranging from diseases of the ocular media through to pathology of the visual cortex. Traditionally, acquired color vision deficiency is considered a separate entity from congenital color vision deficiency, although emerging clinical and molecular genetic data would suggest a degree of overlap. We review the pathophysiology of acquired color vision deficiency, the data on its prevalence, theories for the preponderance of acquired S-mechanism (or tritan) deficiency, and discuss tests of color vision. We also briefly review the types of color vision deficiencies encountered in ocular disease, with an emphasis placed on larger or more detailed clinical investigations. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010

    DTIC Science & Technology

    2010-04-01

    SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and

  5. Achieving Better Buying Power Through Acquisition of Open Architecture Software Systems for Web-Based and Mobile Devices

    DTIC Science & Technology

    2015-04-30

    mobile devices used within academic, business , or government enterprises. Acquisition personnel in such enterprises will increasingly be called on to...Graduate School of Business & Public Policy at the Naval Postgraduate School. To request defense acquisition research, to become a research sponsor, or to...address challenges in the acquisition of software systems for Web-based or mobile devices used within academic, business , or government enterprises

  6. Acquisition Planning at the Defense Communications Agency.

    DTIC Science & Technology

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  7. Acquired platelet function defect

    MedlinePlus

    ... Some cases cannot be prevented. Alternative Names Acquired qualitative platelet disorders; Acquired disorders of platelet function Images ... Todd Gersten, MD, Hematology/Oncology, Florida Cancer Specialists & Research Institute, Wellington, FL. Review provided by VeriMed Healthcare ...

  8. Defense Primer: DOD Contractors

    DTIC Science & Technology

    2017-02-10

    contractors . A defense contractor , as defined by the Code of Federal Regulations, is “any individual, firm, corporation, partnership, association...158.3, “Definitions”). Within the defense policy community, the term contractor is commonly used in two different contexts. The word can describe

  9. Density-dependent adjustment of inducible defenses.

    PubMed

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C; Laforsch, Christian; Kopp, Michael

    2015-08-03

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators' densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems.

  10. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  11. Nonoffensive defense is overrated

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flanagan, S.J.

    1988-09-01

    Some Western analysts argue that European security would stabilize if nations shifted to forces and doctrines that left them structurally incapable of conducting offensive military actions. Some, including American scholar Gene Sharp, have even called for replacing traditional military forces with plans for civilian-based resistance. Purely defensive postures would be reassuring to neighboring states, all of these theorists say, but such defenses would still be strong enough to defeat an attack if deterrence failed. This defensive-only stance, according to its advocates, is a purer form of deterrence by denial than now exists, since it removes even the possibility of inflictingmore » punishment in retaliation for an attack: it deters only be denying victory. But Mr. Flanagan questions whether such defense actually would serve as a credible deterrent. In addition, the various proposed schemes share some serious weaknesses, which he proceeds to discuss. 5 refs.« less

  12. SU-E-P-43: A Knowledge Based Approach to Guidelines for Software Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salomons, G; Kelly, D

    Purpose: In the fall of 2012, a survey was distributed to medical physicists across Canada. The survey asked the respondents to comment on various aspects of software development and use in their clinic. The survey revealed that most centers employ locally produced (in-house) software of some kind. The respondents also indicated an interest in having software guidelines, but cautioned that the realities of cancer clinics include variations, that preclude a simple solution. Traditional guidelines typically involve periodically repeating a set of prescribed tests with defined tolerance limits. However, applying a similar formula to software is problematic since it assumes thatmore » the users have a perfect knowledge of how and when to apply the software and that if the software operates correctly under one set of conditions it will operate correctly under all conditions Methods: In the approach presented here the personnel involved with the software are included as an integral part of the system. Activities performed to improve the safety of the software are done with both software and people in mind. A learning oriented approach is taken, following the premise that the best approach to safety is increasing the understanding of those associated with the use or development of the software. Results: The software guidance document is organized by areas of knowledge related to use and development of software. The categories include: knowledge of the underlying algorithm and its limitations; knowledge of the operation of the software, such as input values, parameters, error messages, and interpretation of output; and knowledge of the environment for the software including both data and users. Conclusion: We propose a new approach to developing guidelines which is based on acquiring knowledge-rather than performing tests. The ultimate goal is to provide robust software guidelines which will be practical and effective.« less

  13. Transcripts of Regional Hearings, St. Louis, Missouri. Annex L to Adjusting to the Drawdown. Report of the Defense Conversion Commission

    DTIC Science & Technology

    1992-08-01

    entrepreneurship courses for laid-off McDonnell Douglas employees. Over 500 have participated in the classes. • McDonnell Douglas donated its lease-hold...international programs and organizations • Analysis of regional financing programs The St. Louis World Trade Center franchise was acquired for the region...averaged over the 1970’s, the defense cutbacks are likely contribute only a small part of that objective. 2 38 7 Figure 5.3 REAL GDP BASE VS

  14. The First Line of Defense: Higher Education in Wartime and the Development of National Defense Education, 1939-1959

    ERIC Educational Resources Information Center

    Ponte, Dana Adrienne

    2016-01-01

    This study posits that the National Defense Education Act of 1958 (NDEA) represented the culmination of nearly a century-long process through which education was linked to national defense in periods of wartime, and later retained a strategic utility for defense purposes in times of peace. That a defense rationale for federal support of public…

  15. Air Traffic Control Experimentation and Evaluation with the NASA ATS-6 Satellite : Volume 4. Data Reduction and Analysis Software.

    DOT National Transportation Integrated Search

    1976-09-01

    Software used for the reduction and analysis of the multipath prober, modem evaluation (voice, digital data, and ranging), and antenna evaluation data acquired during the ATS-6 field test program is described. Multipath algorithms include reformattin...

  16. A Closed-Loop Proportional-Integral (PI) Control Software for Fully Mechanically Controlled Automated Electron Microscopic Tomography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    REN, GANG; LIU, JINXIN; LI, HONGCHANG

    A closed-loop proportional-integral (PI) control software is provided for fully mechanically controlled automated electron microscopic tomography. The software is developed based on Gatan DigitalMicrograph, and is compatible with Zeiss LIBRA 120 transmission electron microscope. However, it can be expanded to other TEM instrument with modification. The software consists of a graphical user interface, a digital PI controller, an image analyzing unit, and other drive units (i.e.: image acquire unit and goniometer drive unit). During a tomography data collection process, the image analyzing unit analyzes both the accumulated shift and defocus value of the latest acquired image, and provides the resultsmore » to the digital PI controller. The digital PI control compares the results with the preset values and determines the optimum adjustments of the goniometer. The goniometer drive unit adjusts the spatial position of the specimen according to the instructions given by the digital PI controller for the next tilt angle and image acquisition. The goniometer drive unit achieves high precision positioning by using a backlash elimination method. The major benefits of the software are: 1) the goniometer drive unit keeps pre-aligned/optimized beam conditions unchanged and achieves position tracking solely through mechanical control; 2) the image analyzing unit relies on only historical data and therefore does not require additional images/exposures; 3) the PI controller enables the system to dynamically track the imaging target with extremely low system error.« less

  17. Technology collaboration by means of an open source government

    NASA Astrophysics Data System (ADS)

    Berardi, Steven M.

