Science.gov

Sample records for acquiring defense software

  1. Defense analyses software

    SciTech Connect

    Przemieniecki, J.S.

    1990-01-01

    Listings are provided for a set of BASIC software programs designed to accompany and illustrate a textbook on mathematical analysis techniques for military applications (Przemieniecki, 1990; A91-40524). The programs are also provided on floppy disks for use with IBM-type personal computers.

  2. Acquiring Financial Management Software: A Prototyping Approach.

    ERIC Educational Resources Information Center

    Wilson, John H.

    1990-01-01

    When the Smithsonian Institution recently acquired a new financial management system, the concept of prototyping was used throughout the process, but in a broader sense than in software development. It was used to refine requirements, establish software management techniques, test a logistical system, and implement and apply the package. (MSE)

  3. A Model for Evaluating and Acquiring Educational Software in Psychology.

    ERIC Educational Resources Information Center

    Brown, Stephen W.; And Others

    This paper describes a model for evaluating and acquiring instructionally effective and cost effective educational computer software in university psychology departments. Four stages in evaluating the software are developed: (1) establishing departmental goals and objectives for educational use of computers; (2) inventorying and evaluating…

  4. Estimating Software Effort Hours for Major Defense Acquisition Programs

    ERIC Educational Resources Information Center

    Wallshein, Corinne C.

    2010-01-01

    Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…

  5. The Defense Technical Information Center: Acquiring Information and Imparting Knowledge.

    ERIC Educational Resources Information Center

    Molholm, Kurt N.; And Others

    1988-01-01

    This overview of the Defense Technical Information Center (DTIC) discusses how DTIC fits into the Department of Defense Scientific and Technical Information Program; its history, organization, users, and operations; types of information handled; subject classification; cataloging standards; Information Analysis Centers (IACs); and research and…

  6. Acquiring Software Design Schemas: A Machine Learning Perspective

    NASA Technical Reports Server (NTRS)

    Harandi, Mehdi T.; Lee, Hing-Yan

    1991-01-01

    In this paper, we describe an approach based on machine learning that acquires software design schemas from design cases of existing applications. An overview of the technique, design representation, and acquisition system are presented. the paper also addresses issues associated with generalizing common features such as biases. The generalization process is illustrated using an example.

  7. Defense mechanisms in congenital and acquired facial disfigurement: a clinical-empirical study.

    PubMed

    van den Elzen, Marijke E P; Versnel, Sarah L; Perry, J Christopher; Mathijssen, Irene M J; Duivenvoorden, Hugo J

    2012-04-01

    It is of clinical interest to investigate the degree to which patients with facial disfigurement use defense styles. Therefore, 59 adults born with rare facial clefts, 59 patients with facial deformities acquired at an adult age, and a reference group of 141 adults without facial disfigurements completed standardized questionnaires. There was a significant difference between the group with and the group without disfigurements on immature defense styles, with the disfigured group using the immature style more frequently. There was a trend for the nondisfigured group to use more mature defense styles. No difference between congenital and acquired groups was seen on individual types of defense style. Self-esteem had the strength to differentiate mature and immature defense styles within our disfigured groups. The association of low self-esteem and the utilization of immature defense styles suggests that professional help may tailor treatment on discussing immature defense style and problems triggering or maintaining this style. PMID:22456586

  8. Proposed Department of Defense software metrics implementation plan

    NASA Astrophysics Data System (ADS)

    Fife, Dennis W.; Popelas, Judy M.; Springsteen, Beth

    1994-09-01

    This report presents a proposed plan for DOD implementation of software metrics in support of acquisition reform and improved software risk management. The report documents the concluding phase of a one-year task to assess software metrics and to determine how to improve their use in software acquisition, particularly of weapon system software. An earlier effort surveyed the state of development and use of software metrics in industry and defense organizations. This survey found (1) that industry is strongly committed to using software metrics in a corporate-wide approach to gain marketplace advantages, and (2) that defense contractors exhibit a state of evolution in metrics use that is comparable to that of strictly commercial companies, if not more mature. The overall vision of the proposed plan is to establish a department-wide, bottom-to-top corporate approach for collecting and using software metrics to improve analysis and decision-making in software acquisition and risk management. Acquisition reform and the need for improved risk management should provide more specific goals to address under this vision, comparable to industry's goals of marketplace benefits from using software metrics. The plan is framed as eight specific recommendations, including a list of future research and development work that would support their implementation.

  9. Trade-offs between acquired and innate immune defenses in humans

    PubMed Central

    McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.

    2016-01-01

    Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325

  10. Trade-offs between acquired and innate immune defenses in humans.

    PubMed

    McDade, Thomas W; Georgiev, Alexander V; Kuzawa, Christopher W

    2016-01-01

    Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325

  11. 75 FR 25165 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... Regulation Supplement; Cost and Software Data Reporting System AGENCY: Defense Acquisition Regulations System... the Defense Federal Acquisition Regulation Supplement (DFARS) to set forth DoD Cost and Software Data... Software Data Reporting (CSDR) process offerors intend to use to satisfy the requirements of the...

  12. 76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-05

    ... Software Public Meeting AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION... regarding the use of open source software in DoD contracts. DATES: Public Meeting: January 12, 2012, from 10... for the discussions in the meeting. Please cite ``Public Meeting, DFARS--Open Source Software'' in...

  13. Acquiring Software Project Specifications in a Virtual World

    ERIC Educational Resources Information Center

    Ng, Vincent; Tang, Zoe

    2012-01-01

    In teaching software engineering, it is often interesting to introduce real life scenarios for students to experience and to learn how to collect information from respective clients. The ideal arrangement is to have some real clients willing to spend time to provide their ideas of a target system through interviews. However, this arrangement…

  14. Method for distributed object communications based on dynamically acquired and assembled software components

    NASA Technical Reports Server (NTRS)

    Sundermier, Amy (Inventor)

    2002-01-01

    A method for acquiring and assembling software components at execution time into a client program, where the components may be acquired from remote networked servers is disclosed. The acquired components are assembled according to knowledge represented within one or more acquired mediating components. A mediating component implements knowledge of an object model. A mediating component uses its implemented object model knowledge, acquired component class information and polymorphism to assemble components into an interacting program at execution time. The interactions or abstract relationships between components in the object model may be implemented by the mediating component as direct invocations or indirect events or software bus exchanges. The acquired components may establish communications with remote servers. The acquired components may also present a user interface representing data to be exchanged with the remote servers. The mediating components may be assembled into layers, allowing arbitrarily complex programs to be constructed at execution time.

  15. Systemic Acquired Resistance in Moss: Further Evidence for Conserved Defense Mechanisms in Plants

    PubMed Central

    Winter, Peter S.; Bowman, Collin E.; Villani, Philip J.; Dolan, Thomas E.; Hauck, Nathanael R.

    2014-01-01

    Vascular plants possess multiple mechanisms for defending themselves against pathogens. One well-characterized defense mechanism is systemic acquired resistance (SAR). In SAR, a plant detects the presence of a pathogen and transmits a signal throughout the plant, inducing changes in the expression of various pathogenesis-related (PR) genes. Once SAR is established, the plant is capable of mounting rapid responses to subsequent pathogen attacks. SAR has been characterized in numerous angiosperm and gymnosperm species; however, despite several pieces of evidence suggesting SAR may also exist in non-vascular plants6–8, its presence in non-vascular plants has not been conclusively demonstrated, in part due to the lack of an appropriate culture system. Here, we describe and use a novel culture system to demonstrate that the moss species Amblystegium serpens does initiate a SAR-like reaction upon inoculation with Pythium irregulare, a common soil-borne oomycete. Infection of A. serpens gametophores by P. irregulare is characterized by localized cytoplasmic shrinkage within 34 h and chlorosis and necrosis within 7 d of inoculation. Within 24 h of a primary inoculation (induction), moss gametophores grown in culture became highly resistant to infection following subsequent inoculation (challenge) by the same pathogen. This increased resistance was a response to the pathogen itself and not to physical wounding. Treatment with β-1,3 glucan, a structural component of oomycete cell walls, was equally effective at triggering SAR. Our results demonstrate, for the first time, that this important defense mechanism exists in a non-vascular plant, and, together with previous studies, suggest that SAR arose prior to the divergence of vascular and non-vascular plants. In addition, this novel moss – pathogen culture system will be valuable for future characterization of the mechanism of SAR in moss, which is necessary for a better understanding of the evolutionary history of SAR

  16. SDI (Strategic Defense Initiative): technology, survivability, and software

    SciTech Connect

    Not Available

    1988-05-01

    This report reviews the status of the various SDI technologies and system components. It analyzes the feasibility of producing dependable software of the complexity that advanced BMD systems would require. Finally, it summarizes what is now known, and unknown, about the probable survivability of such systems against concerted enemy attacks of various kinds.

  17. Framework for understanding the Strategic Defense Initiatives' software debates. Master's thesis

    SciTech Connect

    Adams, R.C.

    1990-06-01

    On March 23, 1983, then-President Ronald Reagan challenged a group of engineers and scientists to make nuclear weapons impotent and obsolete. This challenge led to the beginning of a new era in space technology and strategic defense, thus creating the Strategic Defense Initiative (SDI), better known as Star Wars. By 1984, several studies had begun to show that software in conjunction with Battle Management/Command, Control, and Communications techniques would play a major role in determining the effectiveness of the SDI. The results from these studies caused numerous controversial debates on the reliability, dependability, and trustworthiness of the software. This thesis provides a framework for understanding the complexities of the SDI software and points out some of the major issues involved in the software debates. The structure for this thesis is based on presenting the opinions of various computer scientists and engineers, indicating the issues that are controversial and those that have been defined as a necessity for the SDI program. One of the major highlights is the SDI summary chart that provides the reader with a very brief narrative of each individuals' opinion on the software issues discussed in this thesis.

  18. Engineering of Data Acquiring Mobile Software and Sustainable End-User Applications

    NASA Technical Reports Server (NTRS)

    Smith, Benton T.

    2013-01-01

    The criteria for which data acquiring software and its supporting infrastructure should be designed should take the following two points into account: the reusability and organization of stored online and remote data and content, and an assessment on whether abandoning a platform optimized design in favor for a multi-platform solution significantly reduces the performance of an end-user application. Furthermore, in-house applications that control or process instrument acquired data for end-users should be designed with a communication and control interface such that the application's modules can be reused as plug-in modular components in greater software systems. The application of the above mentioned is applied using two loosely related projects: a mobile application, and a website containing live and simulated data. For the intelligent devices mobile application AIDM, the end-user interface have a platform and data type optimized design, while the database and back-end applications store this information in an organized manner and manage access to that data to only to authorized user end application(s). Finally, the content for the website was derived from a database such that the content can be included and uniform to all applications accessing the content. With these projects being ongoing, I have concluded from my research that the applicable methods presented are feasible for both projects, and that a multi-platform design for the mobile application only marginally drop the performance of the mobile application.

  19. Defense Responses in Infected and Elicited Cucumber (Cucumis sativus L.) Hypocotyl Segments Exhibiting Acquired Resistance.

    PubMed Central

    Siegrist, J.; Jeblick, W.; Kauss, H.

    1994-01-01

    Segments from dark-grown cucumber (Cucumis sativus L.) hypocotyls were used to study defense reactions occurring upon fungal infection and induced by elicitors in the same tissue. The segments were rendered resistant to infection by Colletotrichum lagenarium either by growing the seedlings in the presence of dichloroisonicotinic acid (DCIA) or by preincubation of the cut segments with DCIA, salicylic acid (SA), or 5-chlorosalicylic acid (5CSA). This resistance appears to be due mainly to inhibition of fungal penetration into epidermal cells. In the resistant hypocotyl segments, the fungus induced, at the time of attempted penetration, an increased deposition of phenolics, which were visualized by autofluorescence. These phenolics were located mainly in the epidermal cell wall around and in the emerging papillae below appressoria and were quantified either as lignin-like polymers by the thioglycolic acid method or as 4-OH-benzaldehyde, 4-OH-benzoic, or 4-coumaric acid liberated upon treatment with alkali at room temperature. Pretreatment with DCIA, SA, and 5CSA induced little chitinase activity, but this activity greatly increased in resistant tissues upon subsequent infection. These observations indicate that resistance is associated with an improved perception of the pathogen stimulus resulting in the enhanced induction of diverse defense reactions. When the cut segments were pretreated with DCIA, SA, or 5CSA and then split and incubated with chitosan fragments, the deposition of cell wall phenolics was also enhanced. These pretreated and split segments also exhibited an increase in the rapid production of activated oxygen species induced by an elicitor preparation from Phytophthora megasperma f. sp. Glya. Pretreatment of the segments with methyl jasmonate neither induced resistance nor enhanced induction of cell wall phenolics upon fungal infection, although we observed in the corresponding split segments some increase in chitosan-induced cell wall phenolics and

  20. Defense Responses in Infected and Elicited Cucumber (Cucumis sativus L.) Hypocotyl Segments Exhibiting Acquired Resistance.

    PubMed

    Siegrist, J.; Jeblick, W.; Kauss, H.

    1994-08-01

    Segments from dark-grown cucumber (Cucumis sativus L.) hypocotyls were used to study defense reactions occurring upon fungal infection and induced by elicitors in the same tissue. The segments were rendered resistant to infection by Colletotrichum lagenarium either by growing the seedlings in the presence of dichloroisonicotinic acid (DCIA) or by preincubation of the cut segments with DCIA, salicylic acid (SA), or 5-chlorosalicylic acid (5CSA). This resistance appears to be due mainly to inhibition of fungal penetration into epidermal cells. In the resistant hypocotyl segments, the fungus induced, at the time of attempted penetration, an increased deposition of phenolics, which were visualized by autofluorescence. These phenolics were located mainly in the epidermal cell wall around and in the emerging papillae below appressoria and were quantified either as lignin-like polymers by the thioglycolic acid method or as 4-OH-benzaldehyde, 4-OH-benzoic, or 4-coumaric acid liberated upon treatment with alkali at room temperature. Pretreatment with DCIA, SA, and 5CSA induced little chitinase activity, but this activity greatly increased in resistant tissues upon subsequent infection. These observations indicate that resistance is associated with an improved perception of the pathogen stimulus resulting in the enhanced induction of diverse defense reactions. When the cut segments were pretreated with DCIA, SA, or 5CSA and then split and incubated with chitosan fragments, the deposition of cell wall phenolics was also enhanced. These pretreated and split segments also exhibited an increase in the rapid production of activated oxygen species induced by an elicitor preparation from Phytophthora megasperma f. sp. Glya. Pretreatment of the segments with methyl jasmonate neither induced resistance nor enhanced induction of cell wall phenolics upon fungal infection, although we observed in the corresponding split segments some increase in chitosan-induced cell wall phenolics and

  1. Delayed Hypersensitivity: Indicator of Acquired Failure of Host Defenses in Sepsis and Trauma

    PubMed Central

    Meakins, Jonathan L.; Pietsch, John B.; Bubenick, Oldrich; Kelly, Ralph; Rode, Harold; Gordon, Julius; MacLean, Lloyd D.

    1977-01-01

    Primary failure of host defense mechanisms has been associated with increased infection and mortality. Anergy, the failure of delayed hypersensitivity response, has been shown to identify surgical patients at increased risk for sepsis and related mortality. The anergic and relatively anergic patients whose skin tests failed to improve had a mortality rate of 74.4%, whereas those who improved their responses had a mortality rate of 5.1% (P < 0.001). This study documents abnormalities of neutrophil chemotaxis, T-lymphocyte rosetting in anergic patients and the effect of autologous serum. These abnormalities may account for the increased infection and mortality rates in anergic patients. Skin testing with five standard antigens has identified 110 anergic (A) or relatively anergic (RA) patients in whom neutrophil chemotaxis (CTX) and bactericidal function (NBF), T-lymphocyte rosettes, mixed lymphocyte culture (MLC), cell-mediated lympholysis (CML), and blastogenic factor (BF) were studied. The MLC, CML and BF were normal in the patients studied, and were not clinically helpful. Neutrophil CTX in 19 controls was 117.5 ± 1.6 u whereas in 40 A patients, neutrophils migrated 81.7 ± 2.3 u and in 15 RA patients 97.2 ± 3.8 u (P < 0.01). In 14 patients whose skin tests converted to normal, neutrophil migration improved from 78.2 ± 5.4 u to 107.2 ± 4.0 u (P < 0.01). Incubation of A or control neutrophils in A serum reduced migration in A patients from 93 ± 3.7 u to 86.2 ± 3.5 u (P < 0.01) and in normals from 121.2 ± 1.6 u to 103.6 ± 2.6 u (P < 0.001). The per cent rosette forming cells in 66 A patients was 42.5 ± 3.1 compared to 53.6 ± 2.8 in normal responders (P < 0.02). Incubation of normal lymphocytes in anergic serum further reduced rosetting by 30%. Restoration of delayed hypersensitivity responses and concurrent improvement in cellular and serum components of host defense were correlated with maintenance of adequate nutrition and aggressive surgical drainage

  2. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... the cost and software data reporting requirements. DoD published a proposed rule at 75 FR 25165 on May... from small entities and other interested parties (proposed rule at 75 FR 25165). No comments were... Automated Information Systems. DATES: Effective Date: November 24, 2010. FOR FURTHER INFORMATION CONTACT:...

