48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... a contract that is used to acquire designated commercial software or related services such as... Officer to develop processes for DoD-wide software asset management. Software maintenance means services...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2010 CFR
2010-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208... services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI... software and related services. ESI does not dictate the products or services to be acquired. ...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7403 - Acquisition procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7403 Acquisition procedures. Follow the procedures at PGI 208.7403 when acquiring commercial software and related services. [71 FR 39005, July 11, 2006] ...
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7
2006-07-01
public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto
Acquisition Handbook - Update. Comprehensive Approach to Reusable Defensive Software (CARDS)
1994-03-25
designs, and implementation components (source code, test plans, procedures and results, and system/software documentation). This handbook provides a...activities where software components are acquired, evaluated, tested and sometimes modified. In addition to serving as a facility for the acquisition and...systems from such components [1]. Implementation components are at the lowest level and consist of: specifications; detailed designs; code, test
Code of Federal Regulations, 2011 CFR
2011-10-01
... acquired from a small business concern or a commercial item acquired under FAR part 12 or part 8. (1) The... property. The Defense Contract Management Agency (DCMA) eTools software application is the DoD data... procedures for reporting loss of Government property to eTools are set forth in the clause at 252.245-7002...
Technology collaboration by means of an open source government
NASA Astrophysics Data System (ADS)
Berardi, Steven M.
2009-05-01
The idea of open source software originally began in the early 1980s, but it never gained widespread support until recently, largely due to the explosive growth of the Internet. Only the Internet has made this kind of concept possible, bringing together millions of software developers from around the world to pool their knowledge. The tremendous success of open source software has prompted many corporations to adopt the culture of open source and thus share information they previously held secret. The government, and specifically the Department of Defense (DoD), could also benefit from adopting an open source culture. In acquiring satellite systems, the DoD often builds walls between program offices, but installing doors between programs can promote collaboration and information sharing. This paper addresses the challenges and consequences of adopting an open source culture to facilitate technology collaboration for DoD space acquisitions. DISCLAIMER: The views presented here are the views of the author, and do not represent the views of the United States Government, United States Air Force, or the Missile Defense Agency.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... Data and Computer Software AGENCY: Defense Acquisition Regulations System; Department of Defense (DoD... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information to...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caudell, R.B.; Bauder, M.E.; Boyer, W.B.
1993-09-01
Sandia National Laboratories (SNL) Instrumentation Development Department was tasked by the Defense Nuclear Agency (DNA) to record data on Tektronix RTD720 Digitizers on the HUNTERS TROPHY field test conducted at the Nevada Test Site (NTS) on September 18, 1992. This report contains a overview and description of the computer hardware and software that was used to acquire, reduce, and display the data. The document is divided into two volumes: an overview and operators manual (Volume 1) and a maintenance manual (Volume 2).
2013-02-25
Directive 5160.41E, Defense Language Program . 10GAO-11-456. Page 5 GAO-13-251R Defense Contracting types of foreign language support that DOD has acquired...Language Transformation Roadmap, (January 2005), and Department of Defense Directive 5160.41E, Defense Language Program . Page 15 GAO-13-251R Defense...examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help
Trade-offs between acquired and innate immune defenses in humans
McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.
2016-01-01
Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
...; Defense Federal Acquisition Regulation Supplement; Rights in Technical Data and Computer Software (OMB... 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and... rights in technical data and computer software. DoD needs this information to implement 10 U.S.C. 2320...
2005-01-01
developed a partnership with the Defense Acquisition University to in- tegrate DISA’s systems engineering processes, software , and network...in place, with processes being implemented: deployment management; systems engineering ; software engineering ; configuration man- agement; test and...CSS systems engineering is a transition partner with Carnegie Mellon University’s Software Engineering Insti- tute and its work on the capability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-07
... 215, 234, 242, and 252 Defense Federal Acquisition Regulation Supplement; Cost and Software Data... Regulation Supplement (DFARS) to set forth DoD Cost and Software Data Reporting system requirements for major... set forth the DoD requirement for offerors to: Describe the standard Cost and Software Data Reporting...
Estimating Software Effort Hours for Major Defense Acquisition Programs
ERIC Educational Resources Information Center
Wallshein, Corinne C.
2010-01-01
Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…
Code of Federal Regulations, 2014 CFR
2014-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2012 CFR
2012-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2011 CFR
2011-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2013 CFR
2013-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Certified Binaries for Software Components
2007-09-01
is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored...by the U.S. Department of Defense. Copyright 2007 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 9
2008-09-01
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson...SEP 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE CrossTalk: The Journal of Defense Software Engineering...The Journal of Defense Software Engineering September 2008 4 10 15 19 24 26 Securing Legacy C Applications Using Dynamic Data Flow Analysis This
76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-05
... Regulation Supplement; Open Source Software Public Meeting AGENCY: Defense Acquisition Regulations System... initiate a dialogue with industry regarding the use of open source software in DoD contracts. DATES: Public... be held in the General Services Administration (GSA), Central Office Auditorium, 1800 F Street NW...
Low Cost Ways to Keep Software Current.
ERIC Educational Resources Information Center
Schultheis, Robert A.
1992-01-01
Discusses strategies for providing students with current computer software technology including acquiring previous versions of software, obtaining demonstration software, using student versions, getting examination software, buying from mail order firms, buying few copies, exploring site licenses, acquiring shareware or freeware, and applying for…
Four Pillars of Service-Oriented Architecture
2007-09-01
ic A lig n m e n t Figure 1: Pillars of SOA-Based Systems Development Service -Oriented Architectures 12 CROSSTALK The Journal of Defense Software ...et al. “On the Business Value and Technical Challenges of Adopting Web Services .” Journal of Software Maintenance and Evolution 16 (2004): 16, 31-50...10 CROSSTALK The Journal of Defense Software Engineering September 2007 Acornerstone of DoD policy forfuture software and systems policy is the
78 FR 45515 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
...] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has... Supplement (DFARS) Subpart 227.71, Rights in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and clauses of the Defense Federal...
32 CFR 32.37 - Property trust relationship.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Property trust relationship. 32.37 Section 32.37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... trust relationship. Real property, equipment, intangible property and debt instruments that are acquired...
Department of Defense Healthcare Management System Modernization (DHMSM)
2016-03-01
2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization...DHMSM) DoD Component DoD The acquiring DoD Component is Program Executive Office (PEO) Department of Defense (DoD) Healthcare Management Systems (DHMS
Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
2014-10-01
of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance
Data processing for the DMSP microwave radiometer system
NASA Technical Reports Server (NTRS)
Rigone, J. L.; Stogryn, A. P.
1977-01-01
A software program was developed and tested to process microwave radiometry data to be acquired by the microwave sensor (SSM/T) on the Defense Meteorological Satellite Program spacecraft. The SSM/T 7-channel microwave radiometer and systems data will be data-linked to Air Force Global Weather Central (AFGWC) where they will be merged with ephemeris data prior to product processing for use in the AFGWC upper air data base (UADB). The overall system utilizes an integrated design to provide atmospheric temperature soundings for global applications. The fully automated processing at AFGWC was accomplished by four related computer processor programs to produce compatible UADB soundings, evaluate system performance, and update the a priori developed inversion matrices. Tests with simulated data produced results significantly better than climatology.
SDI (Strategic Defense Initiative) Software Technology Program Plan
1987-06-01
station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 3
2006-03-01
Humphreys & Associates, Inc., 2002. 3. Humphrey , Watts S . PSP : A Self- Improvement Process for...sanderfer.html>. 5. Humphrey , Watts S . A Discipline for Software Engineering. Addison- Wesley, 1995. 6. Tuma, David, and David R. Webb. “Personal Earned Value: Why...o u r c e li n e s o f c o d e ) Figure 3: Differences for Highest Degree Attained PSP /TSP 12 CROSSTALK The Journal of Defense Software
A Benzothiadiazole Primes Parsley Cells for Augmented Elicitation of Defense Responses
Katz, Vera A.; Thulke, Oliver U.; Conrath, Uwe
1998-01-01
Systemic acquired resistance is an important component of the disease-resistance arsenal of plants, and is associated with an enhanced potency for activating local defense responses upon pathogen attack. Here we demonstrate that pretreatment with benzothiadiazole (BTH), a synthetic activator of acquired resistance in plants, augmented the sensitivity for low-dose elicitation of coumarin phytoalexin secretion by cultured parsley (Petroselinum crispum L.) cells. Enhanced coumarin secretion was associated with potentiated activation of genes encoding Phe ammonia-lyase (PAL). The augmentation of PAL gene induction was proportional to the length of pretreatment with BTH, indicating time-dependent priming of the cells. In contrast to the PAL genes, those for anionic peroxidase were directly induced by BTH in the absence of elicitor, thus confirming a dual role for BTH in the activation of plant defenses. Strikingly, the ability of various chemicals to enhance plant disease resistance correlated with their capability to potentiate parsley PAL gene elicitation, emphasizing an important role for defense response potentiation in acquired plant disease resistance. PMID:9701589
NASA Technical Reports Server (NTRS)
Sundermier, Amy (Inventor)
2002-01-01
A method for acquiring and assembling software components at execution time into a client program, where the components may be acquired from remote networked servers is disclosed. The acquired components are assembled according to knowledge represented within one or more acquired mediating components. A mediating component implements knowledge of an object model. A mediating component uses its implemented object model knowledge, acquired component class information and polymorphism to assemble components into an interacting program at execution time. The interactions or abstract relationships between components in the object model may be implemented by the mediating component as direct invocations or indirect events or software bus exchanges. The acquired components may establish communications with remote servers. The acquired components may also present a user interface representing data to be exchanged with the remote servers. The mediating components may be assembled into layers, allowing arbitrarily complex programs to be constructed at execution time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Special Purpose Loans Defense... loans to help eligible small businesses transition from defense to civilian markets, or eligible individuals adversely impacted by base closures or defense cutbacks to acquire or open and operate a small...
2001-09-01
Oriented Discrete Event Simulation,” Master’s Thesis in Operations Research, Naval Postgraduate School Monterey, CA, 1996. 12. Arntzen , A., “Software...Dependent Hit Probabilities”, Naval Research Logistics, Vol. 31, pp. 363-371, 1984. 3 Arntzen , A., “Software Components for Air Defense Planning
beta-Aminoalcohols as Potential Reactivators of Aged Sarin-/Soman-Inhibited Acetylcholinesterase
2017-02-08
This approach includes high - quality quantum mechanical/molecular mechanical calcula- tions, providing reliable reactivation steps and energetics...I. V. Khavrutskii Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced...b] Dr. A. Wallqvist Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced
Air Force and the Cyberspace Mission: Defending the Air Force’s Computer Network in the Future
2007-12-01
computers, their operating systems and software purchased by the Air Force are commercial off-the-shelf (COTS) components, often manufactured abroad due...crystal clear 2003 information security report: “The U.S. Department of Defense (DOD) relies too much on commercial software , doesn’t know who is...creating the software , and faces other significant cybersecurity problems.”11 This paper explores the topic of defense of the cyberspace domain by
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 215, 234, 242, and 252... System (DFARS Case 2008-D027) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... 1921-2, Progress Curve Report Comment: A respondent noted that DD Form 1921-2 Progress Curve Report...
CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 4, July/August 2010
2010-08-01
Anita Carleton, Del Kellogg, and Jeff Schwalb Building Critical Systems as a Cyborg As outrageous as it may seem, adapting cybernetics to defense...software is a real possibility in building complex software systems. Ball discusses the history of cybernetics, what a “ cyborg ” really is, and how...What Is a Cyborg ? We want both kinds of the behavior that I’ve talked about, with predictable systems that follow established rules and proce- dures
32 CFR 631.10 - Administration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 4 2010-07-01 2010-07-01 true Administration. 631.10 Section 631.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL... Disciplinary Control Boards § 631.10 Administration. (a) Commanders are authorized to acquire, report, process...
32 CFR 631.10 - Administration.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 4 2012-07-01 2011-07-01 true Administration. 631.10 Section 631.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL... Disciplinary Control Boards § 631.10 Administration. (a) Commanders are authorized to acquire, report, process...
32 CFR 631.10 - Administration.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 4 2013-07-01 2013-07-01 false Administration. 631.10 Section 631.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL... Disciplinary Control Boards § 631.10 Administration. (a) Commanders are authorized to acquire, report, process...
32 CFR 631.10 - Administration.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 4 2011-07-01 2011-07-01 false Administration. 631.10 Section 631.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL... Disciplinary Control Boards § 631.10 Administration. (a) Commanders are authorized to acquire, report, process...
Salivary Defense Proteins: Their Network and Role in Innate and Acquired Oral Immunity
Fábián, Tibor Károly; Hermann, Péter; Beck, Anita; Fejérdy, Pál; Fábián, Gábor
2012-01-01
There are numerous defense proteins present in the saliva. Although some of these molecules are present in rather low concentrations, their effects are additive and/or synergistic, resulting in an efficient molecular defense network of the oral cavity. Moreover, local concentrations of these proteins near the mucosal surfaces (mucosal transudate), periodontal sulcus (gingival crevicular fluid) and oral wounds and ulcers (transudate) may be much greater, and in many cases reinforced by immune and/or inflammatory reactions of the oral mucosa. Some defense proteins, like salivary immunoglobulins and salivary chaperokine HSP70/HSPAs (70 kDa heat shock proteins), are involved in both innate and acquired immunity. Cationic peptides and other defense proteins like lysozyme, bactericidal/permeability increasing protein (BPI), BPI-like proteins, PLUNC (palate lung and nasal epithelial clone) proteins, salivary amylase, cystatins, prolin-rich proteins, mucins, peroxidases, statherin and others are primarily responsible for innate immunity. In this paper, this complex system and function of the salivary defense proteins will be reviewed. PMID:22605979
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired— (a) As part of a system or system upgrade, where practicable; (b) Under a service contract; (c) Under...
The Defense Technical Information Center: Acquiring Information and Imparting Knowledge.
ERIC Educational Resources Information Center
Molholm, Kurt N.; And Others
1988-01-01
This overview of the Defense Technical Information Center (DTIC) discusses how DTIC fits into the Department of Defense Scientific and Technical Information Program; its history, organization, users, and operations; types of information handled; subject classification; cataloging standards; Information Analysis Centers (IACs); and research and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... received will be considered by DoD in the formation of a recommendation to the Secretary of Defense if a... States to provide defense articles and defense services to friendly countries and international... Assistance and related activities. The articles and services acquired via FMS sales are procured through the...
Code of Federal Regulations, 2012 CFR
2012-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
Code of Federal Regulations, 2014 CFR
2014-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. (1) Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative...
Code of Federal Regulations, 2011 CFR
2011-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
Code of Federal Regulations, 2013 CFR
2013-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
32 CFR 644.3 - Navigation projects.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 4 2011-07-01 2011-07-01 false Navigation projects. 644.3 Section 644.3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Project Planning Civil Works § 644.3 Navigation projects. (a) Land to be acquired in fee...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
75 FR 52316 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
...-acquired in 2003 or 2004 and that the Office of the Under Secretary of Defense for Acquisition, Technology & Logistics determined at that time possessed defense critical technology under development. Affected Public...
29 CFR 570.141 - Good faith defense.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 3 2011-07-01 2011-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...
29 CFR 570.141 - Good faith defense.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 3 2013-07-01 2013-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...
29 CFR 570.141 - Good faith defense.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 3 2014-07-01 2014-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...
29 CFR 570.141 - Good faith defense.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 3 2012-07-01 2012-07-01 false Good faith defense. 570.141 Section 570.141 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.141 Good faith defense. A... ships or delivers for shipment in commerce goods which he acquired in good faith in reliance on written...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-29
... Structures (DFARS Case 2012-D015) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... structures. DATES: Effective date: June 29, 2012. Comment date: Comments are due by August 28, 2012..., when acquiring tents and other temporary structures, regardless of whether purchased by DoD or by...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2011 CFR
2011-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2013 CFR
2013-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2012 CFR
2012-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2014 CFR
2014-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2010 CFR
2010-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
33 CFR 211.2 - Authority to acquire real estate.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...
33 CFR 211.2 - Authority to acquire real estate.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...
33 CFR 211.2 - Authority to acquire real estate.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...
33 CFR 211.2 - Authority to acquire real estate.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional authority...
Assessing Survivability Using Software Fault Injection
2001-04-01
UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO10875 TITLE: Assessing Survivability Using Software Fault Injection...Esc to exit .......................................................................... = 11-1 Assessing Survivability Using Software Fault Injection...Jeffrey Voas Reliable Software Technologies 21351 Ridgetop Circle, #400 Dulles, VA 20166 jmvoas@rstcorp.crom Abstract approved sources have the
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... Defense Authorization Act for Fiscal Year 2011. Section 847 provides a nonavailability exception to the requirement at 10 U.S.C. 2533a (Berry Amendment) to acquire only domestic hand or measuring tools. DATES... DFARS 225.7002-2 to implement section 847 of the National Defense Authorization Act for Fiscal Year 2011...
The China Factor in Japanese Military Modernization for the 21st Century
1997-06-01
Japan’s ongoing modernization of its forces, which are directed under its National Defense Program Outline and Midterm Defense Program, do not, however...directed under its National Defense Program Outline and Midterm Defense Program, do not, however, seem to be in reaction to any overt perception of a...It did so with the economic motive of acquiring a captive market for Japanese consumer goods, the strategic consideration of preempting Russian
2010-01-01
offshoring, or producing major software components overseas (Defense Science Board, 2009). These trends raise concerns about the level of trust that...7 Software Complexity...7 Increasing Software Vulnerabilities and Malware Population . . . . . . . . . . . . . . . . 9 Limitations of
ERIC Educational Resources Information Center
Mukala, Patrick; Cerone, Antonio; Turini, Franco
2017-01-01
Free\\Libre Open Source Software (FLOSS) environments are increasingly dubbed as learning environments where practical software engineering skills can be acquired. Numerous studies have extensively investigated how knowledge is acquired in these environments through a collaborative learning model that define a learning process. Such a learning…
77 FR 40863 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0085] Privacy Act of 1974... Register Liaison Officer, Department of Defense. QNRO-31 System name: Software Security Risk Evaluations... the Department of Defense; DoDD 5240.2, DoD Counterintelligence (CI); DoDI 5240.8, Security...
Code of Federal Regulations, 2011 CFR
2011-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2010 CFR
2010-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2012 CFR
2012-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2014 CFR
2014-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2013 CFR
2013-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 241.201 Section 241.201 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF UTILITY SERVICES Acquiring Utility Services 241...
Strategy for a DOD Software Initiative. Volume 2. Appendices
1983-10-01
Druffel 9 PERFORMING ORGANIZATION NAME AND ADDRESS 1 10 . PROGRAM ELEMENT. PROJECT. TASK AREA 6 WORK UN17 NUMBERS Office of Under Secretary of Defense...New Approach j Lwering DoD Software Costs, Honeywell Aerospace and Defense Group, March 1982. 3 10 p - -q Recognizing that the opportunities and needs...Epstein, M. Fallon, R. A. Farrar, B. L. Fischer, Herman Fisher, Dave Fowler, Northrup, III Fox, Joseph Frager, David S. Frank, Geoffrey A. Fredette
Extending Team Software Process (TSP) to Systems Engineering: A NAVAIR Experience Report
2010-03-01
instrumental in formulating the concepts and approaches presented in this report: Dan Burton, Anita Carleton, Timothy Chick, Mike Fehring, Watts Humphrey ...Senate,” GAO-04-393, Defense Acquisitions, 2004. http://www.gao.gov/new.items/d04393.pdf [ Humphrey 06] W. S . Humphrey , TSP: Leading a Development... Humphrey 08] W. S . Humphrey , “The Process Revolution,” CrossTalk The Journal of Defense Software Engineering, August 2008, Volume 28 Number 8
Software Master Plan. Volume 2. Background (Annexes A-G)
1990-02-09
AFLC is also responsible for the support of the Avionics Integration Support Facilities, the pilot training systems support and the Automatic Test ...Deputy Director of Defense Research and Engineering ( Test & Evaluation) ..... ............ A.1.1.3 Office of the Deputy Director of Defense Research and...Department of Defense .... ........ 3 A.3 Operational Test & Evaluation ........ ................. 4 A.4 Office of the Assistant Secretary of Defense
SOFTWARE ENGINEERING INSTITUTE (SEI)
The Software Engineering Institute (SEI) is a federally funded research and development center established in 1984 by the U.S. Department of Defense and operated by Carnegie Mellon University. SEI has a broad charter to provide leadership in the practice of software engineering t...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
Joint Operational Medicine Information Systems (JOMIS)
2016-03-01
Component is Program Executive Office (PEO) Department of Defense (DoD) Healthcare Management Systems (DHMS) for Defense Health Agency (DHA). Responsible...AT&L)) and the Program Executive Office (PEO) Defense Healthcare Management Systems (DHMS). Operational medicine is the application of routine and...acquired by the DoD Healthcare Management System Modernization (DHMSM) program for Health Care Delivery (HCD) capabilities. JOMIS future release(s
Code of Federal Regulations, 2010 CFR
2010-10-01
... 3011.602 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... contractors to acquire products, materials, and services under the Defense Priorities and Allocations System (DPAS) regulations (15 CFR part 700): (1) The U.S. Coast Guard in support of certified national defense...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 3011.602 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... contractors to acquire products, materials, and services under the Defense Priorities and Allocations System (DPAS) regulations (15 CFR part 700): (1) The U.S. Coast Guard in support of certified national defense...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 3011.602 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... contractors to acquire products, materials, and services under the Defense Priorities and Allocations System (DPAS) regulations (15 CFR part 700): (1) The U.S. Coast Guard in support of certified national defense...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 3011.602 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... contractors to acquire products, materials, and services under the Defense Priorities and Allocations System (DPAS) regulations (15 CFR part 700): (1) The U.S. Coast Guard in support of certified national defense...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 3011.602 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... contractors to acquire products, materials, and services under the Defense Priorities and Allocations System (DPAS) regulations (15 CFR part 700): (1) The U.S. Coast Guard in support of certified national defense...
Plant innate immunity: an updated insight into defense mechanism.
Muthamilarasan, Mehanathan; Prasad, Manoj
2013-06-01
Plants are invaded by an array of pathogens of which only a few succeed in causing disease. The attack by others is countered by a sophisticated immune system possessed by the plants. The plant immune system is broadly divided into two, viz. microbial-associated molecular-patterns-triggered immunity (MTI) and effector-triggered immunity (ETI). MTI confers basal resistance, while ETI confers durable resistance, often resulting in hypersensitive response. Plants also possess systemic acquired resistance (SAR), which provides long-term defense against a broad-spectrum of pathogens. Salicylic-acid-mediated systemic acquired immunity provokes the defense response throughout the plant system during pathogen infection at a particular site. Trans-generational immune priming allows the plant to heritably shield their progeny towards pathogens previously encountered. Plants circumvent the viral infection through RNA interference phenomena by utilizing small RNAs. This review summarizes the molecular mechanisms of plant immune system, and the latest breakthroughs reported in plant defense. We discuss the plant–pathogen interactions and integrated defense responses in the context of presenting an integral understanding in plant molecular immunity.
48 CFR 12.212 - Computer software.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...
48 CFR 12.212 - Computer software.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...
48 CFR 12.212 - Computer software.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...
48 CFR 12.212 - Computer software.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...
48 CFR 12.212 - Computer software.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Computer software. 12.212... software. (a) Commercial computer software or commercial computer software documentation shall be acquired... required to— (1) Furnish technical information related to commercial computer software or commercial...
Educational Software Acquisition for Microcomputers.
ERIC Educational Resources Information Center
Erikson, Warren; Turban, Efraim
1985-01-01
Examination of issues involved in acquiring appropriate microcomputer software for higher education focuses on the following points: developing your own software; finding commercially available software; using published evaluations; pre-purchase testing; customizing and adapting commercial software; post-purchase testing; and software use. A…
NASA Technical Reports Server (NTRS)
1992-01-01
This standard specifies the software assurance program for the provider of software. It also delineates the assurance activities for the provider and the assurance data that are to be furnished by the provider to the acquirer. In any software development effort, the provider is the entity or individual that actually designs, develops, and implements the software product, while the acquirer is the entity or individual who specifies the requirements and accepts the resulting products. This standard specifies at a high level an overall software assurance program for software developed for and by NASA. Assurance includes the disciplines of quality assurance, quality engineering, verification and validation, nonconformance reporting and corrective action, safety assurance, and security assurance. The application of these disciplines during a software development life cycle is called software assurance. Subsequent lower-level standards will specify the specific processes within these disciplines.
ERIC Educational Resources Information Center
Haley, M.
2013-01-01
The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…
Reusable Ada Software for Command and Control Workstation Map Manipulation
1992-06-18
h-.. I.. b 1 .. hm . T.... ~ N -k.L A..-bt ... ~ 4.g -np ft. Figure 15. The Main Display Storyboard (final iteration) are other panels not shown which...Defense, October 1988. 18. Defense Mapping Agency, Products Catalog, Digitizing The Future, 3d ed., Department of Defense, No Date. 183 19. Deitel , H
48 CFR 227.7207 - Contractor data repositories.
Code of Federal Regulations, 2010 CFR
2010-10-01
... repositories. 227.7207 Section 227.7207 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Computer Software and Computer Software Documentation 227.7207 Contractor data repositories. Follow 227.7108 when it is in the Government's interests to have a data repository include computer software or to...
32 CFR 552.32 - Authority to acquire real estate and interests therein.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...
32 CFR 552.32 - Authority to acquire real estate and interests therein.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...
32 CFR 552.32 - Authority to acquire real estate and interests therein.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...
32 CFR 552.32 - Authority to acquire real estate and interests therein.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...
32 CFR 552.32 - Authority to acquire real estate and interests therein.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal ownership...
Emerging Technologies for Software-Reliant Systems
2011-02-24
needs • Loose coupling • Global distribution of hardware, software and people • Horizontal integration and convergence • Virtualization...Webinar– February 2011 © 2011 Carnegie Mellon University Global Distribution of Hardware, Software and People Globalization is an essential part of...University Required Software Engineering Emphasis Due to Emerging Technologies (2) Defensive Programming • Security • Auto-adaptation • Globalization
Automated Software Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2012 CFR
2012-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2013 CFR
2013-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2010 CFR
2010-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2011 CFR
2011-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2014 CFR
2014-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
Acquiring Software Design Schemas: A Machine Learning Perspective
NASA Technical Reports Server (NTRS)
Harandi, Mehdi T.; Lee, Hing-Yan
1991-01-01
In this paper, we describe an approach based on machine learning that acquires software design schemas from design cases of existing applications. An overview of the technique, design representation, and acquisition system are presented. the paper also addresses issues associated with generalizing common features such as biases. The generalization process is illustrated using an example.