    2009-05-01

    The idea of open source software originally began in the early 1980s, but it never gained widespread support until recently, largely due to the explosive growth of the Internet. Only the Internet has made this kind of concept possible, bringing together millions of software developers from around the world to pool their knowledge. The tremendous success of open source software has prompted many corporations to adopt the culture of open source and thus share information they previously held secret. The government, and specifically the Department of Defense (DoD), could also benefit from adopting an open source culture. In acquiring satellite systems, the DoD often builds walls between program offices, but installing doors between programs can promote collaboration and information sharing. This paper addresses the challenges and consequences of adopting an open source culture to facilitate technology collaboration for DoD space acquisitions. DISCLAIMER: The views presented here are the views of the author, and do not represent the views of the United States Government, United States Air Force, or the Missile Defense Agency.

  18. Software for Managing an Archive of Images

    NASA Technical Reports Server (NTRS)

    Hallai, Charles; Jones, Helene; Callac, Chris

    2003-01-01

    This is a revised draft by Innovators concerning the report on Software for Managing and Archive of Images.The SSC Multimedia Archive is an automated electronic system to manage images, acquired both by film and digital cameras, for the Public Affairs Office (PAO) at Stennis Space Center (SSC). Previously, the image archive was based on film photography and utilized a manual system that, by todays standards, had become inefficient and expensive. Now, the SSC Multimedia Archive, based on a server at SSC, contains both catalogs and images for pictures taken both digitally and with a traditional film-based camera, along with metadata about each image.

  19. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  20. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  1. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  2. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  3. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 6, September/October 2009

    DTIC Science & Technology

    2009-10-01

    software to improve the reliability, sustainability, and responsiveness of our warfighting capability. Subscriptions: Send correspondence concerning...endorsed by, the U.S. government, the DoD, the co-sponsors, or the STSC.All product names referenced in this issue are trademarks of their companies...Authors will use this section to share evidence of a demonstrative return on investment, process improvement , quality improvement , reductions to schedule

  4. DCT-based cyber defense techniques

    NASA Astrophysics Data System (ADS)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  5. Strategic Missile Defense & Nuclear Deterrence

    NASA Astrophysics Data System (ADS)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  6. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  7. Defense Mechanisms: A Bibliography.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  8. The anatomy of self-defense.

    PubMed

    Stein, Pamela Sparks; Richardson, April D; Challman, Sandra D

    2008-01-01

    The following study describes a creative application of anatomical principles in the instruction of self-defense. Undergraduates at the University of Kentucky were invited to a special lecture that featured a series of self-defense moves introduced by a local police officer. Following a demonstration of each self-defense tactic, the students were briefed on the anatomy of both the victim and the assailant that contributed to the overall effectiveness of each move. This approach was unique in that students learned critical knowledge of self-defense while reinforcing anatomical principles previously introduced in class. Moreover, this integration of topics prompted students to think about their response to potentially dangerous situations on campus. (c) 2008 American Association of Anatomists.

  9. Chairside multi-unit restoration of a quadrant using the new Cerec 3D software.

    PubMed

    Ender, A; Wiedhahn, K; Mörmann, W H

    2003-01-01

    The new Cerec 3D design software for inlays and partial and full crowns simplifies work when producing several restorations in one session. Quite significant progress has been achieved, in that the entire row of teeth of a quadrant can be acquired completely and displayed by successively overlapping optical impressions. The digital working model of a quadrant in which all preparations are acquired is the result. The restorations can be designed individually and inserted virtually. Thanks to virtual insertion, the proximal contacts to neighboring restorations can be designed perfectly and all restorations finally designed, milled, and inserted in one sitting. This method provides a significant rationalization effect.

  10. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., destruction, processing or use of defense articles; (2) The furnishing to foreign persons of any technical...) Military training of foreign units and forces, regular and irregular, including formal or informal...

  11. Variation in plant defense suppresses herbivore performance

    USGS Publications Warehouse

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  12. A near-infrared fluorescence-based surgical navigation system imaging software for sentinel lymph node detection

    NASA Astrophysics Data System (ADS)

    Ye, Jinzuo; Chi, Chongwei; Zhang, Shuang; Ma, Xibo; Tian, Jie

    2014-02-01

    Sentinel lymph node (SLN) in vivo detection is vital in breast cancer surgery. A new near-infrared fluorescence-based surgical navigation system (SNS) imaging software, which has been developed by our research group, is presented for SLN detection surgery in this paper. The software is based on the fluorescence-based surgical navigation hardware system (SNHS) which has been developed in our lab, and is designed specifically for intraoperative imaging and postoperative data analysis. The surgical navigation imaging software consists of the following software modules, which mainly include the control module, the image grabbing module, the real-time display module, the data saving module and the image processing module. And some algorithms have been designed to achieve the performance of the software, for example, the image registration algorithm based on correlation matching. Some of the key features of the software include: setting the control parameters of the SNS; acquiring, display and storing the intraoperative imaging data in real-time automatically; analysis and processing of the saved image data. The developed software has been used to successfully detect the SLNs in 21 cases of breast cancer patients. In the near future, we plan to improve the software performance and it will be extensively used for clinical purpose.

  13. 75 FR 33587 - Defense Science Board; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Correction AGENCY: Department..., DoD published a notice (75 FR 32416) announcing a meeting of the Defense Science Board Task Force. In... published a notice announcing a meeting of the Defense Science Board Task Force on the Survivability of DoD...

  14. Defense Financial and Investment Review. Appendix 3. Financial Community Perceptions of the Defense Industry: 1985,

    DTIC Science & Technology

    1985-03-01

    customer. The interviewed executives believe these considerations are a major cause for the rather low esteem in which the investing public holds defense...RD-RI58 246 DEFENSE FINANCIAL AND INVESTMENT REVIEN APPENDIX 3 FINRNCIAL COMMUNITY PE.. (U) LOGISTICS MANAGEMENT INST BETHESDA MD P J DAVEY ET RL... INVESTMENT REVIEW, APPENDIX 3; Financial Community Perceptions Of The Defense Industry: 1985 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(e) 8. CONTRACT

  15. Software system design for the non-null digital Moiré interferometer

    NASA Astrophysics Data System (ADS)

    Chen, Meng; Hao, Qun; Hu, Yao; Wang, Shaopu; Li, Tengfei; Li, Lin

    2016-11-01

    Aspheric optical components are an indispensable part of modern optics systems. With the development of aspheric optical elements fabrication technique, high-precision figure error test method of aspheric surfaces is a quite urgent issue now. We proposed a digital Moiré interferometer technique (DMIT) based on partial compensation principle for aspheric and freeform surface measurement. Different from traditional interferometer, DMIT consists of a real and a virtual interferometer. The virtual interferometer is simulated with Zemax software to perform phase-shifting and alignment. We can get the results by a series of calculation with the real interferogram and virtual interferograms generated by computer. DMIT requires a specific, reliable software system to ensure its normal work. Image acquisition and data processing are two important parts in this system. And it is also a challenge to realize the connection between the real and virtual interferometer. In this paper, we present a software system design for DMIT with friendly user interface and robust data processing features, enabling us to acquire the figure error of the measured asphere. We choose Visual C++ as the software development platform and control the ideal interferometer by using hybrid programming with Zemax. After image acquisition and data transmission, the system calls image processing algorithms written with Matlab to calculate the figure error of the measured asphere. We test the software system experimentally. In the experiment, we realize the measurement of an aspheric surface and prove the feasibility of the software system.