  3. The Arabidopsis Mediator Complex Subunit16 Positively Regulates Salicylate-Mediated Systemic Acquired Resistance and Jasmonate/Ethylene-Induced Defense Pathways[W

    PubMed Central

    Zhang, Xudong; Wang, Chenggang; Zhang, Yanping; Sun, Yijun; Mou, Zhonglin

    2012-01-01

    Systemic acquired resistance (SAR) is a long-lasting plant immunity against a broad spectrum of pathogens. Biological induction of SAR requires the signal molecule salicylic acid (SA) and involves profound transcriptional changes that are largely controlled by the transcription coactivator NONEXPRESSOR OF PATHOGENESIS-RELATED GENES1 (NPR1). However, it is unclear how SAR signals are transduced from the NPR1 signaling node to the general transcription machinery. Here, we report that the Arabidopsis thaliana Mediator subunit16 (MED16) is an essential positive regulator of SAR. Mutations in MED16 reduced NPR1 protein levels and completely compromised biological induction of SAR. These mutations also significantly suppressed SA-induced defense responses, altered the transcriptional changes induced by the avirulent bacterial pathogen Pseudomonas syringae pv tomato (Pst) DC3000/avrRpt2, and rendered plants susceptible to both Pst DC3000/avrRpt2 and Pst DC3000. In addition, mutations in MED16 blocked the induction of several jasmonic acid (JA)/ethylene (ET)–responsive genes and compromised resistance to the necrotrophic fungal pathogens Botrytis cinerea and Alternaria brassicicola. The Mediator complex acts as a bridge between specific transcriptional activators and the RNA polymerase II transcription machinery; therefore, our data suggest that MED16 may be a signaling component in the gap between the NPR1 signaling node and the general transcription machinery and may relay signals from both the SA and the JA/ET pathways. PMID:23064320

  4. 4DCAPTURE: a general purpose software package for capturing and analyzing two- and three-dimensional motion data acquired from video sequences

    NASA Astrophysics Data System (ADS)

    Walton, James S.; Hodgson, Peter; Hallamasek, Karen; Palmer, Jake

    2003-07-01

    4DVideo is creating a general purpose capability for capturing and analyzing kinematic data from video sequences in near real-time. The core element of this capability is a software package designed for the PC platform. The software ("4DCapture") is designed to capture and manipulate customized AVI files that can contain a variety of synchronized data streams -- including audio, video, centroid locations -- and signals acquired from more traditional sources (such as accelerometers and strain gauges.) The code includes simultaneous capture or playback of multiple video streams, and linear editing of the images (together with the ancilliary data embedded in the files). Corresponding landmarks seen from two or more views are matched automatically, and photogrammetric algorithms permit multiple landmarks to be tracked in two- and three-dimensions -- with or without lens calibrations. Trajectory data can be processed within the main application or they can be exported to a spreadsheet where they can be processed or passed along to a more sophisticated, stand-alone, data analysis application. Previous attempts to develop such applications for high-speed imaging have been limited in their scope, or by the complexity of the application itself. 4DVideo has devised a friendly ("FlowStack") user interface that assists the end-user to capture and treat image sequences in a natural progression. 4DCapture employs the AVI 2.0 standard and DirectX technology which effectively eliminates the file size limitations found in older applications. In early tests, 4DVideo has streamed three RS-170 video sources to disk for more than an hour without loss of data. At this time, the software can acquire video sequences in three ways: (1) directly, from up to three hard-wired cameras supplying RS-170 (monochrome) signals; (2) directly, from a single camera or video recorder supplying an NTSC (color) signal; and (3) by importing existing video streams in the AVI 1.0 or AVI 2.0 formats. The

  5. Evaluation of Structure from Motion Software to Create 3D Models of Late Nineteenth Century Great Lakes Shipwrecks Using Archived Diver-Acquired Video Surveys

    NASA Astrophysics Data System (ADS)

    Mertes, J.; Thomsen, T.; Gulley, J.

    2014-12-01

    Here we demonstrate the ability to use archived video surveys to create photorealistic 3D models of submerged archeological sites. We created 3D models of two nineteenth century Great Lakes shipwrecks using diver-acquired video surveys and Structure from Motion (SfM) software. Models were georeferenced using archived hand survey data. Comparison of hand survey measurements and digital measurements made using the models demonstrate that spatial analysis produces results with reasonable accuracy when wreck maps are available. Error associated with digital measurements displayed an inverse relationship to object size. Measurement error ranged from a maximum of 18 % (on 0.37 m object) and a minimum of 0.56 % (on a 4.21 m object). Our results demonstrate SfM can generate models of large maritime archaeological sites that for research, education and outreach purposes. Where site maps are available, these 3D models can be georeferenced to allow additional spatial analysis long after on-site data collection.

  6. Acquired hyperpigmentations*

    PubMed Central

    Cestari, Tania Ferreira; Dantas, Lia Pinheiro; Boza, Juliana Catucci

    2014-01-01

    Cutaneous hyperpigmentations are frequent complaints, motivating around 8.5% of all dermatological consultations in our country. They can be congenital, with different patterns of inheritance, or acquired in consequence of skin problems, systemic diseases or secondary to environmental factors. The vast majority of them are linked to alterations on the pigment melanin, induced by different mechanisms. This review will focus on the major acquired hyperpigmentations associated with increased melanin, reviewing their mechanisms of action and possible preventive measures. Particularly prominent aspects of diagnosis and therapy will be emphasized, with focus on melasma, post-inflammatory hyperpigmentation, periorbital pigmentation, dermatosis papulosa nigra, phytophotodermatoses, flagellate dermatosis, erythema dyschromicum perstans, cervical poikiloderma (Poikiloderma of Civatte), acanthosis nigricans, cutaneous amyloidosis and reticulated confluent dermatitis PMID:24626644

  7. Astronomy Software

    NASA Technical Reports Server (NTRS)

    1995-01-01

    Software Bisque's TheSky, SkyPro and Remote Astronomy Software incorporate technology developed for the Hubble Space Telescope. TheSky and SkyPro work together to orchestrate locating, identifying and acquiring images of deep sky objects. With all three systems, the user can directly control computer-driven telescopes and charge coupled device (CCD) cameras through serial ports. Through the systems, astronomers and students can remotely operate a telescope at the Mount Wilson Observatory Institute.

  8. [ICU acquired neuromyopathy].

    PubMed

    Gueret, G; Guillouet, M; Vermeersch, V; Guillard, E; Talarmin, H; Nguyen, B-V; Rannou, F; Giroux-Metges, M-A; Pennec, J-P; Ozier, Y

    2013-09-01

    ICU acquired neuromyopathy (IANM) is the most frequent neurological pathology observed in ICU. Nerve and muscle defects are merged with neuromuscular junction abnormalities. Its physiopathology is complex. The aim is probably the redistribution of nutriments and metabolism towards defense against sepsis. The main risk factors are sepsis, its severity and its duration of evolution. IANM is usually diagnosed in view of difficulties in weaning from mechanical ventilation, but electrophysiology may allow an earlier diagnosis. There is no curative therapy, but early treatment of sepsis, glycemic control as well as early physiotherapy may decrease its incidence. The outcomes of IANM are an increase in morbi-mortality and possibly long-lasting neuromuscular abnormalities as far as tetraplegia. PMID:23958176

  9. NASA Software Engineering Benchmarking Study

    NASA Technical Reports Server (NTRS)

    Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.

    2013-01-01

    To identify best practices for the improvement of software engineering on projects, NASA's Offices of Chief Engineer (OCE) and Safety and Mission Assurance (OSMA) formed a team led by Heather Rarick and Sally Godfrey to conduct this benchmarking study. The primary goals of the study are to identify best practices that: Improve the management and technical development of software intensive systems; Have a track record of successful deployment by aerospace industries, universities [including research and development (R&D) laboratories], and defense services, as well as NASA's own component Centers; and Identify candidate solutions for NASA's software issues. Beginning in the late fall of 2010, focus topics were chosen and interview questions were developed, based on the NASA top software challenges. Between February 2011 and November 2011, the Benchmark Team interviewed a total of 18 organizations, consisting of five NASA Centers, five industry organizations, four defense services organizations, and four university or university R and D laboratory organizations. A software assurance representative also participated in each of the interviews to focus on assurance and software safety best practices. Interviewees provided a wealth of information on each topic area that included: software policy, software acquisition, software assurance, testing, training, maintaining rigor in small projects, metrics, and use of the Capability Maturity Model Integration (CMMI) framework, as well as a number of special topics that came up in the discussions. NASA's software engineering practices compared favorably with the external organizations in most benchmark areas, but in every topic, there were ways in which NASA could improve its practices. Compared to defense services organizations and some of the industry organizations, one of NASA's notable weaknesses involved communication with contractors regarding its policies and requirements for acquired software. One of NASA's strengths

  10. Antiterrorist Software

    NASA Technical Reports Server (NTRS)

    Clark, David A.

    1998-01-01

    In light of the escalation of terrorism, the Department of Defense spearheaded the development of new antiterrorist software for all Government agencies by issuing a Broad Agency Announcement to solicit proposals. This Government-wide competition resulted in a team that includes NASA Lewis Research Center's Computer Services Division, who will develop the graphical user interface (GUI) and test it in their usability lab. The team launched a program entitled Joint Sphere of Security (JSOS), crafted a design architecture (see the following figure), and is testing the interface. This software system has a state-ofthe- art, object-oriented architecture, with a main kernel composed of the Dynamic Information Architecture System (DIAS) developed by Argonne National Laboratory. DIAS will be used as the software "breadboard" for assembling the components of explosions, such as blast and collapse simulations.

  11. Educational Software Acquisition for Microcomputers.

    ERIC Educational Resources Information Center

    Erikson, Warren; Turban, Efraim

    1985-01-01

    Examination of issues involved in acquiring appropriate microcomputer software for higher education focuses on the following points: developing your own software; finding commercially available software; using published evaluations; pre-purchase testing; customizing and adapting commercial software; post-purchase testing; and software use. A…

  12. Strategic Defense Initiative - an overview

    SciTech Connect

    Abrahamson, J.A.

    1985-01-01

    A general framework for developing the concept and implementing options for strategic ballistic missile defense systems is emerging. The objective of the Strategic Defense Initiative (SDI) program is to conduct research on those technologies for defensive system which could intercept ballistic missiles after they have been launched and prevent them from hitting their targets. Its goal is to acquire the technical knowledge as a basis for a later decision on deployment, not a program for deployment or star wars. Abrahamson reviews the basic technological questions facing researchers, outlines the multi-layered defense possibilities and summarizes the status of technology to date. He argues for a continuity of resources to conduct the program. 4 figures.

  13. SOFTWARE ENGINEERING INSTITUTE (SEI)

    EPA Science Inventory

    The Software Engineering Institute (SEI) is a federally funded research and development center established in 1984 by the U.S. Department of Defense and operated by Carnegie Mellon University. SEI has a broad charter to provide leadership in the practice of software engineering t...

  14. Software assurance standard

    NASA Technical Reports Server (NTRS)

    1992-01-01

    This standard specifies the software assurance program for the provider of software. It also delineates the assurance activities for the provider and the assurance data that are to be furnished by the provider to the acquirer. In any software development effort, the provider is the entity or individual that actually designs, develops, and implements the software product, while the acquirer is the entity or individual who specifies the requirements and accepts the resulting products. This standard specifies at a high level an overall software assurance program for software developed for and by NASA. Assurance includes the disciplines of quality assurance, quality engineering, verification and validation, nonconformance reporting and corrective action, safety assurance, and security assurance. The application of these disciplines during a software development life cycle is called software assurance. Subsequent lower-level standards will specify the specific processes within these disciplines.

  15. The software engineering laboratory: An approach to measuring software technology

    NASA Technical Reports Server (NTRS)

    Mcgarry, F.

    1980-01-01

    The investigations of the software evaluation laboratory into the software development process at NASA/Goddard are described. A data collection process for acquiring detailed histories of software development projects is outlined. The application of different sets of software methodologies to specific applications projects is summarized. The effect of the development methodology on productivity is discussed.

  16. 48 CFR 208.7002-1 - Acquiring department responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Acquiring department responsibilities. 208.7002-1 Section 208.7002-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND...

  17. 48 CFR 208.7002-1 - Acquiring department responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Acquiring department responsibilities. 208.7002-1 Section 208.7002-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND...

  18. 48 CFR 208.7002-1 - Acquiring department responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Acquiring department responsibilities. 208.7002-1 Section 208.7002-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND...

  19. 48 CFR 208.7002-1 - Acquiring department responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Acquiring department responsibilities. 208.7002-1 Section 208.7002-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND...

  20. 48 CFR 208.7002-1 - Acquiring department responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Acquiring department responsibilities. 208.7002-1 Section 208.7002-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND...

  1. Space Station Software Recommendations

    NASA Technical Reports Server (NTRS)

    Voigt, S. (Editor)

    1985-01-01

    Four panels of invited experts and NASA representatives focused on the following topics: software management, software development environment, languages, and software standards. Each panel deliberated in private, held two open sessions with audience participation, and developed recommendations for the NASA Space Station Program. The major thrusts of the recommendations were as follows: (1) The software management plan should establish policies, responsibilities, and decision points for software acquisition; (2) NASA should furnish a uniform modular software support environment and require its use for all space station software acquired (or developed); (3) The language Ada should be selected for space station software, and NASA should begin to address issues related to the effective use of Ada; and (4) The space station software standards should be selected (based upon existing standards where possible), and an organization should be identified to promulgate and enforce them. These and related recommendations are described in detail in the conference proceedings.

  2. Hospital-acquired pneumonia

    MedlinePlus

    ... this page: //medlineplus.gov/ency/article/000146.htm Hospital-acquired pneumonia To use the sharing features on this page, please enable JavaScript. Hospital-acquired pneumonia is an infection of the lungs ...

  3. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional...

  4. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional...

  5. 33 CFR 211.2 - Authority to acquire real estate.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Authority to acquire real estate..., DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL WORKS PROJECTS Real Estate; General § 211.2 Authority to acquire real estate. (a) Congressional...

  6. Defenses and disincentives to proliferation. Final report

    SciTech Connect

    Snipes, F.S.; Scesney, P.E.

    1992-03-02

    The proliferation of ballistic missiles and their associated technologies through the Third World has become a chief security concern for the United States and its allies. To meet this threat, the U.S. and other industrial nations have attempted to impose export controls on critical missile technologies in order to prohibit certain regimes from acquiring ballistic missile systems. Unfortunately, the controls have largely been ineffective as not only have ballistic missiles been acquired by dangerous Third World regimes, but often the technology and engineering expertise to indigenously produce these weapons have been obtained as well. Two major instances of ballistic missile use in the Third World--the Iran-Iraq War of the Cities and Desert Storm--have brought home the realization that arms control measures alone are not going to be successful in stopping proliferation of these weapons. Other responses to these systems are needed to enhance current arms control efforts. One of these responses is active ballistic missile defense. Desert Storm demonstrated the utility of defense as a response to the products of proliferation. Less obvious, but of great interest to SDI and U.S. foreign policy is how this demonstration of defensive prowess and subsequent development in defensive technologies will affect ballistic missile proliferation. The presence of defenses reduces the value of ballistic missiles that is determined by a potential proliferator. By doing so, defenses provide disincentives for regional countries to proliferate. Examining these disincentives is an integral part of determining the net value of defensive deployments.

  7. Values as Defenses

    ERIC Educational Resources Information Center

    Hultman, Kenneth E.

    1976-01-01

    The author outlines a cognitive approach for explaining how and why people use values as defenses. He examines the relationship between defensive values and irrational beliefs, suggests a number of criteria for diagnosing the presence of defensive values, and proposes some strategies for dealing with defensive values in counseling. (Author)

  8. Acquired reactive perforating collagenosis.

    PubMed

    Basak, P Y; Turkmen, C

    2001-01-01

    Acquired perforating disorder has been recognized as an uncommon distinct dermatosis in which altered collagen is eliminated through the epidermis. Several disorders accompanied by itching and scratching were reported to be associated with reactive perforating collagenosis. A 67-year-old white woman diagnosed as acquired reactive perforating collagenosis with poorly controlled diabetes mellitus and congestive cardiac failure is presented. PMID:11525959

  9. Computer Software.

    ERIC Educational Resources Information Center

    Kay, Alan

    1984-01-01

    Discusses the nature and development of computer software. Programing, programing languages, types of software (including dynamic spreadsheets), and software of the future are among the topics considered. (JN)

  10. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  11. Acquired Cystic Kidney Disease

    MedlinePlus

    ... a kidney transplant or blood-filtering treatments called dialysis. The cysts are more likely to develop in people who are on kidney dialysis. The chance of developing acquired cystic kidney disease ...