Plant defense activators: applications and prospects in cereal crops
USDA-ARS?s Scientific Manuscript database
This review addresses the current understanding of the plant immune response and the molecular mechanisms responsible for systemic acquired resistance as well as the phenomenon of "priming" in plant defense. A detailed discussion of the role of salicylic acid in activating the plant transcription c...
Military Throwaways Why Acquirers Should Go Disposable
2016-02-01
Defense AT&L: January–February 2016 34 Military Throwaways? Why Acquirers Should Go Disposable Maj. Patrick Dugan, USAF Maj. Jon D. McComb...outdated they no longer are manufactured. Unfortunately, the military regularly deals with DMS issues. Going disposable would alleviate DMS concerns
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 1
2008-01-01
project manage- ment and the individual components of the software life-cycle model ; it will be awarded for...software professionals that had been formally educated in software project manage- ment. The study indicated that our industry is lacking in program managers...soft- ware developments get bigger, more complicated, and more dependent on senior software pro- fessionals to get the project on the right path
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 9
2005-09-01
2004. 12. Humphrey , Watts . Introduction to the Personal Software Process SM. Addison- Wesley 1997. 13. Humphrey , Watts . Introduction to the Team...Personal Software ProcessSM (PSPSM)is a software development process orig- inated by Watts Humphrey at the Software Engineering Institute (SEI) in the...meets its commitments and bring a sense of control and predictability into an apparently chaotic project.u References 1. Humphrey , Watts . Coaching
Technical Concept Document. Central Archive for Reusable Defense Software (CARDS)
1994-02-28
FeNbry 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive for...February 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive...accordance with the DFARS Special Works Clause Developed by: This document, developed under the Software Technology for Adaptable, Reliable Systems
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Disposition. If there is a residual inventory of unused supplies exceeding $5,000 in total aggregate fair... 32 National Defense 1 2010-07-01 2010-07-01 false Supplies. 33.33 Section 33.33 National Defense... Requirements Changes, Property, and Subawards § 33.33 Supplies. (a) Title. Title to supplies acquired under a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... shall retain any unused supplies. If the inventory of unused supplies exceeds $5,000 in total aggregate... 32 National Defense 1 2010-07-01 2010-07-01 false Supplies. 34.24 Section 34.24 National Defense... § 34.24 Supplies. (a) Title shall vest in the recipient upon acquisition for supplies acquired with...
48 CFR 211.274-4 - Policy for reporting of Government-furnished property.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Government-furnished property. 211.274-4 Section 211.274-4 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and.... (b) The following items are not required to be reported: (1) Contractor-acquired property, as defined...
48 CFR 211.274-4 - Policy for reporting of Government-furnished property.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Government-furnished property. 211.274-4 Section 211.274-4 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and.... (b) The following items are not required to be reported: (1) Contractor-acquired property, as defined...
48 CFR 211.274-4 - Policy for reporting of Government-furnished property.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Government-furnished property. 211.274-4 Section 211.274-4 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and.... (b) The following items are not required to be reported: (1) Contractor-acquired property, as defined...
Arduino-Based Data Acquisition into Excel, LabVIEW, and MATLAB
ERIC Educational Resources Information Center
Nichols, Daniel
2017-01-01
Data acquisition equipment for physics can be quite expensive. As an alternative, data can be acquired using a low-cost Arduino microcontroller. The Arduino has been used in physics labs where the data are acquired using the Arduino software. The Arduino software, however, does not contain a suite of tools for data fitting and analysis. The data…
CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 6. November/December 2011
2011-11-01
Software Development.” Software Quality Professional Journal, American Society for Quality (ASQ), (March 2010) 4-14. 3. Nair, Gopalakrishnan T.R...Inspection Performance Metric”. Software Quality Professional Journal, American Society for Quality (ASQ), Volume 13, Issue 2, (March 2011) 14-26...the discovery process and are marketed by compa- nies such as Black Duck Software, OpenLogic, Palamida, and Protecode, among others.7 A number of open
OSI for hardware/software interoperability
NASA Astrophysics Data System (ADS)
Wood, Richard J.; Harvey, Donald L.; Linderman, Richard W.; Gardener, Gary A.; Capraro, Gerard T.
1994-03-01
There is a need in public safety for real-time data collection and transmission from one or more sensors. The Rome Laboratory and the Ballistic Missile Defense Organization are pursuing an effort to bring the benefits of Open System Architectures (OSA) to embedded systems within the Department of Defense. When developed properly OSA provides interoperability, commonality, graceful upgradeability, survivability and hardware/software transportability to greatly minimize life cycle costs, integration and supportability. Architecture flexibility can be achieved to take advantage of commercial accomplishments by basing these developments on vendor-neutral commercially accepted standards and protocols.
1986-09-01
point here Is that the capital cost of design and development (including the cost of software tools and/or CAD/CAM programs which aided in the development...and capitalization , software Is in many ways more Ike a hardware component than it is Ike the tech- nical documentation which supports the hardware...Invoked, the owner of intelectual property rights in software may attach appropriate copyright notices to software delivered under this contract. 2.2.2
Re-usable electrochemical glucose sensors integrated into a smartphone platform.
Bandodkar, Amay J; Imani, Somayeh; Nuñez-Flores, Rogelio; Kumar, Rajan; Wang, Chiyi; Mohan, A M Vinu; Wang, Joseph; Mercier, Patrick P
2018-03-15
This article demonstrates a new smartphone-based reusable glucose meter. The glucose meter includes a custom-built smartphone case that houses a permanent bare sensor strip, a stylus that is loaded with enzyme-carbon composite pellets, and sensor instrumentation circuits. A custom-designed Android-based software application was developed to enable easy and clear display of measured glucose concentration. A typical test involves the user loading the software, using the stylus to dispense an enzymatic pellet on top of the bare sensor strip affixed to the case, and then introducing the sample. The electronic module then acquires and wirelessly transmits the data to the application software to be displayed on the screen. The deployed pellet is then discarded to regain the fresh bare sensor surface. Such a unique working principle allows the system to overcome challenges faced by previously reported reusable sensors, such as enzyme degradation, leaching, and hysteresis effects. Studies reveal that the enzyme loaded in the pellets are stable for up to 8 months at ambient conditions, and generate reproducible sensor signals. The work illustrates the significance of the pellet-based sensing system towards realizing a reusable, point-of-care sensor that snugly fits around a smartphone and which does not face issues usually common to reusable sensors. The versatility of this system allows it to be easily modified to detect other analytes for application in a wide range of healthcare, environmental and defense domains. Copyright © 2017 Elsevier B.V. All rights reserved.
Canes Implementation: Analysis of Budgetary, Business, and Policy Challenges
2014-12-01
Concept of Operations COTS Commercial Off the Shelf DAG Defense Acquisitions Guidebook DAS Defense Acquisitions System DOD Department of Defense...and Integration NSS National Security Strategy OA Open Architecture OCO Overseas Contingency Operations OEF Operation Enduring Freedom OIF...and software and civilian-type open architecture ( OA ) presents a series of challenges. The purpose of this report is to provide the Navy with a
Acquiring Defense Systems: A Quest for the Best.
1993-07-01
Chapter 7 The Political Character of Defense Policy -Making .............. 75 PART TWO INCEPTION OF AN ORGANIZED MANAGEMENT APPROACH Chapter 8 A Historical...175 Chapter 43 Total Package Procurement Discontinued .................... 177 PART SIX DECADE OF THE SEVENTIES Chapter 44 Policy Documents...DOD Actions ....................... 193 Chapter 49 Acquisition Advisory Group Report ........................ 195 Chapter 50 Profit Policy
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2010 CFR
2010-10-01
...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...
Computer-Aided Process and Tools for Mobile Software Acquisition
2013-04-01
Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani Naval Postgraduate School Published April 1, 2013 Approved for public...ManTech International Corporation Computer-Aided Process and Tools for Mobile Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani...Mobile Software Acquisition Christopher Bonine — Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense
Common Misconceptions About Service-Oriented Architecture
2007-11-01
addition, the architect(s) must make decisions on how services are implemented. Service implementations may involve developing new software , wrapping a...legacy software system, incor- porating services provided by third par- ties, or a combination of these options. Information about the quality attrib...temperature. However, there 28 CROSSTALK The Journal of Defense Software Engineering November 2007 Common Misconceptions About Service -Oriented
NASA Software Engineering Benchmarking Study
NASA Technical Reports Server (NTRS)
Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.
2013-01-01
To identify best practices for the improvement of software engineering on projects, NASA's Offices of Chief Engineer (OCE) and Safety and Mission Assurance (OSMA) formed a team led by Heather Rarick and Sally Godfrey to conduct this benchmarking study. The primary goals of the study are to identify best practices that: Improve the management and technical development of software intensive systems; Have a track record of successful deployment by aerospace industries, universities [including research and development (R&D) laboratories], and defense services, as well as NASA's own component Centers; and Identify candidate solutions for NASA's software issues. Beginning in the late fall of 2010, focus topics were chosen and interview questions were developed, based on the NASA top software challenges. Between February 2011 and November 2011, the Benchmark Team interviewed a total of 18 organizations, consisting of five NASA Centers, five industry organizations, four defense services organizations, and four university or university R and D laboratory organizations. A software assurance representative also participated in each of the interviews to focus on assurance and software safety best practices. Interviewees provided a wealth of information on each topic area that included: software policy, software acquisition, software assurance, testing, training, maintaining rigor in small projects, metrics, and use of the Capability Maturity Model Integration (CMMI) framework, as well as a number of special topics that came up in the discussions. NASA's software engineering practices compared favorably with the external organizations in most benchmark areas, but in every topic, there were ways in which NASA could improve its practices. Compared to defense services organizations and some of the industry organizations, one of NASA's notable weaknesses involved communication with contractors regarding its policies and requirements for acquired software. One of NASA's strengths was its software assurance practices, which seemed to rate well in comparison to the other organizational groups and also seemed to include a larger scope of activities. An unexpected benefit of the software benchmarking study was the identification of many opportunities for collaboration in areas including metrics, training, sharing of CMMI experiences and resources such as instructors and CMMI Lead Appraisers, and even sharing of assets such as documented processes. A further unexpected benefit of the study was the feedback on NASA practices that was received from some of the organizations interviewed. From that feedback, other potential areas where NASA could improve were highlighted, such as accuracy of software cost estimation and budgetary practices. The detailed report contains discussion of the practices noted in each of the topic areas, as well as a summary of observations and recommendations from each of the topic areas. The resulting 24 recommendations from the topic areas were then consolidated to eliminate duplication and culled into a set of 14 suggested actionable recommendations. This final set of actionable recommendations, listed below, are items that can be implemented to improve NASA's software engineering practices and to help address many of the items that were listed in the NASA top software engineering issues. 1. Develop and implement standard contract language for software procurements. 2. Advance accurate and trusted software cost estimates for both procured and in-house software and improve the capture of actual cost data to facilitate further improvements. 3. Establish a consistent set of objectives and expectations, specifically types of metrics at the Agency level, so key trends and models can be identified and used to continuously improve software processes and each software development effort. 4. Maintain the CMMI Maturity Level requirement for critical NASA projects and use CMMI to measure organizations developing software for NASA. 5.onsolidate, collect and, if needed, develop common processes principles and other assets across the Agency in order to provide more consistency in software development and acquisition practices and to reduce the overall cost of maintaining or increasing current NASA CMMI maturity levels. 6. Provide additional support for small projects that includes: (a) guidance for appropriate tailoring of requirements for small projects, (b) availability of suitable tools, including support tool set-up and training, and (c) training for small project personnel, assurance personnel and technical authorities on the acceptable options for tailoring requirements and performing assurance on small projects. 7. Develop software training classes for the more experienced software engineers using on-line training, videos, or small separate modules of training that can be accommodated as needed throughout a project. 8. Create guidelines to structure non-classroom training opportunities such as mentoring, peer reviews, lessons learned sessions, and on-the-job training. 9. Develop a set of predictive software defect data and a process for assessing software testing metric data against it. 10. Assess Agency-wide licenses for commonly used software tools. 11. Fill the knowledge gap in common software engineering practices for new hires and co-ops.12. Work through the Science, Technology, Engineering and Mathematics (STEM) program with universities in strengthening education in the use of common software engineering practices and standards. 13. Follow up this benchmark study with a deeper look into what both internal and external organizations perceive as the scope of software assurance, the value they expect to obtain from it, and the shortcomings they experience in the current practice. 14. Continue interactions with external software engineering environment through collaborations, knowledge sharing, and benchmarking.
The Use of Massive Multiplayer Online Games to Evaluate C4I Systems
2004-03-01
popularity in the gaming industry , the public and the Department of Defense. Improvements to computer technology and the increased data transfer rate...Multiplayer Online Games (MMOG) have gained in popularity in the gaming industry , the public and the Department of Defense. Improvements to...have gained in popularity in the gaming industry , the public and the Department of Defense. These networked virtual environments are “a software
AdaNET Dynamic Software Inventory (DSI) prototype component acquisition plan
NASA Technical Reports Server (NTRS)
Hanley, Lionel
1989-01-01
A component acquisition plan contains the information needed to evaluate, select, and acquire software and hardware components necessary for successful completion of the AdaNET Dynamic Software Inventory (DSI) Management System Prototype. This plan will evolve and be applicable to all phases of the DSI prototype development. Resources, budgets, schedules, and organizations related to component acquisition activities are provided. A purpose and description of a software or hardware component which is to be acquired are presented. Since this is a plan for acquisition of all components, this section is not applicable. The procurement activities and events conducted by the acquirer are described and who is responsible is identified, where the activity will be performed, and when the activities will occur for each planned procurement. Acquisition requirements describe the specific requirements and standards to be followed during component acquisition. The activities which will take place during component acquisition are described. A list of abbreviations and acronyms, and a glossary are contained.
Cyber Warfare: Protecting Military Systems
2000-01-01
Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.
Survey of Software Assurance Techniques for Highly Reliable Systems
NASA Technical Reports Server (NTRS)
Nelson, Stacy
2004-01-01
This document provides a survey of software assurance techniques for highly reliable systems including a discussion of relevant safety standards for various industries in the United States and Europe, as well as examples of methods used during software development projects. It contains one section for each industry surveyed: Aerospace, Defense, Nuclear Power, Medical Devices and Transportation. Each section provides an overview of applicable standards and examples of a mission or software development project, software assurance techniques used and reliability achieved.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 11
2005-11-01
languages. Our discipline of software engineering has really experienced phenomenal growth right before our eyes. A sign that software design has...approach on a high level of abstraction. The main emphasis is on the identification and allocation of a needed functionality (e.g., a target tracker ), rather...messaging software that is the backbone of teenage culture. As increasing security constraints will increase the cost of developing and main- taining any
CrossTalk. The Journal of Defense Software Engineering. Volume 13, Number 6, June 2000
2000-06-01
Techniques for Efficiently Generating and Testing Software This paper presents a proven process that uses advanced tools to design, develop and test... optimal software. by Keith R. Wegner Large Software Systems—Back to Basics Development methods that work on small problems seem to not scale well to...Ability Requirements for Teamwork: Implications for Human Resource Management, Journal of Management, Vol. 20, No. 2, 1994. 11. Ferguson, Pat, Watts S
77 FR 65185 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... million Total $60 million (iii) Description and Quantity or Quantities of Articles or Services under... Technology Contained in the Defense Article or Defense Services Proposed to be Sold: See Annex attached... integrate the Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the...
78 FR 62600 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... million Total $68 million (iii) Description and Quantity or Quantities of Articles or Services Under... Technology Contained in the Defense Article or Defense Services Proposed To Be Sold: See Annex attached... integrate the Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the...
Gaining Control and Predictability of Software-Intensive Systems Development and Sustainment
2015-02-04
implementation of the baselines, audits , and technical reviews within an overarching systems engineering process (SEP; Defense Acquisition University...warfighters’ needs. This management and metrics effort supplements and supports the system’s technical development through the baselines, audits and...other areas that could be researched and added into the nine-tier model. Areas including software metrics, quality assurance , software-oriented
National Software Reference Library (NSRL)
National Institute of Standards and Technology Data Gateway
National Software Reference Library (NSRL) (PC database for purchase) A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.
An Analysis of Botnet Vulnerabilities
2007-06-01
Definition Currently, the primary defense against botnets is prompt patching of vulnerable systems and antivirus software . Network monitoring can identify...IRCd software , none were identified during this effort. AFIT iv For my wife, for her caring and support throughout the course of this...are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online
NASA Astrophysics Data System (ADS)
Spitznagel, J. A.; Wood, Susan
1988-08-01
The Software Engineering institute is a federally funded research and development center sponsored by the Department of Defense (DOD). It was chartered by the Undersecretary of Defense for Research and Engineering on June 15, 1984. The SEI was established and is operated by Carnegie Mellon University (CUM) under contract F19628-C-0003, which was competitively awarded on December 28, 1984, by the Air Force Electronic Systems Division. The mission of the SEI is to provide the means to bring the ablest minds and the most effective technology to bear on the rapid improvement of the quality of operational software in mission-critical computer systems; to accelerate the reduction to practice of modern software engineering techniques and methods; to promulgate the use of modern techniques and methods throughout the mission-critical systems community; and to establish standards of excellence for the practice of software engineering. This report provides a summary of the programs and projects, staff, facilities, and service accomplishments of the Software Engineering Institute during 1987.
NASA Astrophysics Data System (ADS)
Percy Plasencia Linares, Milton; Russi, Marino; Pesaresi, Damiano; Cravos, Claudio
2010-05-01
The Italian National Institute for Oceanography and Experimental Geophysics (Istituto Nazionale di Oceanografia e di Geofisica Sperimentale, OGS) is running the Antarctic Seismographic Argentinean Italian Network (ASAIN), made of 7 seismic stations located in the Scotia Sea region in Antarctica and in Tierra del Fuego - Argentina: data from these stations are transferred in real time to the OGS headquarters in Trieste (Italy) via satellite links provided by the Instituto Antártico Argentino (IAA). Data is collected and archived primarily in Güralp Compress Format (GCF) through the Scream! software at OGS and IAA, and transmitted also in real time to the Observatories and Research Facilities for European Seismology (ORFEUS). The main real time seismic data acquisition and processing system of the ASAIN network is based on the EarthWorm 7.3 (Open Source) software suite installed on a Linux server at the OGS headquarters in Trieste. It runs several software modules for data collection, data archiving, data publication on dedicated web servers: wave_serverV, Winston Wave Server, and data analysis and realtime monitoring through Swarm program. OGS is also running, in close cooperation with the Friuli-Venezia Giulia Civil Defense, the North East (NI) Italy seismic network, making use of the Antelope commercial software suite from BRTT as the main acquisition system. As a test to check the global capabilities of the Antelope software suite, we also set up an instance of Antelope acquiring data in real time from both the regional ASAIN seismic network in Antarctica and a subset of the Global Seismic Network (GSN) funded by the Incorporated Research Institution for Seismology (IRIS). The facilities of the IRIS Data Management System, and specifically the IRIS Data Management Center, were used for real time access to waveform required in this study. The first tests indicated that more than 80% of the earthquakes with magnitude M>5.0 listed in the Preliminary Determination of Epicenters (PDE) catalogue of the National Earthquake Information Center (NEIC) of the United States Geological Survey (USGS) were also correctly automatically detected by Antelope, with an average location error of 0.05 degrees and average body wave magnitude Mb estimation error below 0.1. The average time difference between event origin time and the actual time of event determination by Antelope was of about 45': the comparison with 20', the IASPEI91 P-wave travel time for 180 degrees distance, and 25', the estimate of our test system data latency, indicate that Antelope is a serious candidate for regional and global early warning systems.
Third-Party Software's Trust Quagmire.
Voas, J; Hurlburt, G
2015-12-01
Current software development has trended toward the idea of integrating independent software sub-functions to create more complete software systems. Software sub-functions are often not homegrown - instead they are developed by unknown 3 rd party organizations and reside in software marketplaces owned or controlled by others. Such software sub-functions carry plausible concern in terms of quality, origins, functionality, security, interoperability, to name a few. This article surveys key technical difficulties in confidently building systems from acquired software sub-functions by calling out the principle software supply chain actors.
A Handbook For Acquiring Demand-Responsive Transit Software, Tcrp Report 18
DOT National Transportation Integrated Search
1996-01-01
THIS HANDBOOK WILL BE OF INTEREST TO AGENCIES ENGAGED IN MANAGING AND OPERATING DEMAND-RESPONSIVE TRANSIT (DRT) SERVICES. THE HANDBOOK IS INTENDED TO ASSIST DRTPROVIDERS WITH ASSESSMENT OF SOFTWARE NEEDS AND PROCUREMENT OF SOFTWARE TO MEET THOSE NEED...
7 CFR 1703.121 - Approved purposes for grants.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Acquiring, by lease or purchase, eligible equipment as defined in § 1703.102; (b) Acquiring instructional... any related software; developing instructional programming; providing engineering or environmental...
7 CFR 1703.121 - Approved purposes for grants.
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Acquiring, by lease or purchase, eligible equipment as defined in § 1703.102; (b) Acquiring instructional... any related software; developing instructional programming; providing engineering or environmental...
7 CFR 1703.121 - Approved purposes for grants.
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Acquiring, by lease or purchase, eligible equipment as defined in § 1703.102; (b) Acquiring instructional... any related software; developing instructional programming; providing engineering or environmental...
7 CFR 1703.121 - Approved purposes for grants.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Acquiring, by lease or purchase, eligible equipment as defined in § 1703.102; (b) Acquiring instructional... any related software; developing instructional programming; providing engineering or environmental...
1992-12-01
provide program 5 managers some level of confidence that their software will operate at an acceptable level of risk. A number of structured safety...safety within the constraints of operational effectiveness, schedule, and cost through timely application of system safety management and engineering...Master of Science in Software Systems Management Peter W. Colan, B.S.E. Robert W. Prouhet, B.S. Captain, USAF Captain, USAF December 1992 Approved for
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 6, June 2007
2007-06-01
California. He has co-authored the book Software Cost Estimation With COCOMO II with Barry Boehm and others. Clark helped define the COCOMO II model...Software Engineering at the University of Southern California. She worked with Barry Boehm and Chris Abts to develop and calibrate a cost-estimation...2003/02/ schorsch.html>. 2. See “Software Engineering, A Practitioners Approach” by Roger Pressman for a good description of coupling, cohesion
A Holistic Compliance Model for Capture Teams: A Grounded Theory Approach
ERIC Educational Resources Information Center
Anderson, Duane C.
2013-01-01
By the time a Department of Defense (DOD) Request for Proposal (RFP) is awarded, its initial targets have moved, in many cases so much as to render any replies by the defense industry to an RFP useless. Requirements tend to evolve during the development of systems specifications. This may be caused in part by new information acquired during the…
Army Requirement to Acquire Individual Carbine Not Justified
2013-09-16
ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for...AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...of the Department of Defense that: supports the warfighter; promotes accountability, integrity , and efficiency; advises the Secretary of Defense and
Software Literacy and Student Learning in the Tertiary Environment: Powerpoint and Beyond
ERIC Educational Resources Information Center
Khoo, Elaine; Hight, Craig; Cowie, Bronwen; Torrens, Rob; Ferrarelli, Lisabeth
2014-01-01
In this paper, we explore the relationship between student success in acquiring software literacy and students' broader engagement and understanding of knowledge across different disciplines. We report on the first phase of a project that examines software literacies associated with Microsoft PowerPoint as a common software package encountered and…
Defense Acquisition Research Journal. Volume 22, Number 4, Issue 75, October 2015
2015-10-01
forma nce pa ra meters ba sed on operational requirements related to the mission. These thresholds will inform the develop- ment of KPPs, KSAs...success of a software development project. 400 Defense ARJ, October 2015, Vol. 22 No. 4 : 394–415 A Publication of the Defense Acquisition University...define when development is complete (Resnick et al., 2011), and when a story is added to a sprint the acceptance criteria can be adjusted. This is
’Pushing a Big Rock Up a Steep Hill’: Acquisition Lessons Learned from DoD Applications Storefront
2014-04-30
software patches, web applications, widgets, and mobile application packages. The envisioned application store will deliver software from a central...automated delivery of software patches, web applications, widgets, and mobile application packages. The envisioned application store will deliver... mobile technologies, hoping to enhance warfighter situational awareness and access to information. Unfortunately, the Defense Acquisition System has not
Repository-based software engineering program
NASA Technical Reports Server (NTRS)
Wilson, James
1992-01-01
The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.
CrossTalk. The Journal of Defense Software Engineering. Volume 27, Number 2. March/April 2014
2014-04-01
Consequently, it is no wonder that we subconsciously and consciously expect that same level of consistency to hold in the cyber domains, though...including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum compilers. He is currently a co-PI for a DARPA-funded
76 FR 72180 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
...) Description and Quantity or Quantities of Articles or Services under Consideration for Purchase: 20 AIM-9X-2.... (vii) Sensitivity of Technology Contained in the Defense Article or Defense Services Proposed to be... Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the AIM-9X-2...
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 4
2013-07-01
quality of most software explode into the broader consciousness . This awareness came thanks to the coincidence of the rise of universal Internet...facilitates the accomplishment of stage 4, Continuous Improvement. A quantum advance for project management is readily avail- able through the
Innate immunity; Humoral immunity; Cellular immunity; Immunity; Inflammatory response; Acquired (adaptive) immunity ... normal and usually does not react against them. INNATE IMMUNITY Innate, or nonspecific, immunity is the defense ...