  16. Mood States Associated with Induced Defensiveness.

    ERIC Educational Resources Information Center

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  17. Self-Defense Distributed Engagement Coordinator

    DTIC Science & Technology

    2016-02-01

    its countermeasures. Whether a missile is defeated with an interceptor, undermined by a signal jammer, or diverted by a decoy, there is Self - Defense ...anti-ship threats and recommends actions to the personnel coordinating ship self - defense . This tool was recognized with a 2015 R&D 100 Award. a cost...reloading process, and may not be possible at all. The Self - Defense Distributed Engagement Coordinator (SDDEC) is designed to provide automated battle

  18. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Office Computer Software: A Comprehensive Review of Software Programs.

    ERIC Educational Resources Information Center

    Secretary, 1992

    1992-01-01

    Describes types of software including system software, application software, spreadsheets, accounting software, graphics packages, desktop publishing software, database, desktop and personal information management software, project and records management software, groupware, and shareware. (JOW)

  20. Investigation of the accuracy of MV radiation isocentre calculations in the Elekta cone-beam CT software XVI.

    PubMed

    Riis, Hans L; Moltke, Lars N; Zimmermann, Sune J; Ebert, Martin A; Rowshanfarzad, Pejman

    2016-06-07

    Accurate determination of the megavoltage (MV) radiation isocentre of a linear accelerator (linac) is an important task in radiotherapy. The localization of the MV radiation isocentre is crucial for correct calibration of the in-room lasers and the cone-beam CT scanner used for patient positioning prior to treatment. Linac manufacturers offer tools for MV radiation isocentre localization. As a user, there is no access to the documentation for the underlying method and calculation algorithm used in the commercial software. The idea of this work was to evaluate the accuracy of the software tool for MV radiation isocentre calculation as delivered by Elekta using independent software. The image acquisition was based on the scheme designed by the manufacturer. Eight MV images were acquired in each series of a ball-bearing (BB) phantom attached to the treatment couch. The images were recorded at cardinal angles of the gantry using the electronic portal imaging device (EPID). Eight Elekta linacs with three different types of multileaf collimators (MLCs) were included in the test. The influence of MLC orientation, x-ray energy, and phantom modifications were examined. The acquired images were analysed using the Elekta x-ray volume imaging (XVI) software and in-house developed (IHD) MATLAB code. Results from the two different software were compared. A discrepancy in the longitudinal direction of the isocentre localization was found averaging 0.23 mm up to a maximum of 0.75 mm. The MLC orientation or the phantom asymmetry in the longitudinal direction do not appear to cause the discrepancy. The main cause of the differences could not be clearly identified. However, it is our opinion that the commercial software delivered by the linac manufacturer should be improved to reach better stability and precise results in the MV radiation isocentre calculations.

  1. Software Library: A Reusable Software Issue.

    DTIC Science & Technology

    1984-06-01

    On reverse aide it neceeary aid Identify by block number) Software Library; Program Library; Reusability; Generator 20 ABSTRACT (Cmlnue on revere... Software Library. A particular example of the Software Library, the Program Library, is described as a prototype of a reusable library. A hierarchical... programming libraries are described. Finally, non code products in the Software Library are discussed. Accesson Fo NTIS R~jS DrrC TA Availability Codes 0

  2. Software for Teaching about AIDS & Sex: A Critical Review of Products. A MicroSIFT Report.

    ERIC Educational Resources Information Center

    Weaver, Dave

    This document contains critical reviews of 10 microcomputer software packages and two interactive videodisc products designed for use in teaching about Acquired Immune Deficiency Syndrome (AIDS) and sex at the secondary school level and above. Each package was reviewed by one or two secondary school health teachers and by a staff member from the…

  3. Proceedings of the Workshop on software tools for distributed intelligent control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herget, C.J.

    1990-09-01

    The Workshop on Software Tools for Distributed Intelligent Control Systems was organized by Lawrence Livermore National Laboratory for the United States Army Headquarters Training and Doctrine Command and the Defense Advanced Research Projects Agency. The goals of the workshop were to the identify the current state of the art in tools which support control systems engineering design and implementation, identify research issues associated with writing software tools which would provide a design environment to assist engineers in multidisciplinary control design and implementation, formulate a potential investment strategy to resolve the research issues and develop public domain code which can formmore » the core of more powerful engineering design tools, and recommend test cases to focus the software development process and test associated performance metrics. Recognizing that the development of software tools for distributed intelligent control systems will require a multidisciplinary effort, experts in systems engineering, control systems engineering, and compute science were invited to participate in the workshop. In particular, experts who could address the following topics were selected: operating systems, engineering data representation and manipulation, emerging standards for manufacturing data, mathematical foundations, coupling of symbolic and numerical computation, user interface, system identification, system representation at different levels of abstraction, system specification, system design, verification and validation, automatic code generation, and integration of modular, reusable code.« less

  4. Variation in Plant Defense Suppresses Herbivore Performance.

    PubMed

    Pearse, Ian S; Paul, Ryan; Ode, Paul J

    2018-06-18

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory [1, 2]. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores [3, 4]. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory [5]. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging. Published by Elsevier Ltd.

  5. Chemical defense: Bestowal of a nuptial alkaloidal garment by a male moth on its mate

    PubMed Central

    Conner, William E.; Boada, Ruth; Schroeder, Frank C.; González, Andrés; Meinwald, Jerrold; Eisner, Thomas

    2000-01-01

    Males of the moth Cosmosoma myrodora (Arctiidae) acquire pyrrolizidine alkaloid by feeding on the excrescent fluids of certain plants (for instance, Eupatorium capillifolium). They incorporate the alkaloid systemically and as a result are protected against spiders. The males have a pair of abdominal pouches, densely packed with fine cuticular filaments, which in alkaloid-fed males are alkaloid laden. The males discharge the filaments on the female in bursts during courtship, embellishing her with alkaloid as a result. The topical investiture protects the female against spiders. Alkaloid-free filaments, from alkaloid-deprived males, convey no such protection. The males also transmit alkaloid to the female by seminal infusion. The systemic alkaloid thus received, which itself may contribute to the female's defense against spiders, is bestowed in part by the female on the eggs. Although paternal contribution to egg defense had previously been demonstrated for several arctiid moths, protective nuptial festooning of a female by its mate, such as is practiced by C. myrodora, appears to be without parallel among insects. PMID:11114202

  6. The role of automatic defensive responses in the development of posttraumatic stress symptoms in police recruits: protocol of a prospective study.