  12. Hospital-acquired pneumonia

    MedlinePlus

    ... tends to be more serious than other lung infections because: People in the hospital are often very sick and cannot fight off ... prevent pneumonia. Most hospitals have programs to prevent hospital-acquired infections.

  13. Community-acquired pneumonia.

    PubMed

    Falguera, M; Ramírez, M F

    2015-11-01

    This article not only reviews the essential aspects of community-acquired pneumonia for daily clinical practice, but also highlights the controversial issues and provides the newest available information. Community-acquired pneumonia is considered in a broad sense, without excluding certain variants that, in recent years, a number of authors have managed to delineate, such as healthcare-associated pneumonia. The latter form is nothing more than the same disease that affects more frail patients, with a greater number of risk factors, both sharing an overall common approach. PMID:26186969

  14. Signal regulators of systemic acquired resistance

    PubMed Central

    Gao, Qing-Ming; Zhu, Shifeng; Kachroo, Pradeep; Kachroo, Aardra

    2015-01-01

    Salicylic acid (SA) is an important phytohormone that plays a vital role in a number of physiological responses, including plant defense. The last two decades have witnessed a number of breakthroughs related to biosynthesis, transport, perception and signaling mediated by SA. These findings demonstrate that SA plays a crictical role in both local and systemic defense responses. Systemic acquired resistance (SAR) is one such SA-dependent response. SAR is a long distance signaling mechanism that provides broad spectrum and long-lasting resistance to secondary infections throughout the plant. This unique feature makes SAR a highly desirable trait in crop production. This review summarizes the recent advances in the role of SA in SAR and discusses its relationship to other SAR inducers. PMID:25918514

  15. NASA Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Rosenberg, Linda

    1997-01-01

    If software is a critical element in a safety critical system, it is imperative to implement a systematic approach to software safety as an integral part of the overall system safety programs. The NASA-STD-8719.13A, "NASA Software Safety Standard", describes the activities necessary to ensure that safety is designed into software that is acquired or developed by NASA, and that safety is maintained throughout the software life cycle. A PDF version, is available on the WWW from Lewis. A Guidebook that will assist in the implementation of the requirements in the Safety Standard is under development at the Lewis Research Center (LeRC). After completion, it will also be available on the WWW from Lewis.

  16. Acquired Brain Injury Program.

    ERIC Educational Resources Information Center

    Schwartz, Stacey Hunter

    This paper reviews the Acquired Brain Injury (ABI) Program at Coastline Community College (California). The ABI Program is a two-year, for-credit educational curriculum designed to provide structured cognitive retraining for adults who have sustained an ABI due to traumatic (such as motor vehicle accident or fall) or non-traumatic(such as…

  17. Acquired von Willebrand disease.

    PubMed

    Petrini, P

    1999-05-01

    Acquired von Willebrand disease (AvWD) is a syndrome that has clinical and laboratory features similar to hereditary vWD. In contrast to the latter it occurs in patients without a family history of previous bleeding tendency. PMID:23401904

  18. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  19. Technologies for Distributed Defense

    SciTech Connect

    Seiders, Barbara AB; Rybka, Anthony J.

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of "citizen soldiers," with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  20. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  1. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  2. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  3. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  4. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  5. Acquired von Willebrand disease.

    PubMed

    Kumar, Shaji; Pruthi, Rajiv K; Nichols, William L

    2002-02-01

    Acquired von Willebrand disease (AvWD) is a relatively rare acquired bleeding disorder that usually occurs in elderly patients, in whom its recognition may be delayed. Patients usually present predominantly with mucocutaneous bleeding, with no previous history of bleeding abnormalities and no clinically meaningful family history. Various underlying diseases have been associated with AvWD, most commonly hematoproliferative disorders, including monoclonal gammopathies, lymphoproliferative disorders, and myeloproliferative disorders. The pathogenesis of AvWD remains incompletely understood but includes autoantibodies directed against the von Willebrand factor (vWF), leading to a more rapid clearance from the circulation or interference with its function, adsorption of vWF by tumor cells, and nonimmunologic mechanisms of destruction. Laboratory evaluation usually reveals a pattern of prolonged bleeding time and decreased levels of vWF antigen, ristocetin cofactor activity, and factor VIII coagulant activity consistent with a diagnosis of vWD. Acquired vWD is distinguished from the congenital form by age at presentation, absence of a personal and family history of bleeding disorders, and, often, presence of a hematoproliferative or autoimmune disorder. The severity of the bleeding varies considerably among patients. Therapeutic options include desmopressin and certain factor VIII concentrates that also contain vWF. Successful treatment of the associated illness can reverse the clinical and laboratory manifestations. Intravenous immunoglobulins have also shown some efficacy in the management of AvWD, especially cases associated with monoclonal gammopathies. Awareness of AvWD is essential for diagnosis and appropriate management. PMID:11838652

  6. Schools and Civil Defense.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…

  7. Forgiveness and Defense Style

    ERIC Educational Resources Information Center

    Maltby, John; Day, Liz

    2004-01-01

    Within the literature on the psychology of forgiveness, researchers have hypothesized that the 1st stage in the process of being able to forgive is the role of psychological defense. To examine such a hypothesis, the authors explored the relationship between forgiveness and defense style. The 304 respondents (151 men, 153 women) completed measures…

  8. Defense Mechanisms: A Bibliography.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  9. Selecting Software.

    ERIC Educational Resources Information Center

    Pereus, Steven C.

    2002-01-01

    Describes a comprehensive computer software selection and evaluation process, including documenting district needs, evaluating software packages, weighing the alternatives, and making the purchase. (PKP)

  10. 78 FR 30898 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... Regulation Supplement; Rights in Technical Data and Computer Software AGENCY: Defense Acquisition Regulations... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information...

  11. National Software Reference Library (NSRL)

    National Institute of Standards and Technology Data Gateway

    National Software Reference Library (NSRL) (PC database for purchase)   A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.

  12. [Acquired von Willebrand syndrome].

    PubMed

    Franchini, Massimo

    2006-01-01

    Acquired von Willebrand syndrome (aVWS) is a rare, but probably underestimated, bleeding disorder that mimics the congenital form of von Willebrand disease (VWD) in terms of laboratory findings and clinical presentation. However, unlike congenital VWD, it arises in individuals with no personal or family history of bleeding. AVWS occurs in association with a variety of underlying disorders, including lymphoproliferative disorders, myeloproliferative disorders and cardiovascular diseases. The main pathogenic, clinical, laboratory and therapeutic aspects of this syndrome are concisely reported in this review. PMID:16913181

  13. 48 CFR 215.101-70. - Best value when acquiring tents or other temporary structures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Best value when acquiring tents or other temporary structures. 215.101-70. Section 215.101-70. Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION...

  14. 48 CFR 215.101-70. - Best value when acquiring tents or other temporary structures.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Best value when acquiring tents or other temporary structures. 215.101-70. Section 215.101-70. Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION...

  15. Two systems and defenses.

    PubMed

    Novick, Jack; Novick, Kerry Kelly

    2013-02-01

    The authors suggest that Freud's concept of defense differentiated psychoanalysis from other medical and psychological theories of personality development and functioning then and now. Reclaiming the concept's centrality and linking it with interdisciplinary research findings, they illustrate their extension of defense into a two-system model of self-protection and self-regulation with a clinical example. The authors suggest that the two-system model allows for the reintegration of defense into a multidimensional psychoanalytic theory and multimodal therapeutic technique. PMID:23421665

  16. AIDS: acquired immunodeficiency syndrome *

    PubMed Central

    Gilmore, N.J.; Beaulieu, R.; Steben, M.; Laverdière, M.

    1992-01-01

    Acquired immunodeficiency syndrome, or AIDS, is a new illness that occurs in previously healthy individuals. It is characterized by immunodeficiency, opportunistic infections and unusual malignant diseases. Life-threatening single or multiple infections with viruses, mycobacteria, fungi or protozoa are common. A rare neoplasm, Kaposi's sarcoma, has developed in approximately one third of patients with AIDS. More than 800 cases of AIDS have been reported in North America, over 24 of them in Canada. The majority of patients are male homosexuals, although AIDS has also developed in abusers of intravenously administered drugs, Haitian immigrants, individuals with hemophilia, recipients of blood transfusions, prostitutes, and infants, spouses and partners of patients with AIDS. The cause of AIDS is unknown, but the features are consistent with an infectious process. Early diagnosis can be difficult owing to the nonspecific symptoms and signs of the infections and malignant diseases. Therefore, vigilance by physicians is of the utmost importance. PMID:1544049

  17. Community-acquired pneumonia.

    PubMed

    Polverino, E; Torres Marti, A

    2011-02-01

    Despite the remarkable advances in antibiotic therapies, diagnostic tools, prevention campaigns and intensive care, community-acquired pneumonia (CAP) is still among the primary causes of death worldwide, and there have been no significant changes in mortality in the last decades. The clinical and economic burden of CAP makes it a major public health problem, particularly for children and the elderly. This issue provides a clinical overview of CAP, focusing on epidemiology, economic burden, diagnosis, risk stratification, treatment, clinical management, and prevention. Particular attention is given to some aspects related to the clinical management of CAP, such as the microbial etiology and the available tools to achieve it, the usefulness of new and old biomarkers, and antimicrobial and other non-antibiotic adjunctive therapies. Possible scenarios in which pneumonia does not respond to treatment are also analyzed to improve clinical outcomes of CAP. PMID:21242952

  18. Acquired Porphyria Cutanea Tarda

    PubMed Central

    Koval, Andrew; Danby, C. W. E.; Petermann, H.

    1965-01-01

    Currently, the porphyrias are classified in four main groups: congenital porphyria, acute intermittent porphyria, porphyria cutanea tarda hereditaria, and porphyria cutanea tarda symptomatica. The acquired form of porphyria (porphyria cutanea tarda symptomatica) occurs in older males and is nearly always associated with chronic alcoholism and hepatic cirrhosis. The main clinical changes are dermatological, with excessive skin fragility and photosensitivity resulting in erosions and bullae. Biochemically, high levels of uroporphyrin are found in the urine and stools. Treatment to date has been symptomatic and usually unsuccessful. A case of porphyria cutanea tarda symptomatica is presented showing dramatic improvement of both the skin lesions and porphyrin levels in urine and blood following repeated phlebotomy. Possible mechanisms of action of phlebotomy on porphyria cutanea tarda symptomatica are discussed. ImagesFig. 1Fig. 2 PMID:14341652

  19. Powerplant software

    SciTech Connect

    Elliott, T.C.

    1995-07-01

    Powerplants need software to thrive and compete. Covered here are many programs and applications -- an overview of the functions, tasks, and problem-solving software is used for today. Software or, more accurately, software-driven systems are pervasive. Their presence is felt in every nook and cranny of the powerplant -- from design and construction through operation and maintenance, even dismantling and decommissioning -- embracing whole systems but also focusing on individual pieces of equipment. No one software supplier or two or three dominates -- powerplant software is the purview of scores if not hundreds of suppliers ranging from the largest corporations to individual consultants and application developers.

  20. GLOBE (Global Oceanographic Bathymetry Explorer) : an innovative and generic software combining all necessary functionalities for cruise preparation, for collection, linking, processing and display of scientific data acquired during sea cruises, and for exporting data and information to the main marine data centers and networks.

    NASA Astrophysics Data System (ADS)

    Sinquin, J. M.; Sorribas, J.

    2014-12-01

    Within the EUROFLEETS project, and linked to the EMODNet and Geo-Seas European projects, GLOBE (Global Oceanographic Bathymetry Explorer) is an innovative and generic software. I. INTRODUCTION The first version can be used onboard during the survey to get a quick overview of acquired data, or later, to re-process data with accurate environmental data. II. MAIN FUNCTIONALITIES The version shown at AGU-2014 will present several key items : - 3D visualization: DTM multi-layers from EMODNet, - Water Column echogram, Seismic lines, ... - Bathymetry Plug-In: manual and automatic data cleaning, integration of EMODNet methodology to introduce CDI concept, filtering, spline, data gridding, ... - Backscatter with compensation, - Tectonic toolset, - Photo/Video Plug-In - Navigation 3D including tide correction, MRU corrections, GPS offsets correction, - WMS/WFS interfaces. III. FOCUS ON EMODNET One of the main objectives of the EMODNet European project is to elaborate a common processing flow for gridding the bathymetry data and for generating harmonized digital terrain model (DTM) : this flow includes the definition of the DTM characteristics (geodetic parameters, grid spacing, interpolation and smoothing parameters…) and also the specifications of a set of layers which enrich the basic depth layer : statistical layers (sounding density, standard deviation,…) and an innovative data source layer which indicates the source of the soundings and and which is linked and collects to the associated metadata. GLOBE Software provides the required tools for applying this methodology and is offered to the project partners. V. FOCUS ON THE TECTONIC TOOLSET The tectonic toolset allows the user to associate any DTM to 3D rotation movements. These rotations represent the movement of tectonic plates along discrete time lines (from 200 million years ago to now). One rotation is described by its axes, its value angle and its date. GLOBE can display the movement of tectonic plates

  1. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal...

  2. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal...

  3. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal...

  4. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal...

  5. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Authority to acquire real estate and interests... Real Estate and Interest Therein § 552.32 Authority to acquire real estate and interests therein. While... law authorizing such purchase (R. S. 3736; 41 U.S.C. 14). No real estate not in Federal...

  6. Software Program: Software Management Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this NASA Software Management Guidebook is twofold. First, this document defines the core products and activities required of NASA software projects. It defines life-cycle models and activity-related methods but acknowledges that no single life-cycle model is appropriate for all NASA software projects. It also acknowledges that the appropriate method for accomplishing a required activity depends on characteristics of the software project. Second, this guidebook provides specific guidance to software project managers and team leaders in selecting appropriate life cycles and methods to develop a tailored plan for a software engineering project.

  7. Proprietary software

    NASA Technical Reports Server (NTRS)

    Marnock, M. J.

    1971-01-01

    The protection of intellectual property by a patent, a copyright, or trade secrets is reviewed. The present and future use of computers and software are discussed, along with the governmental uses of software. The popularity of contractual agreements for sale or lease of computer programs and software services is also summarized.

  8. Moscow's defense intellectuals

    SciTech Connect

    Lambeth, B.S.

    1990-01-01

    This essay was originally written two decades ago as a seminar paper. A substantial portion of it addresses what were then only the first steps toward the establishment of a community of professional civilian defense analysts in the Soviet Union. Throughout most of the intervening period, that community found itself mired in immobilism as jurisdiction over such key Soviet national security inputs as military doctrine, force requirements, resource needs, and to a considerable degree, arms negotiating positions remained an exclusive prerogative of the Defense Ministry and the General Staff. Today, this former military monopoly has come to be challenged with increasing success by a host of newcomers to the Soviet defense scene, including the Foreign Ministry, the Supreme Soviet, and an ambitious cadre of civilian analysts attached to the social science research institutes of the Academy of Sciences. These individuals are making a determined bid for greater influence over Soviet defense policy, with the express encouragement of President Gorbachev and his supporters. The result has been an unprecedented infusion of pluralism into Soviet defense politics and a significant change in the content and goals of Soviet military policy.

  9. Computer software.

    PubMed

    Rosenthal, L E

    1986-10-01

    Software is the component in a computer system that permits the hardware to perform the various functions that a computer system is capable of doing. The history of software and its development can be traced to the early nineteenth century. All computer systems are designed to utilize the "stored program concept" as first developed by Charles Babbage in the 1850s. The concept was lost until the mid-1940s, when modern computers made their appearance. Today, because of the complex and myriad tasks that a computer system can perform, there has been a differentiation of types of software. There is software designed to perform specific business applications. There is software that controls the overall operation of a computer system. And there is software that is designed to carry out specialized tasks. Regardless of types, software is the most critical component of any computer system. Without it, all one has is a collection of circuits, transistors, and silicone chips. PMID:3536223

  10. Acute Acquired Concomitant Esotropia

    PubMed Central

    Chen, Jingchang; Deng, Daming; Sun, Yuan; Shen, Tao; Cao, Guobin; Yan, Jianhua; Chen, Qiwen; Ye, Xuelian

    2015-01-01

    Abstract Acute acquired concomitant esotropia (AACE) is a rare, distinct subtype of esotropia. The purpose of this retrospective study was to describe the clinical characteristics and discuss the classification and etiology of AACE. Charts from 47 patients with AACE referred to our institute between October 2010 and November 2014 were reviewed. All participants underwent a complete medical history, ophthalmologic and orthoptic examinations, and brain and orbital imaging. Mean age at onset was 26.6 ± 12.2 years. Of the 18 cases with deviations ≤ 20 PD, 16 presented with diplopia at distance and fusion at near vision at the onset of deviation; differences between distance and near deviations were < 8 PD; all cases except one were treated with prism and diplopia resolved. Of the 29 cases with deviations > 20 PD, 5 were mild hypermetropic with age at onset between 5 and 19 years, 16 were myopic, and 8 were emmetropic with age at onset > 12 years; 24 were surgically treated and 5 cases remained under observation; all 24 cases achieved normal retinal correspondence or fusion or stereopsis on postoperative day 1 in synoptophore; in 23 cases diplopia or visual confusion resolved postoperatively. Of the 47 cases, brain and orbital imaging in 2 cases revealed a tumor in the cerebellopontine angle and 1 case involved spinocerebellar ataxia as revealed by genetic testing. AACE in this study was characterized by a sudden onset of concomitant nonaccommodative esotropia with diplopia or visual confusion at 5 years of age or older and the potential for normal binocular vision. We suggest that AACE can be divided into 2 subgroups consisting of patients with relatively small versus large angle deviations. Coexisting or underlying neurological diseases were infrequent in AACE. PMID:26705210

  11. Value of space defenses

    SciTech Connect

    Canavan, G.H.