Rosset, Antoine; Spadola, Luca; Pysher, Lance; Ratib, Osman
2006-01-01
The display and interpretation of images obtained by combining three-dimensional data acquired with two different modalities (eg, positron emission tomography and computed tomography) in the same subject require complex software tools that allow the user to adjust the image parameters. With the current fast imaging systems, it is possible to acquire dynamic images of the beating heart, which add a fourth dimension of visual information-the temporal dimension. Moreover, images acquired at different points during the transit of a contrast agent or during different functional phases add a fifth dimension-functional data. To facilitate real-time image navigation in the resultant large multidimensional image data sets, the authors developed a Digital Imaging and Communications in Medicine-compliant software program. The open-source software, called OsiriX, allows the user to navigate through multidimensional image series while adjusting the blending of images from different modalities, image contrast and intensity, and the rate of cine display of dynamic images. The software is available for free download at http://homepage.mac.com/rossetantoine/osirix. (c) RSNA, 2006.
Effects of Gain/Loss Framing in Cyber Defense Decision-Making
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bos, Nathan; Paul, Celeste; Gersh, John
Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one ofmore » two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.« less
Validation of a Quality Management Metric
2000-09-01
quality management metric (QMM) was used to measure the performance of ten software managers on Department of Defense (DoD) software development programs. Informal verification and validation of the metric compared the QMM score to an overall program success score for the entire program and yielded positive correlation. The results of applying the QMM can be used to characterize the quality of software management and can serve as a template to improve software management performance. Future work includes further refining the QMM, applying the QMM scores to provide feedback
Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes
Ponce de León, Inés; Montesano, Marcos
2017-01-01
Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens. PMID:28360923
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
... technical data package, in cases where the Government may have funded only a small portion of the... subcontractor's asserted restrictions on technical data and computer software. DATES: Effective date: September... data and computer software. More specifically, the final rule affects these validation procedures in...
2-Player Game With Uncertainty to Protect Mission Critical Information Over Blue Networks
2009-04-01
Eclipse 233MHz 512MB 700MB JAVA 6 166MHz 64MB 98MB Key Focus Sensor Honeypot 1.5 GHz 512MB 500MB Distributed Data Pastry JAVA...defense, Pastry , run. JAVA 6 is an added plug-in that helps Eclipse software. There are many defenses that can be used to help alongside this project but...each defense to be used. Encryption : Steganos Privacy Suite 2008 Honeypots : Key Focus Sensor Distributed Data: Pastry 7 Table 2 Domain
2016-09-01
BEHAVIORAL MODELING OF SYSTEM- AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS by Monica F. Farah-Stapleton...AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS 5. FUNDING NUMBERS 6. AUTHOR(S) Monica F. Farah-Stapleton 7. PERFORMING...this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB number
Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0
2008-11-05
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9150 Approved for public release; distribution is unlimited. Software ...collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for...THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0 Pamela G
Software Design Description for the Tidal Open-boundary Prediction System (TOPS)
2010-05-04
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--10-9209 Approved for public release; distribution is unlimited. Software ...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite...RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (include area code) b. ABSTRACT c. THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design
Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0
2008-12-31
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9149 Approved for public release; distribution is unlimited. Software ...suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704...LIMITATION OF ABSTRACT Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0 Paul Martin, Charlie N. Barron, Lucy F
Project Robot: A Software Simulation for Systems Engineering Education
ERIC Educational Resources Information Center
Arnold, Ross D.; Wade, Jon P.
2017-01-01
The U.S. defense industry spends billions of dollars each year developing defense systems to keep the nation and allies secure. However, the failure rate of system development is notoriously high. Even when development efforts do succeed, they often do so with cost overruns and compromises in system performance. As a result, large amounts of money…
USDA-ARS?s Scientific Manuscript database
Accurate and timely surveillance of bed bug infestations is critical for development of effective control strategies. While the bed bug produced volatiles (E)-2-hexenal and (E)-2-octenal are considered defensive secretions, through use of EthoVision® video-tracking software we demonstrate that low ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... (Acquisition, Technology, and Logistics) has determined that it is inconsistent with the public interest to... manufacturer or supplier. (C) Foreign drugs acquired by the Defense Supply Center, Philadelphia, when the...
Long-distance communication and signal amplification in systemic acquired resistance
Shah, Jyoti; Zeier, Jürgen
2013-01-01
Systemic acquired resistance (SAR) is an inducible defense mechanism in plants that confers enhanced resistance against a variety of pathogens. SAR is activated in the uninfected systemic (distal) organs in response to a prior (primary) infection elsewhere in the plant. SAR is associated with the activation of salicylic acid (SA) signaling and the priming of defense responses for robust activation in response to subsequent infections. The activation of SAR requires communication by the primary infected tissues with the distal organs. The vasculature functions as a conduit for the translocation of factors that facilitate long-distance intra-plant communication. In recent years, several metabolites putatively involved in long-distance signaling have been identified. These include the methyl ester of SA (MeSA), the abietane diterpenoid dehydroabietinal (DA), the dicarboxylic acid azelaic acid (AzA), and a glycerol-3-phosphate (G3P)-dependent factor. Long-distance signaling by some of these metabolites also requires the lipid-transfer protein DIR1 (DEFECTIVE IN INDUCED RESISTANCE 1). The relative contribution of these factors in long-distance signaling is likely influenced by environmental conditions, for example light. In the systemic leaves, the AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1)-dependent production of the lysine catabolite pipecolic acid (Pip), FLAVIN-DEPENDENT MONOOXYGENASE1 (FMO1) signaling, as well as SA synthesis and downstream signaling are required for the activation of SAR. This review summarizes the involvement and interaction between long-distance SAR signals and details the recently discovered role of Pip in defense amplification and priming that allows plants to acquire immunity at the systemic level. Recent advances in SA signaling and perception are also highlighted. PMID:23440336
Direct volumetric rendering based on point primitives in OpenGL.
da Rosa, André Luiz Miranda; de Almeida Souza, Ilana; Yuuji Hira, Adilson; Zuffo, Marcelo Knörich
2006-01-01
The aim of this project is to present a renderization by software algorithm of acquired volumetric data. The algorithm was implemented in Java language and the LWJGL graphical library was used, allowing the volume renderization by software and thus preventing the necessity to acquire specific graphical boards for the 3D reconstruction. The considered algorithm creates a model in OpenGL, through point primitives, where each voxel becomes a point with the color values related to this pixel position in the corresponding images.
2012-03-13
Legacy Maintenance and Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level...NDI)-intensive systems Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This...be furnished by NDI components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software
2009-09-01
NII)/CIO Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer CMMI Capability Maturity Model...a Web-based portal to share knowledge about software process-related methodologies, such as the SEI’s Capability Maturity Model Integration ( CMMI ...19 SEI’s IDEALSM model, and Lean Six Sigma.20 For example, the portal features content areas such as software acquisition management, the SEI CMMI
CrossTalk. The Journal of Defense Software Engineering. Volume 23, Number 6, Nov/Dec 2010
2010-11-01
Model of archi- tectural design. It guides developers to apply effort to their software architecture commensurate with the risks faced by...Driven Model is the promotion of risk to prominence. It is possible to apply the Risk-Driven Model to essentially any software development process...succeed without any planned architecture work, while many high-risk projects would fail without it . The Risk-Driven Model walks a middle path
1997-09-01
program include the ACEIT software training and the combination of Department of Defense (DOD) application, regression, and statistics. The weaknesses...and Integrated Tools ( ACEIT ) software and training could not be praised enough. AFIT vs. Civilian Institutions. The GCA program provides a Department...very useful to the graduates and beneficial to their careers. The main strengths of the program include the ACEIT software training and the combination
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 4
2005-04-01
older automated cost- estimating tools are no longer being actively marketed but are still in use such as CheckPoint, COCOMO, ESTIMACS, REVIC, and SPQR ...estimation tools: SPQR /20, Checkpoint, and Knowl- edgePlan. These software estimation tools pioneered the use of function point metrics for sizing and
78 FR 703 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-04
... Value: Major Defense Equipment $110 million Other $30 million Total $140 million * as defined in Section... Cueing System. The software algorithms are the most sensitive portion of the AIM-9X-2 missile. The software continues to be modified via a pre- planned product improvement (P\\3\\I) program in order to...
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 11
2006-11-01
8>. 7. Wallace, Delores R. Practical Soft- ware Reliability Modeling. Proc. of the 26th Annual NASA Goddard Software Engineering Workshop, Nov. 2001...STAR WARS TO STAR TREK To Request Back Issues on Topics Not Listed Above, Please Contact <stsc. customerservice@hill.af.mil>. About the Authors Kym
Acquiring the Data Needed to Support Defense Transformation
2010-04-01
PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Center for Technology and National Security Policy (CTNSP) National Defense University (NDU) Fort...Lesley J. McNair, Washington, DC USA 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR...makers (see Table 1 below), there is a need to collect and organize the data of interest. It is anticipated that all of the stakeholders will be
Monoterpenes Support Systemic Acquired Resistance within and between Plants
Ghirardo, Andrea; Knappe, Claudia; Koch, Kerstin; Dey, Sanjukta; Parker, Jane E.
2017-01-01
This study investigates the role of volatile organic compounds in systemic acquired resistance (SAR), a salicylic acid (SA)-associated, broad-spectrum immune response in systemic, healthy tissues of locally infected plants. Gas chromatography coupled to mass spectrometry analyses of SAR-related emissions of wild-type and non-SAR-signal-producing mutant plants associated SAR with monoterpene emissions. Headspace exposure of Arabidopsis thaliana to a mixture of the bicyclic monoterpenes α-pinene and β-pinene induced defense, accumulation of reactive oxygen species, and expression of SA- and SAR-related genes, including the SAR regulatory AZELAIC ACID INDUCED1 (AZI1) gene and three of its paralogs. Pinene-induced resistance was dependent on SA biosynthesis and signaling and on AZI1. Arabidopsis geranylgeranyl reductase1 mutants with reduced monoterpene biosynthesis were SAR-defective but mounted normal local resistance and methyl salicylate-induced defense responses, suggesting that monoterpenes act in parallel with SA. The volatile emissions from SAR signal-emitting plants induced defense in neighboring plants, and this was associated with the presence of α-pinene, β-pinene, and camphene in the emissions of the “sender” plants. Our data suggest that monoterpenes, particularly pinenes, promote SAR, acting through ROS and AZI1, and likely function as infochemicals in plant-to-plant signaling, thus allowing defense signal propagation between neighboring plants. PMID:28536145
NASA Technical Reports Server (NTRS)
Sauter, H. E.; Lushina, L. N.
1983-01-01
U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.
CARDS: A blueprint and environment for domain-specific software reuse
NASA Technical Reports Server (NTRS)
Wallnau, Kurt C.; Solderitsch, Anne Costa; Smotherman, Catherine
1992-01-01
CARDS (Central Archive for Reusable Defense Software) exploits advances in domain analysis and domain modeling to identify, specify, develop, archive, retrieve, understand, and reuse domain-specific software components. An important element of CARDS is to provide visibility into the domain model artifacts produced by, and services provided by, commercial computer-aided software engineering (CASE) technology. The use of commercial CASE technology is important to provide rich, robust support for the varied roles involved in a reuse process. We refer to this kind of use of knowledge representation systems as supporting 'knowledge-based integration.'
Code of Federal Regulations, 2012 CFR
2012-10-01
... Logistics) has determined that it is inconsistent with the public interest to apply the Buy American statute... manufacturer or supplier. (C) Foreign drugs acquired by the Defense Supply Center, Philadelphia, when the...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Logistics) has determined that it is inconsistent with the public interest to apply the Buy American statute... manufacturer or supplier. (C) Foreign drugs acquired by the Defense Supply Center, Philadelphia, when the...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Logistics) has determined that it is inconsistent with the public interest to apply the Buy American statute... manufacturer or supplier. (C) Foreign drugs acquired by the Defense Supply Center, Philadelphia, when the...
Systemic acquired resistance: turning local infection into global defense.
Fu, Zheng Qing; Dong, Xinnian
2013-01-01
Systemic acquired resistance (SAR) is an induced immune mechanism in plants. Unlike vertebrate adaptive immunity, SAR is broad spectrum, with no specificity to the initial infection. An avirulent pathogen causing local programmed cell death can induce SAR through generation of mobile signals, accumulation of the defense hormone salicylic acid, and secretion of the antimicrobial PR (pathogenesis-related) proteins. Consequently, the rest of the plant is protected from secondary infection for a period of weeks to months. SAR can even be passed on to progeny through epigenetic regulation. The Arabidopsis NPR1 (nonexpresser of PR genes 1) protein is a master regulator of SAR. Recent study has shown that salicylic acid directly binds to the NPR1 adaptor proteins NPR3 and NPR4, regulates their interactions with NPR1, and controls NPR1 protein stability. However, how NPR1 interacts with TGA transcription factors to activate defense gene expression is still not well understood. In addition, redox regulators, the mediator complex, WRKY transcription factors, endoplasmic reticulum-resident proteins, and DNA repair proteins play critical roles in SAR.
ERIC Educational Resources Information Center
Samuels, Alan R.; And Others
1987-01-01
These five papers by speakers at the Small Computers in Libraries 1987 conference include: "Acquiring and Using Shareware in Building Small Scale Automated Information systems" (Samuels); "A Software Lending Collection" (Talab); "Providing Subject Access to Microcomputer Software" (Mitchell); "Interfacing Vendor…
48 CFR 27.404-4 - Contractor's release, publication, and use of data.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... statutes. However, agencies may restrict the release or disclosure of computer software that is or is... software for purposes of established agency distribution programs, or where required to accomplish the purpose for which the software is acquired. (b) Except for the results of basic or applied research under...
Near-Earth object intercept trajectory design for planetary defense
NASA Astrophysics Data System (ADS)
Vardaxis, George; Wie, Bong
2014-08-01
Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.
Analysis-Software for Hyperspectral Algal Reflectance Probes v. 1.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timlin, Jerilyn A.; Reichardt, Thomas A.; Jenson, Travis J.
This software provides onsite analysis of the hyperspectral reflectance data acquired on an outdoor algal pond by a multichannel, fiber-coupled spectroradiometer. The analysis algorithm is based on numerical inversion of a reflectance model, in which the above-water reflectance is expressed as a function of the single backscattering albedo, which is dependent on the backscatter and absorption coefficients of the algal culture, which are in turn related to the algal biomass and pigment optical activity, respectively. Prior to the development of this software, while raw multichannel data were displayed in real time, analysis required a post-processing procedure to extract the relevantmore » parameters. This software provides the capability to track the temporal variation of such culture parameters in real time, as raw data are being acquired, or can be run in a post processing mode. The software allows the user to select between different algal species, incorporate the appropriate calibration data, and observe the quality of the resulting model inversions.« less
1977-05-01
C31) programs; (4) simulator/ trainer programs ; and (5) automatic test equipment software. Each of these five types of software represents a problem...coded in the same source language, say JOVIAL, then source—language statements would be a better measure, since that would automatically compensate...whether done at no (visible) cost or by renegotiation of the contract. Fig. 2.3 illustrates these with solid lines. It is conjec- tured that the change
2012-03-13
Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level 6.7 References 7...Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This chapter summarizes each...components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software-intensive systems have
2009-11-01
interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a...an interesting conti- nuum between how many different requirements a program must satisfy: the more complex and diverse the requirements, the more... Gender differences in approaches to end-user software development have also been reported in debugging feature usage [1] and in end-user web programming
CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 3. May/June 2014
2014-06-01
field of software engineering. by Delores M. Etter, Jennifer Webb, and John Howard The Problem of Prolific Process What is the optimal amount and...Programming Will Never Be Obsolete The creativity of software developers will always be needed to solve problems of the future and to then translate those...utilized to address some of the complex problems associated with biometric database construction. 1. A Next Generation Multispectral Iris Biometric
2004-09-01
protection. Firewalls, Intrusion Detection Systems (IDS’s), Anti-Virus (AV) software , and routers are such tools used. In recent years, computer security...associated with operating systems, application software , and computing hardware. When IDS’s are utilized on a host computer or network, there are two...primary approaches to detecting and / or preventing attacks. Traditional IDS’s, like most AV software , rely on known “signatures” to detect attacks
2011-09-01
suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway...maintenance or operations support for a missile range to grass cutting, and many things in between. According to the Defense Science Board, buying...may be found on the last Belva M. Martin page of this report. Staff acknowledgements are listed in appendix VII. t Director, Acquisition and
Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process
2010-04-23
Departments; the Chairman, Joint Chiefs of Staff (CJCS) and Joint Staff; the Unified Combatant Commands ( UCCs ); the Defense Agencies; and DOD field...Systems Congressional Research Service 24 industrialists in their own states and districts got their fair share , or more, of the military contracts...be a market for its products as a catalyst; this market was born when the comparatively small and unsophisticated U.S. peacetime ‘militia’ envisioned
1987-06-01
Facilitator Robert Voss, Esq. Private Consultant, Honeywell, Inc. Institute for Defense Analyses Robert Adams , Esq. Naval Training Systems Center Mr...Systems Command Leonard Rawlcz, Esq. Skadden, Arps, Slate, Meagher & Flom Ansel Schwartz, Esq. Reed Smith Shaw & McClay Michael Yatsko, Esq
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009
2009-12-01
an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210
Design and Acquisition of Software for Defense Systems
2018-02-14
enterprise business systems and related information technology (IT) services, the role software plays in enabling and enhancing weapons systems often...3 The information in this chart was compiled from Christian Hagen, Jeff Sorenson, Steven Hurt...understanding to make an informed choice of final architecture. The Task Force found commercial practice starts with several competing architectures and
Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples
2010-04-01
are never Software CTE candidates 19 Algorithm Example: Filters • Definitions – Filters in Signal Processing • A filter is a mathematical algorithm...Segment Segment • SOA as a CTE? – Google produced 40 million (!) hits in 0.2 sec for “SOA”. Even if we discount hits on the Society of Actuaries and
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-07
... asserted restrictions on technical data and computer software. DATES: Comments on the proposed rule should... restrictions on technical data and computer software. More specifically, the proposed rule affects these...) items (as defined at 41 U.S.C. 431(c)). Since COTS items are a subtype of commercial items, this change...
1988-04-21
Layton Senior Software Engineer Martin Marietta Denver Aerospace MS L0425 P.O. Box 179 Denver, CO 80201 Larry L. Lehman Integrated Systems Inc. 2500...Mission College Road Santa Clara, CA 95054 Eric Leighninger Dynamics Research 60 Frontage Road Andover, MA 01810 . Peter Lempp Software Products and
2006-02-23
Information Technology Management Department of Defense Office of Inspector General February 23, 2006 AccountabilityIntegrityQuality DoD...Organization Information Assurance Management of Information Technology Goods and Services Acquired Through Interagency Agreements (D-2006-052) Report...REPORT TYPE 3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management: DoD Organization Information
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 7
2007-07-01
away from the current Global Command and Control System family of systems, this effort will also require a significant change in both mindset and...which complicate the already significant logistic problems in austere environ- ments. Several efforts are beginning to produce rapidly deployable...currency, and applicability to keep pace with the changing environment and address significant challenges they face. Defense Information Systems Agency
Simple solution to the medical instrumentation software problem
NASA Astrophysics Data System (ADS)
Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.
1995-04-01
Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.
War-gaming application for future space systems acquisition
NASA Astrophysics Data System (ADS)
Nguyen, Tien M.; Guillen, Andy T.
2016-05-01
Recently the U.S. Department of Defense (DOD) released the Defense Innovation Initiative (DII) [1] to focus DOD on five key aspects; Aspect #1: Recruit talented and innovative people, Aspect #2: Reinvigorate war-gaming, Aspect #3: Initiate long-range research and development programs, Aspect #4: Make DOD practices more innovative, and Aspect #5: Advance technology and new operational concepts. Per DII instruction, this paper concentrates on Aspect #2 and Aspect #4 by reinvigorating the war-gaming effort with a focus on an innovative approach for developing the optimum Program and Technical Baselines (PTBs) and their corresponding optimum acquisition strategies for acquiring future space systems. The paper describes a unified approach for applying the war-gaming concept for future DOD acquisition of space systems. The proposed approach includes a Unified Game-based Acquisition Framework (UGAF) and an Advanced Game-Based Mathematical Framework (AGMF) using Bayesian war-gaming engines to optimize PTB solutions and select the corresponding optimum acquisition strategies for acquiring a space system. The framework defines the action space for all players with a complete description of the elements associated with the games, including Department of Defense Acquisition Authority (DAA), stakeholders, warfighters, and potential contractors, War-Gaming Engines (WGEs) played by DAA, WGEs played by Contractor (KTR), and the players' Payoff and Cost functions (PCFs). The AGMF presented here addresses both complete and incomplete information cases. The proposed framework provides a recipe for the DAA and USAF-Space and Missile Systems Center (SMC) to acquire future space systems optimally.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 2
2005-02-01
Richard J. Adams , Sergio Alvarado, Suellen Eslinger, and Joanne Tagami all with The Aerospace Corporation, and Scott A. Whitmire at ODS Software...Kiczales, G., and M. Kersten . “Show Me the Structure.” Software Develop- ment Apr. 2000. Notes 1. Please note that the M1-M11 number- ing of concepts did...VA: Integrated Computer Engineering, Inc., 2 Aug. 2000 (http://www.spmn.com). 3 Adams , Richard J., Suellen Eslinger, Karen L. Owens, and Mary A. Rich
1994-01-29
other processes, but that he arrived at his results in a different manner. Batory didn’t start with idioms; he performed a domain analysis and...abstracted idioms. Through domain analysis and domain modeling, new idioms can be found and the form of architecture can be the same. It was also questioned...Programming 5. Consensus Definition of Architecture 6. Inductive Analysis of Current Exemplars 7. VHDL (Bailor) 8. Ontological Structuring 3.3.3
Auctions in Defense Acquisition: Theory and Experimental Evidence
2002-01-01
Department of Defense (DoD) has recently begun purchasing with online auctions — receiving offers from suppli- ers for things ranging from computers to...equipment for U.S. Navy vessels. The Navy was the first to try online auctions for procuring airplane and ship parts. The Army’s first venture into...system. The Air Force first tested the online auction waters in Au- gust 2000 to acquire computer equipment and saved about $88,000, or 27 percent of
2008-01-01
with many private sector companies to manufacture, field , and develop the products it acquires. As mentioned, the percentages of work outsourced ...been involved from the conceptual development all the way to operational testing and fielding of every major weapons system our Marines and Sailors...the ability to collaborate with contractors and assess the defense value of private sector technologi- cal developments . The inherently governmental
Monoterpenes Support Systemic Acquired Resistance within and between Plants.
Riedlmeier, Marlies; Ghirardo, Andrea; Wenig, Marion; Knappe, Claudia; Koch, Kerstin; Georgii, Elisabeth; Dey, Sanjukta; Parker, Jane E; Schnitzler, Jörg-Peter; Vlot, A Corina
2017-06-01
This study investigates the role of volatile organic compounds in systemic acquired resistance (SAR), a salicylic acid (SA)-associated, broad-spectrum immune response in systemic, healthy tissues of locally infected plants. Gas chromatography coupled to mass spectrometry analyses of SAR-related emissions of wild-type and non-SAR-signal-producing mutant plants associated SAR with monoterpene emissions. Headspace exposure of Arabidopsis thaliana to a mixture of the bicyclic monoterpenes α-pinene and β-pinene induced defense, accumulation of reactive oxygen species, and expression of SA- and SAR-related genes, including the SAR regulatory AZELAIC ACID INDUCED1 ( AZI1 ) gene and three of its paralogs. Pinene-induced resistance was dependent on SA biosynthesis and signaling and on AZI1 Arabidopsis geranylgeranyl reductase1 mutants with reduced monoterpene biosynthesis were SAR-defective but mounted normal local resistance and methyl salicylate-induced defense responses, suggesting that monoterpenes act in parallel with SA The volatile emissions from SAR signal-emitting plants induced defense in neighboring plants, and this was associated with the presence of α-pinene, β-pinene, and camphene in the emissions of the "sender" plants. Our data suggest that monoterpenes, particularly pinenes, promote SAR, acting through ROS and AZI1 , and likely function as infochemicals in plant-to-plant signaling, thus allowing defense signal propagation between neighboring plants. © 2017 American Society of Plant Biologists. All rights reserved.
A Requirement Specification Language for AADL
2016-06-01
008 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release; Distribution is Unlimited...Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No...FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Defense AT and L. Volume 42, Number 1
2013-02-01
Agnish The U.S. Army late last year began equipping brigade combat teams with its first package of radios, satellite systems, software applications...Army’s first package of radios, satellite systems, software applications, smartphone-like devices, and other network components that provide integrated... satellite communications, intelligence, mission command applications, and the integration of C4ISR equip- ment onto various vehicle platforms. This
Measuring Cyber Operations Effectiveness
2014-11-01
are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10
2005-10-01
1: Disciplines Contributing to Software Assurance When a natural disaster strikes, a cor-poration normally places a disaster recovery plan into effect...survivability, and contrasts survivability with the traditional disaster recovery and business continuity disciplines . A system survivability design...specialty engi- neering disciplines and their requirements. These disciplines include availability, reliabil- ity, maintainability, and accountability as
NASA Technical Reports Server (NTRS)
Hanley, Lionel
1989-01-01
The Ada Software Repository is a public-domain collection of Ada software and information. The Ada Software Repository is one of several repositories located on the SIMTEL20 Defense Data Network host computer at White Sands Missile Range, and available to any host computer on the network since 26 November 1984. This repository provides a free source for Ada programs and information. The Ada Software Repository is divided into several subdirectories. These directories are organized by topic, and their names and a brief overview of their topics are contained. The Ada Software Repository on SIMTEL20 serves two basic roles: to promote the exchange and use (reusability) of Ada programs and tools (including components) and to promote Ada education.