    PubMed

    Koch, Saskia B J; Klumpers, Floris; Zhang, Wei; Hashemi, Mahur M; Kaldewaij, Reinoud; van Ast, Vanessa A; Smit, Annika S; Roelofs, Karin

    2017-01-01

    Background : Control over automatic tendencies is often compromised in challenging situations when people fall back on automatic defensive reactions, such as freeze - fight - flight responses. Stress-induced lack of control over automatic defensive responses constitutes a problem endemic to high-risk professions, such as the police. Difficulties controlling automatic defensive responses may not only impair split-second decisions under threat, but also increase the risk for and persistence of posttraumatic stress disorder (PTSD) symptoms. However, the significance of these automatic defensive responses in the development and maintenance of trauma-related symptoms remains unclear due to a shortage of large-scale prospective studies. Objective : The 'Police-in-Action' study is conducted to investigate the role of automatic defensive responses in the development and maintenance of PTSD symptomatology after trauma exposure. Methods : In this prospective study, 340 police recruits from the Dutch Police Academy are tested before (wave 1; pre-exposure) and after (wave 2; post-exposure) their first emergency aid experiences as police officers. The two waves of data assessment are separated by approximately 15 months. To control for unspecific time effects, a well-matched control group of civilians ( n  = 85) is also tested twice, approximately 15 months apart, but without being frequently exposed to potentially traumatic events. Main outcomes are associations between (changes in) behavioural, psychophysiological, endocrine and neural markers of automatic defensive responses and development of trauma-related symptoms after trauma exposure in police recruits. Discussion : This prospective study in a large group of primary responders enables us to distinguish predisposing from acquired neurobiological abnormalities in automatic defensive responses, associated with the development of trauma-related symptoms. Identifying neurobiological correlates of (vulnerability for

  7. Schools and Civil Defense.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…

  8. Defense Workforce Training Programs.

    ERIC Educational Resources Information Center

    Fletcher, J. D.; And Others

    This report discusses the amount and kinds of Department of Defense (DoD) interactive courseware (ICW) programs that are candidates for transfer to the private sector. Candidates for transfer were identified through an analysis of the Defense Instructional Technology Information System (DITIS). Out of 4,644 ICW programs that have been reported to…

  9. Product-oriented Software Certification Process for Software Synthesis

    NASA Technical Reports Server (NTRS)

    Nelson, Stacy; Fischer, Bernd; Denney, Ewen; Schumann, Johann; Richardson, Julian; Oh, Phil

    2004-01-01

    The purpose of this document is to propose a product-oriented software certification process to facilitate use of software synthesis and formal methods. Why is such a process needed? Currently, software is tested until deemed bug-free rather than proving that certain software properties exist. This approach has worked well in most cases, but unfortunately, deaths still occur due to software failure. Using formal methods (techniques from logic and discrete mathematics like set theory, automata theory and formal logic as opposed to continuous mathematics like calculus) and software synthesis, it is possible to reduce this risk by proving certain software properties. Additionally, software synthesis makes it possible to automate some phases of the traditional software development life cycle resulting in a more streamlined and accurate development process.

  10. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  11. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  12. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  13. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  14. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 3, May-June 2013

    DTIC Science & Technology

    2013-06-01

    in which the pieces are being shaped at the same time they are being as- sembled. If I am honest, software is probably more like a Rube Goldberg ...losing the focus on architecting activities that help maintain the desired state, enable cost savings, and ensure delivery tempo when other agile...masters degrees and working as developers), accepted by the same in- structor, with counted LOC identically, yielded variations as great as 22:1, and

  16. Method for acquiring, storing and analyzing crystal images

    NASA Technical Reports Server (NTRS)

    Gester, Thomas E. (Inventor); Rosenblum, William M. (Inventor); Christopher, Gayle K. (Inventor); Hamrick, David T. (Inventor); Delucas, Lawrence J. (Inventor); Tillotson, Brian (Inventor)

    2003-01-01

    A system utilizing a digital computer for acquiring, storing and evaluating crystal images. The system includes a video camera (12) which produces a digital output signal representative of a crystal specimen positioned within its focal window (16). The digitized output from the camera (12) is then stored on data storage media (32) together with other parameters inputted by a technician and relevant to the crystal specimen. Preferably, the digitized images are stored on removable media (32) while the parameters for different crystal specimens are maintained in a database (40) with indices to the digitized optical images on the other data storage media (32). Computer software is then utilized to identify not only the presence and number of crystals and the edges of the crystal specimens from the optical image, but to also rate the crystal specimens by various parameters, such as edge straightness, polygon formation, aspect ratio, surface clarity, crystal cracks and other defects or lack thereof, and other parameters relevant to the quality of the crystals.

  17. Case series on defense mechanisms in patients for reconstructive hand transplantation: consideration on transplant defense concept.

    PubMed

    Kumnig, Martin; Jowsey, Sheila G; Moreno, Elisa; Brandacher, Gerald; Azari, Kodi; Rumpold, Gerhard

    2014-05-16

    The technical demands of reconstructive hand transplantation (RHT) and need for complex multidisciplinary care have led to intense research efforts to improve patient care and outcomes. However, RHT is an extraordinary life event which carries the potential for long-term consequences including psychological distress, which invokes coping and defense mechanisms. Little is known about the relationship between psychological defense mechanisms and health outcomes in RHT patients. In an effort to elucidate this relationship, we studied seven RHT patients who underwent standardized psychological assessment either pre- or post transplantation. No single defense concept was identified as common to all patients, which we suspect was due in part to the varied mechanisms of hand loss. All seven patients demonstrated diverse psychological reactions to RHT. The self-reported defense styles were associated with psychological adjustment. The patients who reported defenses that distorted reality described less adaptive functioning and psychological well-being. These preliminary findings reveal the varied psychological mechanisms invoked in RHT patients. An assessment of defense mechanisms should be part of multicenter evaluation protocols that address unique psychosocial aspects of RHT in large samples, in order to better guide psychological management.

  18. Defense.gov Special Report: Travels with Carter

    Science.gov Websites

    Department of Defense Submit Search Travels With Carter Deputy Defense Secretary Ashton B. Carter July 2012 After a 10-day Asia trip, Deputy Defense Secretary Ashton B. Carter said he had succeeded in informing , U.S. Troops at End of Asia-Pacific Tour U.S. Deputy Defense Secretary Ashton B. Carter got a close

  19. Using the Defensive Style Questionnaire to evaluate the impact of sex reassignment surgery on defensive mechanisms in transsexual patients.

    PubMed

    Lobato, Maria Inês; Koff, Walter José; Crestana, Tiago; Chaves, Camila; Salvador, Jaqueline; Petry, Analídia Rodolpho; Silveira, Esalba; Henriques, Alexandre Annes; Cervo, Fábio; Böhme, Eduardo Siam; Massuda, Raffael

    2009-12-01

    To evaluate the impact of sex reassignment surgery on the defense mechanisms of 32 transsexual patients at two different points in time using the Defensive Style Questionnaire. The Defensive Style Questionnaire was applied to 32 patients upon their admission to the Gender Identity Disorder Program, and 12 months after they had undergone sex reassignment surgery. There were changes in two defense mechanisms: anticipation and idealization. However, no significant differences were observed in terms of the mature, neurotic and immature categories. One possible explanation for this result is the fact that the procedure does not resolve gender dysphoria, which is a core symptom in such patients. Another aspect is related to the early onset of the gender identity disorder, which determines a more regressive defensive structure in these patients. Sex reassignment surgery did not improve the defensive profile as measured by the Defensive Style Questionnaire.