    1992-10-29

    This report discusses the economic value of defenses against Near-Earth Object (NEO) impacts is bounded by calculating expected losses in their absence, which illustrates the contributions from NEOs of different sizes and the sensitivity of total expected losses to impact frequencies. For typical size distributions and damage of only a few decades duration, losses are most sensitive to small NEOs, and lead to defenses worth a few $M/yr. When the persistence of damage with NEO size is taken into account, that shifts the loss to the largest NEOs and greatly increases expected loss and values.

  12. CERCLA's innocent landowner defense -- Consultants beware

    SciTech Connect

    Nijman, J.T. )

    1994-05-01

    Consultant liability is an area of the innocent landowner defense under CERCLA that is not often discussed. The only reasonable way to protect consultants hired by innocent purchasers'' is for Congress or state legislatures to establish standardized, regulated audit guidelines. However, even standardized guidelines do not protect consultants completely, because standards cannot specify all activity necessary to perform a particular task. Each project has unique circumstances, and standards arguably can become per se determinants of liability. CERCLA provides three defenses to its basic strict, joint and several liability provisions -- an act of God, an act of war, and an act or omission of a third party not in a contractual relationship with the current owner. Congress amended the third-party not in a contractual relationship with the current owner. Congress amended the third-party defense in SARA by redefining contractual relationship'' to exclude from liability owners who acquired the real property following disposal or placement of hazardous material, and established satisfactorily that the owner at the time of purchase neither knew nor had reason to know hazardous substances were disposed on the property -- the innocent landowner defense.

  13. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... confer control of X and therefore will file as an acquiring person. Because A held the plant prior to the... within two persons, “A” and “B.” Under this section, if V is to acquire corporation X, both “A” and “B... person. Examples: 1. Assume that person “Q” will acquire voting securities of corporation X held by...

  14. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... confer control of X and therefore will file as an acquiring person. Because A held the plant prior to the... within two persons, “A” and “B.” Under this section, if V is to acquire corporation X, both “A” and “B... person. Examples: 1. Assume that person “Q” will acquire voting securities of corporation X held by...

  15. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  16. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  17. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense...

  18. Radiological Defense Manual.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    Originally prepared for use as a student textbook in Radiological Defense (RADEF) courses, this manual provides the basic technical information necessary for an understanding of RADEF. It also briefly discusses the need for RADEF planning and expected postattack emergency operations. There are 14 chapters covering these major topics: introduction…

  19. Censorship: Tactics for Defense.

    ERIC Educational Resources Information Center

    Lowery, Skip

    1998-01-01

    Book banners are generally successful because they have a wide network of support, including national coalitions with sophisticated organizational methods--such as electing certain people to school boards. School officials should get organized and devise defensive strategies, such as inviting critics to class, asking what they would like to…

  20. Defense Language Institute.

    ERIC Educational Resources Information Center

    Defense Language Inst., Washington, DC.

    Discussed in this Defense Language Institute (DLI) brochure are its intensive language programs' history, and its four schools, which are located in Monterey, California, Washington, D.C., Lackland Air Force Base, and Fort Bliss, Texas. Proficiency levels determined by the DLI and utilization of the audiolingual method are also described.…

  1. Plant defense activators: applications and prospects in cereal crops

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This review addresses the current understanding of the plant immune response and the molecular mechanisms responsible for systemic acquired resistance as well as the phenomenon of "priming" in plant defense. A detailed discussion of the role of salicylic acid in activating the plant transcription c...

  2. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... acquired person is the pre-acquisition ultimate parent entity of the entity. (ii) The value of an... directors of B. A is deemed to be acquiring all of the assets of B as a result. (g) Transfers of patent... transfer of patent rights covered by this paragraph constitutes an asset acquisition; and (3) Patent...

  3. Software for Microcomputers in Libraries and Information Units.

    ERIC Educational Resources Information Center

    Tedd, Lucy A.

    1983-01-01

    Descriptions of available microcomputer software cover basic software, word processing, database management systems, in-house information retrieval, searching of external online information retrieval systems, in-house library housekeeping, and financial and management software. Checklist of points to consider when acquiring software, 36…

  4. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization. PMID:17875603

  5. Software safety

    NASA Technical Reports Server (NTRS)

    Leveson, Nancy

    1987-01-01

    Software safety and its relationship to other qualities are discussed. It is shown that standard reliability and fault tolerance techniques will not solve the safety problem for the present. A new attitude requires: looking at what you do NOT want software to do along with what you want it to do; and assuming things will go wrong. New procedures and changes to entire software development process are necessary: special software safety analysis techniques are needed; and design techniques, especially eliminating complexity, can be very helpful.

  6. 9. BASRELIEF DECORATION, 'DEFENSE', MURAL COMMEMORATING THE DEFENSE OF FORT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. BAS-RELIEF DECORATION, 'DEFENSE', MURAL COMMEMORATING THE DEFENSE OF FORT DEARBORN - Chicago River Bascule Bridge, Michigan Avenue, Spanning Chicago River at North Michigan Avenue, Chicago, Cook County, IL

  7. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  8. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  9. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  10. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  11. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  12. The innocent landowner defense under CERCLA should be transferable to subsequent purchasers

    SciTech Connect

    Spertus, J.W.

    1993-12-31

    Under CERCLA, landowners are held strictly liable for cleaning up hazardous substances on their property. Purchasers who acquire title to contaminated property become liable for cleanup costs by virtue of their status as the current owner. Although liability under the Act is strict, joint, and several, a few limited defenses enable some landowners to avoid liability altogether. One such defense, known as the innocent landowner defense, is the subject of this article.

  13. Software for quantitative trait analysis

    PubMed Central

    2005-01-01

    This paper provides a brief overview of software currently available for the genetic analysis of quantitative traits in humans. Programs that implement variance components, Markov Chain Monte Carlo (MCMC), Haseman-Elston (H-E) and penetrance model-based linkage analyses are discussed, as are programs for measured genotype association analyses and quantitative trait transmission disequilibrium tests. The software compared includes LINKAGE, FASTLINK, PAP, SOLAR, SEGPATH, ACT, Mx, MERLIN, GENEHUNTER, Loki, Mendel, SAGE, QTDT and FBAT. Where possible, the paper provides URLs for acquiring these programs through the internet, details of the platforms for which the software is available and the types of analyses performed. PMID:16197737

  14. A Corpus-Based Comparative Study of "Learn" and "Acquire"

    ERIC Educational Resources Information Center

    Yang, Bei

    2016-01-01

    As an important yet intricate linguistic feature in English language, synonymy poses a great challenge for second language learners. Using the 100 million-word British National Corpus (BNC) as data and the software Sketch Engine (SkE) as an analyzing tool, this article compares the usage of "learn" and "acquire" used in natural…

  15. Children Acquire Emotion Categories Gradually

    ERIC Educational Resources Information Center

    Widen, Sherri C.; Russell, James A.

    2008-01-01

    Some accounts imply that basic-level emotion categories are acquired early and quickly, whereas others imply that they are acquired later and more gradually. Our study examined this question for fear, happiness, sadness, and anger in the context of children's categorization of emotional facial expressions. Children (N=168, 2-5 years) first labeled…

  16. Software Reviews.

    ERIC Educational Resources Information Center

    Bitter, Gary G., Ed.

    1990-01-01

    Reviews three computer software: (1) "Elastic Lines: The Electronic Geoboard" on elementary geometry; (2) "Wildlife Adventures: Whales" on environmental science; and (3) "What Do You Do with a Broken Calculator?" on computation and problem solving. Summarizes the descriptions, strengths and weaknesses, and applications of each software. (YP)

  17. Software Repository

    NASA Technical Reports Server (NTRS)

    Merwarth, P., D.

    1983-01-01

    The Common Software Module Repository (CSMR) is computerized library system with high product and service visibility to potential users. Online capabilities of system allow both librarian and user to interact with library. Librarian is responsible for maintaining information in CSMR library. User searches library to locate software modules that meet his or her current needs.

  18. Software Reviews.

    ERIC Educational Resources Information Center

    Miller, Anne, Ed.; Radziemski, Cathy, Ed.

    1988-01-01

    Reviews two software packages for the Macintosh series. "Course Builder 2.0," a courseware authoring system, allows the user to create programs which stand alone and may be used independently in the classroom. "World Builder," an artificial intelligence software package, allows creative thinking, problem-solving, and decision-making. (YP)

  19. Software Bridge

    NASA Technical Reports Server (NTRS)

    1995-01-01

    I-Bridge is a commercial version of software developed by I-Kinetics under a NASA Small Business Innovation Research (SBIR) contract. The software allows users of Windows applications to gain quick, easy access to databases, programs and files on UNIX services. Information goes directly onto spreadsheets and other applications; users need not manually locate, transfer and convert data.

  20. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen

    1988-01-01

    Presents reviews of six computer software programs for teaching science. Provides the publisher, grade level, cost, and descriptions of software, including: (1) "Recycling Logic"; (2) "Introduction to Biochemistry"; (3) "Food for Thought"; (4) "Watts in a Home"; (5) "Geology in Action"; and (6) "Biomes." All are for Apple series microcomputers.…

  1. [Thoughts on "defensive" medicine].

    PubMed

    Csiba, László

    2007-03-25

    "Defensive" medicine is called medical behaviour characterized by deformation of diagnostic and therapeutic activities due to fears endangering existence and work, thus some interventions are omitted or, on the contrary, superfluous examinations are proposed on account of internal uncertainty, the patient's distrust or hostile social environment. Trust relation between patient and physician is the most gravely damaged because of aggravation and distortion of some conscienceless physicians' abuses by the media; patient-physician relations may not be degraded to contractual legal relations. Young physicians must get acquainted with the joy of success in diagnostics that enriches the personality. They shall have healthy self-esteem and be ready to take diagnostic and therapeutic challenges on themselves. All of us have to fight against social atmosphere hostile to physicians, against causes inducing and augmenting practice of defensive medicine. PMID:17444017

  2. Defense Waste Processing Facility

    SciTech Connect

    Haselow, J.S.; Wilhite, E.L.; Stieve, A.L.

    1990-05-01

    The information contained in this report is intended to supplement the original Environmental Impact Statement (EIS) for the Defense Waste Processing Facility (DWPF). Since the original EIS in 1982, alterations have been made to he conceptual process that reduce the impact to the groundwater. This reduced impact is documented in this report along with an update of the understanding of seismology and geology of the Savannah River Site. 6 refs., 2 figs., 2 tabs.

  3. Credible Software and Simulation Uncertainty

    NASA Technical Reports Server (NTRS)

    Mehta, Unmeel B.; Nixon, David (Technical Monitor)

    1998-01-01

    The utility of software primarily depends on its reliability and performance; whereas, its significance depends solely on its credibility for intended use. The credibility of simulations confirms the credibility of software. The level of veracity and the level of validity of simulations determine the degree of credibility of simulations. The process of assessing this credibility in fields such as computational mechanics (CM) differs from that followed by the Defense Modeling and Simulation Office in operations research. Verification and validation (V&V) of CM simulations is not the same as V&V of CM software. Uncertainty is the measure of simulation credibility. Designers who use software are concerned with management of simulation uncertainty. Terminology and concepts are presented with a few examples from computational fluid dynamics.

  4. ACQUIRE: A data acquisition system for CAMAC on SUN workstations

    SciTech Connect

    Kouzes, R.T. ); Lowry, M.M. )

    1994-02-01

    The data acquisition software package ACQUIRE has been used for many years by the Princeton University Cyclotron Laboratory for nuclear physics research applications. This code has been ported to the SUN Sparc workstation and is fully functional, including block data transfers using an in crate Event Handler. A SCSI interface to CAMAC is utilized, and the device handling software has been developed in such a way that little modification was needed in the ACQUIRE code for the SUN implementation. The Higz X windows graphics package from CERN is used for data display. ACQUIRE will be used for test and development of CAMAC based systems within the Molecular Science Research Center at Pacific Northwest Laboratory.

  5. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  6. Software Smarts

    NASA Technical Reports Server (NTRS)

    1998-01-01

    Under an SBIR (Small Business Innovative Research) contract with Johnson Space Center, Knowledge Based Systems Inc. (KBSI) developed an intelligent software environment for modeling and analyzing mission planning activities, simulating behavior, and, using a unique constraint propagation mechanism, updating plans with each change in mission planning activities. KBSI developed this technology into a commercial product, PROJECTLINK, a two-way bridge between PROSIm, KBSI's process modeling and simulation software and leading project management software like Microsoft Project and Primavera's SureTrak Project Manager.

  7. Software testing

    NASA Astrophysics Data System (ADS)

    Price-Whelan, Adrian M.

    2016-01-01

    Now more than ever, scientific results are dependent on sophisticated software and analysis. Why should we trust code written by others? How do you ensure your own code produces sensible results? How do you make sure it continues to do so as you update, modify, and add functionality? Software testing is an integral part of code validation and writing tests should be a requirement for any software project. I will talk about Python-based tools that make managing and running tests much easier and explore some statistics for projects hosted on GitHub that contain tests.

  8. 76 FR 6003 - Defense Federal Acquisition Regulation Supplement; Marking of Government-Furnished Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ... administrator or other responsible Government official during a property management system analysis or audit... partial, advance, progress, or performance-based payments; (G) Intellectual property or software; or (H... 252 Defense Federal Acquisition Regulation Supplements; Marking of Government-Furnished...

  9. When management gets serious about managing software

    NASA Technical Reports Server (NTRS)

    Jansma, Patti A. 'Trisha'

    2005-01-01

    This paper describes JPL's approach to improving the management of software. It discusses the various products, services and training that were developed, describes the deployment approach used, and concludes with several 'lessons learned' about changing how software is managed, developed and acquired.

  10. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  11. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1990-01-01

    Reviewed are six computer software packages including "Lunar Greenhouse,""Dyno-Quest,""How Weather Works,""Animal Trackers,""Personal Science Laboratory," and "The Skeletal and Muscular Systems." Availability, functional, and hardware requirements are discussed. (CW)

  12. Software Reviews.

    ERIC Educational Resources Information Center

    McGrath, Diane

    1990-01-01

    Reviews two programs: (1) "The Weather Machine" on understanding weather and weather forecasting and (2) "The Mystery of the Hotel Victoria" on problem solving in mathematics. Presents the descriptions, advantages, and weaknesses of the software. (YP)

  13. Software Reviews.

    ERIC Educational Resources Information Center

    Davis, Shelly J., Ed.; Knaupp, Jon, Ed.

    1984-01-01

    Reviewed is computer software on: (1) classification of living things, a tutorial program for grades 5-10; and (2) polynomial practice using tiles, a drill-and-practice program for algebra students. (MNS)

  14. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1987-01-01

    Provides a review of four science software programs. Includes topics such as plate tectonics, laboratory experiment simulations, the human body, and light and temperature. Contains information on ordering and reviewers' comments. (ML)

  15. Software Reviews.

    ERIC Educational Resources Information Center

    Dwyer, Donna; And Others

    1989-01-01

    Reviewed are seven software packages for Apple and IBM computers. Included are: "Toxicology"; "Science Corner: Space Probe"; "Alcohol and Pregnancy"; "Science Tool Kit Plus"; Computer Investigations: Plant Growth"; "Climatrolls"; and "Animal Watch: Whales." (CW)

  16. Software Reviews.

    ERIC Educational Resources Information Center

    Kimball, Jeffrey P.; And Others

    1987-01-01

    Describes a variety of computer software. The packages reviewed include a variety of simulations, a spread sheet, a printer driver and an alternative operating system for DBM.PCs and compatible programs. (BSR)

  17. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Eugene T., Ed.