2001-12-01
defense profits become excessive. Sorenson uses the Capital Asset Pricing Model ( CAPM ) to compare the risk-reward relationship for defense...firms. THEORETICAL, NORMATIVE, EMPIRICAL, INDUCTIVE [58] “A Comment on Using the Capital Asset Pricing ...combination asset revaluation, pensions, post-retirement health benefits, software capitalization , Material Management and Accounting System (MMAS), cost
National Defense Center of Excellence for Industrial Metrology and 3D Imaging
2012-10-18
validation rather than mundane data-reduction/analysis tasks. Indeed, the new financial and technical resources being brought to bear by integrating CT...of extremely fast axial scanners. By replacing the single-spot detector by a detector array, a three-dimensional image is acquired by one depth scan...the number of acquired voxels per complete two-dimensional or three-dimensional image, the axial and lateral resolution, the depth range, the
Technical Basis for Evaluating Software-Related Common-Cause Failures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muhlheim, Michael David; Wood, Richard
2016-04-01
The instrumentation and control (I&C) system architecture at a nuclear power plant (NPP) incorporates protections against common-cause failures (CCFs) through the use of diversity and defense-in-depth. Even for well-established analog-based I&C system designs, the potential for CCFs of multiple systems (or redundancies within a system) constitutes a credible threat to defeating the defense-in-depth provisions within the I&C system architectures. The integration of digital technologies into the I&C systems provides many advantages compared to the aging analog systems with respect to reliability, maintenance, operability, and cost effectiveness. However, maintaining the diversity and defense-in-depth for both the hardware and software within themore » digital system is challenging. In fact, the introduction of digital technologies may actually increase the potential for CCF vulnerabilities because of the introduction of undetected systematic faults. These systematic faults are defined as a “design fault located in a software component” and at a high level, are predominately the result of (1) errors in the requirement specification, (2) inadequate provisions to account for design limits (e.g., environmental stress), or (3) technical faults incorporated in the internal system (or architectural) design or implementation. Other technology-neutral CCF concerns include hardware design errors, equipment qualification deficiencies, installation or maintenance errors, instrument loop scaling and setpoint mistakes.« less
48 CFR 207.7002 - Authority to acquire additional quantities of end items.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Buy-to-Budget... production efficiencies or other cost reductions; (c) The amount of funds used for the acquisition of the...
48 CFR 207.7002 - Authority to acquire additional quantities of end items.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Buy-to-Budget... production efficiencies or other cost reductions; (c) The amount of funds used for the acquisition of the...
48 CFR 207.7002 - Authority to acquire additional quantities of end items.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Buy-to-Budget... production efficiencies or other cost reductions; (c) The amount of funds used for the acquisition of the...
48 CFR 207.7002 - Authority to acquire additional quantities of end items.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Buy-to-Budget... production efficiencies or other cost reductions; (c) The amount of funds used for the acquisition of the...
48 CFR 207.7002 - Authority to acquire additional quantities of end items.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Buy-to-Budget... production efficiencies or other cost reductions; (c) The amount of funds used for the acquisition of the...
Open Architecture SDR for Space
NASA Technical Reports Server (NTRS)
Smith, Carl; Long, Chris; Liebetreu, John; Reinhart, Richard C.
2005-01-01
This paper describes an open-architecture SDR (software defined radio) infrastructure that is suitable for space-based operations (Space-SDR). SDR technologies will endow space and planetary exploration systems with dramatically increased capability, reduced power consumption, and significantly less mass than conventional systems, at costs reduced by vigorous competition, hardware commonality, dense integration, reduced obsolescence, interoperability, and software re-use. Significant progress has been recorded on developments like the Joint Tactical Radio System (JSTRS) Software Communication Architecture (SCA), which is oriented toward reconfigurable radios for defense forces operating in multiple theaters of engagement. The JTRS-SCA presents a consistent software interface for waveform development, and facilitates interoperability, waveform portability, software re-use, and technology evolution.
Ground-Based Correction of Remote-Sensing Spectral Imagery
NASA Technical Reports Server (NTRS)
Alder-Golden, Steven M.; Rochford, Peter; Matthew, Michael; Berk, Alexander
2007-01-01
Software has been developed for an improved method of correcting for the atmospheric optical effects (primarily, effects of aerosols and water vapor) in spectral images of the surface of the Earth acquired by airborne and spaceborne remote-sensing instruments. In this method, the variables needed for the corrections are extracted from the readings of a radiometer located on the ground in the vicinity of the scene of interest. The software includes algorithms that analyze measurement data acquired from a shadow-band radiometer. These algorithms are based on a prior radiation transport software model, called MODTRAN, that has been developed through several versions up to what are now known as MODTRAN4 and MODTRAN5 . These components have been integrated with a user-friendly Interactive Data Language (IDL) front end and an advanced version of MODTRAN4. Software tools for handling general data formats, performing a Langley-type calibration, and generating an output file of retrieved atmospheric parameters for use in another atmospheric-correction computer program known as FLAASH have also been incorporated into the present soft-ware. Concomitantly with the soft-ware described thus far, there has been developed a version of FLAASH that utilizes the retrieved atmospheric parameters to process spectral image data.
Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process
2009-07-10
and Joint Staff; the Unified Combatant Commands ( UCCs ); the Defense Agencies; and DOD field activities. 18 If there is a conflict between DOD’s top...fair share , or more, of the military contracts there were to be won.71 Congress appeared to have been aware of issues relating to such a basic...However for this establishment to occur, there had to be a market for its products as a catalyst; this market was born when the comparatively small
1992-08-01
entrepreneurship courses for laid-off McDonnell Douglas employees. Over 500 have participated in the classes. • McDonnell Douglas donated its lease-hold...international programs and organizations • Analysis of regional financing programs The St. Louis World Trade Center franchise was acquired for the region...averaged over the 1970’s, the defense cutbacks are likely contribute only a small part of that objective. 2 38 7 Figure 5.3 REAL GDP BASE VS
Defensive Practice as ‘Fear-Based’ Practice: Social Work's Open Secret?
Whittaker, Andrew; Havard, Tirion
2016-01-01
Defensive practice has received attention through the Munro review of child protection, which has identified that current organisational cultures increase the likelihood of defensive practice. Whilst the wider socio-political climate that gives rise to defensive practice has been explored within the literature, little attention has been paid to the everyday realities of defensive practice. This paper reports the findings of a study into final year social work students' attitudes towards defensive practice within social work. Three focus groups were completed with a total of ninety final-year students that collected qualitative and quantitative data using interactive software. This paper examines how participants perceived defensive practice, both in general and when faced with real-life vignettes. Participants distinguished between pro-active behaviour (sins of commission) and passive behaviour (sins of omission), generally regarding the latter as less serious because it was less tangible and easier to attribute to more positive motives. Whilst the literature identifies defensive practice as deliberate behaviour, the focus group discussions suggest that it is a subtler and less conscious process. Whilst there was there was a general consensus about the nature of defensive practice, there was considerable disagreement about specific vignettes and several competing explanations are explored. PMID:27559220
Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡
Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.
2011-01-01
The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672
Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.
Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V
2011-11-01
The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.
Department of Defense High Performance Computing Modernization Program. 2006 Annual Report
2007-03-01
Department. We successfully completed several software development projects that introduced parallel, scalable production software now in use across the...imagined. They are developing and deploying weather and ocean models that allow our soldiers, sailors, marines and airmen to plan missions more effectively...and to navigate adverse environments safely. They are modeling molecular interactions leading to the development of higher energy fuels, munitions
ERIC Educational Resources Information Center
Ols, John M., Jr.
Under current federal copyright law (17 U.S.C. 105), federal agencies cannot copyright and license their computer software. Officials at the Departments of Agriculture, Commerce, and Defense, the Environmental Protection Agency, the National Aeronautics and Space Administration, and the National Institutes of Health state that a significant…
A Proven Methodology for Developing Secure Software and Applying It to Ground Systems
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2016-01-01
Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?
Funding for Life: When to Spend the Acquisition Pot
2010-05-01
Private Military Sector Software Requirements for OA Spiral Development Strategy for Defense Acquisition Research The Software, Hardware...qb=p`elli= Capital Budgeting for the DoD Energy Saving Contracts/DoD Mobile Assets Financing DoD Budget via PPPs Lessons from Private Sector ...the endeavor can, in part, be related to the stability of the aims and contributory components. Economic growth has been driven by globalisation
Smith, Kelly D
2007-01-01
The host innate immune defense protein lipocalin 2 binds bacterial enterobactin siderophores to limit bacterial iron acquisition. To counteract this host defense mechanism bacteria have acquired the iroA gene cluster, which encodes enzymatic machinery and transporters that revitalize enterobactin in the form of salmochelin. The iroB enzyme introduces glucosyl residues at the C5 site on 2,3-dihydroxybenzoylserine moieties of enterobactin and thereby prevents lipocalin 2 binding. Additional strategies to evade lipocalin 2 have evolved in other bacteria, such as Mycobacteria tuberculosis and Bacillus anthracis. Targeting these specialized bacterial evasion strategy may provide a mechanism to reinvigorate lipocalin 2 in defense against specific pathogens.
Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense
2016-12-08
in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully
2010-03-01
submenus and toolbar with icon buttons 4. The IFOTA shall conform to Defense Information Infrastructure Common Operating Environment ( DII COE) and...him my business card , but it might come in the package we request via AFRL). PSYOP Instructor IWST is now called IWT (??) SME MD MD Instructor...Engineering and Software Engineering CTA Cognitive Task Analysis DII COE Defense Information Infrastructure Common Operating Environment EJB Enterprise Java
Large Scale Portability of Hospital Information System Software
Munnecke, Thomas H.; Kuhn, Ingeborg M.
1986-01-01
As part of its Decentralized Hospital Computer Program (DHCP) the Veterans Administration installed new hospital information systems in 169 of its facilities during 1984 and 1985. The application software for these systems is based on the ANS MUMPS language, is public domain, and is designed to be operating system and hardware independent. The software, developed by VA employees, is built upon a layered approach, where application packages layer on a common data dictionary which is supported by a Kernel of software. Communications between facilities are based on public domain Department of Defense ARPA net standards for domain naming, mail transfer protocols, and message formats, layered on a variety of communications technologies.
Computer-Based Educational Software System. Final Report.
ERIC Educational Resources Information Center
Brandt, Richard C.; Davis, Bradley N.
CBESS (Computer-Based Educational Software System) is a set of 22 programs addressing authoring, instructional delivery, and instructional management. The programs are divided into five groups: (1) Computer-Based Memorization System (CBMS), which helps students acquire and maintain declarative (factual) knowledge (11 programs); (2) Language Skills…
Making the most of a translator.
Dannenfeldt, D
1994-01-01
Anaheim Memorial Hospital in California is a trailblazer. It's one of the first hospitals in the nation to use translation software for both supply procurement and claims-related transactions. Initially, it acquired the software to streamline the ordering of supplies by shifting to standard electronic formats. Today, the hospital is using the software to receive electronic remittance advice, and it has plans for other labor-saving applications.
Systemic acquired tolerance to virulent bacterial pathogens in tomato.
Block, Anna; Schmelz, Eric; O'Donnell, Phillip J; Jones, Jeffrey B; Klee, Harry J
2005-07-01
Recent studies on the interactions between plants and pathogenic microorganisms indicate that the processes of disease symptom development and pathogen growth can be uncoupled. Thus, in many instances, the symptoms associated with disease represent an active host response to the presence of a pathogen. These host responses are frequently mediated by phytohormones. For example, ethylene and salicylic acid (SA) mediate symptom development but do not influence bacterial growth in the interaction between tomato (Lycopersicon esculentum) and virulent Xanthomonas campestris pv vesicatoria (Xcv). It is not apparent why extensive tissue death is integral to a defense response if it does not have the effect of limiting pathogen proliferation. One possible function for this hormone-mediated response is to induce a systemic defense response. We therefore assessed the systemic responses of tomato to Xcv. SA- and ethylene-deficient transgenic lines were used to investigate the roles of these phytohormones in systemic signaling. Virulent and avirulent Xcv did induce a systemic response as evidenced by expression of defense-associated pathogenesis-related genes in an ethylene- and SA-dependent manner. This systemic response reduced cell death but not bacterial growth during subsequent challenge with virulent Xcv. This systemic acquired tolerance (SAT) consists of reduced tissue damage in response to secondary challenge with a virulent pathogen with no effect upon pathogen growth. SAT was associated with a rapid ethylene and pathogenesis-related gene induction upon challenge. SAT was also induced by infection with Pseudomonas syringae pv tomato. These data show that SAT resembles systemic acquired resistance without inhibition of pathogen growth.
Seven Processes that Enable NASA Software Engineering Technologies
NASA Technical Reports Server (NTRS)
Housch, Helen; Godfrey, Sally
2011-01-01
This slide presentation reviews seven processes that NASA uses to ensure that software is developed, acquired and maintained as specified in the NPR 7150.2A requirement. The requirement is to ensure that all software be appraised for the Capability Maturity Model Integration (CMMI). The enumerated processes are: (7) Product Integration, (6) Configuration Management, (5) Verification, (4) Software Assurance, (3) Measurement and Analysis, (2) Requirements Management and (1) Planning & Monitoring. Each of these is described and the group(s) that are responsible is described.
Soft mechanical stimulation induces a defense response against Botrytis cinerea in strawberry.
Tomas-Grau, Rodrigo Hernán; Requena-Serra, Fernando José; Hael-Conrad, Verónica; Martínez-Zamora, Martín Gustavo; Guerrero-Molina, María Fernanda; Díaz-Ricci, Juan Carlos
2018-02-01
Genes associated with plant mechanical stimulation were found in strawberry genome. A soft mechanical stimulation (SMS) induces molecular and biochemical changes in strawberry plants, conferring protection against Botrytis cinerea. Plants have the capacity to induce a defense response after exposure to abiotic stresses acquiring resistance towards pathogens. It was reported that when leaves of Arabidopsis thaliana were wounded or treated with a soft mechanical stimulation (SMS), they could resist much better the attack of the fungal pathogen Botrytis cinerea, and this effect was accompanied by an oxidative burst and the expression of touch-inducible genes (TCH). However, no further work was carried out to better characterize the induced defense response. In this paper, we report that TCH genes were identified for first time in the genomes of the strawberry species Fragaria ananassa (e.g. FaTCH2, FaTCH3, FaTCH4 and FaCML39) and Fragaria vesca (e.g. FvTCH2, FvTCH3, FvTCH4 and FvCML39). Phylogenetic studies revealed that F. ananassa TCH genes exhibited high similarity with the orthologous of F. vesca and lower with A. thaliana ones. We also present evidence that after SMS treatment on strawberry leaves, plants activate a rapid oxidative burst, callose deposition, and the up-regulation of TCH genes as well as plant defense genes such as FaPR1, FaCHI2-2, FaCAT, FaACS1 and FaOGBG-5. The latter represents the first report showing that TCH- and defense-induced genes participate in SMS-induced resistance in plants, bringing a rational explanation why plants exposed to a SMS treatment acquired an enhance resistance toward B. cinerea.
Using digital colour to increase the realistic appearance of SEM micrographs of bloodstains.
Hortolà, Policarp
2010-10-01
Although in the scientific-research literature the micrographs from scanning electron microscopes (SEMs) are usually displayed in greyscale, the potential of colour resources provided by the SEM-coupled image-acquiring systems and, subsidiarily, by image-manipulation free softwares deserves be explored as a tool for colouring SEM micrographs of bloodstains. After acquiring greyscale SEM micrographs of a (dark red to the naked eye) human blood smear on grey chert, they were manually obtained in red tone using both the SEM-coupled image-acquiring system and an image-manipulation free software, as well as they were automatically generated in thermal tone using the SEM-coupled system. Red images obtained by the SEM-coupled system demonstrated lower visual-discrimination capability than the other coloured images, whereas those in red generated by the free software rendered better magnitude of scopic information than the red images generated by the SEM-coupled system. Thermal-tone images, although were further from the real sample colour than the red ones, not only increased their realistic appearance over the greyscale images, but also yielded the best visual-discrimination capability among all the coloured SEM micrographs, and fairly enhanced the relief effect of the SEM micrographs over both the greyscale and the red images. The application of digital colour by means of the facilities provided by an SEM-coupled image-acquiring system or, when required, by an image-manipulation free software provides a user-friendly, quick and inexpensive way of obtaining coloured SEM micrographs of bloodstains, avoiding to do sophisticated, time-consuming colouring procedures. Although this work was focused on bloodstains, well probably other monochromatic or quasi-monochromatic samples are also susceptible of increasing their realistic appearance by colouring them using the simple methods utilized in this study.
Tracking Positions and Attitudes of Mars Rovers
NASA Technical Reports Server (NTRS)
Ali, Khaled; vanelli, Charles; Biesiadecki, Jeffrey; Martin, Alejandro San; Maimone, Mark; Cheng, Yang; Alexander, James
2006-01-01
The Surface Attitude Position and Pointing (SAPP) software, which runs on computers aboard the Mars Exploration Rovers, tracks the positions and attitudes of the rovers on the surface of Mars. Each rover acquires data on attitude from a combination of accelerometer readings and images of the Sun acquired autonomously, using a pointable camera to search the sky for the Sun. Depending on the nature of movement commanded remotely by operators on Earth, the software propagates attitude and position by use of either (1) accelerometer and gyroscope readings or (2) gyroscope readings and wheel odometry. Where necessary, visual odometry is performed on images to fine-tune the position updates, particularly on high-wheel-slip terrain. The attitude data are used by other software and ground-based personnel for pointing a high-gain antenna, planning and execution of driving, and positioning and aiming scientific instruments.
DOT National Transportation Integrated Search
1976-09-01
Software used for the reduction and analysis of the multipath prober, modem evaluation (voice, digital data, and ranging), and antenna evaluation data acquired during the ATS-6 field test program is described. Multipath algorithms include reformattin...
48 CFR 208.002 - Priorities for use of Government supply sources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES 208... Acquisition, and Subpart 208.74, Enterprise Software Agreements. [71 FR 39004, July 11, 2006] ...
Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen
2016-01-01
We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. PMID:26672068
Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen
2016-01-01
We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. © 2016 American Society of Plant Biologists. All rights reserved.
A Separate Compilation Extension to Standard ML (Revised and Expanded)
2006-09-17
repetition of interfaces. The language is given a formal semantics, and we argue that this semantics is implementable in a variety of compilers. This...material is based on work supported in part by the National Science Foundation under grant 0121633 Language Technology for Trustless Software...Dissemination and by the Defense Advanced Research Projects Agency under contracts F196268-95-C-0050 The Fox Project: Advanced Languages for Systems Software
2007-09-01
Findings______________________________________________________________________ Chinese hackers forced one of its bureaus to cut off Internet access and discard virus -infected...Vulnerability ( IAV ) Management (IAVM) process was created to prepare and rapidly disseminate mitigating actions for potentially critical software...vulnerabilities to DoD Components. IAVM notices have three criticality levels: • IAV Alert (IAVA) – most critical – a vulnerability posing an immediate
Applying the Goal-Question-Indicator-Metric (GQIM) Method to Perform Military Situational Analysis
2016-05-11
www.sei.cmu.edu CMU/SEI-2016-TN-003 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release...Distribution is Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of...Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally
Defense Facility Condition: Revised Guidance Needed to Improve Oversight of Assessments and Ratings
2016-06-01
are to implement the standardized process in part by assessing the condition of buildings, pavement , and rail using the same set of software tools...facility to current standards; costs for labor, equipment, materials, and currency exchange rates overseas; costs for project planning and design ...example, the services are to assess the condition of buildings, pavement , and rail using Sustainment Management System software tools developed by the
CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010
2010-04-01
SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 6, September/October 2009
2009-10-01
software to improve the reliability, sustainability, and responsiveness of our warfighting capability. Subscriptions: Send correspondence concerning...endorsed by, the U.S. government, the DoD, the co-sponsors, or the STSC.All product names referenced in this issue are trademarks of their companies...Authors will use this section to share evidence of a demonstrative return on investment, process improvement , quality improvement , reductions to schedule
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 6
2006-06-01
improvement methods. The total volume of projects studied now exceeds 12,000. Software Productivity Research, LLC Phone: (877) 570-5459 (973) 273-5829...While performing quality con- sulting, Olson has helped organizations measurably improve quality and productivity , save millions of dollars in costs of...This article draws parallels between the outrageous events on the Jerry Springer Show and problems faced by process improvement programs. by Paul
Optimizing the Remotely Piloted Aircraft Pilot Career Field
2011-10-01
Katana light aircraft trainers, receiving 30 to 38 hours of introductory, night, cross country and solo ...Power Journal 33, no. 2 (Summer 2009): 5-10. 51. Steve Lohr. "Software Progress Beats Moore’s Law." bits.blogs.nytimes.com. March 07, 2011. http...bits.blogs.nytimes.com/2011/03/07/software-progress- beats -moores-law/ 52. US Department of Defense. "United States Air Force Unmanned Aircraft
NASA Technical Reports Server (NTRS)
1995-01-01
Software Bisque's TheSky, SkyPro and Remote Astronomy Software incorporate technology developed for the Hubble Space Telescope. TheSky and SkyPro work together to orchestrate locating, identifying and acquiring images of deep sky objects. With all three systems, the user can directly control computer-driven telescopes and charge coupled device (CCD) cameras through serial ports. Through the systems, astronomers and students can remotely operate a telescope at the Mount Wilson Observatory Institute.
1992-01-01
perturbations and nonstationary interference effects so as to reduce decoding 13 DARPA SBIR PHASE I AWARDS errors for spread spectrum communications...potential applications - Utilization of spread spectrum techniques by DoD and others is increasing because ot robusines, to interference and fading...Mirror Devices ( DMD ) illuminated by a low power laser diode or led will be considered as a source. Commercial optical software in conjunction with in
1985-06-01
Z2~1 31DTIC TAR 31 Unaflnonc.-d Successful The S N wDefense Challenge: Distribul Systems Spare Parts Availability Dr. Joniathian D. Kaplan Lieutenant...Developing Human Perform- hardware software has not been ing that the resulting design be capable ance Specifications ( Kaplan & Crooks, developed at this...design to perform at the components: MOS-characteristics specified criteria. Although the map, analysis-characteristics map, and E Dr. Kaplan is a
2017-03-23
performance computing resources made available by the US Department of Defense High Performance Computing Modernization Program at the Air Force...1Department of Defense Biotechnology High Performance Computing Software Applications Institute, Telemedicine and Advanced Technology Research Center, United...States Army Medical Research and Materiel Command, Fort Detrick, Maryland, USA Full list of author information is available at the end of the article
2006-02-01
technology for cost and risk reduction of products, software, and processes; long-term, multi-Service needs; and disruptive technologies , both...initiatives and for disruptive technologies , the Office of the Secretary of Defense (OSD) can better promote the importance and value of the program...multi- Service programs, research in “ disruptive ” technologies , and SBIR programs. Balance current, near term, and future needs as well as small and
Use of Writing with Symbols 2000 Software to Facilitate Emergent Literacy Development
ERIC Educational Resources Information Center
Parette, Howard P.; Boeckmann, Nichole M.; Hourcade, Jack J.
2008-01-01
This paper outlines the use of the "Writing with Symbols 2000" software to facilitate emergent literacy development. The program's use of pictures incorporated with text has great potential to help young children with and without disabilities acquire fundamental literacy concepts about print, phonemic awareness, alphabetic principle, vocabulary…
NASA Technical Reports Server (NTRS)
Tamayo, Tak Chai
1987-01-01
Quality of software not only is vital to the successful operation of the space station, it is also an important factor in establishing testing requirements, time needed for software verification and integration as well as launching schedules for the space station. Defense of management decisions can be greatly strengthened by combining engineering judgments with statistical analysis. Unlike hardware, software has the characteristics of no wearout and costly redundancies, thus making traditional statistical analysis not suitable in evaluating reliability of software. A statistical model was developed to provide a representation of the number as well as types of failures occur during software testing and verification. From this model, quantitative measure of software reliability based on failure history during testing are derived. Criteria to terminate testing based on reliability objectives and methods to estimate the expected number of fixings required are also presented.
Artificial intelligence and expert systems in-flight software testing
NASA Technical Reports Server (NTRS)
Demasie, M. P.; Muratore, J. F.
1991-01-01
The authors discuss the introduction of advanced information systems technologies such as artificial intelligence, expert systems, and advanced human-computer interfaces directly into Space Shuttle software engineering. The reconfiguration automation project (RAP) was initiated to coordinate this move towards 1990s software technology. The idea behind RAP is to automate several phases of the flight software testing procedure and to introduce AI and ES into space shuttle flight software testing. In the first phase of RAP, conventional tools to automate regression testing have already been developed or acquired. There are currently three tools in use.
Applying formal methods and object-oriented analysis to existing flight software
NASA Technical Reports Server (NTRS)
Cheng, Betty H. C.; Auernheimer, Brent
1993-01-01
Correctness is paramount for safety-critical software control systems. Critical software failures in medical radiation treatment, communications, and defense are familiar to the public. The significant quantity of software malfunctions regularly reported to the software engineering community, the laws concerning liability, and a recent NRC Aeronautics and Space Engineering Board report additionally motivate the use of error-reducing and defect detection software development techniques. The benefits of formal methods in requirements driven software development ('forward engineering') is well documented. One advantage of rigorously engineering software is that formal notations are precise, verifiable, and facilitate automated processing. This paper describes the application of formal methods to reverse engineering, where formal specifications are developed for a portion of the shuttle on-orbit digital autopilot (DAP). Three objectives of the project were to: demonstrate the use of formal methods on a shuttle application, facilitate the incorporation and validation of new requirements for the system, and verify the safety-critical properties to be exhibited by the software.
A Clementine collection: Moonglow
NASA Astrophysics Data System (ADS)
1994-06-01
The Clementine story began in 1990 when NASA administrator Richard Truly asked the Department of Defense to consider a joint NASA/DOD mission that would achieve goals mutually beneficial to both organizations. That request was given to the then Strategic Defense Initiative Organization (SDIO) to investigate. A mission was conceived to test the latest in space-based imaging components, using the moon and a near-earth asteroid as celestial targets. The Clementine mission is the result of those early investigations. This collection is an early sampling of the 1.8 million images acquired by the Clementine spacecraft.
A Corpus-Based Comparative Study of "Learn" and "Acquire"
ERIC Educational Resources Information Center
Yang, Bei
2016-01-01
As an important yet intricate linguistic feature in English language, synonymy poses a great challenge for second language learners. Using the 100 million-word British National Corpus (BNC) as data and the software Sketch Engine (SkE) as an analyzing tool, this article compares the usage of "learn" and "acquire" used in natural…
Software architecture and engineering for patient records: current and future.
Weng, Chunhua; Levine, Betty A; Mun, Seong K
2009-05-01
During the "The National Forum on the Future of the Defense Health Information System," a track focusing on "Systems Architecture and Software Engineering" included eight presenters. These presenters identified three key areas of interest in this field, which include the need for open enterprise architecture and a federated database design, net centrality based on service-oriented architecture, and the need for focus on software usability and reusability. The eight panelists provided recommendations related to the suitability of service-oriented architecture and the enabling technologies of grid computing and Web 2.0 for building health services research centers and federated data warehouses to facilitate large-scale collaborative health care and research. Finally, they discussed the need to leverage industry best practices for software engineering to facilitate rapid software development, testing, and deployment.