  20. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    ERIC Educational Resources Information Center

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  1. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  2. Acquired hyperpigmentations*

    PubMed Central

    Cestari, Tania Ferreira; Dantas, Lia Pinheiro; Boza, Juliana Catucci

    2014-01-01

    Cutaneous hyperpigmentations are frequent complaints, motivating around 8.5% of all dermatological consultations in our country. They can be congenital, with different patterns of inheritance, or acquired in consequence of skin problems, systemic diseases or secondary to environmental factors. The vast majority of them are linked to alterations on the pigment melanin, induced by different mechanisms. This review will focus on the major acquired hyperpigmentations associated with increased melanin, reviewing their mechanisms of action and possible preventive measures. Particularly prominent aspects of diagnosis and therapy will be emphasized, with focus on melasma, post-inflammatory hyperpigmentation, periorbital pigmentation, dermatosis papulosa nigra, phytophotodermatoses, flagellate dermatosis, erythema dyschromicum perstans, cervical poikiloderma (Poikiloderma of Civatte), acanthosis nigricans, cutaneous amyloidosis and reticulated confluent dermatitis PMID:24626644

  3. Control software for two dimensional airfoil tests using a self-streamlining flexible walled transonic test section

    NASA Technical Reports Server (NTRS)

    Wolf, S. W. D.; Goodyer, M. J.

    1982-01-01

    Operation of the Transonic Self-Streamlining Wind Tunnel (TSWT) involved on-line data acquisition with automatic wall adjustment. A tunnel run consisted of streamlining the walls from known starting contours in iterative steps and acquiring model data. Each run performs what is described as a streamlining cycle. The associated software is presented.

  4. Self-Defense for Teens

    ERIC Educational Resources Information Center

    Givler, Jill I.

    2005-01-01

    Resources for self-defense training programs have become more popular and available over the last few years. Introducing a self-defense unit as part of a school physical education program is a wonderful way to address a number of psychosocial issues that prevail among teenagers today. The physical skills learned in this type of program allow…

  5. Whither Ballistic Missile Defense?

    DTIC Science & Technology

    1992-11-30

    Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing...Technical Marketing 2000: Opportunities and Strategies for a Changing World) Descriptors, Keywords: Cooper Speech Ballistic Missile Defense...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC

  6. ACHP | Defense Department Compliance with NHPA

    Science.gov Websites

    NHPA: Section 202(a)(6) Evaluation Report Defense Department Compliance with the National Historic )(6) Evaluation Report is a preliminary step in helping the Department of Defense marshall its Search skip specific nav links Home arrow Publications arrow Intro: Defense Department Compliance with

  7. The Defense Systems Acquisition and Review Council

    DTIC Science & Technology

    1976-09-15

    THE DEFENSE SYSTEMS ACQUISITION AND REVIEW COUNCIL.. A Study of Areas of Consideration Affecting the Functions and Process of Defense Major...COUNfIL: 4 Study of Areas of Considerationi Affecting/he Functions and Process of Defense _- 1 Major Systems Acquisition. , ; O,. v AUTHOR(e) I. C...Studies DSARC -- Functions and Process OSDCAIG *, Army Systems . A - =A -- he Defense Systems Acquisition Review Council (DSARC) was created to assume

  8. Defense.gov Special Report: Travels With Work

    Science.gov Websites

    Department of Defense Submit Search Travels With Work Deputy Defense Secretary Robert O. Work April 2015 Flag of Germany Germany Flag of U.S.A. USA Deputy Defense Secretary Bob Work is on a five-day trip isn't a piece of equipment - it's the men and women who serve, Deputy Defense Secretary Bob Work said

  9. The Art and Science of Defense Logistics

    DTIC Science & Technology

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  10. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933..., INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired. If...

  11. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    DTIC Science & Technology

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  12. CrossTalk, The Journal of Defense Software Engineering. Volume 26, Number 2. March/April 2013

    DTIC Science & Technology

    2013-04-01

    standards and best practices. “Software and hardware are at risk of being tam - pered with even before they are linked together in an operational system...because of their role in national and global security and the variety of valuable lessons learned and best practices they can provide because they are...Management. GAO said DoD’s efforts to implement SCRM can be a learning tool for others in the Federal government. DoD is currently imple- CrossTalk

  13. 75 FR 20578 - Federal Advisory Committee; Defense Health Board (DHB); Department of Defense Task Force on the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-20

    ... (DHB); Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces... announces a meeting of the Department of Defense Task Force on the Prevention of Suicide by Members of the... Secretary, Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One...

  14. The software architecture to control the Cherenkov Telescope Array

    NASA Astrophysics Data System (ADS)

    Oya, I.; Füßling, M.; Antonino, P. O.; Conforti, V.; Hagge, L.; Melkumyan, D.; Morgenstern, A.; Tosti, G.; Schwanke, U.; Schwarz, J.; Wegner, P.; Colomé, J.; Lyard, E.

    2016-07-01

    The Cherenkov Telescope Array (CTA) project is an initiative to build two large arrays of Cherenkov gamma- ray telescopes. CTA will be deployed as two installations, one in the northern and the other in the southern hemisphere, containing dozens of telescopes of different sizes. CTA is a big step forward in the field of ground- based gamma-ray astronomy, not only because of the expected scientific return, but also due to the order-of- magnitude larger scale of the instrument to be controlled. The performance requirements associated with such a large and distributed astronomical installation require a thoughtful analysis to determine the best software solutions. The array control and data acquisition (ACTL) work-package within the CTA initiative will deliver the software to control and acquire the data from the CTA instrumentation. In this contribution we present the current status of the formal ACTL system decomposition into software building blocks and the relationships among them. The system is modelled via the Systems Modelling Language (SysML) formalism. To cope with the complexity of the system, this architecture model is sub-divided into different perspectives. The relationships with the stakeholders and external systems are used to create the first perspective, the context of the ACTL software system. Use cases are employed to describe the interaction of those external elements with the ACTL system and are traced to a hierarchy of functionalities (abstract system functions) describing the internal structure of the ACTL system. These functions are then traced to fully specified logical elements (software components), the deployment of which as technical elements, is also described. This modelling approach allows us to decompose the ACTL software in elements to be created and the ow of information within the system, providing us with a clear way to identify sub-system interdependencies. This architectural approach allows us to build the ACTL system model and

  15. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multicore, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to approx.50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  16. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multi-core, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to .50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  17. Software Defined GPS Receiver for International Space Station

    NASA Technical Reports Server (NTRS)

    Duncan, Courtney B.; Robison, David E.; Koelewyn, Cynthia Lee

    2011-01-01

    JPL is providing a software defined radio (SDR) that will fly on the International Space Station (ISS) as part of the CoNNeCT project under NASA's SCaN program. The SDR consists of several modules including a Baseband Processor Module (BPM) and a GPS Module (GPSM). The BPM executes applications (waveforms) consisting of software components for the embedded SPARC processor and logic for two Virtex II Field Programmable Gate Arrays (FPGAs) that operate on data received from the GPSM. GPS waveforms on the SDR are enabled by an L-Band antenna, low noise amplifier (LNA), and the GPSM that performs quadrature downconversion at L1, L2, and L5. The GPS waveform for the JPL SDR will acquire and track L1 C/A, L2C, and L5 GPS signals from a CoNNeCT platform on ISS, providing the best GPS-based positioning of ISS achieved to date, the first use of multiple frequency GPS on ISS, and potentially the first L5 signal tracking from space. The system will also enable various radiometric investigations on ISS such as local multipath or ISS dynamic behavior characterization. In following the software-defined model, this work will create a highly portable GPS software and firmware package that can be adapted to another platform with the necessary processor and FPGA capability. This paper also describes ISS applications for the JPL CoNNeCT SDR GPS waveform, possibilities for future global navigation satellite system (GNSS) tracking development, and the applicability of the waveform components to other space navigation applications.