    1988-01-01

    Presents reviews by classroom teachers of software for teaching science. Includes material on the work of geologists, genetics, earth science, classification of living things, astronomy, endangered species, skeleton, drugs, and heartbeat. Provides information on availability and equipment needed. (RT)

  18. Software Reviews.

    ERIC Educational Resources Information Center

    Classroom Computer Learning, 1990

    1990-01-01

    Reviewed are three computer software packages including "Martin Luther King, Jr.: Instant Replay of History,""Weeds to Trees," and "The New Print Shop, School Edition." Discussed are hardware requirements, costs, grade levels, availability, emphasis, strengths, and weaknesses. (CW)

  19. Software Reviews.

    ERIC Educational Resources Information Center

    Mathematics and Computer Education, 1988

    1988-01-01

    Presents reviews of six software packages. Includes (1) "Plain Vanilla Statistics"; (2) "MathCAD 2.0"; (3) "GrFx"; (4) "Trigonometry"; (5) "Algebra II"; (6) "Algebra Drill and Practice I, II, and III." (PK)

  20. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    ERIC Educational Resources Information Center

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  1. Synthetic plant defense elicitors

    PubMed Central

    Bektas, Yasemin; Eulgem, Thomas

    2015-01-01

    To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug-like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection. PMID:25674095

  2. Nanomaterials for Defense Applications

    NASA Astrophysics Data System (ADS)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  3. Survey of Software Assurance Techniques for Highly Reliable Systems

    NASA Technical Reports Server (NTRS)

    Nelson, Stacy

    2004-01-01

    This document provides a survey of software assurance techniques for highly reliable systems including a discussion of relevant safety standards for various industries in the United States and Europe, as well as examples of methods used during software development projects. It contains one section for each industry surveyed: Aerospace, Defense, Nuclear Power, Medical Devices and Transportation. Each section provides an overview of applicable standards and examples of a mission or software development project, software assurance techniques used and reliability achieved.

  4. Software engineering

    NASA Technical Reports Server (NTRS)

    Fridge, Ernest M., III; Hiott, Jim; Golej, Jim; Plumb, Allan

    1993-01-01

    Today's software systems generally use obsolete technology, are not integrated properly with other software systems, and are difficult and costly to maintain. The discipline of reverse engineering is becoming prominent as organizations try to move their systems up to more modern and maintainable technology in a cost effective manner. The Johnson Space Center (JSC) created a significant set of tools to develop and maintain FORTRAN and C code during development of the space shuttle. This tool set forms the basis for an integrated environment to reengineer existing code into modern software engineering structures which are then easier and less costly to maintain and which allow a fairly straightforward translation into other target languages. The environment will support these structures and practices even in areas where the language definition and compilers do not enforce good software engineering. The knowledge and data captured using the reverse engineering tools is passed to standard forward engineering tools to redesign or perform major upgrades to software systems in a much more cost effective manner than using older technologies. The latest release of the environment was in Feb. 1992.

  5. Software reengineering

    NASA Technical Reports Server (NTRS)

    Fridge, Ernest M., III

    1991-01-01

    Today's software systems generally use obsolete technology, are not integrated properly with other software systems, and are difficult and costly to maintain. The discipline of reverse engineering is becoming prominent as organizations try to move their systems up to more modern and maintainable technology in a cost effective manner. JSC created a significant set of tools to develop and maintain FORTRAN and C code during development of the Space Shuttle. This tool set forms the basis for an integrated environment to re-engineer existing code into modern software engineering structures which are then easier and less costly to maintain and which allow a fairly straightforward translation into other target languages. The environment will support these structures and practices even in areas where the language definition and compilers do not enforce good software engineering. The knowledge and data captured using the reverse engineering tools is passed to standard forward engineering tools to redesign or perform major upgrades to software systems in a much more cost effective manner than using older technologies. A beta vision of the environment was released in Mar. 1991. The commercial potential for such re-engineering tools is very great. CASE TRENDS magazine reported it to be the primary concern of over four hundred of the top MIS executives.

  6. CSAM Metrology Software Tool

    NASA Technical Reports Server (NTRS)

    Vu, Duc; Sandor, Michael; Agarwal, Shri

    2005-01-01

    CSAM Metrology Software Tool (CMeST) is a computer program for analysis of false-color CSAM images of plastic-encapsulated microcircuits. (CSAM signifies C-mode scanning acoustic microscopy.) The colors in the images indicate areas of delamination within the plastic packages. Heretofore, the images have been interpreted by human examiners. Hence, interpretations have not been entirely consistent and objective. CMeST processes the color information in image-data files to detect areas of delamination without incurring inconsistencies of subjective judgement. CMeST can be used to create a database of baseline images of packages acquired at given times for comparison with images of the same packages acquired at later times. Any area within an image can be selected for analysis, which can include examination of different delamination types by location. CMeST can also be used to perform statistical analyses of image data. Results of analyses are available in a spreadsheet format for further processing. The results can be exported to any data-base-processing software.

  7. Repository-based software engineering program

    NASA Technical Reports Server (NTRS)

    Wilson, James

    1992-01-01

    The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.

  8. Control Software

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Real-Time Innovations, Inc. (RTI) collaborated with Ames Research Center, the Jet Propulsion Laboratory and Stanford University to leverage NASA research to produce ControlShell software. RTI is the first "graduate" of Ames Research Center's Technology Commercialization Center. The ControlShell system was used extensively on a cooperative project to enhance the capabilities of a Russian-built Marsokhod rover being evaluated for eventual flight to Mars. RTI's ControlShell is complex, real-time command and control software, capable of processing information and controlling mechanical devices. One ControlShell tool is StethoScope. As a real-time data collection and display tool, StethoScope allows a user to see how a program is running without changing its execution. RTI has successfully applied its software savvy in other arenas, such as telecommunications, networking, video editing, semiconductor manufacturing, automobile systems, and medical imaging.

  9. Light regulation of plant defense.

    PubMed

    Ballaré, Carlos L

    2014-01-01

    Precise allocation of limited resources between growth and defense is critical for plant survival. In shade-intolerant species, perception of competition signals by informational photoreceptors activates shade-avoidance responses and reduces the expression of defenses against pathogens and insects. The main mechanism underlying defense suppression is the simultaneous downregulation of jasmonate and salicylic acid signaling by low ratios of red:far-red radiation. Inactivation of phytochrome B by low red:far-red ratios appears to suppress jasmonate responses by altering the balance between DELLA and JASMONATE ZIM DOMAIN (JAZ) proteins in favor of the latter. Solar UVB radiation is a positive modulator of plant defense, signaling through jasmonate-dependent and jasmonate-independent pathways. Light, perceived by phytochrome B and presumably other photoreceptors, helps plants concentrate their defensive arsenals in photosynthetically valuable leaves. The discovery of connections between photoreceptors and defense signaling is revealing novel mechanisms that control key resource allocation decisions in plant canopies. PMID:24471835

  10. Software Reviews.

    ERIC Educational Resources Information Center

    Classroom Computer Learning, 1990

    1990-01-01

    Reviewed are two computer software packages: "Super Solvers Midnight Rescue!" a problem-solving program for IBM PCs; and "Interactive Physics," a simulation program for the Macintosh computer. The functions of the package are discussed including strengths and weaknesses and teaching suggestions. (CW)

  11. Reviews, Software.

    ERIC Educational Resources Information Center

    Science Teacher, 1988

    1988-01-01

    Reviews two software programs for Apple series computers. Includes "Orbital Mech," a basic planetary orbital simulation for the Macintosh, and "START: Stimulus and Response Tools for Experiments in Memory, Learning, Cognition, and Perception," a program that demonstrates basic psychological principles and experiments. (CW)

  12. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1989-01-01

    Six software packages are described in this review. Included are "Molecules and Atoms: Exploring the Essence of Matter"; "Heart Probe"; "GM Sunraycer"; "Six Puzzles"; "Information Laboratory--Life Science"; and "Science Test Builder." Hardware requirements, prices, and a summary of the abilities of each program are presented. (CW)

  13. Educational Software.

    ERIC Educational Resources Information Center

    Northwest Regional Educational Lab., Portland, OR.

    The third session of IT@EDU98 consisted of five papers on educational software and was chaired by Tran Van Hao (University of Education, Ho Chi Minh City, Vietnam). "Courseware Engineering" (Nguyen Thanh Son, Ngo Ngoc Bao Tran, Quan Thanh Tho, Nguyen Hong Lam) briefly describes the use of courseware. "Machine Discovery Theorems in Geometry: A…

  14. Software Reviews.

    ERIC Educational Resources Information Center

    Computing Teacher, 1985

    1985-01-01

    Reprinted from "The Computing Teacher," this document contains software reviews for 23 computer programs that educators could use in the classroom or for administrative purposes. Each review describes the program by listing the program title, subject, producer, grade level (if applicable), hardware required, cost, and reviewer's name and…

  15. Software Reviews.

    ERIC Educational Resources Information Center

    Bitter, Gary G., Ed.

    1989-01-01

    Reviews three software packages: (1) "The Weather Machine Courseware Kit" for grades 7-12; (2) "Exploring Measurement, Time, and Money--Level I," for primary level mathematics; and (3) "Professor DOS with SmartGuide for DOS" providing an extensive tutorial covering DOS 2.1 to 4.0. Discusses the strengths and weaknesses of each package. (YP)

  16. Software Reviews.

    ERIC Educational Resources Information Center

    Smith, Richard L., Ed.

    1987-01-01

    Reviewed are three computer software programs: the Astronomer (astronomy program for middle school students and older); Hands-on-Statistics: Explorations with a Microcomputer (statistics program for secondary school students and older); and CATGEN (a genetics program for secondary school students and older). Each review provides information on:…

  17. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1990

    1990-01-01

    Reviewed are seven computer software packages for IBM and/or Apple Computers. Included are "Windows on Science: Volume 1--Physical Science"; "Science Probe--Physical Science"; "Wildlife Adventures--Grizzly Bears"; "Science Skills--Development Programs"; "The Clean Machine"; "Rock Doctor"; and "Geology Search." Cost, quality, hardware, and…

  18. Software Review.

    ERIC Educational Resources Information Center

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed is a computer software package entitled "Audubon Wildlife Adventures: Grizzly Bears" for Apple II and IBM microcomputers. Included are availability, hardware requirements, cost, and a description of the program. The murder-mystery flavor of the program is stressed in this program that focuses on illegal hunting and game management. (CW)

  19. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1989-01-01

    Presents comments by classroom teachers on software for science teaching including topics on: the size of a molecule, matter, leaves, vitamins and minerals, dinosaurs, and collecting and measuring data. Each is an Apple computer series. Availability and costs are included. (RT)

  20. Software Comparison

    NASA Technical Reports Server (NTRS)

    Blanchard, D. C.

    1986-01-01

    Software Comparison Package (SCP) compares similar files. Normally, these are 90-character files produced by CDC UPDATE utility from program libraries that contain FORTRAN source code plus identifier. SCP also used to compare load maps, cross-reference outputs, and UPDATE corrections sets. Helps wherever line-by-line comparison of similarly structured files required.

  1. Software Patents.

    ERIC Educational Resources Information Center

    Burke, Edmund B.

    1994-01-01

    Outlines basic patent law information that pertains to computer software programs. Topics addressed include protection in other countries; how to obtain patents; kinds of patents; duration; classes of patentable subject matter, including machines and processes; patentability searches; experimental use prior to obtaining a patent; and patent…

  2. Software reengineering

    NASA Technical Reports Server (NTRS)

    Fridge, Ernest M., III

    1991-01-01

    Programs in use today generally have all of the function and information processing capabilities required to do their specified job. However, older programs usually use obsolete technology, are not integrated properly with other programs, and are difficult to maintain. Reengineering is becoming a prominent discipline as organizations try to move their systems to more modern and maintainable technologies. The Johnson Space Center (JSC) Software Technology Branch (STB) is researching and developing a system to support reengineering older FORTRAN programs into more maintainable forms that can also be more readily translated to a modern languages such as FORTRAN 8x, Ada, or C. This activity has led to the development of maintenance strategies for design recovery and reengineering. These strategies include a set of standards, methodologies, and the concepts for a software environment to support design recovery and reengineering. A brief description of the problem being addressed and the approach that is being taken by the STB toward providing an economic solution to the problem is provided. A statement of the maintenance problems, the benefits and drawbacks of three alternative solutions, and a brief history of the STB experience in software reengineering are followed by the STB new FORTRAN standards, methodology, and the concepts for a software environment.

  3. Software Reviews.

    ERIC Educational Resources Information Center

    Smith, Richard L., Ed.

    1988-01-01

    Reviews two software packages, "Solutions Unlimited" and "BASIC Data Base System." Provides a description, summary, strengths and weaknesses, availability and costs. Includes reviews of three structured BASIC packages: "True BASIC (2.0)"; "Turbo BASIC (1.0)"; and "QuickBASIC (3.0)." Explains significant features such as graphics, costs,…

  4. Design Software

    NASA Technical Reports Server (NTRS)

    1991-01-01

    A NASA contractor and Small Business Innovation Research (SBIR) participant has converted its research into commercial software products for auto design, structural analysis and other applications. ViGYAN, Inc., utilizing the aeronautical research principle of computational fluid dynamics, has created - with VGRID3D and VPLOT3D - an easier alternative to conventional structured grids for fluid dynamic calculations.

  5. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1988

    1988-01-01

    Reviews six software packages for use with school age children ranging from grade 3 to grade 12. Includes "The Microcomputer Based Lab Project: Motion, Sound"; "Genetics"; "Geologic History"; "The Microscope Simulator"; and "Wiz Works" all for Apple II and "Reading for Information: Level II" for IBM. (CW)

  6. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1989

    1989-01-01

    Reviews of seven software packages are presented including "The Environment I: Habitats and EcoSystems; II Cycles and Interactions"; "Super Sign Maker"; "The Great Knowledge Race: Substance Abuse"; "Exploring Science: Temperature"; "Fast Food Calculator and RD Aide"; "The Human Body: Circulation and Respiration" and "Forces in Liquids and Gases."…

  7. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1990-01-01

    Reviewed are seven computer software packages including "Frog Dissection Lab Report,""Backyard Birds,""LEGO TC Logo,""Alcohol--Four Interactive Programs,""Windows on Science--Life Science,""Climate and Weather/Our Town Database," and "Weeds to Trees." Discussed are availability, features, strengths, and weaknesses. (CW)

  8. Star Software.

    ERIC Educational Resources Information Center

    Kloza, Brad

    2000-01-01

    Presents a collection of computer software programs designed to spark learning enthusiasm at every grade level and across the curriculum. They include Reader Rabbit's Learn to Read, Spelling Power, Mind Twister Math, Community Construction Kit, Breaking the Code, Encarta Africana 2000, Virtual Serengeti, Operation: Frog (Deluxe), and My First…

  9. Software Reviews.

    ERIC Educational Resources Information Center

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed are two computer software programs for Apple II computers on weather for upper elementary and middle school grades. "Weather" introduces the major factors (temperature, humidity, wind, and air pressure) affecting weather. "How Weather Works" uses simulation and auto-tutorial formats on sun, wind, fronts, clouds, and storms. (YP)

  10. Statistical Software.

    ERIC Educational Resources Information Center

    Callamaras, Peter

    1983-01-01

    This buyer's guide to seven major types of statistics software packages for microcomputers reviews Edu-Ware Statistics 3.0; Financial Planning; Speed Stat; Statistics with DAISY; Human Systems Dynamics package of Stats Plus, ANOVA II, and REGRESS II; Maxistat; and Moore-Barnes' MBC Test Construction and MBC Correlation. (MBR)

  11. Software Reviews.

    ERIC Educational Resources Information Center

    Teles, Elizabeth, Ed.; And Others

    1990-01-01

    Reviewed are two computer software packages for Macintosh microcomputers including "Phase Portraits," an exploratory graphics tool for studying first-order planar systems; and "MacMath," a set of programs for exploring differential equations, linear algebra, and other mathematical topics. Features, ease of use, cost, availability, and hardware…

  12. Reviews: Software.

    ERIC Educational Resources Information Center

    Mackenzie, Norma N.; And Others

    1988-01-01

    Reviews four computer software packages including: "The Physical Science Series: Sound" which demonstrates making waves, speed of sound, doppler effect, and human hearing; "Andromeda" depicting celestial motions in any direction; "Biology Quiz: Humans" covering chemistry, cells, viruses, and human biology; and "MacStronomy" covering information on…

  13. Software Reviews.

    ERIC Educational Resources Information Center

    Mackenzie, Norma N.; And Others

    1988-01-01

    Describes computer software for use with various age groups. Topics include activities involving temperature, simulations, earth science, the circulatory system, human body, reading in science, and ecology. Provides information on equipment needed, availability, package contents, and price. Comments of reviews are presented by classroom teachers.…

  14. Writing software for the clinic.

    PubMed

    Rosen, I I

    1998-03-01

    Medical physicists often write computer programs to support scientific, educational, and clinical endeavors. Errors in scientific and educational software can waste time and effort by producing meaningless results, but errors in clinical software can contribute to patient injuries. Although the ultimate goal of error-free software is impossible to achieve except in very small programs, there are many good design, implementation, and testing practices that can be used by small development groups to significantly reduce errors, improve quality, and reduce maintenance. The software development process should include four basic steps: specifications, design, implementation, and testing. A specifications document defining what the software is intended to do is valuable for clearly delimiting the scope of the project and providing a benchmark for evaluating the final product. Keep the software design simple and straightforward. Document assumptions, and check them. Emphasize maintainability, portability, and reliability rather than speed. Use layers to isolate the application from hardware and the operating system. Plan for upgrades. Expect the software to be used in unplanned ways. Whenever possible, be generous with RAM and disk storage; hardware is cheaper than development and maintenance. During implementation, use well-known algorithms whenever possible. Use prototypes to try out ideas. Use generic modules, version numbering, unique file names, defensive programming, and operating system and language/compiler defaults. Avoid binary data files and clever tricks. Remember that real numbers are not exact in a computer. Get it right before making it faster. Document the software extensively. Test continuously during development; the later a problem is found, the more it costs to fix. Use a written procedure to test the final product exactly as a typical user would run it. Allow no changes after clinical release. Expect to spend at least an additional 50% of the initial

  15. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  16. Antipredator defenses predict diversification rates.