Computer-Aided Process and Tools for Mobile Software Acquisition
2013-07-30
moldo^j= pmlkploba=obmloq=pbofbp= Computer-Aided Process and Tools for Mobile Software Acquisition 30 July 2013 LT Christopher Bonine , USN, Dr...Christopher Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense Operations Command in Norfolk, VA. He has...interests are in development and implementation of cyber security policy. Bonine has a master’s in computer science from the Naval Postgraduate School
Exploring the Cost and Functionality of MEDCOM Web Services
2005-10-24
Software Name 24. What backend database software supports your intranet/Internet content? (check all that apply)-. o Oracle o Microsoft SQL Server E0...Department of Defense (DoD) service branches, which funded and deployed an Internet portal, TRICARE Online, to serve as an information conduit between the...public website, the information contained on the intranet is traditionally limited to the members of the hosting command. The local information serves as
Glossary: Defense Acquisition Acronyms and Terms. 4th Edition
1989-10-01
Appropriations Committee R HARDMAN Manpower Planning for Hardware (Navy/USMC) HASC House Armed Services Committee 11 HBC House Budget Committee R HCA Head of...Logistics Review Group (Navy) LRIP Low Rate Initial Production LRP Low Rate Production LRRDAP Long Range Research, Development and Acquisition Plan...Software User’s Manual R SUPSHIPS Superintendent of Shipbuilding S/V Survivability/Vulnerability SVR Shop Visit Rate R SW or S/W Software SX Systems
Department of Defense Software Factbook
2017-07-07
parameters, these rules of thumb may not provide a lot of value to project managers estimating their software efforts. To get the information useful to them...organization determine the total cost of a particular project , but it is a useful metric to technical managers when they are required to submit an annual...outcome. It is most likely a combination of engineering, management , and funding factors. Although a project may resist planning a schedule slip, this
2015-04-30
mobile devices used within academic, business , or government enterprises. Acquisition personnel in such enterprises will increasingly be called on to...Graduate School of Business & Public Policy at the Naval Postgraduate School. To request defense acquisition research, to become a research sponsor, or to...address challenges in the acquisition of software systems for Web-based or mobile devices used within academic, business , or government enterprises
Training Plan. Central Archive for Reusable Defense Software (CARDS)
1994-01-29
Modeling Software Reuse Technology: Feature Oriented Domain Analysis ( FODA ). SEI, Carnegie Mellon University, May 1992. 8. Component Provider’s...events to the services of the domain. 4. Feature Oriented Domain Analysis ( FODA ) [COHEN92] The FODA method produces feature models. Feature models provide...Architecture FODA Feature-Oriented Domain Analysis GOTS Government-Off-The-Shelf Pap A-49 STARS-VC-B003/001/00 29 imaty 1994 MS Master of Science NEC
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 9
2006-09-01
it does. Several freely down- loadable methodologies have emerged to support the developer in modeling threats to applications and other soft...SECURIS. Model -Driven Develop - ment and Analysis of Secure Information Systems <www.sintef.no/ content/page1_1824.aspx>. 10. The SECURIS Project ...By applying these methods to the SDLC , we can actively reduce the number of known vulnerabilities in software as it is developed . For
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007
2007-03-01
Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO
Fault Tolerant Hardware/Software Architecture for Flight Critical Function
1985-09-01
Applications Studies Programme. The results of AGARD work are reported to the member nations and the NATO Authorities through the AGARD series of...systems, and is being advocated as a defense against design deficiencies which can plague software. - -- -- z--mm-L ___ K A critical application area for...day of the lecture series concludes with part I of a paper on the ;use of the Ada programming language In flight critical applications . Ada has been
Program Manager: Journal of the Defense Systems Management College, Volume 17, Number 3
1988-06-01
34 modernizing plants and processes, We have established a network with What does "quality" mean? First, the streamlining management, pooling trade associations...pant an opportunity to reflect on the - Network building may be the first opportunity for some organizational climate and hierarchical managers to...s devop slom p se result of the soaring cost of soft -Software Performance Testing. 3 ware enhancements. This difference in hardware and software
Agile Software Development in Defense Acquisition: A Mission Assurance Perspective
2012-03-23
based information retrieval system, we might say that this program works like a hive of bees , going out for pollen and bringing it back to the hive...developers ® Six Siqma is reqistered in the U. S. Patent and Trademark Office by Motorola ^_ 33 @ AEROSPACE Major Areas in a Typical Software...requirements - Capturing and evaluating quality metrics, identifying common problem areas **» Despite its positive impact on quality, pair programming
Engineering intelligent tutoring systems
NASA Technical Reports Server (NTRS)
Warren, Kimberly C.; Goodman, Bradley A.
1993-01-01
We have defined an object-oriented software architecture for Intelligent Tutoring Systems (ITS's) to facilitate the rapid development, testing, and fielding of ITS's. This software architecture partitions the functionality of the ITS into a collection of software components with well-defined interfaces and execution concept. The architecture was designed to isolate advanced technology components, partition domain dependencies, take advantage of the increased availability of commercial software packages, and reduce the risks involved in acquiring ITS's. A key component of the architecture, the Executive, is a publish and subscribe message handling component that coordinates all communication between ITS components.
1983-11-01
INSTRUMENTATION ;(U) FORKLIFT VEHICLES ;(U) EXPERIMENTAL DATA IDENTIFIERS: OBJECTIVE: (U) SUPPORT INHOUSE RESEARCH FOR- ACQUISITION AND ANALYSIS OF...ROBOTIC RECONNAISSANCE VEHICLE DEMONSTRATOR WITH TERRAIN ANALYSIS . THIS WORK WILL SPECIFY THE BASE LINE HARDWARE, SOFTWARE, DATA BASE, AND SYSTEM...THE DATA ANALYSIS . THIS IS ALSO TRUE OF INFLIGMT DATA THAT THE PILOT IS REQUIRED TO ANALYZE. THIS RESEARCH IS CONCERNED WITH THE REPORT NO. CX7419
Budd, Aidan; Blandin, Stephanie; Levashina, Elena A; Gibson, Toby J
2004-01-01
Background Invasive bacteria are known to have captured and adapted eukaryotic host genes. They also readily acquire colonizing genes from other bacteria by horizontal gene transfer. Closely related species such as Helicobacter pylori and Helicobacter hepaticus, which exploit different host tissues, share almost none of their colonization genes. The protease inhibitor α2-macroglobulin provides a major metazoan defense against invasive bacteria, trapping attacking proteases required by parasites for successful invasion. Results Database searches with metazoan α2-macroglobulin sequences revealed homologous sequences in bacterial proteomes. The bacterial α2-macroglobulin phylogenetic distribution is patchy and violates the vertical descent model. Bacterial α2-macroglobulin genes are found in diverse clades, including purple bacteria (proteobacteria), fusobacteria, spirochetes, bacteroidetes, deinococcids, cyanobacteria, planctomycetes and thermotogae. Most bacterial species with bacterial α2-macroglobulin genes exploit higher eukaryotes (multicellular plants and animals) as hosts. Both pathogenically invasive and saprophytically colonizing species possess bacterial α2-macroglobulins, indicating that bacterial α2-macroglobulin is a colonization rather than a virulence factor. Conclusions Metazoan α2-macroglobulins inhibit proteases of pathogens. The bacterial homologs may function in reverse to block host antimicrobial defenses. α2-macroglobulin was probably acquired one or more times from metazoan hosts and has then spread widely through other colonizing bacterial species by more than 10 independent horizontal gene transfers. yfhM-like bacterial α2-macroglobulin genes are often found tightly linked with pbpC, encoding an atypical peptidoglycan transglycosylase, PBP1C, that does not function in vegetative peptidoglycan synthesis. We suggest that YfhM and PBP1C are coupled together as a periplasmic defense and repair system. Bacterial α2-macroglobulins might provide useful targets for enhancing vaccine efficacy in combating infections. PMID:15186489
Cloud Computing E-Communication Services in the University Environment
ERIC Educational Resources Information Center
Babin, Ron; Halilovic, Branka
2017-01-01
The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…
An Ontology and a Software Framework for Competency Modeling and Management
ERIC Educational Resources Information Center
Paquette, Gilbert
2007-01-01
The importance given to competency management is well justified. Acquiring new competencies is the central goal of any education or knowledge management process. Thus, it must be embedded in any software framework as an instructional engineering tool, to inform the runtime environment of the knowledge that is processed by actors, and their…
Acquiring Software Project Specifications in a Virtual World
ERIC Educational Resources Information Center
Ng, Vincent; Tang, Zoe
2012-01-01
In teaching software engineering, it is often interesting to introduce real life scenarios for students to experience and to learn how to collect information from respective clients. The ideal arrangement is to have some real clients willing to spend time to provide their ideas of a target system through interviews. However, this arrangement…
NASA Technical Reports Server (NTRS)
Rosenberg, Linda
1997-01-01
If software is a critical element in a safety critical system, it is imperative to implement a systematic approach to software safety as an integral part of the overall system safety programs. The NASA-STD-8719.13A, "NASA Software Safety Standard", describes the activities necessary to ensure that safety is designed into software that is acquired or developed by NASA, and that safety is maintained throughout the software life cycle. A PDF version, is available on the WWW from Lewis. A Guidebook that will assist in the implementation of the requirements in the Safety Standard is under development at the Lewis Research Center (LeRC). After completion, it will also be available on the WWW from Lewis.
Real time data acquisition of a countrywide commercial microwave link network
NASA Astrophysics Data System (ADS)
Chwala, Christian; Keis, Felix; Kunstmann, Harald
2015-04-01
Research in recent years has shown that data from commercial microwave link networks can provide very valuable precipitation information. Since these networks comprise the backbone of the cell phone network, they provide countrywide coverage. However acquiring the necessary data from the network operators is still difficult. Data is usually made available for researchers with a large time delay and often at irregular basis. This of course hinders the exploitation of commercial microwave link data in operational applications like QPE forecasts running at national meteorological services. To overcome this, we have developed a custom software in joint cooperation with our industry partner Ericsson. The software is installed on a dedicated server at Ericsson and is capable of acquiring data from the countrywide microwave link network in Germany. In its current first operational testing phase, data from several hundred microwave links in southern Germany is recorded. All data is instantaneously sent to our server where it is stored and organized in an emerging database. Time resolution for the Ericsson data is one minute. The custom acquisition software, however, is capable of processing higher sampling rates. Additionally we acquire and manage 1 Hz data from four microwave links operated by the skiing resort in Garmisch-Partenkirchen. We will present the concept of the data acquisition and show details of the custom-built software. Additionally we will showcase the accessibility and basic processing of real time microwave link data via our database web frontend.
Use of imagery and GIS for humanitarian demining management
NASA Astrophysics Data System (ADS)
Gentile, Jack; Gustafson, Glen C.; Kimsey, Mary; Kraenzle, Helmut; Wilson, James; Wright, Stephen
1997-11-01
In the Fall of 1996, the Center for Geographic Information Science at James Madison University became involved in a project for the Department of Defense evaluating the data needs and data management systems for humanitarian demining in the Third World. In particular, the effort focused on the information needs of demining in Cambodia and in Bosnia. In the first phase of the project one team attempted to identify all sources of unclassified country data, image data and map data. Parallel with this, another group collected information and evaluations on most of the commercial off-the-shelf computer software packages for the management of such geographic information. The result was a design for the kinds of data and the kinds of systems necessary to establish and maintain such a database as a humanitarian demining management tool. The second phase of the work involved acquiring the recommended data and systems, integrating the two, and producing a demonstration of the system. In general, the configuration involves ruggedized portable computers for field use with a greatly simplified graphical user interface, supported by a more capable central facility based on Pentium workstations and appropriate technical expertise.
48 CFR 34.103 - Testing and qualification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Developed Under Title III, Defense Production Act 34.103 Testing and qualification. (a) Contractors... or item of supply; and (2) for major systems in production, remaining quantities to be acquired are sufficient to justify incurring the cost of testing and qualification. In evaluating this request, the...
48 CFR 212.211 - Technical data.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Technical data. 212.211 Section 212.211 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition of Commercial Items 212.211 Technical data. The DoD policy for acquiring technical data for...
48 CFR 212.211 - Technical data.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Technical data. 212.211 Section 212.211 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition of Commercial Items 212.211 Technical data. The DoD policy for acquiring technical data for...
48 CFR 212.211 - Technical data.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Technical data. 212.211 Section 212.211 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition of Commercial Items 212.211 Technical data. The DoD policy for acquiring technical data for...
48 CFR 212.211 - Technical data.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Technical data. 212.211 Section 212.211 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition of Commercial Items 212.211 Technical data. The DoD policy for acquiring technical data for...
48 CFR 212.211 - Technical data.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Technical data. 212.211 Section 212.211 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition of Commercial Items 212.211 Technical data. The DoD policy for acquiring technical data for...
Steyn, Rachelle; Boniaszczuk, John; Geldenhuys, Theodore
2014-01-01
To determine how two software packages, supplied by Siemens and Hermes, for processing gated blood pool (GBP) studies should be used in our department and whether the use of different cameras for the acquisition of raw data influences the results. The study had two components. For the first component, 200 studies were acquired on a General Electric (GE) camera and processed three times by three operators using the Siemens and Hermes software packages. For the second part, 200 studies were acquired on two different cameras (GE and Siemens). The matched pairs of raw data were processed by one operator using the Siemens and Hermes software packages. The Siemens method consistently gave estimates that were 4.3% higher than the Hermes method (p < 0.001). The differences were not associated with any particular level of left ventricular ejection fraction (LVEF). There was no difference in the estimates of LVEF obtained by the three operators (p = 0.1794). The reproducibility of estimates was good. In 95% of patients, using the Siemens method, the SD of the three estimates of LVEF by operator 1 was ≤ 1.7, operator 2 was ≤ 2.1 and operator 3 was ≤ 1.3. The corresponding values for the Hermes method were ≤ 2.5, ≤ 2.0 and ≤ 2.1. There was no difference in the results of matched pairs of data acquired on different cameras (p = 0.4933) CONCLUSION: Software packages for processing GBP studies are not interchangeable. The report should include the name and version of the software package used. Wherever possible, the same package should be used for serial studies. If this is not possible, the report should include the limits of agreement of the different packages. Data acquisition on different cameras did not influence the results.
Type III CRISPR-Cas systems can provide redundancy to counteract viral escape from type I systems.
Silas, Sukrit; Lucas-Elio, Patricia; Jackson, Simon A; Aroca-Crevillén, Alejandra; Hansen, Loren L; Fineran, Peter C; Fire, Andrew Z; Sánchez-Amat, Antonio
2017-08-17
CRISPR-Cas-mediated defense utilizes information stored as spacers in CRISPR arrays to defend against genetic invaders. We define the mode of target interference and role in antiviral defense for two CRISPR-Cas systems in Marinomonas mediterranea . One system (type I-F) targets DNA. A second system (type III-B) is broadly capable of acquiring spacers in either orientation from RNA and DNA, and exhibits transcription-dependent DNA interference. Examining resistance to phages isolated from Mediterranean seagrass meadows, we found that the type III-B machinery co-opts type I-F CRISPR-RNAs. Sequencing and infectivity assessments of related bacterial and phage strains suggests an 'arms race' in which phage escape from the type I-F system can be overcome through use of type I-F spacers by a horizontally-acquired type III-B system. We propose that the phage-host arms race can drive selection for horizontal uptake and maintenance of promiscuous type III interference modules that supplement existing host type I CRISPR-Cas systems.
Maintaining the Health of Software Monitors
NASA Technical Reports Server (NTRS)
Person, Suzette; Rungta, Neha
2013-01-01
Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors use information from the specification and implementation of the monitored software to detect violations, predict possible failures, and help the system recover from faults. Changes to the monitored software, such as adding new functionality or fixing defects, therefore, have the potential to impact the correctness of both the monitored software and the SWHM monitor. In this work, we describe how the results of a software change impact analysis technique, Directed Incremental Symbolic Execution (DiSE), can be applied to monitored software to identify the potential impact of the changes on the SWHM monitor software. The results of DiSE can then be used by other analysis techniques, e.g., testing, debugging, to help preserve and improve the integrity of the SWHM monitor as the monitored software evolves.
Software-assisted small bowel motility analysis using free-breathing MRI: feasibility study.
Bickelhaupt, Sebastian; Froehlich, Johannes M; Cattin, Roger; Raible, Stephan; Bouquet, Hanspeter; Bill, Urs; Patak, Michael A
2014-01-01
To validate a software prototype allowing for small bowel motility analysis in free breathing by comparing it to manual measurements. In all, 25 patients (15 male, 10 female; mean age 39 years) were included in this Institutional Review Board-approved, retrospective study. Magnetic resonance imaging (MRI) was performed on a 1.5T system after standardized preparation acquiring motility sequences in free breathing over 69-84 seconds. Small bowel motility was analyzed manually and with the software. Functional parameters, measurement time, and reproducibility were compared using the coefficient of variance and paired Student's t-test. Correlation was analyzed using Pearson's correlation coefficient and linear regression. The 25 segments were analyzed twice both by hand and using the software with automatic breathing correction. All assessed parameters significantly correlated between the methods (P < 0.01), but the scattering of repeated measurements was significantly (P < 0.01) lower using the software (3.90%, standard deviation [SD] ± 5.69) than manual examinations (9.77%, SD ± 11.08). The time needed was significantly less (P < 0.001) with the software (4.52 minutes, SD ± 1.58) compared to manual measurement, lasting 17.48 minutes for manual (SD ± 1.75 minutes). The use of the software proves reliable and faster small bowel motility measurements in free-breathing MRI compared to manual analyses. The new technique allows for analyses of prolonged sequences acquired in free breathing, improving the informative value of the examinations by amplifying the evaluable data. Copyright © 2013 Wiley Periodicals, Inc.
Multidrug-resistant enterococci lack CRISPR-cas.
Palmer, Kelli L; Gilmore, Michael S
2010-10-12
Clustered, regularly interspaced short palindromic repeats (CRISPR) provide bacteria and archaea with sequence-specific, acquired defense against plasmids and phage. Because mobile elements constitute up to 25% of the genome of multidrug-resistant (MDR) enterococci, it was of interest to examine the codistribution of CRISPR and acquired antibiotic resistance in enterococcal lineages. A database was built from 16 Enterococcus faecalis draft genome sequences to identify commonalities and polymorphisms in the location and content of CRISPR loci. With this data set, we were able to detect identities between CRISPR spacers and sequences from mobile elements, including pheromone-responsive plasmids and phage, suggesting that CRISPR regulates the flux of these elements through the E. faecalis species. Based on conserved locations of CRISPR and CRISPR-cas loci and the discovery of a new CRISPR locus with associated functional genes, CRISPR3-cas, we screened additional E. faecalis strains for CRISPR content, including isolates predating the use of antibiotics. We found a highly significant inverse correlation between the presence of a CRISPR-cas locus and acquired antibiotic resistance in E. faecalis, and examination of an additional eight E. faecium genomes yielded similar results for that species. A mechanism for CRISPR-cas loss in E. faecalis was identified. The inverse relationship between CRISPR-cas and antibiotic resistance suggests that antibiotic use inadvertently selects for enterococcal strains with compromised genome defense.
Adaptive Technology for the Internet: Making Electronic Resources Accessible to All.
ERIC Educational Resources Information Center
Mates, Barbara T.
This book seeks to guide information providers in establishing accessible World Wide Web sites and acquiring the hardware and software needed by people with disabilities, focusing on access to the Internet using large print, voice, and Braille. The book also covers how to acquire the funds for adaptive technology, what type of equipment to choose,…
Chairside multi-unit restoration of a quadrant using the new Cerec 3D software.
Ender, A; Wiedhahn, K; Mörmann, W H
2003-01-01
The new Cerec 3D design software for inlays and partial and full crowns simplifies work when producing several restorations in one session. Quite significant progress has been achieved, in that the entire row of teeth of a quadrant can be acquired completely and displayed by successively overlapping optical impressions. The digital working model of a quadrant in which all preparations are acquired is the result. The restorations can be designed individually and inserted virtually. Thanks to virtual insertion, the proximal contacts to neighboring restorations can be designed perfectly and all restorations finally designed, milled, and inserted in one sitting. This method provides a significant rationalization effect.
NASA Technical Reports Server (NTRS)
Jumper, Judith K.
1994-01-01
The Laser Velocimeter Data Acquisition System (LVDAS) in the Langley 14- by 22-Foot Tunnel is controlled by a comprehensive software package. The software package was designed to control the data acquisition process during wind tunnel tests which employ a laser velocimeter measurement system. This report provides detailed explanations on how to configure and operate the LVDAS system to acquire laser velocimeter and static wind tunnel data.
Immune defense in leaf-cutting ants: a cross-fostering approach.
Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández; Nash, David R; Boomsma, Jacobus J
2011-06-01
To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily social defense, a Pseudonocardia bacteria that helps to control pathogens in the ants' fungus garden, showed a significant colony of origin by rearing environment interaction, whereby ants that acquired the bacteria of a foster colony obtained a less abundant cover of bacteria: one explanation for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses. © 2011 The Author(s). Evolution© 2011 The Society for the Study of Evolution.
Space Station Software Recommendations
NASA Technical Reports Server (NTRS)
Voigt, S. (Editor)
1985-01-01
Four panels of invited experts and NASA representatives focused on the following topics: software management, software development environment, languages, and software standards. Each panel deliberated in private, held two open sessions with audience participation, and developed recommendations for the NASA Space Station Program. The major thrusts of the recommendations were as follows: (1) The software management plan should establish policies, responsibilities, and decision points for software acquisition; (2) NASA should furnish a uniform modular software support environment and require its use for all space station software acquired (or developed); (3) The language Ada should be selected for space station software, and NASA should begin to address issues related to the effective use of Ada; and (4) The space station software standards should be selected (based upon existing standards where possible), and an organization should be identified to promulgate and enforce them. These and related recommendations are described in detail in the conference proceedings.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 6
2005-06-01
Bollinger The MITRE Corporation1 Progress brings new dangers: Powerful home computers, inexpensive high-speed Internet access, telecommuting , and software...been using for years. Sure enough, GIANT was able to finish removing the hard - core spyware. At some point, my Internet security package had been... The sad truth is that if you do nothing more than attach a Windows PC to the Internet over a high- speed line, it will be subjected to the first
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2
2012-04-01
attacks is expanding to engulf the compact world of smartphones . by Aditya K. Sood and Richard J. Enbody A Practical Approach to Securing and Managing...provide a vulnerable entry point to our mobile device informa- tion systems. As a result, hackers are able to quickly exploit software on smartphones ...MOBILE WORLD 4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones . This paper
Technical Reviews and Audits for Systems, Equipment and Computer Software. Volume 1
2009-09-15
acquisitions and technology developments. 2. This new-issue SMC standard comprises the text of The Aerospace Corporation report number TOR-2007( 8583 )-6414...TRA) Deskbook – DUSD(S&T) (May 2005) 17. IMP & IMS Preparation and Use Guide Version 0.9 (21 October 2005) 18. ISO /IEC STD 15939 Software...1521B, TOR-2007( 8583 )-6414_Volume 1. 110.2 Purpose A. The guidelines contained herein implement the Department of Defense Directive 4120.21
System and Mass Storage Study for Defense Mapping Agency Topographic Center (DMATC/HC)
1977-04-01
34•»-—•—■»■—- view. The assessment should be based on carefully designed control condi- tions—data volume, resolution, function, etc...egories: hardware control and library management support. This software is designed to interface with IBM 360/370 OS and OS/VS. No interface with a...laser re- cording unit includes a programmable recorder control subsystem which can be designed to provide a hardware and software interface compatible
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 8
2008-08-01
effort. No one ever replaced the dirty string and no one washed the cup ... The BASE -1 system came up on time, under budget, and exceeded all operating...the base where he worked was written, maintained, and com- pletely understood by one individual. Unfortunately, that individual was in a bad car ...sponsor: Software Engineering and System Assurance. USN co- sponsor: Naval Air Systems Command. USAF co- sponsors: Oklahoma City-Air Logistics Center
Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 4
2009-06-01
ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER...collaborate and produce quality results on a DoD project. by Dr. William R. Nichols, Anita D. Carleton, Watts S. Humphrey, and James W. Over Measuring...through both demanding software customers—and my own com- plaints during two- minute waits at the drive-thru window. Sometimes we just can- not get things
DoD Related Software Technology Requirements, Practices, and Prospects for the Future
1984-06-01
SOFIWARE REQUIREMENTS DEFINITION 61 G. DESIGN 63 H. CODING 66 I. INTEGRATION 68 "J. TESTING AND EVALUATION 69 K. CONFIGURATION CONTROL 72 "L. SOFTWARE... integrated functionality. It must be able to operate perfectly after prolonged periods of dormancy in hostile environments and when portions of the system have...aircraft to middle- eastern trouble spots. Although these examples are just highlights of defense systems, they are representative of the integral nature
NASA Technical Reports Server (NTRS)
1983-01-01
Drones, subscale vehicles like the Firebees, and full scale retired military aircraft are used to test air defense missile systems. The DFCS (Drone Formation Control System) computer, developed by IBM (International Business Machines) Federal Systems Division, can track ten drones at once. A program called ORACLS is used to generate software to track and control Drones. It was originally developed by Langley and supplied by COSMIC (Computer Software Management and Information Center). The program saved the company both time and money.
Contracting for Agile Software Development in the Department of Defense: An Introduction
2015-08-01
Requirements are fixed at a more granular level; reviews of the work product happen more frequently and assess each individual increment rather than a “ big bang ...boundaries than “ big - bang ” development. The implementation of incremental or progressive reviews enables just that—any issues identified at the time of the...the contract needs to support the delivery of deployable software at defined increments/intervals, rather than incentivizing “ big - bang ” efforts or
Social transmission of a host defense against cuckoo parasitism.