  18. A four-alternative forced choice (4AFC) software for observer performance evaluation in radiology

    NASA Astrophysics Data System (ADS)

    Zhang, Guozhi; Cockmartin, Lesley; Bosmans, Hilde

    2016-03-01

    Four-alternative forced choice (4AFC) test is a psychophysical method that can be adopted for observer performance evaluation in radiological studies. While the concept of this method is well established, difficulties to handle large image data, perform unbiased sampling, and keep track of the choice made by the observer have restricted its application in practice. In this work, we propose an easy-to-use software that can help perform 4AFC tests with DICOM images. The software suits for any experimental design that follows the 4AFC approach. It has a powerful image viewing system that favorably simulates the clinical reading environment. The graphical interface allows the observer to adjust various viewing parameters and perform the selection with very simple operations. The sampling process involved in 4AFC as well as the speed and accuracy of the choice made by the observer is precisely monitored in the background and can be easily exported for test analysis. The software has also a defensive mechanism for data management and operation control that minimizes the possibility of mistakes from user during the test. This software can largely facilitate the use of 4AFC approach in radiological observer studies and is expected to have widespread applicability.

  19. SeisFlows-Flexible waveform inversion software

    NASA Astrophysics Data System (ADS)

    Modrak, Ryan T.; Borisov, Dmitry; Lefebvre, Matthieu; Tromp, Jeroen

    2018-06-01

    SeisFlows is an open source Python package that provides a customizable waveform inversion workflow and framework for research in oil and gas exploration, earthquake tomography, medical imaging, and other areas. New methods can be rapidly prototyped in SeisFlows by inheriting from default inversion or migration classes, and code can be tested on 2D examples before application to more expensive 3D problems. Wave simulations must be performed using an external software package such as SPECFEM3D. The ability to interface with external solvers lends flexibility, and the choice of SPECFEM3D as a default option provides optional GPU acceleration and other useful capabilities. Through support for massively parallel solvers and interfaces for high-performance computing (HPC) systems, inversions with thousands of seismic traces and billions of model parameters can be performed. So far, SeisFlows has run on clusters managed by the Department of Defense, Chevron Corp., Total S.A., Princeton University, and the University of Alaska, Fairbanks.

  20. Assistant Secretary of Defense for Legislative Affairs

    Science.gov Websites

    Links Mission Congressional Links Secretary of Defense James Mattis
    Defense James Mattis" title=" Secretary of Defense James Mattis" /> The

  1. Upgrading of data acquisition software for centralized radiation monitoring system in Malaysian Nuclear Agency

    NASA Astrophysics Data System (ADS)

    Yussup, F.; Ibrahim, M. M.; Haris, M. F.; Soh, S. C.; Hasim, H.; Azman, A.; Razalim, F. A. A.; Yapp, R.; Ramli, A. A. M.

    2016-01-01

    With the growth of technology, many devices and equipments can be connected to the network and internet to enable online data acquisition for real-time data monitoring and control from monitoring devices located at remote sites. Centralized radiation monitoring system (CRMS) is a system that enables area radiation level at various locations in Malaysian Nuclear Agency (Nuklear Malaysia) to be monitored centrally by using a web browser. The Local Area Network (LAN) in Nuclear Malaysia is utilized in CRMS as a communication media for data acquisition of the area radiation levels from radiation detectors. The development of the system involves device configuration, wiring, network and hardware installation, software and web development. This paper describes the software upgrading on the system server that is responsible to acquire and record the area radiation readings from the detectors. The recorded readings are called in a web programming to be displayed on a website. Besides the main feature which is acquiring the area radiation levels in Nuclear Malaysia centrally, the upgrading involves new features such as uniform time interval for data recording and exporting, warning system and dose triggering.

  2. Upgrading of data acquisition software for centralized radiation monitoring system in Malaysian Nuclear Agency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yussup, F., E-mail: nolida@nm.gov.my; Ibrahim, M. M., E-mail: maslina-i@nm.gov.my; Soh, S. C.

    With the growth of technology, many devices and equipments can be connected to the network and internet to enable online data acquisition for real-time data monitoring and control from monitoring devices located at remote sites. Centralized radiation monitoring system (CRMS) is a system that enables area radiation level at various locations in Malaysian Nuclear Agency (Nuklear Malaysia) to be monitored centrally by using a web browser. The Local Area Network (LAN) in Nuclear Malaysia is utilized in CRMS as a communication media for data acquisition of the area radiation levels from radiation detectors. The development of the system involves devicemore » configuration, wiring, network and hardware installation, software and web development. This paper describes the software upgrading on the system server that is responsible to acquire and record the area radiation readings from the detectors. The recorded readings are called in a web programming to be displayed on a website. Besides the main feature which is acquiring the area radiation levels in Nuclear Malaysia centrally, the upgrading involves new features such as uniform time interval for data recording and exporting, warning system and dose triggering.« less

  3. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  4. User Interactive Software for Analysis of Human Physiological Data

    NASA Technical Reports Server (NTRS)

    Cowings, Patricia S.; Toscano, William; Taylor, Bruce C.; Acharya, Soumydipta

    2006-01-01

    Ambulatory physiological monitoring has been used to study human health and performance in space and in a variety of Earth-based environments (e.g., military aircraft, armored vehicles, small groups in isolation, and patients). Large, multi-channel data files are typically recorded in these environments, and these files often require the removal of contaminated data prior to processing and analyses. Physiological data processing can now be performed with user-friendly, interactive software developed by the Ames Psychophysiology Research Laboratory. This software, which runs on a Windows platform, contains various signal-processing routines for both time- and frequency- domain data analyses (e.g., peak detection, differentiation and integration, digital filtering, adaptive thresholds, Fast Fourier Transform power spectrum, auto-correlation, etc.). Data acquired with any ambulatory monitoring system that provides text or binary file format are easily imported to the processing software. The application provides a graphical user interface where one can manually select and correct data artifacts utilizing linear and zero interpolation and adding trigger points for missed peaks. Block and moving average routines are also provided for data reduction. Processed data in numeric and graphic format can be exported to Excel. This software, PostProc (for post-processing) requires the Dadisp engineering spreadsheet (DSP Development Corp), or equivalent, for implementation. Specific processing routines were written for electrocardiography, electroencephalography, electromyography, blood pressure, skin conductance level, impedance cardiography (cardiac output, stroke volume, thoracic fluid volume), temperature, and respiration

  5. Induction of plant defense gene expression by plant activators and Pseudomonas syringae pv. tomato in greenhouse-grown tomatoes.