    PubMed

    Arbuckle, Kevin; Speed, Michael P

    2015-11-01

    The "escape-and-radiate" hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  17. Acquired Equivalence Changes Stimulus Representations

    ERIC Educational Resources Information Center

    Meeter, M.; Shohamy, D.; Myers, C. E.

    2009-01-01

    Acquired equivalence is a paradigm in which generalization is increased between two superficially dissimilar stimuli (or antecedents) that have previously been associated with similar outcomes (or consequents). Several possible mechanisms have been proposed, including changes in stimulus representations, either in the form of added associations or…

  18. Software Quality Assurance for Nuclear Safety Systems

    SciTech Connect

    Sparkman, D R; Lagdon, R

    2004-05-16

    -critical software and applies the highest level of rigor for those systems. DOE has further defined a risk approach to nuclear safety system software consistent with the analyses required for operation of nuclear facilities. This requires the grading of software in terms of safety class and safety significant structures, systems and components (SSCs). Safety-class SSCs are related to public safety where as safety-significant SSCs are identified for specific aspects of defense-in-depth and worker safety. Industry standards do not directly categorize nuclear safety software and DOE sites are not consistent in their approach to nuclear safety software quality assurance. DOE is establishing a more detailed graded approach for software associated with safety class and safety significant systems. This paper presents the process and results that DOE utilized to develop a detailed classification scheme for nuclear safety software.

  19. Self-Defense for Teens

    ERIC Educational Resources Information Center

    Givler, Jill I.

    2005-01-01

    Resources for self-defense training programs have become more popular and available over the last few years. Introducing a self-defense unit as part of a school physical education program is a wonderful way to address a number of psychosocial issues that prevail among teenagers today. The physical skills learned in this type of program allow…

  20. Space Station Software Issues

    NASA Technical Reports Server (NTRS)

    Voigt, S. (Editor); Beskenis, S. (Editor)

    1985-01-01

    Issues in the development of software for the Space Station are discussed. Software acquisition and management, software development environment, standards, information system support for software developers, and a future software advisory board are addressed.

  1. [Defensive Medicine: Defensive Medicine: Overview of the literature].

    PubMed

    Panella, Massimiliano; Leigheb, Fabrizio; Rinaldi, Carmela; Donnarumma, Chiara; Tozzi, Quinto; Di Stanislao, Francesco

    2015-01-01

    A literature review was performed on the subject of defensive medicine, in order to gather information and evidence for identifying a shared definition of this phenomenon, identify its causes, quantify its frequency and its economic impact.Results show that defensive medicine is primarily the result of medical professionals adapting to the pressure of litigation risks, and whose behaviour is motivated by fear of malpractice claims rather than by the patient's health. Defensive medicine seems to have become a diffuse phenomenon, afflicting all diagnostic-therapeutic areas and some disciplines to a greater degree, and leading to a large waste of human, organizational and economic resources. PMID:26241515

  2. Acquired causes of intestinal malabsorption.

    PubMed

    van der Heide, F

    2016-04-01

    This review focuses on the acquired causes, diagnosis, and treatment of intestinal malabsorption. Intestinal absorption is a complex process that depends on many variables, including the digestion of nutrients within the intestinal lumen, the absorptive surface of the small intestine, the membrane transport systems, and the epithelial absorptive enzymes. Acquired causes of malabsorption are classified by focussing on the three phases of digestion and absorption: 1) luminal/digestive phase, 2) mucosal/absorptive phase, and 3) transport phase. Most acquired diseases affect the luminal/digestive phase. These include short bowel syndrome, extensive small bowel inflammation, motility disorders, and deficiencies of digestive enzymes or bile salts. Diagnosis depends on symptoms, physical examination, and blood and stool tests. There is no gold standard for the diagnosis of malabsorption. Further testing should be based on the specific clinical context and the suspected underlying disease. Therapy is directed at nutritional support by enteral or parenteral feeding and screening for and supplementation of deficiencies in vitamins and minerals. Early enteral feeding is important for intestinal adaptation in short bowel syndrome. Medicinal treatment options for diarrhoea in malabsorption include loperamide, codeine, cholestyramine, or antibiotics. PMID:27086886

  3. Directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka

    2013-09-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. Numerous risk mitigation strategies have been described, most involving dedicated missions to a threatening object. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR for Directed Energy System for Targeting of Asteroids and exploRation. DE-STAR is a modular phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, test, and initial deployment, lowering cost, minimizing risk, and allowing for technological co-development, leading eventually to an orbiting structure that would be developed in stages with both technological and target milestones. The main objective of DE-STAR is to use the focused directed energy to raise the surface spot temperature to ~3,000K, allowing direct vaporization of all known substances. In the process of heating the surface ejecting evaporated material a large reaction force would alter the asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1-10km array) depending on the degree of protection desired. A DE-STAR 4 allows for asteroid engagement starting beyond 1AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in one year. Small asteroids and comets can be diverted/evaporated with a DESTAR 2 (100m) while space debris is vaporized with a DE-STAR 1 (10m).

  4. Epigenetic Control of Defense Signaling and Priming in Plants

    PubMed Central

    Espinas, Nino A.; Saze, Hidetoshi; Saijo, Yusuke

    2016-01-01

    Immune recognition of pathogen-associated molecular patterns or effectors leads to defense activation at the pathogen challenged sites. This is followed by systemic defense activation at distant non-challenged sites, termed systemic acquired resistance (SAR). These inducible defenses are accompanied by extensive transcriptional reprogramming of defense-related genes. SAR is associated with priming, in which a subset of these genes is kept at a poised state to facilitate subsequent transcriptional regulation. Transgenerational inheritance of defense-related priming in plants indicates the stability of such primed states. Recent studies have revealed the importance and dynamic engagement of epigenetic mechanisms, such as DNA methylation and histone modifications that are closely linked to chromatin reconfiguration, in plant adaptation to different biotic stresses. Herein we review current knowledge regarding the biological significance and underlying mechanisms of epigenetic control for immune responses in plants. We also argue for the importance of host transposable elements as critical regulators of interactions in the evolutionary “arms race” between plants and pathogens. PMID:27563304

  5. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier

    PubMed Central

    Ishikawa, Yuki; Aonuma, Hitoshi; Sasaki, Ken; Miura, Toru

    2016-01-01

    In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA) and tyramine (TA), as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG) and the OA level in brain were increased in soldiers than in pseudergates (worker caste). Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes. PMID:27196303

  6. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier.

    PubMed

    Ishikawa, Yuki; Aonuma, Hitoshi; Sasaki, Ken; Miura, Toru

    2016-01-01

    In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA) and tyramine (TA), as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG) and the OA level in brain were increased in soldiers than in pseudergates (worker caste). Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes. PMID:27196303

  7. Influence of infection of cotton by Rotylenchulus Reniformis and Meloidogyne Incognita on the production of enzymes involved in systemic acquired resistance.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Systemic acquired resistance (SAR), which results in enhanced defense mechanisms in plants, can be elicited by virulent and avirulent strains of pathogens including nematodes. Recent studies of nematode reproduction strongly suggest that Meloidogyne incognita and Rotylenchulus reniformis induce SAR ...

  8. Analysis Software

    NASA Technical Reports Server (NTRS)

    1994-01-01

    General Purpose Boundary Element Solution Technology (GPBEST) software employs the boundary element method of mechanical engineering analysis, as opposed to finite element. It is, according to one of its developers, 10 times faster in data preparation and more accurate than other methods. Its use results in less expensive products because the time between design and manufacturing is shortened. A commercial derivative of a NASA-developed computer code, it is marketed by Best Corporation to solve problems in stress analysis, heat transfer, fluid analysis and yielding and cracking of solids. Other applications include designing tractor and auto parts, household appliances and acoustic analysis.

  9. Seminar Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The Society for Computer Simulation International is a professional technical society that distributes information on methodology techniques and uses of computer simulation. The society uses NETS, a NASA-developed program, to assist seminar participants in learning to use neural networks for computer simulation. NETS is a software system modeled after the human brain; it is designed to help scientists exploring artificial intelligence to solve pattern matching problems. Examples from NETS are presented to seminar participants, who can then manipulate, alter or enhance them for their own applications.

  10. Simulation Software

    NASA Technical Reports Server (NTRS)

    1996-01-01

    Various NASA Small Business Innovation Research grants from Marshall Space Flight Center, Langley Research Center and Ames Research Center were used to develop the 'kernel' of COMCO's modeling and simulation software, the PHLEX finite element code. NASA needed it to model designs of flight vehicles; one of many customized commercial applications is UNISIM, a PHLEX-based code for analyzing underground flows in oil reservoirs for Texaco, Inc. COMCO's products simulate a computational mechanics problem, estimate the solution's error and produce the optimal hp-adapted mesh for the accuracy the user chooses. The system is also used as a research or training tool in universities and in mechanical design in industrial corporations.

  11. Software Surrogate

    NASA Technical Reports Server (NTRS)

    1999-01-01

    In 1994, Blackboard Technology received a NASA Phase I SBIR award entitled "A Blackboard-Based Framework for Mixed-Initiative, Crewed- Space-System Applications." This research continued in Phase II at JSC, where a generic architecture was developed in which a software surrogate serves as the operator's representative in the fast-paced realm of nearly autonomous, intelligent systems. This SBIR research effort addressed the need to support human-operator monitoring and intervention with intelligent systems such as those being developed for NASA's crewed space program.

  12. Software system safety

    NASA Technical Reports Server (NTRS)

    Uber, James G.

    1988-01-01

    Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of software safety are not yet available. Some past software failures, future NASA software trends, software engineering methods, and tools and techniques for various software safety analyses are reviewed. Recommendations to NASA are made based on this review.

  13. Experimental research control software system

    NASA Astrophysics Data System (ADS)

    Cohn, I. A.; Kovalenko, A. G.; Vystavkin, A. N.

    2014-05-01

    A software system, intended for automation of a small scale research, has been developed. The software allows one to control equipment, acquire and process data by means of simple scripts. The main purpose of that development is to increase experiment automation easiness, thus significantly reducing experimental setup automation efforts. In particular, minimal programming skills are required and supervisors have no reviewing troubles. Interactions between scripts and equipment are managed automatically, thus allowing to run multiple scripts simultaneously. Unlike well-known data acquisition commercial software systems, the control is performed by an imperative scripting language. This approach eases complex control and data acquisition algorithms implementation. A modular interface library performs interaction with external interfaces. While most widely used interfaces are already implemented, a simple framework is developed for fast implementations of new software and hardware interfaces. While the software is in continuous development with new features being implemented, it is already used in our laboratory for automation of a helium-3 cryostat control and data acquisition. The software is open source and distributed under Gnu Public License.

  14. Quantification of moving target cyber defenses

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Cybenko, George

    2015-05-01

    Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential "game-changers" in an effort to increase the attacker's workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.

  15. Defenseive Structuring and Environmental Stress

    ERIC Educational Resources Information Center

    Siegel, Bernard J.

    1970-01-01

    This essay explores a kind of adaptation, referred to as defenseive structuring, that recurs with great regularity among groups that perceive themselves as exposed to environmental stress of long duration with which they cannot cope directly and aggressively." (Author)

  16. DEFENSE MEDICAL SURVEILLANCE SYSTEM (DMSS)

    EPA Science Inventory

    AMSA operates the Defense Medical Surveillance System (DMSS), an executive information system whose database contains up-to-date and historical data on diseases and medical events (e.g., hospitalizations, ambulatory visits, reportable diseases, HIV tests, acute respiratory diseas...

  17. Safety. [requirements for software to monitor and control critical processes

    NASA Technical Reports Server (NTRS)

    Leveson, Nancy G.

    1991-01-01

    Software requirements, design, implementation, verification and validation, and especially management are affected by the need to produce safe software. This paper discusses the changes in the software life cycle that are necessary to ensure that software will execute without resulting in unacceptable risk. Software is being used increasingly to monitor and control safety-critical processes in which a run-time failure or error could result in unacceptable losses such as death, injury, loss of property, or environmental harm. Examples of such processes maybe found in transportation, energy, aerospace, basic industry, medicine, and defense systems.

  18. Strategic defense initiative: critical issues

    SciTech Connect

    Nuckolls, J.H.

    1985-06-01

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to the defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)

  19. Perioperatively acquired disorders of coagulation

    PubMed Central

    Grottke, Oliver; Fries, Dietmar; Nascimento, Bartolomeu

    2015-01-01

    Purpose of review To provide an overview of acquired coagulopathies that can occur in various perioperative clinical settings. Also described are coagulation disturbances linked to antithrombotic medications and currently available strategies to reverse their antithrombotic effects in situations of severe hemorrhage. Recent findings Recent studies highlight the link between low fibrinogen and decreased fibrin polymerization in the development of acquired coagulopathy. Particularly, fibrin(ogen) deficits are observable after cardiopulmonary bypass in cardiac surgery, on arrival at the emergency room in trauma patients, and with ongoing bleeding after child birth. Regarding antithrombotic therapy, although new oral anticoagulants offer the possibility of efficacy and relative safety compared with vitamin K antagonists, reversal of their anticoagulant effect with nonspecific agents, including prothrombin complex concentrate, has provided conflicting results. Specific antidotes, currently being developed, are not yet licensed for clinical use, but initial results are promising. Summary Targeted hemostatic therapy aims to correct coagulopathies in specific clinical settings, and reduce the need for allogeneic transfusions, thus preventing massive transfusion and its deleterious outcomes. Although there are specific guidelines for reversing anticoagulation in patients treated with antiplatelet agents or warfarin, there is currently little evidence to advocate comprehensive recommendations to treat drug-induced coagulopathy associated with new oral anticoagulants. PMID:25734869

  20. Foodborne listeriosis acquired in hospitals.

    PubMed

    Silk, Benjamin J; McCoy, Morgan H; Iwamoto, Martha; Griffin, Patricia M

    2014-08-15

    Listeriosis is characterized by bacteremia or meningitis. We searched for listeriosis case series and outbreak investigations published in English by 2013, and assessed the strength of evidence for foodborne acquisition among patients who ate hospital food. We identified 30 reports from 13 countries. Among the case series, the median proportion of cases considered to be hospital-acquired was 25% (range, 9%-67%). The median number of outbreak-related illnesses considered to be hospital-acquired was 4.0 (range, 2-16). All patients were immunosuppressed in 18 of 24 (75%) reports with available data. Eight outbreak reports with strong evidence for foodborne acquisition in a hospital implicated sandwiches (3 reports), butter, precut celery, Camembert cheese, sausage, and tuna salad (1 report each). Foodborne acquisition of listeriosis among hospitalized patients is well documented internationally. The number of listeriosis cases could be reduced substantially by establishing hospital policies for safe food preparation for immunocompromised patients and by not serving them higher-risk foods. PMID:24846635

  1. Organ-specific regulation of growth-defense tradeoffs by plants.

    PubMed

    Smakowska, Elwira; Kong, Jixiang; Busch, Wolfgang; Belkhadir, Youssef

    2016-02-01

    Plants grow while also defending themselves against phylogenetically unrelated pathogens. Because defense and growth are both costly programs, a plant's success in colonizing resource-scarce environments requires tradeoffs between the two. Here, we summarize efforts aimed at understanding how plants use iterative tradeoffs to modulate differential organ growth when defenses are elicited. First, we focus on shoots to illustrate how light, in conjunction with the growth hormone gibberellin (GA) and the defense hormone jasmonic acid (JA), act to finely regulate defense and growth programs in this organ. Second, we expand on the regulation of growth-defense trade-offs in the root, a less well-studied topic despite the critical role of this organ in acquiring resources in an environment deeply entrenched with disparate populations of microbes. PMID:26802804

  2. Maintaining the Health of Software Monitors

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Rungta, Neha

    2013-01-01

    Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors use information from the specification and implementation of the monitored software to detect violations, predict possible failures, and help the system recover from faults. Changes to the monitored software, such as adding new functionality or fixing defects, therefore, have the potential to impact the correctness of both the monitored software and the SWHM monitor. In this work, we describe how the results of a software change impact analysis technique, Directed Incremental Symbolic Execution (DiSE), can be applied to monitored software to identify the potential impact of the changes on the SWHM monitor software. The results of DiSE can then be used by other analysis techniques, e.g., testing, debugging, to help preserve and improve the integrity of the SWHM monitor as the monitored software evolves.