Davies, Nicholas B; Welbergen, Justin A
2009-06-05
Coevolutionary arms races between brood parasites and hosts involve genetic adaptations and counter-adaptations. However, hosts sometimes acquire defenses too rapidly to reflect genetic change. Our field experiments show that observation of cuckoo (Cuculus canorus) mobbing by neighbors on adjacent territories induced reed warblers (Acrocephalus scirpaceus) to increase the mobbing of cuckoos but not of parrots (a harmless control) on their own territory. In contrast, observation of neighbors mobbing parrots had no effect on reed warblers' responses to either cuckoos or parrots. These results indicate that social learning provides a mechanism by which hosts rapidly increase their nest defense against brood parasites. Such enemy-specific social transmission enables hosts to track fine-scale spatiotemporal variation in parasitism and may influence the coevolutionary trajectories and population dynamics of brood parasites and hosts.
Qiu, L L; Li, S; Bai, Y X
2016-06-01
To develop surgical templates for orthodontic miniscrew implantation based on cone-beam CT(CBCT)three-dimensional(3D)images and to evaluate the safety and stability of implantation guided by the templates. DICOM data obtained in patients who had CBCT scans taken were processed using Mimics software, and 3D images of teeth and maxillary bone were acquired. Meanwhile, 3D images of miniscrews were acquired using Solidworks software and processed with Mimics software. Virtual position of miniscrews was determined based on 3D images of teeth, bone, and miniscrews. 3D virtual templates were designed according to the virtual implantation plans. STL files were output and the real templates were fabricated with stereolithographic appliance(SLA). Postoperative CBCT scans were used to evaluate the implantation safety and the stability of miniscrews were investigated. All the templates were positioned accurately and kept stable throughout the implantation process. No root damage was found. The deviations were(1.73±0.65)mm at the corona, and(1.28±0.82)mm at the apex, respectively. The stability of miniscrews was fairly well. Surgical templates for miniscrew implantation could be acquired based on 3D CBCT images and fabricated with SLA. Implantation guided by these templates was safe and stable.
Evaluating Dense 3d Reconstruction Software Packages for Oblique Monitoring of Crop Canopy Surface
NASA Astrophysics Data System (ADS)
Brocks, S.; Bareth, G.
2016-06-01
Crop Surface Models (CSMs) are 2.5D raster surfaces representing absolute plant canopy height. Using multiple CMSs generated from data acquired at multiple time steps, a crop surface monitoring is enabled. This makes it possible to monitor crop growth over time and can be used for monitoring in-field crop growth variability which is useful in the context of high-throughput phenotyping. This study aims to evaluate several software packages for dense 3D reconstruction from multiple overlapping RGB images on field and plot-scale. A summer barley field experiment located at the Campus Klein-Altendorf of University of Bonn was observed by acquiring stereo images from an oblique angle using consumer-grade smart cameras. Two such cameras were mounted at an elevation of 10 m and acquired images for a period of two months during the growing period of 2014. The field experiment consisted of nine barley cultivars that were cultivated in multiple repetitions and nitrogen treatments. Manual plant height measurements were carried out at four dates during the observation period. The software packages Agisoft PhotoScan, VisualSfM with CMVS/PMVS2 and SURE are investigated. The point clouds are georeferenced through a set of ground control points. Where adequate results are reached, a statistical analysis is performed.
Contribution of Electronic Medical Records to the Management of Rare Diseases.
Bremond-Gignac, Dominique; Lewandowski, Elisabeth; Copin, Henri
2015-01-01
Electronic health record systems provide great opportunity to study most diseases. Objective of this study was to determine whether electronic medical records (EMR) in ophthalmology contribute to management of rare eye diseases, isolated or in syndromes. Study was designed to identify and collect patients' data with ophthalmology-specific EMR. Ophthalmology-specific EMR software (Softalmo software Corilus) was used to acquire ophthalmological ocular consultation data from patients with five rare eye diseases. The rare eye diseases and data were selected and collected regarding expertise of eye center. A total of 135,206 outpatient consultations were performed between 2011 and 2014 in our medical center specialized in rare eye diseases. The search software identified 29 congenital aniridia, 6 Axenfeld/Rieger syndrome, 11 BEPS, 3 Nanophthalmos, and 3 Rubinstein-Taybi syndrome. EMR provides advantages for medical care. The use of ophthalmology-specific EMR is reliable and can contribute to a comprehensive ocular visual phenotype useful for clinical research. Routinely EMR acquired with specific software dedicated to ophthalmology provides sufficient detail for rare diseases. These software-collected data appear useful for creating patient cohorts and recording ocular examination, avoiding the time-consuming analysis of paper records and investigation, in a University Hospital linked to a National Reference Rare Center Disease.
Contribution of Electronic Medical Records to the Management of Rare Diseases
Bremond-Gignac, Dominique; Lewandowski, Elisabeth; Copin, Henri
2015-01-01
Purpose. Electronic health record systems provide great opportunity to study most diseases. Objective of this study was to determine whether electronic medical records (EMR) in ophthalmology contribute to management of rare eye diseases, isolated or in syndromes. Study was designed to identify and collect patients' data with ophthalmology-specific EMR. Methods. Ophthalmology-specific EMR software (Softalmo software Corilus) was used to acquire ophthalmological ocular consultation data from patients with five rare eye diseases. The rare eye diseases and data were selected and collected regarding expertise of eye center. Results. A total of 135,206 outpatient consultations were performed between 2011 and 2014 in our medical center specialized in rare eye diseases. The search software identified 29 congenital aniridia, 6 Axenfeld/Rieger syndrome, 11 BEPS, 3 Nanophthalmos, and 3 Rubinstein-Taybi syndrome. Discussion. EMR provides advantages for medical care. The use of ophthalmology-specific EMR is reliable and can contribute to a comprehensive ocular visual phenotype useful for clinical research. Conclusion. Routinely EMR acquired with specific software dedicated to ophthalmology provides sufficient detail for rare diseases. These software-collected data appear useful for creating patient cohorts and recording ocular examination, avoiding the time-consuming analysis of paper records and investigation, in a University Hospital linked to a National Reference Rare Center Disease. PMID:26539543
The Company Approach to Software Engineering Project Courses
ERIC Educational Resources Information Center
Broman, D.; Sandahl, K.; Abu Baker, M.
2012-01-01
Teaching larger software engineering project courses at the end of a computing curriculum is a way for students to learn some aspects of real-world jobs in industry. Such courses, often referred to as capstone courses, are effective for learning how to apply the skills they have acquired in, for example, design, test, and configuration management.…
26 CFR 1.167(a)-14 - Treatment of certain intangible property excluded from section 197.
Code of Federal Regulations, 2014 CFR
2014-04-01
... of computer software that is section 179 property, as defined in section 179(d)(1)(A)(ii), must be... include certain computer software and certain other separately acquired rights, such as rights to receive... subject to the allowance for depreciation under section 167(a). (b) Computer software—(1) In general. The...
26 CFR 1.167(a)-14 - Treatment of certain intangible property excluded from section 197.
Code of Federal Regulations, 2012 CFR
2012-04-01
... of computer software that is section 179 property, as defined in section 179(d)(1)(A)(ii), must be... include certain computer software and certain other separately acquired rights, such as rights to receive... subject to the allowance for depreciation under section 167(a). (b) Computer software—(1) In general. The...
26 CFR 1.167(a)-14 - Treatment of certain intangible property excluded from section 197.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of computer software that is section 179 property, as defined in section 179(d)(1)(A)(ii), must be... include certain computer software and certain other separately acquired rights, such as rights to receive... subject to the allowance for depreciation under section 167(a). (b) Computer software—(1) In general. The...
26 CFR 1.167(a)-14 - Treatment of certain intangible property excluded from section 197.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of computer software that is section 179 property, as defined in section 179(d)(1)(A)(ii), must be... include certain computer software and certain other separately acquired rights, such as rights to receive... subject to the allowance for depreciation under section 167(a). (b) Computer software—(1) In general. The...
26 CFR 1.167(a)-14 - Treatment of certain intangible property excluded from section 197.
Code of Federal Regulations, 2013 CFR
2013-04-01
... of computer software that is section 179 property, as defined in section 179(d)(1)(A)(ii), must be... include certain computer software and certain other separately acquired rights, such as rights to receive... subject to the allowance for depreciation under section 167(a). (b) Computer software—(1) In general. The...
48 CFR 908.7109 - Fuels and packaged petroleum products.
Code of Federal Regulations, 2010 CFR
2010-10-01
... petroleum products. 908.7109 Section 908.7109 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908... with 951, to acquire such products from Defense sources, they shall do so in accordance with FPMR 41...
GPS Software Packages Deliver Positioning Solutions
NASA Technical Reports Server (NTRS)
2010-01-01
"To determine a spacecraft s position, the Jet Propulsion Laboratory (JPL) developed an innovative software program called the GPS (global positioning system)-Inferred Positioning System and Orbit Analysis Simulation Software, abbreviated as GIPSY-OASIS, and also developed Real-Time GIPSY (RTG) for certain time-critical applications. First featured in Spinoff 1999, JPL has released hundreds of licenses for GIPSY and RTG, including to Longmont, Colorado-based DigitalGlobe. Using the technology, DigitalGlobe produces satellite imagery with highly precise latitude and longitude coordinates and then supplies it for uses within defense and intelligence, civil agencies, mapping and analysis, environmental monitoring, oil and gas exploration, infrastructure management, Internet portals, and navigation technology."
Research on moving target defense based on SDN
NASA Astrophysics Data System (ADS)
Chen, Mingyong; Wu, Weimin
2017-08-01
An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.
48 CFR 235.017-1 - Sponsoring agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 235.017-1... Institute of Technology, and Software Engineering Institute operated by Carnegie Mellon) may respond to solicitations and announcements for programs which promote research, development, demonstration, or transfer of...
48 CFR 235.017-1 - Sponsoring agreements.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 235.017-1... Institute of Technology, and Software Engineering Institute operated by Carnegie Mellon) may respond to solicitations and announcements for programs which promote research, development, demonstration, or transfer of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Real property. 33.31 Section 33.31 National... Post-Award Requirements Changes, Property, and Subawards § 33.31 Real property. (a) Title. Subject to the obligations and conditions set forth in this section, title to real property acquired under a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Real property. 32.32 Section 32.32 National... NON-PROFIT ORGANIZATIONS Post-Award Requirements Property Standards § 32.32 Real property. Each DoD Component that makes awards under which real property is acquired in whole or in part with Federal funds...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Real property. 32.32 Section 32.32 National... NON-PROFIT ORGANIZATIONS Post-Award Requirements Property Standards § 32.32 Real property. Each DoD Component that makes awards under which real property is acquired in whole or in part with Federal funds...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Real property. 32.32 Section 32.32 National... NON-PROFIT ORGANIZATIONS Post-Award Requirements Property Standards § 32.32 Real property. Each DoD Component that makes awards under which real property is acquired in whole or in part with Federal funds...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Real property. 32.32 Section 32.32 National... NON-PROFIT ORGANIZATIONS Post-Award Requirements Property Standards § 32.32 Real property. Each DoD Component that makes awards under which real property is acquired in whole or in part with Federal funds...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Real property. 32.32 Section 32.32 National... NON-PROFIT ORGANIZATIONS Post-Award Requirements Property Standards § 32.32 Real property. Each DoD Component that makes awards under which real property is acquired in whole or in part with Federal funds...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Real property. 33.31 Section 33.31 National... Post-Award Requirements Changes, Property, and Subawards § 33.31 Real property. (a) Title. Subject to the obligations and conditions set forth in this section, title to real property acquired under a...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Real property. 33.31 Section 33.31 National... Post-Award Requirements Changes, Property, and Subawards § 33.31 Real property. (a) Title. Subject to the obligations and conditions set forth in this section, title to real property acquired under a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Real property. 33.31 Section 33.31 National... Post-Award Requirements Changes, Property, and Subawards § 33.31 Real property. (a) Title. Subject to the obligations and conditions set forth in this section, title to real property acquired under a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Real property. 33.31 Section 33.31 National... Post-Award Requirements Changes, Property, and Subawards § 33.31 Real property. (a) Title. Subject to the obligations and conditions set forth in this section, title to real property acquired under a...
33 CFR 211.26 - Functions in acquiring Federal jurisdiction.
Code of Federal Regulations, 2012 CFR
2012-07-01
... jurisdiction. 211.26 Section 211.26 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS... letters and other papers required to procure cessions of jurisdiction and all notices of acceptance are...
33 CFR 211.26 - Functions in acquiring Federal jurisdiction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... jurisdiction. 211.26 Section 211.26 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS... letters and other papers required to procure cessions of jurisdiction and all notices of acceptance are...
33 CFR 211.26 - Functions in acquiring Federal jurisdiction.
Code of Federal Regulations, 2013 CFR
2013-07-01
... jurisdiction. 211.26 Section 211.26 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS... letters and other papers required to procure cessions of jurisdiction and all notices of acceptance are...
33 CFR 211.26 - Functions in acquiring Federal jurisdiction.
Code of Federal Regulations, 2011 CFR
2011-07-01
... jurisdiction. 211.26 Section 211.26 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS... letters and other papers required to procure cessions of jurisdiction and all notices of acceptance are...
48 CFR 245.7206 - Transmitting DD Form 1342, DoD Property Record.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Instructions 245.7206 Transmitting DD Form 1342, DoD Property Record. As a minimum, the plant clearance officer... contractor acquired the equipment; (g) Location of the industrial plant equipment; (h) Total acquisition cost..., DoD Property Record. 245.7206 Section 245.7206 Federal Acquisition Regulations System DEFENSE...
33 CFR 211.10 - Disposition of lands.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 211.10 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Disposal of Real Estate Acquired for Civil Works Purposes § 211.10 Disposition of lands. (a) Acts authorizing...
A DDC Bibliography on Microfiche, Microfilm and Related Equipment, Volume 1.
ERIC Educational Resources Information Center
Defense Documentation Center, Alexandria, VA.
This bibliography contains abstracts of 40 unclassified-unlimited reports on microfiche, microfilm and related equipment acquired by the Defense Documentation Center since 1953. Citations are topically arranged in AD sequence, ascending order. The following computer produced indexes are provided: subject, corporate author, personal author,…
32 CFR 644.431 - Power transmission lines.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 4 2011-07-01 2011-07-01 false Power transmission lines. 644.431 Section 644... Power transmission lines. (a) Authority. Pursuant to the provisions of section 13(d) of the Surplus... power transmission line and the right of way acquired for its construction is needed for or adaptable to...
Corporate Consolidation: An Event Study of Historic Stock Prices in the Defense Aerospace Industry
2009-12-01
1994 Raytheon Xyplex Inc 1/3/1995 Boeing Precision Gear 4/3/1995 Raytheon Raytheon E-Systems Inc 6/30/1995 Raytheon Litwin Engineers & Construction...Acquirer 6/30/1995 Litwin Engineers & Construction Raytheon Arithmetic Return Logarithmic Return Note: * is significant at the 5% level 90
32 CFR 644.3 - Navigation Projects.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 4 2010-07-01 2010-07-01 true Navigation Projects. 644.3 Section 644.3 National... HANDBOOK Project Planning Civil Works § 644.3 Navigation Projects. (a) Land to be acquired in fee. All... construction and borrow areas. (3) In navigation-only projects, the right to permanently flood should be...
32 CFR 32.37 - Property trust relationship.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Property trust relationship. 32.37 Section 32.37... trust relationship. Real property, equipment, intangible property and debt instruments that are acquired or improved with Federal funds shall be held in trust by the recipient as trustee for the...
32 CFR 644.3 - Navigation projects.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 4 2013-07-01 2013-07-01 false Navigation projects. 644.3 Section 644.3... ESTATE HANDBOOK Project Planning Civil Works § 644.3 Navigation projects. (a) Land to be acquired in fee..., and temporary construction and borrow areas. (3) In navigation-only projects, the right to permanently...
32 CFR 644.3 - Navigation projects.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 4 2014-07-01 2013-07-01 true Navigation projects. 644.3 Section 644.3 National... HANDBOOK Project Planning Civil Works § 644.3 Navigation projects. (a) Land to be acquired in fee. All... construction and borrow areas. (3) In navigation-only projects, the right to permanently flood should be...
32 CFR 644.3 - Navigation projects.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 4 2012-07-01 2011-07-01 true Navigation projects. 644.3 Section 644.3 National... HANDBOOK Project Planning Civil Works § 644.3 Navigation projects. (a) Land to be acquired in fee. All... construction and borrow areas. (3) In navigation-only projects, the right to permanently flood should be...
2017-04-01
notice for non -US Government use and distribution. External use: This material may be reproduced in its entirety, without modification, and freely...Combinatorial Design Methods 4 2.1 Identification of Significant Improvement Opportunity 4 2.2 Methodology Development 4 2.3 Piloting...11 3 Process Performance Modeling and Analysis 13 3.1 Identification of Significant Improvement Opportunity 13 3.2 Methodology Development 13 3.3
1994-03-25
metrics [DISA93b]. " The Software Engineering Institute (SET) has developed a domain analysis process (Feature-Oriented Domain Analysis - FODA ) and is...and expresses the range of variability of these decisions. 3.2.2.3 Feature Oriented Domain Analysis Feature Oriented Domain Analysis ( FODA ) is a domain...documents created in this phase. From a purely profit-oriented business point of view, a company may develop its own analysis of a government or commercial
CrossTalk. The Journal of Defense Software Engineering. Volume 16, Number 11, November 2003
2003-11-01
memory area, and stack pointer. These systems are classified as preemptive or nonpreemptive depending on whether they can preempt an existing task or not...of charge. The Software Technology Support Center was established at Ogden Air Logistics Center (AFMC) by Headquarters U.S. Air Force to help Air...device. A script file could be a list of commands for a command interpreter such as a batch file [15]. A communications port consists of a queue to hold
1986-06-10
the solution of the base could be the solution of the target. If expert systems are to mimic humans , then they should inherently utilize analogy. In the...expert systems environment, the theory of frames for representing knowledge developed partly because humans usually solve problems by first seeing if...Goals," Computer, May 1975, p. 17. 8. A.I. Wasserman, "Some Principles of User Software Engineering for Information Systems ," Digest of Papers, COMPCON
CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 3, May-June 2013
2013-06-01
in which the pieces are being shaped at the same time they are being as- sembled. If I am honest, software is probably more like a Rube Goldberg ...losing the focus on architecting activities that help maintain the desired state, enable cost savings, and ensure delivery tempo when other agile...masters degrees and working as developers), accepted by the same in- structor, with counted LOC identically, yielded variations as great as 22:1, and
CrossTalk, The Journal of Defense Software Engineering. Volume 26, Number 2. March/April 2013
2013-04-01
standards and best practices. “Software and hardware are at risk of being tam - pered with even before they are linked together in an operational system...because of their role in national and global security and the variety of valuable lessons learned and best practices they can provide because they are...Management. GAO said DoD’s efforts to implement SCRM can be a learning tool for others in the Federal government. DoD is currently imple- CrossTalk
Toward immunogenetic studies of amphibian chytridiomycosis: Linking innate and acquired immunity
Richmond, J.Q.; Savage, Anna E.; Zamudio, Kelly R.; Rosenblum, E.B.
2009-01-01
Recent declines in amphibian diversity and abundance have contributed significantly to the global loss of biodiversity. The fungal disease chytridiomycosis is widely considered to be a primary cause of these declines, yet the critical question of why amphibian species differ in susceptibility remains unanswered. Considerable evidence links environmental conditions and interspecific variability of the innate immune system to differential infection responses, but other sources of individual, population, or species-typical variation may also be important. In this article we review the preliminary evidence supporting a role for acquired immune defenses against chytridiomycosis, and advocate for targeted investigation of genes controlling acquired responses, as well as those that functionally bridge the innate and acquired immune systems. Immunogenetic data promise to answer key questions about chytridiomycosis susceptibility and host-pathogen coevolution, and will draw much needed attention to the importance of considering evolutionary processes in amphibian conservation management and practice. ?? 2009 by American Institute of Biological Sciences.
NASA Technical Reports Server (NTRS)
Vu, Duc; Sandor, Michael; Agarwal, Shri
2005-01-01
CSAM Metrology Software Tool (CMeST) is a computer program for analysis of false-color CSAM images of plastic-encapsulated microcircuits. (CSAM signifies C-mode scanning acoustic microscopy.) The colors in the images indicate areas of delamination within the plastic packages. Heretofore, the images have been interpreted by human examiners. Hence, interpretations have not been entirely consistent and objective. CMeST processes the color information in image-data files to detect areas of delamination without incurring inconsistencies of subjective judgement. CMeST can be used to create a database of baseline images of packages acquired at given times for comparison with images of the same packages acquired at later times. Any area within an image can be selected for analysis, which can include examination of different delamination types by location. CMeST can also be used to perform statistical analyses of image data. Results of analyses are available in a spreadsheet format for further processing. The results can be exported to any data-base-processing software.
Software for Generating Troposphere Corrections for InSAR Using GPS and Weather Model Data
NASA Technical Reports Server (NTRS)
Moore, Angelyn W.; Webb, Frank H.; Fishbein, Evan F.; Fielding, Eric J.; Owen, Susan E.; Granger, Stephanie L.; Bjoerndahl, Fredrik; Loefgren, Johan; Fang, Peng; Means, James D.;
2013-01-01
Atmospheric errors due to the troposphere are a limiting error source for spaceborne interferometric synthetic aperture radar (InSAR) imaging. This software generates tropospheric delay maps that can be used to correct atmospheric artifacts in InSAR data. The software automatically acquires all needed GPS (Global Positioning System), weather, and Digital Elevation Map data, and generates a tropospheric correction map using a novel algorithm for combining GPS and weather information while accounting for terrain. Existing JPL software was prototypical in nature, required a MATLAB license, required additional steps to acquire and ingest needed GPS and weather data, and did not account for topography in interpolation. Previous software did not achieve a level of automation suitable for integration in a Web portal. This software overcomes these issues. GPS estimates of tropospheric delay are a source of corrections that can be used to form correction maps to be applied to InSAR data, but the spacing of GPS stations is insufficient to remove short-wavelength tropospheric artifacts. This software combines interpolated GPS delay with weather model precipitable water vapor (PWV) and a digital elevation model to account for terrain, increasing the spatial resolution of the tropospheric correction maps and thus removing short wavelength tropospheric artifacts to a greater extent. It will be integrated into a Web portal request system, allowing use in a future L-band SAR Earth radar mission data system. This will be a significant contribution to its technology readiness, building on existing investments in in situ space geodetic networks, and improving timeliness, quality, and science value of the collected data
Earth Observing System/Advanced Microwave SoundingUnit-A (EOS/AMSU-A): Acquisition activities plan
NASA Technical Reports Server (NTRS)
Schwantje, Robert
1994-01-01
This is the acquisition activities plan for the software to be used in the Earth Observing System (EOS) Advanced Microwave Sounding Unit-A (AMSU-A) system. This document is submitted in response to Contract NAS5-323 14 as CDRL 508. The procurement activities required to acquire software for the EOS/AMSU-A program are defined.
NASA Technical Reports Server (NTRS)
Wolf, S. W. D.; Goodyer, M. J.
1982-01-01
Operation of the Transonic Self-Streamlining Wind Tunnel (TSWT) involved on-line data acquisition with automatic wall adjustment. A tunnel run consisted of streamlining the walls from known starting contours in iterative steps and acquiring model data. Each run performs what is described as a streamlining cycle. The associated software is presented.
Software for Teaching about AIDS & Sex: A Critical Review of Products. A MicroSIFT Report.
ERIC Educational Resources Information Center
Weaver, Dave
This document contains critical reviews of 10 microcomputer software packages and two interactive videodisc products designed for use in teaching about Acquired Immune Deficiency Syndrome (AIDS) and sex at the secondary school level and above. Each package was reviewed by one or two secondary school health teachers and by a staff member from the…
NASA Technical Reports Server (NTRS)
Clark, David A.
1998-01-01
In light of the escalation of terrorism, the Department of Defense spearheaded the development of new antiterrorist software for all Government agencies by issuing a Broad Agency Announcement to solicit proposals. This Government-wide competition resulted in a team that includes NASA Lewis Research Center's Computer Services Division, who will develop the graphical user interface (GUI) and test it in their usability lab. The team launched a program entitled Joint Sphere of Security (JSOS), crafted a design architecture (see the following figure), and is testing the interface. This software system has a state-ofthe- art, object-oriented architecture, with a main kernel composed of the Dynamic Information Architecture System (DIAS) developed by Argonne National Laboratory. DIAS will be used as the software "breadboard" for assembling the components of explosions, such as blast and collapse simulations.
Next-generation systemic acquired resistance.
Luna, Estrella; Bruce, Toby J A; Roberts, Michael R; Flors, Victor; Ton, Jurriaan
2012-02-01
Systemic acquired resistance (SAR) is a plant immune response to pathogen attack. Recent evidence suggests that plant immunity involves regulation by chromatin remodeling and DNA methylation. We investigated whether SAR can be inherited epigenetically following disease pressure by Pseudomonas syringae pv tomato DC3000 (PstDC3000). Compared to progeny from control-treated Arabidopsis (Arabidopsis thaliana; C(1)), progeny from PstDC3000-inoculated Arabidopsis (P(1)) were primed to activate salicylic acid (SA)-inducible defense genes and were more resistant to the (hemi)biotrophic pathogens Hyaloperonospora arabidopsidis and PstDC3000. This transgenerational SAR was sustained over one stress-free generation, indicating an epigenetic basis of the phenomenon. Furthermore, P(1) progeny displayed reduced responsiveness of jasmonic acid (JA)-inducible genes and enhanced susceptibility to the necrotrophic fungus Alternaria brassicicola. This shift in SA- and JA-dependent gene responsiveness was not associated with changes in corresponding hormone levels. Instead, chromatin immunoprecipitation analyses revealed that SA-inducible promoters of PATHOGENESIS-RELATED GENE1, WRKY6, and WRKY53 in P(1) plants are enriched with acetylated histone H3 at lysine 9, a chromatin mark associated with a permissive state of transcription. Conversely, the JA-inducible promoter of PLANT DEFENSIN1.2 showed increased H3 triple methylation at lysine 27, a mark related to repressed gene transcription. P(1) progeny from the defense regulatory mutant non expressor of PR1 (npr1)-1 failed to develop transgenerational defense phenotypes, demonstrating a critical role for NPR1 in expression of transgenerational SAR. Furthermore, the drm1drm2cmt3 mutant that is affected in non-CpG DNA methylation mimicked the transgenerational SAR phenotype. Since PstDC3000 induces DNA hypomethylation in Arabidopsis, our results suggest that transgenerational SAR is transmitted by hypomethylated genes that direct priming of SA-dependent defenses in the following generations.