    PubMed

    Herman, M A B; Davidson, J K; Smart, C D

    2008-11-01

    Plant activators provide an appealing management option for bacterial diseases of greenhouse-grown tomatoes. Two types of plant activators, one that induces systemic acquired resistance (SAR) and a second that activates induced systemic resistance (ISR), were evaluated for control of Pseudomonas syringae pv. tomato and effect on plant defense gene activation. Benzothiadiazole (BTH, SAR-inducing compound) effectively reduced bacterial speck incidence and severity, both alone and in combination with the ISR-inducing product. Application of BTH also led to elevated activation of salicylic acid and ethylene-mediated responses, based on real-time polymerase chain reaction analysis of marker gene expression levels. In contrast, the ISR-inducing product (made up of plant growth-promoting rhizobacteria) inconsistently modified defense gene expression and did not provide disease control to the same level as did BTH. No antagonism was observed by combining the two activators as control of bacterial speck was similar to or better than BTH alone.

  6. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE PAGES

    Sankaran, Jaganath; Fearey, Bryan L.

    2017-02-06

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  7. Missile defense and strategic stability: Terminal High Altitude Area Defense (THAAD) in South Korea

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sankaran, Jaganath; Fearey, Bryan L.

    South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis doesmore » not support this assertion. But, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. The United States Forces Korea will deploy THAD and that is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.« less

  8. The relationships between software publications and software systems

    NASA Astrophysics Data System (ADS)

    Hogg, David W.

    2017-01-01

    When we build software systems or software tools for astronomy, we sometimes do and sometimes don't also write and publish standard scientific papers about those software systems. I will discuss the pros and cons of writing such publications. There are impacts of writing such papers immediately (they can affect the design and structure of the software project itself), in the short term (they can promote adoption and legitimize the software), in the medium term (they can provide a platform for all the literature's mechanisms for citation, criticism, and reuse), and in the long term (they can preserve ideas that are embodied in the software, possibly on timescales much longer than the lifetime of any software context). I will argue that as important as pure software contributions are to astronomy—and I am both a preacher and a practitioner—software contributions are even more valuable when they are associated with traditional scientific publications. There are exceptions and complexities of course, which I will discuss.

  9. Advantages and Disadvantages in Image Processing with Free Software in Radiology.

    PubMed

    Mujika, Katrin Muradas; Méndez, Juan Antonio Juanes; de Miguel, Andrés Framiñan

    2018-01-15

    Currently, there are sophisticated applications that make it possible to visualize medical images and even to manipulate them. These software applications are of great interest, both from a teaching and a radiological perspective. In addition, some of these applications are known as Free Open Source Software because they are free and the source code is freely available, and therefore it can be easily obtained even on personal computers. Two examples of free open source software are Osirix Lite® and 3D Slicer®. However, this last group of free applications have limitations in its use. For the radiological field, manipulating and post-processing images is increasingly important. Consequently, sophisticated computing tools that combine software and hardware to process medical images are needed. In radiology, graphic workstations allow their users to process, review, analyse, communicate and exchange multidimensional digital images acquired with different image-capturing radiological devices. These radiological devices are basically CT (Computerised Tomography), MRI (Magnetic Resonance Imaging), PET (Positron Emission Tomography), etc. Nevertheless, the programs included in these workstations have a high cost which always depends on the software provider and is always subject to its norms and requirements. With this study, we aim to present the advantages and disadvantages of these radiological image visualization systems in the advanced management of radiological studies. We will compare the features of the VITREA2® and AW VolumeShare 5® radiology workstation with free open source software applications like OsiriX® and 3D Slicer®, with examples from specific studies.

  10. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... Prevention of Suicide by Members of the Armed Forces, a subcommittee of the Defense Health Board (DHB), will.... Additional information, agenda updates, and meeting registration are available online at the Defense Health...

  11. Indirect Plant Defense against Insect Herbivores: A Review

    USDA-ARS?s Scientific Manuscript database

    Plants respond to herbivore attack by launching two types of defenses: direct defense and indirect defense. Direct defense includes all plant traits that increase the resistance of host plants to attacking insect herbivores by affecting the physiology and/or behavior of the attackers. Indirect defe...

  12. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries. Effective...

  13. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries. Effective...

  14. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries. Effective...

  15. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries. Effective...

  16. Software Engineering Program: Software Process Improvement Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this document is to provide experience-based guidance in implementing a software process improvement program in any NASA software development or maintenance community. This guidebook details how to define, operate, and implement a working software process improvement program. It describes the concept of the software process improvement program and its basic organizational components. It then describes the structure, organization, and operation of the software process improvement program, illustrating all these concepts with specific NASA examples. The information presented in the document is derived from the experiences of several NASA software organizations, including the SEL, the SEAL, and the SORCE. Their experiences reflect many of the elements of software process improvement within NASA. This guidebook presents lessons learned in a form usable by anyone considering establishing a software process improvement program within his or her own environment. This guidebook attempts to balance general and detailed information. It provides material general enough to be usable by NASA organizations whose characteristics do not directly match those of the sources of the information and models presented herein. It also keeps the ideas sufficiently close to the sources of the practical experiences that have generated the models and information.

  17. A methodology for model-based development and automated verification of software for aerospace systems

    NASA Astrophysics Data System (ADS)

    Martin, L.; Schatalov, M.; Hagner, M.; Goltz, U.; Maibaum, O.

    Today's software for aerospace systems typically is very complex. This is due to the increasing number of features as well as the high demand for safety, reliability, and quality. This complexity also leads to significant higher software development costs. To handle the software complexity, a structured development process is necessary. Additionally, compliance with relevant standards for quality assurance is a mandatory concern. To assure high software quality, techniques for verification are necessary. Besides traditional techniques like testing, automated verification techniques like model checking become more popular. The latter examine the whole state space and, consequently, result in a full test coverage. Nevertheless, despite the obvious advantages, this technique is rarely yet used for the development of aerospace systems. In this paper, we propose a tool-supported methodology for the development and formal verification of safety-critical software in the aerospace domain. The methodology relies on the V-Model and defines a comprehensive work flow for model-based software development as well as automated verification in compliance to the European standard series ECSS-E-ST-40C. Furthermore, our methodology supports the generation and deployment of code. For tool support we use the tool SCADE Suite (Esterel Technology), an integrated design environment that covers all the requirements for our methodology. The SCADE Suite is well established in avionics and defense, rail transportation, energy and heavy equipment industries. For evaluation purposes, we apply our approach to an up-to-date case study of the TET-1 satellite bus. In particular, the attitude and orbit control software is considered. The behavioral models for the subsystem are developed, formally verified, and optimized.

  18. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    NASA Astrophysics Data System (ADS)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  19. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... announces that the Defense Health Board (DHB or Board) will meet on March 1-2, 2010, to address and.... Feeks, Executive Secretary, Defense Health Board, Five Skyline Place, 5111 Leesburg Pike, Suite 810...