  3. Sandia software guidelines: Software quality planning

    SciTech Connect

    Not Available

    1987-08-01

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standard for Software Quality Assurance Plans, this volume identifies procedures to follow in producing a Software Quality Assurance Plan for an organization or a project, and provides an example project SQA plan. 2 figs., 4 tabs.

  4. Office Computer Software: A Comprehensive Review of Software Programs.

    ERIC Educational Resources Information Center

    Secretary, 1992

    1992-01-01

    Describes types of software including system software, application software, spreadsheets, accounting software, graphics packages, desktop publishing software, database, desktop and personal information management software, project and records management software, groupware, and shareware. (JOW)

  5. Acquired immunodeficiency syndrome: neuroradiologic findings.

    PubMed

    Kelly, W M; Brant-Zawadzki, M

    1983-11-01

    Central nervous system complications depicted by CT in ten patients with acquired immunodeficiency syndrome are described. Three patients had multifocal intra-axial enhancing lesions representing atypical brain abscesses (two with toxoplasmosis, one with candidiasis). A fourth patient with multifocal "ring" lesions whose biopsy was interpreted as suggestive of toxoplasmosis responded poorly to treatment. Following his death three months later of Pneumocystis carinii pneumonia, autopsy revealed primary intracerebral immunoblastic lymphoma. One patient had Kaposi sarcoma involving the right frontal lobe (seen as an enhancing mass on the CT scan). CT findings in the remaining five patients revealed mild to moderate enlargement of cerebrospinal fluid spaces (including ventricles and basal cisternae) as a result of cryptococcal meningitis in three patients and "aseptic" meningitis in two. The two patients in whom early biopsy confirmed toxoplasmosis responded well to anti-infective therapy, resulting in dramatic clinical recoveries. PMID:6622693

  6. Bejel: acquirable only in childhood?

    PubMed

    Rothschild, Bruce M; Rothschild, Christine; Naples, Virginia; Billard, Michel; Panero, Barbara

    2006-10-01

    Bejel clearly has a long history in the Middle East and the Sudan, but was it transmitted to Europe? As the major manifestation of bejel is presence of periosteal reaction in 20-40% of afflicted populations, absence of significant population frequency of periosteal reaction in Europe would exclude that diagnosis. Examination of skeletal populations from continental Europe revealed no significant periosteal reaction at the time of and immediately subsequent to the Crusades. Thus, there is no evidence for bejel in Europe, in spite of clear contact (the mechanism of bejel transmission in children) between warring groups, at least during the Crusades. This supports the hypothesis that bejel is a childhood-acquired disease and apparently cannot be contracted in adulthood. PMID:17049474

  7. Lymphoma in acquired generalized lipodystrophy.

    PubMed

    Brown, Rebecca J; Chan, Jean L; Jaffe, Elaine S; Cochran, Elaine; DePaoli, Alex M; Gautier, Jean-Francois; Goujard, Cecile; Vigouroux, Corinne; Gorden, Phillip

    2016-01-01

    Acquired generalized lipodystrophy (AGL) is a rare disease thought to result from autoimmune destruction of adipose tissue. Peripheral T-cell lymphoma (PTCL) has been reported in two AGL patients. We report five additional cases of lymphoma in AGL, and analyze the role of underlying autoimmunity and recombinant human leptin (metreleptin) replacement in lymphoma development. Three patients developed lymphoma during metreleptin treatment (two PTCL and one ALK-positive anaplastic large cell lymphoma), and two developed lymphomas (mycosis fungoides and Burkitt lymphoma) without metreleptin. AGL is associated with high risk for lymphoma, especially PTCL. Autoimmunity likely contributes to this risk. Lymphoma developed with or without metreleptin, suggesting metreleptin does not directly cause lymphoma development; a theoretical role of metreleptin in lymphoma progression remains possible. For most patients with AGL and severe metabolic complications, the proven benefits of metreleptin on metabolic disease will likely outweigh theoretical risks of metreleptin in lymphoma development or progression. PMID:25864863

  8. Simple solution to the medical instrumentation software problem

    NASA Astrophysics Data System (ADS)

    Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.

    1995-04-01

    Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.

  9. Genetic Determinism and the Innate-Acquired Distinction in Medicine

    PubMed Central

    2009-01-01

    This article illustrates in which sense genetic determinism is still part of the contemporary interactionist consensus in medicine. Three dimensions of this consensus are discussed: kinds of causes, a continuum of traits ranging from monogenetic diseases to car accidents, and different kinds of determination due to different norms of reaction. On this basis, this article explicates in which sense the interactionist consensus presupposes the innate–acquired distinction. After a descriptive Part 1, Part 2 reviews why the innate–acquired distinction is under attack in contemporary philosophy of biology. Three arguments are then presented to provide a limited and pragmatic defense of the distinction: an epistemic, a conceptual, and a historical argument. If interpreted in a certain manner, and if the pragmatic goals of prevention and treatment (ideally specifying what medicine and health care is all about) are taken into account, then the innate–acquired distinction can be a useful epistemic tool. It can help, first, to understand that genetic determination does not mean fatalism, and, second, to maintain a system of checks and balances in the continuing nature–nurture debates. PMID:20234831

  10. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  11. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  12. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  13. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  14. Software development in Ada

    NASA Technical Reports Server (NTRS)

    Basili, V. R.; Katz, E. E.

    1985-01-01

    Ada will soon become a part of systems developed for the US Department of Defense. NASA must determine whether it will become part of its environment and particularly whether it will become a part fo the space station development. However, there are several issues about Ada which should be considered before this decision is made. One means of considering these issues is the examination of other developments in Ada. Unfortunately, few full scale developments have been completed or made publicly available for observation. Therefore, it will probably be necessary to study an Ada development in a NASA environment. Another means related to the first is the development of Ada metrics which can be used to characterize and evaluate Ada developments. These metrics need not be confined to full scale developments and could be used to evaluate on going projects as well. An early development in Ada, some observations from that development, metrics which were developed for use with Ada, and future directions for research into the use of Ada in software development in general and in the NASA Goddard environment in particular are described.

  15. Framework for Small-Scale Experiments in Software Engineering: Guidance and Control Software Project: Software Engineering Case Study

    NASA Technical Reports Server (NTRS)

    Hayhurst, Kelly J.

    1998-01-01

    Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.

  16. Midbrain circuits for defensive behaviour.

    PubMed

    Tovote, Philip; Esposito, Maria Soledad; Botta, Paolo; Chaudun, Fabrice; Fadok, Jonathan P; Markovic, Milica; Wolff, Steffen B E; Ramakrishnan, Charu; Fenno, Lief; Deisseroth, Karl; Herry, Cyril; Arber, Silvia; Lüthi, Andreas

    2016-06-01

    Survival in threatening situations depends on the selection and rapid execution of an appropriate active or passive defensive response, yet the underlying brain circuitry is not understood. Here we use circuit-based optogenetic, in vivo and in vitro electrophysiological, and neuroanatomical tracing methods to define midbrain periaqueductal grey circuits for specific defensive behaviours. We identify an inhibitory pathway from the central nucleus of the amygdala to the ventrolateral periaqueductal grey that produces freezing by disinhibition of ventrolateral periaqueductal grey excitatory outputs to pre-motor targets in the magnocellular nucleus of the medulla. In addition, we provide evidence for anatomical and functional interaction of this freezing pathway with long-range and local circuits mediating flight. Our data define the neuronal circuitry underlying the execution of freezing, an evolutionarily conserved defensive behaviour, which is expressed by many species including fish, rodents and primates. In humans, dysregulation of this 'survival circuit' has been implicated in anxiety-related disorders. PMID:27279213

  17. Inducible defenses, phenotypic variability and biotic environments.

    PubMed

    Adler, F R; Drew Harvell, C

    1990-12-01

    Defensive morphologies, chemicals and behaviors induced by cues from consumers or competitors have been described in numerous organisms. Much work has focused on the costs of defenses and the actual cues used. Here, we review recent progress in determining the effects of inducible defenses on consumers and the cues implicated in inducing defenses against consumers and competitors, thereby laying the groundwork for studying the implications of inducible defenses for the dynamics of foraging, population size and evolution. PMID:21232402

  18. Empirical Software Evaluation: A Practical Alternative.

    ERIC Educational Resources Information Center

    Hedbring, Charles

    1987-01-01

    The article presents a software evaluation checklist developed by a teaching-research laboratory for severely handicapped students in New York City. In an introductory section, the use of laptop microcomputers in helping handicapped learners acquire, maintain, and generalize functional skills is described as the fifth ingredient of an integrated…

  19. Flexible resource allocation during plant defense responses

    PubMed Central

    Schultz, Jack C.; Appel, Heidi M.; Ferrieri, Abigail P.; Arnold, Thomas M.

    2013-01-01

    Plants are organisms composed of modules connected by xylem and phloem transport streams. Attack by both insects and pathogens elicits sometimes rapid defense responses in the attacked module. We have also known for some time that proteins are often reallocated away from pathogen-infected tissues, while the same infection sites may draw carbohydrates to them. This has been interpreted as a tug of war in which the plant withdraws critical resources to block microbial growth while the microbes attempt to acquire more resources. Sink-source regulated transport among modules of critical resources, particularly carbon and nitrogen, is also altered in response to attack. Insects and jasmonate can increase local sink strength, drawing carbohydrates that support defense production. Shortly after attack, carbohydrates may also be drawn to the root. The rate and direction of movement of photosynthate or signals in phloem in response to attack is subject to constraints that include branching, degree of connection among tissues, distance between sources and sinks, proximity, strength, and number of competing sinks, and phloem loading/unloading regulators. Movement of materials (e.g., amino acids, signals) to or from attack sites in xylem is less well understood but is partly driven by transpiration. The root is an influential sink and may regulate sink-source interactions and transport above and below ground as well as between the plant and the rhizosphere and nearby, connected plants. Research on resource translocation in response to pathogens or herbivores has focused on biochemical mechanisms; whole-plant research is needed to determine which, if any, of these plant behaviors actually influence plant fitness. PMID:23986767

  20. Bulgy tadpoles: inducible defense morph.

    PubMed

    Kishida, Osamu; Nishimura, Kinya

    2004-08-01

    Predator induced morphological defenses are marked morphological shifts induced directly by cues associated with a predator. Generally, remote cues, i.e., chemical substances emitted from predators or injured conspecifics, are considered to be ideal signals to induce morphological change in aquatic environments rather than close cues, i.e., close chemical or tactile cues, since chemical substances that can propagate over relatively long distances and persist for a long period may allow organisms to keep safe and to deliberately change their morph. In fact, most organisms adopting an inducible morphological defense utilize remote chemical cues to detect predation risk and to produce morphological defenses. In this paper, we report a unique and functionally well designed inducible morphological defense strategy where the induction process requires close cues from a predator. The tadpoles of Rana pirica exhibited a bulgy bodied morphology when threatened with predation by larval salamanders, Hynobius retardatus, in close proximity. Predation trials and a function experiment showed that the induced bulgy morph is an adaptive defense phenotype against the gape-limited predator larval H. retardatus. Furthermore, R. pirica tadpoles use two adaptive strategies in terms of cost saving, i.e., adjustment of the extent of bulginess according to predation risk and reversibility by actual shrink of bulgy body after removing the predation threat. In general, R. pirica hatch earlier than H. retardatus. In natural ponds, during the early developmental stage R. pirica tadpoles live in close proximity to young H. retardatus larvae. As they grow, the salamanders gradually become serious predators and the predator-prey interaction becomes intimate. After a while, predation, cannibalism and metamorphosis decrease the number of salamanders in the ponds, and the predator-prey interaction weakens. Such a phenology in the predator-prey interaction allows the evolution of a close

  1. Software Model Of Software-Development Process

    NASA Technical Reports Server (NTRS)

    Lin, Chi Y.; Synott, Debra J.; Levary, Reuven R.

    1990-01-01

    Collection of computer programs constitutes software tool for simulation of medium- to large-scale software-development projects. Necessary to include easily identifiable and more-readily quantifiable characteristics like costs, times, and numbers of errors. Mathematical model incorporating these and other factors of dynamics of software-development process implemented in the Software Life Cycle Simulator (SLICS) computer program. Simulates dynamics of software-development process. In combination with input and output expert software systems and knowledge-based management software system, develops information for use in managing large software-development project. Intended to aid managers in planning, managing, and controlling software-development processes by reducing uncertainties in budgets, required personnel, and schedules.

  2. Transnational architecting for homeland defense

    NASA Astrophysics Data System (ADS)

    O'Brien, Thomas W.

    2002-07-01

    The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.

  3. RNase 7 in Cutaneous Defense

    PubMed Central

    Rademacher, Franziska; Simanski, Maren; Harder, Jürgen

    2016-01-01

    RNase 7 belongs to the RNase A superfamily and exhibits a broad spectrum of antimicrobial activity against various microorganisms. RNase 7 is expressed in human skin, and expression in keratinocytes can be induced by cytokines and microbes. These properties suggest that RNase 7 participates in innate cutaneous defense. In this review, we provide an overview about the role of RNase 7 in cutaneous defense with focus on the molecular mechanism of the antimicrobial activity of RNase 7, the regulation of RNase 7 expression, and the role of RNase 7 in skin diseases. PMID:27089327

  4. Strategy alternatives for homeland air and cruise missile defense.

    PubMed

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. PMID:20626693

  5. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... of Availability (NOA) in the Federal Register (76 FR 28757) announcing the revised Defense Logistics... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense....

  6. 22 CFR 120.44 - Foreign defense article or defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Foreign defense article or defense service. 120.44 Section 120.44 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.44 Foreign defense article or defense service. Foreign defense article...

  7. Optimal Resource Allocation in Electrical Network Defense

    SciTech Connect

    Yao, Y; Edmunds, T; Papageorgiou, D; Alvarez, R

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasures when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or

  8. Acquired immune deficiency syndrome (AIDS).

    PubMed

    1987-02-01

    The International Planned Parenthood Medical Advisory Panel has developed recommendations to assist family planning associations in playing a more active role in the prevention and control of acquired immunodeficiency syndrome (AIDS). Of primary importance is an effective program of information and education aimed at communicating the following facts: AIDS is a fatal disease for which there is no cure; AIDS is spread by sexual intercourse, contaminated blood, and contaminated needles; an infected woman can transmit AIDS to her fetus during pregnancy; a monogamous sexual relationship is the surest way to avoid AIDS infection; condom use is good protection; an infected person can look and feel well, yet still be able to transmit the AIDS virus; and AIDS is not spread by ordinary contact with an infected person. Family planning associations should include information on AIDS in all existing IEC projects, as well as develop new materials. Among the target audiences for IEC activities are family planning workers, family planning clients, and the general public including youth, teachers, parents, employers, and national leaders. Special attention should be given to high-risk groups such as homosexual and bisexual men, hemophiliacs, male and female prostitutes, clients of sexually transmitted disease clinics, people with many sexual partners, illegal users of intravenous drugs, and the sexual partners of those in any of these groups. Wide promotion of condom use is a priority activity for family planning organizations. PMID:12340977

  9. Infections Acquired in the Garden.

    PubMed

    Cunha, Cheston B; Cunha, Burke A

    2015-10-01

    Gardening is a wonderful pastime, and the garden is a very peaceful place to enjoy one's vacation. However, the garden may be a treacherous place for very young or compromised hosts when one takes into account the infectious potential residing in the soil, as well as the insect vectors on plants and animals. Even normal hosts may acquire a variety of infections from the soil, animals, or animal-related insect bites. The location of the garden, its natural animal and insect inhabitants, and the characteristics of the soil play a part in determining its infectious potential. The most important factor making the garden an infectious and dangerous place is the number and interaction of animals, whether they are pets or wild, that temporarily use the garden for part of their daily activities. The clinician should always ask about garden exposure, which will help in eliminating the diagnostic possibilities for the patient. The diagnostic approach is to use epidemiological principles in concert with clinical clues, which together should suggest a reasonable list of diagnostic possibilities. Organ involvement and specific laboratory tests help further narrow the differential diagnosis and determine the specific tests necessary to make a definitive diagnosis. PMID:26542044