The Gulf War's impact on ballistic missile defense systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Likourezos, G.
1993-01-01
During Desert Storm the United States and its allies had an overwhelming advantage over the Iraqi armed forces. Nonetheless, the Iraqis managed to strike Israel and Saudi Arabia with Scud missiles. Because of the changing political climate and the expanding transfer of technology among nations, there is great concern by the US Government about missile proliferation and the ability of any country to obtain weapons of mass destruction. The US Government tried to downplay this concern for many years until the recent events in the Middle East affirmed its seriousness. The truth is that every year countries once thought tomore » pose no international threat are acquiring biological, chemical, and nuclear weapons. Moreover, state-sponsored terrorist organizations could conceivably acquire these weapons in the future. In response to these concerns and in light of the lessons learned from the Gulf War, President George Bush in January 1991 redirected the SDI Program to concentrate on providing protection from limited ballistic missile strikes, rather than from an all-out nuclear missile attack by the Soviet Union. The Patriot air defense system, after knocking out Iraqi Scuds in the Gulf War with a near perfect record, appears for now to be the working model for the development of advanced ballistic missile defense systems - direct-kill missiles and projectiles instead of laser and particle beams. Even though the Patriot's use in Desert Storm has been argued by some to have been militarily insignificant, it has managed to change the viewpoint of many political and scientific leaders into believing that ballistic missile defense systems are needed to defend peaceful population centers and military installations from missile strikes like the ones on Israel and Saudi Arabia. 18 refs.« less
2004-10-01
MONITORING AGENCY NAME(S) AND ADDRESS(ES) Defense Advanced Research Projects Agency AFRL/IFTC 3701 North Fairfax Drive...Scalable Parallel Libraries for Large-Scale Concurrent Applications," Technical Report UCRL -JC-109251, Lawrence Livermore National Laboratory
Guidelines for Tailoring DOD-STD-2167A for SDS (Strategic Defense System) Software Development
1988-02-01
UNCLASSIFIED APPENDIX A LIST OF ACRONYMS ABM Anti-Ballistic Missle AP Advanced Prototypes BM/C3 Battle Management/Command, Control, Communications CDRL...32 5.7.5 Configuration management ................................. 32 5.8 Sytem integration and testing ....... ............................. 34 t
2012-04-09
between BPMN , SysML, and Arena ........................................... 16 Capabilities, Activities, Resources, Performers...Proof of Concept ................................................................ 22 BPMN 2.0 XML to Arena Converter...21 Figure 5: BPMN 2.0 XML StartEvent (Excerpt
Software Process Improvement: Supporting the Linking of the Software and the Business Strategies
NASA Astrophysics Data System (ADS)
Albuquerque, Adriano Bessa; Rocha, Ana Regina; Lima, Andreia Cavalcanti
The market is becoming more and more competitive, a lot of products and services depend of the software product and the software is one of the most important assets, which influence the organizations’ businesses. Considering this context, we can observe that the companies must to deal with the software, developing or acquiring, carefully. One of the perspectives that can help to take advantage of the software, supporting effectively the business, is to invest on the organization’s software processes. This paper presents an approach to evaluate and improve the processes assets of the software organizations, based on internationally well-known standards and process models. This approach is supported by automated tools from the TABA Workstation and is part of a wider improvement strategy constituted of three layers (organizational layer, process execution layer and external entity layer). Moreover, this paper presents the experience of use and their results.
Data acquisition from blast overpressure trials
NASA Astrophysics Data System (ADS)
Kirk, D. R.
1993-03-01
A Macintosh computer has been used to acquire data from blast overpressure trials on various weapons. The computer is connected to a multiple channel FM data recorder via a MacSCS1488 bus controller, allowing the computer to control the recorder and to acquire data from it through an analog to digital converter. Detailed instructions are given for connecting the hardware and operating the software involved.
Strategy alternatives for homeland air and cruise missile defense.
Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W
2010-10-01
Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.
Modeling Reduced Human Performance as a Complex Adaptive System
2003-09-01
successfully used this design strategy in the domain of military simulation. See ( Arntzen 1998; Bohmann 1999; Le 1999; Schrepf 1999). 89 LCC’s design...THIS PAGE INTENTIONALLY LEFT BLANK 187 LIST OF REFERENCES Arntzen , A. (1998). Software Components for Air Defense Planing. Operations
33 CFR 211.104 - Notice to former owners of availability of land for reconveyance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Reconveyance of Land Or Interests Therein Acquired for Grapevine, Garza... District Engineer shall give notice to the former owners thereof (a) by registered letter, addressed to the...
33 CFR 211.107 - Notice of agreement between former owner and abutting owner.
Code of Federal Regulations, 2010 CFR
2010-07-01
... ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Reconveyance of Land Or Interests Therein Acquired for Grapevine, Garza... District Engineer. Such agreement must be mailed or delivered to the appropriate District Engineer within...
33 CFR 211.11 - Sale or salvage of buildings, improvements, or crops.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., improvements, or crops. 211.11 Section 211.11 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Disposal of Real Estate Acquired for Civil Works Purposes § 211.11 Sale or salvage...
Strategies for and barriers to public adoption of fire safe behavior
Ronald W. Hodgson
1995-01-01
A recent survey of people living in wildland-urban intermix neighborhoods in a portion of the Sierra-Cascade foothills identified perceptions of defensible space that block its rapid and widespread adoption. A companion survey described communication channels used by residents to acquire information about landscaping and identified opinion leadership characteristics....
Code of Federal Regulations, 2010 CFR
2010-10-01
... performance of DoD contracts; (2) Existing facilities, either Government or nongovernment, cannot meet program... effort which results in the special use allowance being excessive compared to the Government research... Defense contracts. FAR 31.3 governs how much the Government will reimburse the institution for the...
Strategic Sealift: Part of the National Defense Reserve Fleet Is No Longer Needed
1991-10-01
would prevent MARAD from obtaining fair value for the scrapped ships and affect its ability to acquire newer ships for the Reserve Fleet. They also...Ship Exchange Program Offers are reviewed by a three-member MARAD vessel disposal committee to determine whether they reflect fair value for the
The Epimmunity Theory: The Single Cell Defenses against Infectious and Genetic Diseases.
Barghouthi, Sameer A
2017-01-01
Single cell defense against diseases defines "epimmunity." Epimmunity is complementary to the immune system and can neither be substituted by innate nor by acquired immunity. Epimmunity, the proposed new branch of immunity, is further explored and analyzed for enucleated mature mammalian erythrocytes and nucleated erythrocytes of non-mammalian vertebrates leading to the development of "The Epimmunity Theory." Enucleation of mammalian erythroblast and inactivation of nuclei in erythrocytes of non-mammalian vertebrates are major contributors to the collective immunity: epimmunity, innate, and acquired. The fact that diseases of mature erythrocytes (MEs) are rare supports the notion that a single cell can resist microbial and genetic diseases; MEs are refractory to malaria and cancer. Nucleated cells, such as B-cells, T-cells, hepatocytes, and cell developmental stages are susceptible to genetic and specific microbial diseases depending on their nuclear activities and the receptors they express; such cells show lower epimmunity relative to MEs. Epimmunity is important as a disease insulator that prevents the spread of diseases from an infected tissue to the majority of other tissues. Breakdown of epimmunity may lead to disease development.
Type III CRISPR-Cas systems can provide redundancy to counteract viral escape from type I systems
Silas, Sukrit; Lucas-Elio, Patricia; Jackson, Simon A; Aroca-Crevillén, Alejandra; Hansen, Loren L; Fineran, Peter C
2017-01-01
CRISPR-Cas-mediated defense utilizes information stored as spacers in CRISPR arrays to defend against genetic invaders. We define the mode of target interference and role in antiviral defense for two CRISPR-Cas systems in Marinomonas mediterranea. One system (type I-F) targets DNA. A second system (type III-B) is broadly capable of acquiring spacers in either orientation from RNA and DNA, and exhibits transcription-dependent DNA interference. Examining resistance to phages isolated from Mediterranean seagrass meadows, we found that the type III-B machinery co-opts type I-F CRISPR-RNAs. Sequencing and infectivity assessments of related bacterial and phage strains suggests an ‘arms race’ in which phage escape from the type I-F system can be overcome through use of type I-F spacers by a horizontally-acquired type III-B system. We propose that the phage-host arms race can drive selection for horizontal uptake and maintenance of promiscuous type III interference modules that supplement existing host type I CRISPR-Cas systems. PMID:28826484
Neumann, Wilma; Hadley, Rose C.; Nolan, Elizabeth M.
2017-01-01
Transition metals are essential nutrients for all organisms and important players in the host-microbe interaction. During bacterial infection, a tug-of-war between the host and microbe for nutrient metals occurs: the host innate immune system responds to the pathogen by reducing metal availability and the pathogen tries to outmaneuver this response. The outcome of this competition, which involves metal-sequestering host-defense proteins and microbial metal acquisition machinery, is an important variable for whether infection occurs. One strategy bacterial pathogens employ to overcome metal restriction involves hijacking abundant host metalloproteins. The obligate human pathogens Neisseria spp. express TonB-dependent transport systems that capture human metalloproteins, extract the bound metal ions, and deliver these nutrients into the bacterial cell. This Essay highlights structural and mechanistic investigations that provide insights into how Neisseria acquire iron from the Fe(III)-transport protein transferrin, the Fe(III)-chelating host-defense protein lactoferrin, and the oxygen-transport protein hemoglobin, and obtain zinc from the metal-sequestering antimicrobial protein calprotectin. PMID:28487398
Abele, Rupert; Tampé, Robert
2009-08-01
Cells are metastable per se and a fine-tuned balance of de novo protein synthesis and degradation shapes their proteome. The primary function of peptides is to supply amino acids for de novo protein synthesis or as an energy source during starvation. Peptides are intrinsically short-lived and steadily trimmed by an armada of intra and extracellular peptidases. However, peptides acquired additional, more sophisticated tasks already early in evolution. Here, we summarize current knowledge on intracellular peptide trafficking and translocation mediated by ATP-binding cassette (ABC) transport machineries with a focus on the functions of protein degradation products as important signaling molecules in self-defense mechanisms.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McElroy, Robert Dennis
From the 1991 until 2008 the Canberra Hybrid K-Edge Densitometer systems were provided with ICB-NIM (Integrated Control Bus – Nuclear Instrument Module) acquisition electronics. Newer electronics modules, such as the Lynx, were not supported under the VMS based operating system. The LYNX module was provided as the standard acquisition electronics following the release of the Windows based CHKED software. This report compares the electronics dead-time, gain shifts, detector resolution and measurement performance of the HKED system operated with the two types of acquisition modules. The comparison was performed using measurements obtained with the ORNL HKED system. The original intent ofmore » this study was to take advantage of both the timing and energy outputs from the HPGE detector to acquire data with both sets of electronics in parallel. Although this approach has been applied successfully with other systems, in this case we found the timing output produced a significant amount of noise such that a comparison between the electronics would be invalid. So the comparative measurements were performed sequentially. The ICB-NIM data was acquired over the course of 12 months with 255 measurements while the LYNX data was acquired over a period of 10 months with 75 measurements. To simplify the comparison, all data used in this study was acquired using the Canberra CHKED (V1.0) software package. The performance analysis was based primarily on the peak locations, peak widths and concentration values reported by the CHKED software. The raw spectra from the XRF measurements were also examined to extract additional 109Cd peak location and width data for the hybrid measurements (the standard hybrid report template does not report these values).« less
Integration of communications with the Intelligent Gateway Processor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hampel, V.E.
1986-01-01
The Intelligent Gateway Processor (IGP) software is being used to interconnect users equipped with different personal computers and ASCII terminals to mainframe machines of different make. This integration is made possible by the IGP's unique user interface and networking software. Prototype systems of the table-driven, interpreter-based IGP have been adapted to very different programmatic requirements and have demonstrated substantial increases in end-user productivity. Procedures previously requiring days can now be carried out in minutes. The IGP software has been under development by the Technology Information Systems (TIS) program at Lawrence Livermore National Laboratory (LLNL) since 1975 and is in usemore » by several federal agencies since 1983: The Air Force is prototyping applications which range from automated identification of spare parts for aircraft to office automation and the controlled storage and distribution of technical orders and engineering drawings. Other applications of the IGP are the Information Management System (IMS) for aviation statistics in the Federal Aviation Administration (FAA), the Nuclear Criticality Information System (NCIS) and a nationwide Cost Estimating System (CES) in the Department of Energy, the library automation network of the Defense Technical Information Center (DTIC), and the modernization program in the Office of the Secretary of Defense (OSD). 31 refs., 9 figs.« less
NASA Technical Reports Server (NTRS)
Hayhurst, Kelly J.
1998-01-01
Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.
A software tool for automatic classification and segmentation of 2D/3D medical images
NASA Astrophysics Data System (ADS)
Strzelecki, Michal; Szczypinski, Piotr; Materka, Andrzej; Klepaczko, Artur
2013-02-01
Modern medical diagnosis utilizes techniques of visualization of human internal organs (CT, MRI) or of its metabolism (PET). However, evaluation of acquired images made by human experts is usually subjective and qualitative only. Quantitative analysis of MR data, including tissue classification and segmentation, is necessary to perform e.g. attenuation compensation, motion detection, and correction of partial volume effect in PET images, acquired with PET/MR scanners. This article presents briefly a MaZda software package, which supports 2D and 3D medical image analysis aiming at quantification of image texture. MaZda implements procedures for evaluation, selection and extraction of highly discriminative texture attributes combined with various classification, visualization and segmentation tools. Examples of MaZda application in medical studies are also provided.
1983-01-01
use VLSI with agreement on functions and interfaces. We will have a lead by the time VHSIC is available. A thought on possible packaging is a grouping ...Anthony R. Battista House Committee on Armed Services Dr. Robert Couranz Raytheon Company Mr. Barry C. DeRoze TRW Defense Space Systems Group Mr. Parker...Electronics Mr. Donald A. Sacarob Litton-AmecomMr. William G. Schmick Hewlett-Packard Co. Mr. James M. Shangle US Navy Mr. William R. Smith US Navy Mr. James F
Cross-Layer Damage Assessment for Cyber Situational Awareness
NASA Astrophysics Data System (ADS)
Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason
Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.
Hael-Conrad, Verónica; Perato, Silvia Marisa; Arias, Marta Eugenia; Martínez-Zamora, Martín Gustavo; Di Peto, Pía de Los Ángeles; Martos, Gustavo Gabriel; Castagnaro, Atilio Pedro; Díaz-Ricci, Juan Carlos; Chalfoun, Nadia Regina
2018-01-01
The elicitor AsES (Acremonium strictum elicitor subtilisin) is a 34-kDa subtilisin-like protein secreted by the opportunistic fungus Acremonium strictum. AsES activates innate immunity and confers resistance against anthracnose and gray mold diseases in strawberry plants (Fragaria × ananassa Duch.) and the last disease also in Arabidopsis. In the present work, we show that, upon AsES recognition, a cascade of defense responses is activated, including: calcium influx, biphasic oxidative burst (O 2 ⋅- and H 2 O 2 ), hypersensitive cell-death response (HR), accumulation of autofluorescent compounds, cell-wall reinforcement with callose and lignin deposition, salicylic acid accumulation, and expression of defense-related genes, such as FaPR1, FaPG1, FaMYB30, FaRBOH-D, FaRBOH-F, FaCHI23, and FaFLS. All these responses occurred following a spatial and temporal program, first induced in infiltrated leaflets (local acquired resistance), spreading out to untreated lateral leaflets, and later, to distal leaves (systemic acquired resistance). After AsES treatment, macro-HR and macro-oxidative bursts were localized in infiltrated leaflets, while micro-HRs and microbursts occurred later in untreated leaves, being confined to a single cell or a cluster of a few epidermal cells that differentiated from the surrounding ones. The differentiated cells initiated a time-dependent series of physiological and anatomical changes, evolving to idioblasts accumulating H 2 O 2 and autofluorescent compounds that blast, delivering its content into surrounding cells. This kind of systemic cell-death process in plants is described for the first time in response to a single elicitor. All data presented in this study suggest that AsES has the potential to activate a wide spectrum of biochemical and molecular defense responses in F. ananassa that may explain the induced protection toward pathogens of opposite lifestyle, like hemibiotrophic and necrotrophic fungi.
Data Analytics and Visualization for Large Army Testing Data
2013-09-01
and relationships in the data that would otherwise remain hidden. 7 Bibliography 1. Goodall , J. R.; Tesone, D. R. Visual Analytics for Network...Software Visualization, 2003, pp 143–149. 3. Goodall , J. R.; Sowul, M. VIAssist: Visual Analytics for Cyber Defense, IEEE Conference on Technologies
Computer-Aided Software Evolution Based on Inferred Dependencies
1999-12-01
of Technology, Taoyuan, Taiwan, 1980 M.B.A., National Defense Management College, Taipei, Taiwan, 1986 Submitted in partial fulfillment of the...115 O’Keefe Building Georgia Institute of Technology Atlanta, GA 30332-0800 4. Dr. David Hislop Army Research Office 4300 S. Miami Blvd. Research
Library Development Handbook. Central Archive for Reusable Defense Software (CARDS)
1993-10-29
features. This feature benefits the individual not versed in the terminology of the domain. When class requirements become part of the domain criteria, they... franchisee - Group to whom a franchise is granted. generic architecture - A collection of high-level paradigms and constraints that characterize the
Reviews of Selected System and Software Tools for Strategic Defense Applications
1990-02-01
Interleaf and FrameMaker . IStatic Diagnostics Basic testing includes validating flows, detecting orphan activity, and checking completeness of activities...Publisher, Aldus PageMaker, Unix pic, Apple .pict metafile, Interleaf, Framemaker , or Postscript format. There are no forms for standard documents such as 3
Abstract: Native Americans who consume seafood often have higher seafood consumption rates and consequently greater exposures to contaminants in seafood than the general U.S. population. Defensible and quantifiable tribal seafood consumption rates are needed for development of ...
COSMIC: A catalog of selected computer programs
NASA Technical Reports Server (NTRS)
1980-01-01
Information is presented on various computer programs developed in the space program which are now available to the public. Many programs from the Department of Defense and selected software from other government agencies are also offered. Over 1500 programs in almost every technical or managerial discipline are available.
Ada Implementation Guide. Software Engineering With Ada. Volume 1
1994-04-01
Staff, Department ofDefense Dictionary of Military and Associated Terms, Washington, D.C., 1989. STARS McDonal , C., and S . Redwine, *STARS Glossary: A...ADýA28 357> offj I Volume I I SI I t Ada Implementation II Guide 5 Software Engineering With AdaI I S DTIC QUALITY INSPECTED S 5 April 1994 g " 94...and Abbreviations ...................... I I N p a S I I I i I Libt of F4g u OW Tahl Figures 2-1 DON Directives and Instructions for Implementing Public
2010-01-01
Not Considered Relevant Two current CIO R&R pertain to Year-2000 ( Y2K ) issues. Although it is likely that the software conversion tasks associated...CIOs with tasks related to Y2K software conversion. 44 USC §3506 does not include the term information technology, but does include the term...information resources, which, in this case appears to include IT but explicitly excludes NSS. The CIO R&R in 44 USC §3603 charges the CIO Council with Y2K
NASA Astrophysics Data System (ADS)
Lombardo, Nicholas J.; Knudson, Christa K.; Rutz, Frederick C.; Pattison, Kerrie J.; Stratton, Rex C.; Wiborg, James C.
2010-04-01
Developing an integrated person-borne improvised explosive device (IED) countermeasure to protect unstructured crowds at large public venues is the goal of the Standoff Technology Integration and Demonstration Program (STIDP), sponsored in part by the U.S. Department of Homeland Security (DHS). The architecture being developed includes countermeasure technologies deployed as a layered defense and enabling technologies for operating the countermeasures as an integrated system. In the architecture, early recognition of potentially higher-risk individuals is crucial. Sensors must be able to detect, with high accuracy, explosives' threat signatures in varying environmental conditions, from a variety of approaches and with dense crowds and limited dwell time. Command-and-control technologies are needed to automate sensor operation, reduce staffing requirements, improve situational awareness, and automate/facilitate operator decisions. STIDP is developing technical and operational requirements for standoff and remotely operated sensors and is working with federal agencies and foreign governments to implement these requirements into their research and development programs. STIDP also is developing requirements for a software platform to rapidly integrate and control various sensors; acquire, analyze, and record their data; and present the data in an operationally relevant manner. Requirements also are being developed for spatial analysis, tracking and assessing threats with available screening resources, and data fusion for operator decision-making.
Origin and functional diversification of an amphibian defense peptide arsenal.
Roelants, Kim; Fry, Bryan G; Ye, Lumeng; Stijlemans, Benoit; Brys, Lea; Kok, Philippe; Clynen, Elke; Schoofs, Liliane; Cornelis, Pierre; Bossuyt, Franky
2013-01-01
The skin secretion of many amphibians contains an arsenal of bioactive molecules, including hormone-like peptides (HLPs) acting as defense toxins against predators, and antimicrobial peptides (AMPs) providing protection against infectious microorganisms. Several amphibian taxa seem to have independently acquired the genes to produce skin-secreted peptide arsenals, but it remains unknown how these originated from a non-defensive ancestral gene and evolved diverse defense functions against predators and pathogens. We conducted transcriptome, genome, peptidome and phylogenetic analyses to chart the full gene repertoire underlying the defense peptide arsenal of the frog Silurana tropicalis and reconstruct its evolutionary history. Our study uncovers a cluster of 13 transcriptionally active genes, together encoding up to 19 peptides, including diverse HLP homologues and AMPs. This gene cluster arose from a duplicated gastrointestinal hormone gene that attained a HLP-like defense function after major remodeling of its promoter region. Instead, new defense functions, including antimicrobial activity, arose by mutation of the precursor proteins, resulting in the proteolytic processing of secondary peptides alongside the original ones. Although gene duplication did not trigger functional innovation, it may have subsequently facilitated the convergent loss of the original function in multiple gene lineages (subfunctionalization), completing their transformation from HLP gene to AMP gene. The processing of multiple peptides from a single precursor entails a mechanism through which peptide-encoding genes may establish new functions without the need for gene duplication to avoid adaptive conflicts with older ones.
Origin and Functional Diversification of an Amphibian Defense Peptide Arsenal
Roelants, Kim; Fry, Bryan G.; Ye, Lumeng; Stijlemans, Benoit; Brys, Lea; Kok, Philippe; Clynen, Elke; Schoofs, Liliane; Cornelis, Pierre; Bossuyt, Franky
2013-01-01
The skin secretion of many amphibians contains an arsenal of bioactive molecules, including hormone-like peptides (HLPs) acting as defense toxins against predators, and antimicrobial peptides (AMPs) providing protection against infectious microorganisms. Several amphibian taxa seem to have independently acquired the genes to produce skin-secreted peptide arsenals, but it remains unknown how these originated from a non-defensive ancestral gene and evolved diverse defense functions against predators and pathogens. We conducted transcriptome, genome, peptidome and phylogenetic analyses to chart the full gene repertoire underlying the defense peptide arsenal of the frog Silurana tropicalis and reconstruct its evolutionary history. Our study uncovers a cluster of 13 transcriptionally active genes, together encoding up to 19 peptides, including diverse HLP homologues and AMPs. This gene cluster arose from a duplicated gastrointestinal hormone gene that attained a HLP-like defense function after major remodeling of its promoter region. Instead, new defense functions, including antimicrobial activity, arose by mutation of the precursor proteins, resulting in the proteolytic processing of secondary peptides alongside the original ones. Although gene duplication did not trigger functional innovation, it may have subsequently facilitated the convergent loss of the original function in multiple gene lineages (subfunctionalization), completing their transformation from HLP gene to AMP gene. The processing of multiple peptides from a single precursor entails a mechanism through which peptide-encoding genes may establish new functions without the need for gene duplication to avoid adaptive conflicts with older ones. PMID:23935531
[The psychodynamics of work with iodine-131 in nuclear medicine].
da Silveira, Leila Cunha; Guilam, Maria Cristina Rodrigues; de Oliveira, Sergio Ricardo
2013-11-01
This paper seeks to demonstrate to what extent alternative forms adopted in the working process of professionals with iodine-131 in nuclear medicine can assist in managing risks of ionizing radiation. The design is based on the main theoretical concepts of the psychodynamics of work in relation to workers' health. In the case study, data were gathered from 15 workers of a public health institution in the city of Rio de Janeiro by means of semi-structured individual interviews and non-systematic direct observation. Bardin's content analysis method was used for the data analysis. When comparing the results obtained with standard prescribed models, it was found that the respondents had changed their approach. They developed individual defense mechanisms, such as denial of risk, and collective defensive strategies, leading them to tackle the greatest danger as a form of defense. The defensive role of ideologies of the profession are manifest. On the contrary, the acquired knowledge derived from prudence proved effective in minimizing the risks of radiation exposure. The authors discuss the limitations of security management that does not consider the workers' subjectivity and inherent knowledge.
The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation
Hanington, Patrick C.; Zhang, Si-Ming
2010-01-01
In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081
Automation of data acquisition in electron crystallography.
Cheng, Anchi
2013-01-01
General considerations for using automation software for acquiring high-resolution images of 2D crystals under low-dose conditions are presented. Protocol modifications specific to this application in Leginon are provided.
An assessment of space shuttle flight software development processes
NASA Technical Reports Server (NTRS)
1993-01-01
In early 1991, the National Aeronautics and Space Administration's (NASA's) Office of Space Flight commissioned the Aeronautics and Space Engineering Board (ASEB) of the National Research Council (NRC) to investigate the adequacy of the current process by which NASA develops and verifies changes and updates to the Space Shuttle flight software. The Committee for Review of Oversight Mechanisms for Space Shuttle Flight Software Processes was convened in Jan. 1992 to accomplish the following tasks: (1) review the entire flight software development process from the initial requirements definition phase to final implementation, including object code build and final machine loading; (2) review and critique NASA's independent verification and validation process and mechanisms, including NASA's established software development and testing standards; (3) determine the acceptability and adequacy of the complete flight software development process, including the embedded validation and verification processes through comparison with (1) generally accepted industry practices, and (2) generally accepted Department of Defense and/or other government practices (comparing NASA's program with organizations and projects having similar volumes of software development, software maturity, complexity, criticality, lines of code, and national standards); (4) consider whether independent verification and validation should continue. An overview of the study, independent verification and validation of critical software, and the Space Shuttle flight software development process are addressed. Findings and recommendations are presented.