  20. 48 CFR 225.7902 - Defense Trade Cooperation Treaties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Defense Trade Cooperation Treaties. 225.7902 Section 225.7902 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION EXPORT CONTROL 225.7902 Defense Trade Cooperation Treaties. This...

  1. 48 CFR 225.7902 - Defense Trade Cooperation Treaties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Defense Trade Cooperation Treaties. 225.7902 Section 225.7902 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION EXPORT CONTROL 225.7902 Defense Trade Cooperation Treaties. This...

  2. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  3. LC-IM-TOF Instrument Control & Data Visualization Software

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2011-05-12

    Liquid Chromatography-Ion Mobility-time of Flight Instrument Control and Data Visualization software is designed to control instrument voltages for the Ion Mobility drift tube. It collects and stores information collected from the Agilent TOF instrument and analyses/displays the ion intensity information acquired. The software interface can be split into 3 categories -- Instrument Settings/Controls, Data Acquisition, and Viewer. The Instrument Settings/Controls prepares the instrument for Data Acquisition. The Viewer contains common objects that are used by Instrument Settings/Controls and Data Acquisition. Intensity information is collected in 1 nanosec bins and separated by TOF pulses called scans. A collection of scans aremore » stored side by side making up an accumulation. In order for the computer to keep up with the stream of data, 30-50 accumulations are commonly summed into a single frame. A collection of frames makes up an experiment. The Viewer software then takes the experiment and presents the data in several possible ways, each frame can be viewed in TOF bins or m/z (mass to charge ratio). The experiment can be viewed frame by frame, merging several frames, or by viewing the peak chromatogram. The user can zoom into the data, export data, and/or animate frames. Additional features include calibration of the data and even post-processing multiplexed data.« less

  4. Defense Manpower Policy: Presentations from the 1976 Rand Conference on Defense Manpower

    DTIC Science & Technology

    1978-12-01

    organizations working on defense manpower issues and problems, This book contains selected presentations from ti -a Rand Confer- ence on Defense Manpower...the complete Conference agenda.) Nevertheless, the papers included here provide a reasonably good sampling of the topics and issues addressed at the...one of the key concerns in the Pentagon and on Capitol Hill. Accordingly, the purpose of this book is to shed some light on some of the major issues

  5. Comparative genomics of defense systems in archaea and bacteria

    PubMed Central

    Makarova, Kira S.; Wolf, Yuri I.; Koonin, Eugene V.

    2013-01-01

    Our knowledge of prokaryotic defense systems has vastly expanded as the result of comparative genomic analysis, followed by experimental validation. This expansion is both quantitative, including the discovery of diverse new examples of known types of defense systems, such as restriction-modification or toxin-antitoxin systems, and qualitative, including the discovery of fundamentally new defense mechanisms, such as the CRISPR-Cas immunity system. Large-scale statistical analysis reveals that the distribution of different defense systems in bacterial and archaeal taxa is non-uniform, with four groups of organisms distinguishable with respect to the overall abundance and the balance between specific types of defense systems. The genes encoding defense system components in bacterial and archaea typically cluster in defense islands. In addition to genes encoding known defense systems, these islands contain numerous uncharacterized genes, which are candidates for new types of defense systems. The tight association of the genes encoding immunity systems and dormancy- or cell death-inducing defense systems in prokaryotic genomes suggests that these two major types of defense are functionally coupled, providing for effective protection at the population level. PMID:23470997

  6. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  7. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  8. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  9. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  10. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 13.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY... States armed force and shall be designated by the General Counsel of the Department of Defense. (2) The...) of the Department of Defense. (3) The Chief Defense Counsel shall supervise all defense activities...

  11. 75 FR 9399 - Defense Health Board (DHB) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Health Board (DHB) Meeting AGENCY... of the Defense Health Board (DHB), will meet on March 11, 2010. Subject to the availability of space... INFORMATION: Due to internal DoD difficulties, beyond the control of the Defense Health Board or its...

  12. X-Band Acquisition Aid Software

    NASA Technical Reports Server (NTRS)

    Britcliffe, Michael J.; Strain, Martha M.; Wert, Michael

    2011-01-01

    The X-band Acquisition Aid (AAP) software is a low-cost acquisition aid for the Deep Space Network (DSN) antennas, and is used while acquiring a spacecraft shortly after it has launched. When enabled, the acquisition aid provides corrections to the antenna-predicted trajectory of the spacecraft to compensate for the variations that occur during the actual launch. The AAP software also provides the corrections to the antenna-predicted trajectory to the navigation team that uses the corrections to refine their model of the spacecraft in order to produce improved antenna-predicted trajectories for each spacecraft that passes over each complex. The software provides an automated Acquisition Aid receiver calibration, and provides graphical displays to the operator and remote viewers via an Ethernet connection. It has a Web server, and the remote workstations use the Firefox browser to view the displays. At any given time, only one operator can control any particular display in order to avoid conflicting commands from more than one control point. The configuration and control is accomplished solely via the graphical displays. The operator does not have to remember any commands. Only a few configuration parameters need to be changed, and can be saved to the appropriate spacecraft-dependent configuration file on the AAP s hard disk. AAP automates the calibration sequence by first commanding the antenna to the correct position, starting the receiver calibration sequence, and then providing the operator with the option of accepting or rejecting the new calibration parameters. If accepted, the new parameters are stored in the appropriate spacecraft-dependent configuration file. The calibration can be performed on the Sun, greatly expanding the window of opportunity for calibration. The spacecraft traditionally used for calibration is in view typically twice per day, and only for about ten minutes each pass.

  13. Defense Research Enterprise Assessment

    DTIC Science & Technology

    2017-01-01

    ACQUISITION, TECHNOLOGY , AND LOGISTICS OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 JAN 2 5 2017...fulfill vital missions on behalf of the Warfighter. This DoD research enterprise is characterized by high-quality science, technology transition, and...smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to serve and ready

  14. Strategic defense initiative: critical issues

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuckolls, J.H.

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to themore » defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)« less

  15. Differentiation of depression and anxiety groups using defense mechanisms.

    PubMed

    Olson, Trevor R; Presniak, Michelle D; MacGregor, Michael Wm

    2009-11-01

    We examined whether participants in depressed and anxious groups could be classified correctly using observer and self-report measures of defense mechanisms. A sample of 1182 university students completed the Personality Assessment Inventory and those scoring in the clinical range on either depression or anxiety indices were selected for participation. In total, 25 participants met criteria for the depressed group and 94 met criteria for the anxious group. Individual defense scores from the Defense-Q and the Defense Style Questionnaire were separately entered into 2 stepwise discriminant analyses. After cross-validation, the Defense-Q and Defense Style Questionnaire analyses classified participants with 75.0% and 71.3% accuracy, respectively. The results indicated that depression and anxiety groups can be significantly differentiated by defense use alone. Important differences in defensive functioning between these groups were confirmed and differences between observer and self-report measures of defenses mechanisms and current challenges in defense research were highlighted.

  16. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less

  17. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  18. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  19. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  20. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...