A Roadmap for HEP Software and Computing R&D for the 2020s
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alves, Antonio Augusto, Jr; et al.
Particle physics has an ambitious and broad experimental programme for the coming decades. This programme requires large investments in detector hardware, either to build new facilities and experiments, or to upgrade existing ones. Similarly, it requires commensurate investment in the R&D of software to acquire, manage, process, and analyse the shear amounts of data to be recorded. In planning for the HL-LHC in particular, it is critical that all of the collaborating stakeholders agree on the software goals and priorities, and that the efforts complement each other. In this spirit, this white paper describes the R&D activities required to preparemore » for this software upgrade.« less
General-Purpose Front End for Real-Time Data Processing
NASA Technical Reports Server (NTRS)
James, Mark
2007-01-01
FRONTIER is a computer program that functions as a front end for any of a variety of other software of both the artificial intelligence (AI) and conventional data-processing types. As used here, front end signifies interface software needed for acquiring and preprocessing data and making the data available for analysis by the other software. FRONTIER is reusable in that it can be rapidly tailored to any such other software with minimum effort. Each component of FRONTIER is programmable and is executed in an embedded virtual machine. Each component can be reconfigured during execution. The virtual-machine implementation making FRONTIER independent of the type of computing hardware on which it is executed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kertesz, Vilmos
Short summary of the software's functionality: built-in scan feature to acquire optical image of the surface to be analyzed click-and-point selection of points of interest on the surface supporting standalone autosampler/HPLC/MS operation: creating independent batch files after points of interests are selected for LEAPShell (autosampler control software from Leap Technologies) and Analyst® (mass spectrometry (MS) software from AB Sciex) supporting integrated autosampler/HPLC/MS operation: creating one batch file for all instruments controlled by Analyst® (mass spectrometry software from AB Sciex) after points of interests are selected creating heatmaps of analytes of interests from collected MS files inmore » a hand-off fashion« less
Koonin, Eugene V
2017-02-10
Complementarity between nucleic acid molecules is central to biological information transfer processes. Apart from the basal processes of replication, transcription and translation, complementarity is also employed by multiple defense and regulatory systems. All cellular life forms possess defense systems against viruses and mobile genetic elements, and in most of them some of the defense mechanisms involve small guide RNAs or DNAs that recognize parasite genomes and trigger their inactivation. The nucleic acid-guided defense systems include prokaryotic Argonaute (pAgo)-centered innate immunity and CRISPR-Cas adaptive immunity as well as diverse branches of RNA interference (RNAi) in eukaryotes. The archaeal pAgo machinery is the direct ancestor of eukaryotic RNAi that, however, acquired additional components, such as Dicer, and enormously diversified through multiple duplications. In contrast, eukaryotes lack any heritage of the CRISPR-Cas systems, conceivably, due to the cellular toxicity of some Cas proteins that would get activated as a result of operon disruption in eukaryotes. The adaptive immunity function in eukaryotes is taken over partly by the PIWI RNA branch of RNAi and partly by protein-based immunity. In this review, I briefly discuss the interplay between homology and analogy in the evolution of RNA- and DNA-guided immunity, and attempt to formulate some general evolutionary principles for this ancient class of defense systems. This article was reviewed by Mikhail Gelfand and Bojan Zagrovic.
Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen
2012-12-01
Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid-induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR.
Návarová, Hana; Bernsdorff, Friederike; Döring, Anne-Christin; Zeier, Jürgen
2012-01-01
Metabolic signals orchestrate plant defenses against microbial pathogen invasion. Here, we report the identification of the non-protein amino acid pipecolic acid (Pip), a common Lys catabolite in plants and animals, as a critical regulator of inducible plant immunity. Following pathogen recognition, Pip accumulates in inoculated Arabidopsis thaliana leaves, in leaves distal from the site of inoculation, and, most specifically, in petiole exudates from inoculated leaves. Defects of mutants in AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1) in systemic acquired resistance (SAR) and in basal, specific, and β-aminobutyric acid–induced resistance to bacterial infection are associated with a lack of Pip production. Exogenous Pip complements these resistance defects and increases pathogen resistance of wild-type plants. We conclude that Pip accumulation is critical for SAR and local resistance to bacterial pathogens. Our data indicate that biologically induced SAR conditions plants to more effectively synthesize the phytoalexin camalexin, Pip, and salicylic acid and primes plants for early defense gene expression. Biological priming is absent in the pipecolate-deficient ald1 mutants. Exogenous pipecolate induces SAR-related defense priming and partly restores priming responses in ald1. We conclude that Pip orchestrates defense amplification, positive regulation of salicylic acid biosynthesis, and priming to guarantee effective local resistance induction and the establishment of SAR. PMID:23221596
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 1, Jan/Feb 2012
2012-01-01
Considerations in Airborne Systems and Equipment Certification – RTCA/DO-178B,” Washington, D.C., 1992. 5. Ishikawa , Kaoru (Translator: J. H...significant, repeated issue, a formal root cause analysis process is performed. This method uses fishbone or Ishikawa diagrams [5], where possible
2009-08-19
SSDS Ship Self Defense System TSTS Total Ship Training System UDDI Universal Description, Discovery, and Integration UML Unified Modeling...34ContractorOrganization" type="ContractorOrganizationType"> <xs:annotation> <xs:documentation>Identifies a contractor organization resposible for the
Agile Software Development in the Department of Defense Environment
2017-03-31
Research Methodology .............................................................................................. 17 Research Hypothesis...acquisition framework to enable greater adoption of Agile methodologies . Overview of the Research Methodology The strategy for this study was to...guidance. 17 Chapter 3 – Research Methodology This chapter defines the research methodology and processes used in the study, in an effort to
2013-07-01
applications introduced by third-party developers to connect to the Android operating system through an open software interface. This allows customers...Definition Multimedia Interface have been developed to address the need for standards for high-definition televisions and computer monitors. Perhaps
Investigating the Application of Moving Target Defenses to Network Security
2013-08-01
developing an MTD testbed using OpenStack [14] to show that our MTD design can actually work. Building an MTD system in a cloud infrastructure will be...Information Intelli- gence Research. New York, USA: ACM, 2013. [14] Openstack , “ Openstack : The folsom release,” http://www.openstack.org/software
CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 1, Jan/Feb 2011
2011-02-01
Social Networks: A variety of websites connect users in- terested in specific subjects. Examples are YouTube, Wikipedia, Blogger , Facebook, and...the artist, engineers see beauty in their creations, however our muse is not aesthetic but functional. We prefer client awe and satisfaction to
Moving Toward Trustworthy Systems: R&D Essentials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Vishik, Claire
2010-01-01
Under the game-change metaphor, strate- gies developed to address hard problems will potentially lead to breakthroughs in many different interrelated cybersecuri- ty areas. For software assurance, a game change should focus on improving resil- iency and hardening new technologies that implement moving-target defenses aInd tailored trustworthy spaces.
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 7
2008-07-01
However, when your staff ’s passion goes from Edelweiss [1] to Kewpie Station [2], be sure your protective structures fan, rather than extinguish, the... Kewpie Station.” Everybody Loves You. Velour, 2003. 3. August Rush. Dir. Kirsten Sheridan. Perf. Freddie Highmore, Keri Russell, Jonathan Rhys Meyers
Multimedia Courseware in an Open Systems Environment: A Federal Strategy.
ERIC Educational Resources Information Center
Moline, Judi; And Others
The Portable Courseware Project (PORTCO) of the U.S. Department of Defense (DoD) is typical of projects worldwide that require standard software interfaces. This paper articulates the strategy whereby the federal multimedia courseware initiative leverages the open systems movement and the new realities of information technology. The federal…
NASA Astrophysics Data System (ADS)
Yussup, F.; Ibrahim, M. M.; Haris, M. F.; Soh, S. C.; Hasim, H.; Azman, A.; Razalim, F. A. A.; Yapp, R.; Ramli, A. A. M.
2016-01-01
With the growth of technology, many devices and equipments can be connected to the network and internet to enable online data acquisition for real-time data monitoring and control from monitoring devices located at remote sites. Centralized radiation monitoring system (CRMS) is a system that enables area radiation level at various locations in Malaysian Nuclear Agency (Nuklear Malaysia) to be monitored centrally by using a web browser. The Local Area Network (LAN) in Nuclear Malaysia is utilized in CRMS as a communication media for data acquisition of the area radiation levels from radiation detectors. The development of the system involves device configuration, wiring, network and hardware installation, software and web development. This paper describes the software upgrading on the system server that is responsible to acquire and record the area radiation readings from the detectors. The recorded readings are called in a web programming to be displayed on a website. Besides the main feature which is acquiring the area radiation levels in Nuclear Malaysia centrally, the upgrading involves new features such as uniform time interval for data recording and exporting, warning system and dose triggering.
RTSPM: real-time Linux control software for scanning probe microscopy.
Chandrasekhar, V; Mehta, M M
2013-01-01
Real time computer control is an essential feature of scanning probe microscopes, which have become important tools for the characterization and investigation of nanometer scale samples. Most commercial (and some open-source) scanning probe data acquisition software uses digital signal processors to handle the real time data processing and control, which adds to the expense and complexity of the control software. We describe here scan control software that uses a single computer and a data acquisition card to acquire scan data. The computer runs an open-source real time Linux kernel, which permits fast acquisition and control while maintaining a responsive graphical user interface. Images from a simulated tuning-fork based microscope as well as a standard topographical sample are also presented, showing some of the capabilities of the software.
Software for Simulation of Hyperspectral Images
NASA Technical Reports Server (NTRS)
Richtsmeier, Steven C.; Singer-Berk, Alexander; Bernstein, Lawrence S.
2002-01-01
A package of software generates simulated hyperspectral images for use in validating algorithms that generate estimates of Earth-surface spectral reflectance from hyperspectral images acquired by airborne and spaceborne instruments. This software is based on a direct simulation Monte Carlo approach for modeling three-dimensional atmospheric radiative transport as well as surfaces characterized by spatially inhomogeneous bidirectional reflectance distribution functions. In this approach, 'ground truth' is accurately known through input specification of surface and atmospheric properties, and it is practical to consider wide variations of these properties. The software can treat both land and ocean surfaces and the effects of finite clouds with surface shadowing. The spectral/spatial data cubes computed by use of this software can serve both as a substitute for and a supplement to field validation data.
USDA-ARS?s Scientific Manuscript database
Systemic acquired resistance (SAR), a highly desirable form of plant defense, provides broad-spectrum immunity against diverse pathogens. The recent identification of seemingly unrelated chemical inducers of SAR warrants an investigation of their mutual interrelationships. We show that SAR induced b...
Video Image Stabilization and Registration (VISAR) Software
NASA Technical Reports Server (NTRS)
1999-01-01
Two scientists at NASA's Marshall Space Flight Center, atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.
Video Image Stabilization and Registration (VISAR) Software
NASA Technical Reports Server (NTRS)
1999-01-01
Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
REN, GANG; LIU, JINXIN; LI, HONGCHANG
A closed-loop proportional-integral (PI) control software is provided for fully mechanically controlled automated electron microscopic tomography. The software is developed based on Gatan DigitalMicrograph, and is compatible with Zeiss LIBRA 120 transmission electron microscope. However, it can be expanded to other TEM instrument with modification. The software consists of a graphical user interface, a digital PI controller, an image analyzing unit, and other drive units (i.e.: image acquire unit and goniometer drive unit). During a tomography data collection process, the image analyzing unit analyzes both the accumulated shift and defocus value of the latest acquired image, and provides the resultsmore » to the digital PI controller. The digital PI control compares the results with the preset values and determines the optimum adjustments of the goniometer. The goniometer drive unit adjusts the spatial position of the specimen according to the instructions given by the digital PI controller for the next tilt angle and image acquisition. The goniometer drive unit achieves high precision positioning by using a backlash elimination method. The major benefits of the software are: 1) the goniometer drive unit keeps pre-aligned/optimized beam conditions unchanged and achieves position tracking solely through mechanical control; 2) the image analyzing unit relies on only historical data and therefore does not require additional images/exposures; 3) the PI controller enables the system to dynamically track the imaging target with extremely low system error.« less
Visual Target Tracking on the Mars Exploration Rovers
NASA Technical Reports Server (NTRS)
Kim, Won; Biesiadecki, Jeffrey; Ali, Khaled
2008-01-01
Visual target tracking (VTT) software has been incorporated into Release 9.2 of the Mars Exploration Rover (MER) flight software, now running aboard the rovers Spirit and Opportunity. In the VTT operation (see figure), the rover is driven in short steps between stops and, at each stop, still images are acquired by actively aimed navigation cameras (navcams) on a mast on the rover (see artistic rendition). The VTT software processes the digitized navcam images so as to track a target reliably and to make it possible to approach the target accurately to within a few centimeters over a 10-m traverse.
NASA Astrophysics Data System (ADS)
Martinez Fiorenzano, A. F.
2006-03-01
(Abridged) To this purpose, in the course of the thesis work we prepared a suitable software in order to use the same spectra acquired for radial velocity determinations (i.e., with the spectrum of the Iodine cell imprinted on) to measure variations of the stellar line profiles. This is a novel approach, that can be of general utility in all high precision radial velocity surveys based on iodine cell data. This software has then been extensively used on data acquired within our survey, allowing a proper insight into a number of interesting cases, where spurious estimates of the radial velocities due to activity or contamination by light from the companions were revealed. The same technique can also be considered to correct the measured radial velocities, in order to search for planets around active stars.
Sadygov, Rovshan G.; Zhao, Yingxin; Haidacher, Sigmund J.; Starkey, Jonathan M.; Tilton, Ronald G.; Denner, Larry
2010-01-01
We describe a method for ratio estimations in 18O-water labeling experiments acquired from low resolution isotopically resolved data. The method is implemented in a software package specifically designed for use in experiments making use of zoom-scan mode data acquisition. Zoom-scan mode data allows commonly used ion trap mass spectrometers to attain isotopic resolution, which make them amenable to use in labeling schemes such as 18O-water labeling, but algorithms and software developed for high resolution instruments may not be appropriate for the lower resolution data acquired in zoom-scan mode. The use of power spectrum analysis is proposed as a general approach which may be uniquely suited to these data types. The software implementation uses power spectrum to remove high-frequency noise, and band-filter contributions from co-eluting species of differing charge states. From the elemental composition of a peptide sequence we generate theoretical isotope envelopes of heavy-light peptide pairs in five different ratios; these theoretical envelopes are correlated with the filtered experimental zoom scans. To automate peptide quantification in high-throughput experiments, we have implemented our approach in a computer program, MassXplorer. We demonstrate the application of MassXplorer to two model mixtures of known proteins, and to a complex mixture of mouse kidney cortical extract. Comparison with another algorithm for ratio estimations demonstrates the increased precision and automation of MassXplorer. PMID:20568695
Engineering of Data Acquiring Mobile Software and Sustainable End-User Applications
NASA Technical Reports Server (NTRS)
Smith, Benton T.
2013-01-01
The criteria for which data acquiring software and its supporting infrastructure should be designed should take the following two points into account: the reusability and organization of stored online and remote data and content, and an assessment on whether abandoning a platform optimized design in favor for a multi-platform solution significantly reduces the performance of an end-user application. Furthermore, in-house applications that control or process instrument acquired data for end-users should be designed with a communication and control interface such that the application's modules can be reused as plug-in modular components in greater software systems. The application of the above mentioned is applied using two loosely related projects: a mobile application, and a website containing live and simulated data. For the intelligent devices mobile application AIDM, the end-user interface have a platform and data type optimized design, while the database and back-end applications store this information in an organized manner and manage access to that data to only to authorized user end application(s). Finally, the content for the website was derived from a database such that the content can be included and uniform to all applications accessing the content. With these projects being ongoing, I have concluded from my research that the applicable methods presented are feasible for both projects, and that a multi-platform design for the mobile application only marginally drop the performance of the mobile application.
Chen, Yuting; Cassone, Bryan J; Bai, Xiaodong; Redinbaugh, Margaret G; Michel, Andrew P
2012-01-01
Leafhoppers (HEmiptera: Cicadellidae) are plant-phloem feeders that are known for their ability to vector plant pathogens. The black-faced leafhopper (Graminella nigrifrons) has been identified as the only known vector for the Maize fine streak virus (MFSV), an emerging plant pathogen in the Rhabdoviridae. Within G. nigrifrons populations, individuals can be experimentally separated into three classes based on their capacity for viral transmission: transmitters, acquirers and non-acquirers. Understanding the molecular interactions between vector and virus can reveal important insights in virus immune defense and vector transmission. RNA sequencing (RNA-Seq) was performed to characterize the transcriptome of G. nigrifrons. A total of 38,240 ESTs of a minimum 100 bp were generated from two separate cDNA libraries consisting of virus transmitters and acquirers. More than 60% of known D. melanogaster, A. gambiae, T. castaneum immune response genes mapped to our G. nigrifrons EST database. Real time quantitative PCR (RT-qPCR) showed significant down-regulation of three genes for peptidoglycan recognition proteins (PGRP - SB1, SD, and LC) in G. nigrifrons transmitters versus control leafhoppers. Our study is the first to characterize the transcriptome of a leafhopper vector species. Significant sequence similarity in immune defense genes existed between G. nigrifrons and other well characterized insects. The down-regulation of PGRPs in MFSV transmitters suggested a possible role in rhabdovirus transmission. The results provide a framework for future studies aimed at elucidating the molecular mechanisms of plant virus vector competence.
Uses of megavoltage digital tomosynthesis in radiotherapy
NASA Astrophysics Data System (ADS)
Sarkar, Vikren
With the advent of intensity modulated radiotherapy, radiation treatment plans are becoming more conformal to the tumor with the decreasing margins. It is therefore of prime importance that the patient be positioned correctly prior to treatment. Therefore, image guided treatment is necessary for intensity modulated radiotherapy plans to be implemented successfully. Current advanced imaging devices require costly hardware and software upgrade, and radiation imaging solutions, such as cone beam computed tomography, may introduce extra radiation dose to the patient in order to acquire better quality images. Thus, there is a need to extend current existing imaging device ability and functions while reducing cost and radiation dose. Existing electronic portal imaging devices can be used to generate computed tomography-like tomograms through projection images acquired over a small angle using the technique of cone-beam digital tomosynthesis. Since it uses a fraction of the images required for computed tomography reconstruction, use of this technique correspondingly delivers only a fraction of the imaging dose to the patient. Furthermore, cone-beam digital tomosynthesis can be offered as a software-only solution as long as a portal imaging device is available. In this study, the feasibility of performing digital tomosynthesis using individually-acquired megavoltage images from a charge coupled device-based electronic portal imaging device was investigated. Three digital tomosynthesis reconstruction algorithms, the shift-and-add, filtered back-projection, and simultaneous algebraic reconstruction technique, were compared considering the final image quality and radiation dose during imaging. A software platform, DART, was created using a combination of the Matlab and C++ languages. The platform allows for the registration of a reference Cone Beam Digital Tomosynthesis (CBDT) image against a daily acquired set to determine how to shift the patient prior to treatment. Finally, the software was extended to investigate if the digital tomosynthesis dataset could be used in an adaptive radiotherapy regimen through the use of the Pinnacle treatment planning software to recalculate dose delivered. The feasibility study showed that the megavoltage CBDT visually agreed with corresponding megavoltage computed tomography images. The comparative study showed that the best compromise between imaging quality and imaging dose is obtained when 11 projection images, acquired over an imaging angle of 40°, are used with the filtered back-projection algorithm. DART was successfully used to register reference and daily image sets to within 1 mm in-plane and 2.5 mm out of plane. The DART platform was also effectively used to generate updated files that the Pinnacle treatment planning system used to calculate updated dose in a rigidly shifted patient. These doses were then used to calculate a cumulative dose distribution that could be used by a physician as reference to decide when the treatment plan should be updated. In conclusion, this study showed that a software solution is possible to extend existing electronic portal imaging devices to function as cone-beam digital tomosynthesis devices and achieve daily requirement for image guided intensity modulated radiotherapy treatments. The DART platform also has the potential to be used as a part of adaptive radiotherapy solution.
Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burford, M.J.; Burnett, R.A.; Downing, T.R.
The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage.more » The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.« less
Implementation of Altimetry Data in the GIPSY POD Software Package
NASA Technical Reports Server (NTRS)
Stauch, Jason R.; Gold, Kenn; Born, George H.
2001-01-01
Altimetry data has been used extensively to acquire data about characteristics of the Earth, the Moon, and Mars. More recently, the idea of using altimetry for orbit determination has also been explored. This report discusses modifications to JPL's GIPSY/OASIS II software to include altimetry data as an observation type for precise orbit determination. The mathematical foundation of using altimetry for the purpose of orbit determination is presented, along with results.
Improving the Agency's Software Acquisition Capability
NASA Technical Reports Server (NTRS)
Hankinson, Allen
2003-01-01
External development of software has oftc n led to unsatisfactory results and great frustration for the assurE 7ce community. Contracts frequently omit critical assuranc 4 processes or the right to oversee software development activitie: At a time when NASA depends more and more on software to in plement critical system functions, combination of three factors ex; cerbate this problem: I ) the ever-increasing trend to acquire rather than develop software in-house, 2) the trend toward performance based contracts, and 3) acquisition vehicles that only state softwar 2 requirements while leaving development standards and assur! ince methodologies up to the contractor. We propose to identify specific methods at d tools that NASA projects can use to mitigate the adverse el ects of the three problems. TWO broad classes of methoddt ols will be explored. The first will be those that provide NASA p ojects with insight and oversight into contractors' activities. The st cond will be those that help projects objectively assess, and thus i nprwe, their software acquisition capability. Of particular interest is the Software Engineering Institute's (SEI) Software Acqt isition Capability Maturity Model (SA-CMMO).
Large Smoke Plumes, Alberta Canada
Atmospheric Science Data Center
2016-12-30
... has adverse impacts on human health. These data were acquired during Terra orbit 87148. The stereoscopic analysis was ... software tool, which is publicly available through the Open Channel Foundation at: https://www.openchannelsoftware.com/projects/MINX ...
Test plan : I-40 TTIS tourist intercept survey
DOT National Transportation Integrated Search
1998-06-01
This document assembles best practices and presents practical advice on how to acquire the software components of Intelligent Transportation Systems (ITS). The intended audience is the "customers" - the project leaders, technical contract managers, d...
Air quality impacts of intercity freight. Volume 2 : appendices
DOT National Transportation Integrated Search
1998-07-01
This document presents best practices and practical advice on how to acquire the software components of Intelligent Transportation Systems (ITS). The executive summary briefly describes the themes and activities developed during the project developme...
Integrated fiducial sample mount and software for correlated microscopy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timothy R McJunkin; Jill R. Scott; Tammy L. Trowbridge
2014-02-01
A novel design sample mount with integrated fiducials and software for assisting operators in easily and efficiently locating points of interest established in previous analytical sessions is described. The sample holder and software were evaluated with experiments to demonstrate the utility and ease of finding the same points of interest in two different microscopy instruments. Also, numerical analysis of expected errors in determining the same position with errors unbiased by a human operator was performed. Based on the results, issues related to acquiring reproducibility and best practices for using the sample mount and software were identified. Overall, the sample mountmore » methodology allows data to be efficiently and easily collected on different instruments for the same sample location.« less
Experimental research control software system
NASA Astrophysics Data System (ADS)
Cohn, I. A.; Kovalenko, A. G.; Vystavkin, A. N.
2014-05-01
A software system, intended for automation of a small scale research, has been developed. The software allows one to control equipment, acquire and process data by means of simple scripts. The main purpose of that development is to increase experiment automation easiness, thus significantly reducing experimental setup automation efforts. In particular, minimal programming skills are required and supervisors have no reviewing troubles. Interactions between scripts and equipment are managed automatically, thus allowing to run multiple scripts simultaneously. Unlike well-known data acquisition commercial software systems, the control is performed by an imperative scripting language. This approach eases complex control and data acquisition algorithms implementation. A modular interface library performs interaction with external interfaces. While most widely used interfaces are already implemented, a simple framework is developed for fast implementations of new software and hardware interfaces. While the software is in continuous development with new features being implemented, it is already used in our laboratory for automation of a helium-3 cryostat control and data acquisition. The software is open source and distributed under Gnu Public License.
Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burford, M.J.; Burnett, R.A.; Curtis, L.M.
The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.
Programs Model the Future of Air Traffic Management
NASA Technical Reports Server (NTRS)
2010-01-01
Through Small Business Innovation Research (SBIR) contracts with Ames Research Center, Intelligent Automation Inc., based in Rockville, Maryland, advanced specialized software the company had begun developing with U.S. Department of Defense funding. The agent-based infrastructure now allows NASA's Airspace Concept Evaluation System to explore ways of improving the utilization of the National Airspace System (NAS), providing flexible modeling of every part of the NAS down to individual planes, airports, control centers, and even weather. The software has been licensed to a number of aerospace and robotics customers, and has even been used to model the behavior of crowds.
Digital beacon receiver for ionospheric TEC measurement developed with GNU Radio
NASA Astrophysics Data System (ADS)
Yamamoto, M.
2008-11-01
A simple digital receiver named GNU Radio Beacon Receiver (GRBR) was developed for the satellite-ground beacon experiment to measure the ionospheric total electron content (TEC). The open-source software toolkit for the software defined radio, GNU Radio, is utilized to realize the basic function of the receiver and perform fast signal processing. The software is written in Python for a LINUX PC. The open-source hardware called Universal Software Radio Peripheral (USRP), which best matches the GNU Radio, is used as a front-end to acquire the satellite beacon signals of 150 and 400 MHz. The first experiment was successful as results from GRBR showed very good agreement to those from the co-located analog beacon receiver. Detailed design information and software codes are open at the URL http://www.rish.kyoto-u.ac.jp/digitalbeacon/.