  10. Associative Learning Through Acquired Salience

    PubMed Central

    Treviño, Mario

    2016-01-01

    Most associative learning studies describe the salience of stimuli as a fixed learning-rate parameter. Presumptive saliency signals, however, have also been linked to motivational and attentional processes. An interesting possibility, therefore, is that discriminative stimuli could also acquire salience as they become powerful predictors of outcomes. To explore this idea, we first characterized and extracted the learning curves from mice trained with discriminative images offering varying degrees of structural similarity. Next, we fitted a linear model of associative learning coupled to a series of mathematical representations for stimulus salience. We found that the best prediction, from the set of tested models, was one in which the visual salience depended on stimulus similarity and a non-linear function of the associative strength. Therefore, these analytic results support the idea that the net salience of a stimulus depends both on the items' effective salience and the motivational state of the subject that learns about it. Moreover, this dual salience model can explain why learning about a stimulus not only depends on the effective salience during acquisition but also on the specific learning trajectory that was used to reach this state. Our mathematical description could be instrumental for understanding aberrant salience acquisition under stressful situations and in neuropsychiatric disorders like schizophrenia, obsessive-compulsive disorder, and addiction. PMID:26793078

  11. Associative Learning Through Acquired Salience.

    PubMed

    Treviño, Mario

    2015-01-01

    Most associative learning studies describe the salience of stimuli as a fixed learning-rate parameter. Presumptive saliency signals, however, have also been linked to motivational and attentional processes. An interesting possibility, therefore, is that discriminative stimuli could also acquire salience as they become powerful predictors of outcomes. To explore this idea, we first characterized and extracted the learning curves from mice trained with discriminative images offering varying degrees of structural similarity. Next, we fitted a linear model of associative learning coupled to a series of mathematical representations for stimulus salience. We found that the best prediction, from the set of tested models, was one in which the visual salience depended on stimulus similarity and a non-linear function of the associative strength. Therefore, these analytic results support the idea that the net salience of a stimulus depends both on the items' effective salience and the motivational state of the subject that learns about it. Moreover, this dual salience model can explain why learning about a stimulus not only depends on the effective salience during acquisition but also on the specific learning trajectory that was used to reach this state. Our mathematical description could be instrumental for understanding aberrant salience acquisition under stressful situations and in neuropsychiatric disorders like schizophrenia, obsessive-compulsive disorder, and addiction. PMID:26793078

  12. Social transmission of a host defense against cuckoo parasitism.

    PubMed

    Davies, Nicholas B; Welbergen, Justin A

    2009-06-01

    Coevolutionary arms races between brood parasites and hosts involve genetic adaptations and counter-adaptations. However, hosts sometimes acquire defenses too rapidly to reflect genetic change. Our field experiments show that observation of cuckoo (Cuculus canorus) mobbing by neighbors on adjacent territories induced reed warblers (Acrocephalus scirpaceus) to increase the mobbing of cuckoos but not of parrots (a harmless control) on their own territory. In contrast, observation of neighbors mobbing parrots had no effect on reed warblers' responses to either cuckoos or parrots. These results indicate that social learning provides a mechanism by which hosts rapidly increase their nest defense against brood parasites. Such enemy-specific social transmission enables hosts to track fine-scale spatiotemporal variation in parasitism and may influence the coevolutionary trajectories and population dynamics of brood parasites and hosts. PMID:19498167

  13. Peer review of the trusted software methodology

    SciTech Connect

    Chisholm, G.H.; Gannon, J.D. |; Kemmerer, R.A. |; McHugh, J. |

    1994-02-01

    The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described, and a brief introduction to the TSM is provided. The findings from the review fall into three categories: achievements, desirable additions, and changes. In addition, several recommendations are made with respect to application of the TSM within the purview of the Ballistic Missile Defense Organization.

  14. Software Process Improvement: Supporting the Linking of the Software and the Business Strategies

    NASA Astrophysics Data System (ADS)

    Albuquerque, Adriano Bessa; Rocha, Ana Regina; Lima, Andreia Cavalcanti

    The market is becoming more and more competitive, a lot of products and services depend of the software product and the software is one of the most important assets, which influence the organizations’ businesses. Considering this context, we can observe that the companies must to deal with the software, developing or acquiring, carefully. One of the perspectives that can help to take advantage of the software, supporting effectively the business, is to invest on the organization’s software processes. This paper presents an approach to evaluate and improve the processes assets of the software organizations, based on internationally well-known standards and process models. This approach is supported by automated tools from the TABA Workstation and is part of a wider improvement strategy constituted of three layers (organizational layer, process execution layer and external entity layer). Moreover, this paper presents the experience of use and their results.

  15. Radiological Defense Officer. Student Workbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This student workbook includes the necessary administrative materials, briefs, exercises and answer sheets for the quizzes and final course examination as needed by the students during the conduct of the Radiological Defense Officer course. Among the briefs included are the following: (1) Reporting Forms; (2) Forecasting Dose Rates; (3) Dose…

  16. Directions for Defense Digital Libraries.

    ERIC Educational Resources Information Center

    Larsen, Ronald L.

    1998-01-01

    Describes directions, challenges, and objectives of the information management program of the United States Defense Advanced Research Projects Agency (DARPA). The program envisions the rigor and organization normally associated with a research library to be virtually rendered and extended in the networked world of distributed information. (AEF)

  17. In Defense of the Vendors

    ERIC Educational Resources Information Center

    Irwin, G. Brockett

    1975-01-01

    The problems that are encountered when cooperation breaks down between the industrial source operator and the pollution control equipment vendor are examined. The focal point of this examination is the study of defenses available to the equipment vendor when industrial source operators refuse to cooperate. (Author/BT)

  18. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  19. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  20. 76 FR 25569 - Defense Federal Acquisition Regulation Supplement; Minimizing the Use of Materials Containing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-05

    ...DoD is issuing a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to implement the requirements for minimizing the use of materials containing hexavalent chromium in items acquired by DoD (deliverables and construction materials hereafter referred to as deliverables). Hexavalent chromium is a chemical that has been used in numerous DoD weapons systems and......

  1. Clinicopathological associations of acquired erythroblastopenia

    PubMed Central

    Gunes, Gursel; Malkan, Umit Yavuz; Yasar, Hatime Arzu; Eliacik, Eylem; Haznedaroglu, Ibrahim Celalettin; Demiroglu, Haluk; Sayinalp, Nilgun; Aksu, Salih; Etgul, Sezgin; Aslan, Tuncay; Goker, Hakan; Ozcebe, Osman Ilhami; Buyukasik, Yahya

    2015-01-01

    Introduction: Acquired erythroblastopenia (AE) is a rare clinical situation. It is characterized by the reduction of erythroid precursors in the bone marrow together with the low reticulocyte counts in the peripheral blood. Background: Main secondary causes of AE are drugs, Parvovirus B19 and other infectious reasons, lymphoid and myeloid neoplasia, autoimmune diseases, thymoma and pregnancy. The aim of this study is to assess the frequencies and clinical associations of AE via analyzing 12340 bone marrow samples in a retrospective manner. Material and method: Bone marrow aspirations which were obtained from patients who applied to Hacettepe University Hematology Clinic between 2002 and 2013, were analyzed retrospectively. Results: Thirty four erythroblastopenia cases were found. Patients ranged in age from 16 to 80 years with a median of 38 years. Fifteen patients were men (44%) and nineteen were women (56%). In these patients, detected causes of erythroblastopenia were MDS, idiopathic pure red cell aplasia (PRCA), parvovirus infection, post chemotherapy aplasia, plasma proliferative diseases, copper deficiency due to secondary amyloidosis, fever of unknown origin, hemophagocytic syndrome, enteric fever and legionella pneumonia. We found that between those reasons the most common causes of erythroblastopenia are MDS (17.7%) and idiopathic PRCA (17.7%). Discussion: As a result, erythroblastopenia in the bone marrow may be an early sign of MDS. In those AE cases possibility of being MDS must be kept in mind as it can be mistaken for PRCA. Conclusion: To conclude, in adults MDS without excess blast is one of the most common causes of erythroblastopenia in clinical practice and in case of erythroblastopenia the presence of MDS should be investigated. PMID:26885236

  2. Surface Sampler Arm Acquiring Sample

    NASA Technical Reports Server (NTRS)

    1976-01-01

    Operation of the surface sampler in obtaining Martian soil for Viking 2's molecular analysis experiment last Saturday (September 25) was closely monitored by one of the Lander cameras because of the precision required in trenching the small area--8 by 9 inches-surrounded by rocks. Dubbed 'Bonneville Salt Flats,' the exposure of thin crust appeared unique in contrast with surrounding materials and became a prime target for organic analysis in spite of potential hazards. Large rock in foreground is 8 inches high. At left, the sampler scoop has touched the surface, missing the rock at upper left by a comfortable 6 inches, and the backhoe has penetrated the surface about one-half inch. The scoop was then pulled back to sample the desired point and (second photo) the backhoe furrowed the surface pulling a piece of thin crust toward the spacecraft. The initial touchdown and retraction sequence was used to avoid a collision between a rock in the shadow of the arm and a plate joining the arm and scoop. The rock was cleared by 2 to 3 inches. The third picture was taken 8 minutes after the scoop touched the surface and shows that the collector head has acquired a quantity of soil. With surface sampler withdrawn (right), the foot-long trench is seen between the rocks. The trench is three inches wide and about 1 1/2 to 2 inches deep. The scoop reached to within 3 inches of the rock at far end of trench. Penetration appears to have left a cavernous opening roofed by the crust and only about one inch of undisturbed crust separates the deformed surface and the rock.

  3. Software attribute visualization for high integrity software

    SciTech Connect

    Pollock, G.M.

    1998-03-01

    This report documents a prototype tool developed to investigate the use of visualization and virtual reality technologies for improving software surety confidence. The tool is utilized within the execution phase of the software life cycle. It provides a capability to monitor an executing program against prespecified requirements constraints provided in a program written in the requirements specification language SAGE. The resulting Software Attribute Visual Analysis Tool (SAVAnT) also provides a technique to assess the completeness of a software specification.

  4. Space Flight Software Development Software for Intelligent System Health Management

    NASA Technical Reports Server (NTRS)

    Trevino, Luis C.; Crumbley, Tim

    2004-01-01

    The slide presentation examines the Marshall Space Flight Center Flight Software Branch, including software development projects, mission critical space flight software development, software technical insight, advanced software development technologies, and continuous improvement in the software development processes and methods.

  5. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND... Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired....

  6. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which...

  7. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which...

  8. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which...

  9. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND... Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired....

  10. DOD USER-NEEDS STUDY, PHASE II -- FLOW OF SCIENTIFIC AND TECHNICAL INFORMATION WITHIN THE DEFENSE INDUSTRY. FINAL REPORT. VOLUME II, A. TECHNICAL DESCRIPTION, B. TECHNICAL APPENDICES.

    ERIC Educational Resources Information Center

    GOODMAN, ARNOLD F.; AND OTHERS

    IN PHASE II OF THE DEPARTMENT OF DEFENSE (DOD) SURVEY TO FIND OUT HOW SCIENTISTS AND ENGINEERS IN GOVERNMENT AND INDUSTRIAL RESEARCH, DEVELOPMENT, AND PRODUCTION ACTIVITIES ACQUIRE INFORMATION, SCIENTIFIC PERSONNEL IN THE DEFENSE INDUSTRY WERE INTERVIEWED TO DETERMINE THEIR INFORMATION NEEDS AND THE FLOW OF INFORMATION INHERENT IN SATISFYING THESE…

  11. Report: Scientific Software.

    ERIC Educational Resources Information Center

    Borman, Stuart A.

    1985-01-01

    Discusses various aspects of scientific software, including evaluation and selection of commercial software products; program exchanges, catalogs, and other information sources; major data analysis packages; statistics and chemometrics software; and artificial intelligence. (JN)

  12. Controlling Software Piracy.

    ERIC Educational Resources Information Center

    King, Albert S.

    1992-01-01

    Explains what software manufacturers are doing to combat software piracy, recommends how managers should deal with this problem, and provides a role-playing exercise to help students understand the issues in software piracy. (SR)

  13. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... are in support of contingency, humanitarian, or peacekeeping operations, or to facilitate defense... peacekeeping operations, or to facilitate defense against or recovery from nuclear, biological, chemical,...

  14. Software Engineering Guidebook

    NASA Technical Reports Server (NTRS)

    Connell, John; Wenneson, Greg

    1993-01-01

    The Software Engineering Guidebook describes SEPG (Software Engineering Process Group) supported processes and techniques for engineering quality software in NASA environments. Three process models are supported: structured, object-oriented, and evolutionary rapid-prototyping. The guidebook covers software life-cycles, engineering, assurance, and configuration management. The guidebook is written for managers and engineers who manage, develop, enhance, and/or maintain software under the Computer Software Services Contract.

  15. Defensive Practice as ‘Fear-Based’ Practice: Social Work's Open Secret?

    PubMed Central

    Whittaker, Andrew; Havard, Tirion

    2016-01-01

    Defensive practice has received attention through the Munro review of child protection, which has identified that current organisational cultures increase the likelihood of defensive practice. Whilst the wider socio-political climate that gives rise to defensive practice has been explored within the literature, little attention has been paid to the everyday realities of defensive practice. This paper reports the findings of a study into final year social work students' attitudes towards defensive practice within social work. Three focus groups were completed with a total of ninety final-year students that collected qualitative and quantitative data using interactive software. This paper examines how participants perceived defensive practice, both in general and when faced with real-life vignettes. Participants distinguished between pro-active behaviour (sins of commission) and passive behaviour (sins of omission), generally regarding the latter as less serious because it was less tangible and easier to attribute to more positive motives. Whilst the literature identifies defensive practice as deliberate behaviour, the focus group discussions suggest that it is a subtler and less conscious process. Whilst there was there was a general consensus about the nature of defensive practice, there was considerable disagreement about specific vignettes and several competing explanations are explored. PMID:27559220

  16. Acquire: an open-source comprehensive cancer biobanking system

    PubMed Central

    Dowst, Heidi; Pew, Benjamin; Watkins, Chris; McOwiti, Apollo; Barney, Jonathan; Qu, Shijing; Becnel, Lauren B.

    2015-01-01

    Motivation: The probability of effective treatment of cancer with a targeted therapeutic can be improved for patients with defined genotypes containing actionable mutations. To this end, many human cancer biobanks are integrating more tightly with genomic sequencing facilities and with those creating and maintaining patient-derived xenografts (PDX) and cell lines to provide renewable resources for translational research. Results: To support the complex data management needs and workflows of several such biobanks, we developed Acquire. It is a robust, secure, web-based, database-backed open-source system that supports all major needs of a modern cancer biobank. Its modules allow for i) up-to-the-minute ‘scoreboard’ and graphical reporting of collections; ii) end user roles and permissions; iii) specimen inventory through caTissue Suite; iv) shipping forms for distribution of specimens to pathology, genomic analysis and PDX/cell line creation facilities; v) robust ad hoc querying; vi) molecular and cellular quality control metrics to track specimens’ progress and quality; vii) public researcher request; viii) resource allocation committee distribution request review and oversight and ix) linkage to available derivatives of specimen. Availability and Implementation: Acquire implements standard controlled vocabularies, ontologies and objects from the NCI, CDISC and others. Here we describe the functionality of the system, its technological stack and the processes it supports. A test version Acquire is available at https://tcrbacquire-stg.research.bcm.edu; software is available in https://github.com/BCM-DLDCC/Acquire; and UML models, data and workflow diagrams, behavioral specifications and other documents are available at https://github.com/BCM-DLDCC/Acquire/tree/master/supplementaryMaterials. Contact: becnel@bcm.edu PMID:25573920

  17. Signaling by small metabolites in systemic acquired resistance.

    PubMed

    Shah, Jyoti; Chaturvedi, Ratnesh; Chowdhury, Zulkarnain; Venables, Barney; Petros, Robby A

    2014-08-01

    Plants can retain the memory of a prior encounter with a pest. This memory confers upon a plant the ability to subsequently activate defenses more robustly when challenged by a pest. In plants that have retained the memory of a prior, localized, foliar infection by a pathogen, the pathogen-free distal organs develop immunity against subsequent infections by a broad-spectrum of pathogens. The long-term immunity conferred by this mechanism, which is termed systemic acquired resistance (SAR), is inheritable over a few generations. Signaling mediated by the phenolic metabolite salicylic acid (SA) is critical for the manifestation of SAR. Recent studies have described the involvement of additional small metabolites in SAR signaling, including methyl salicylate, the abietane diterpenoid dehydroabietinal, the lysine catabolite pipecolic acid, a glycerol-3-phosphate-dependent factor and the dicarboxylic acid azelaic acid. Many of these metabolites can be systemically transported through the plant and probably facilitate communication by the primary infected tissue with the distal tissues, which is essential for the activation of SAR. Some of these metabolites have been implicated in the SAR-associated rapid activation of defenses in response to subsequent exposure to the pathogen, a mechanism termed priming. Here, we summarize the role of these signaling metabolites in SAR, and the relationship between them and SA signaling in SAR. PMID:24506415

  18. NPOESS Interface Data Processing Segment Architecture and Software

    NASA Astrophysics Data System (ADS)

    Turek, S.; Souza, K. G.; Fox, C. A.; Grant, K. D.

    2004-12-01

    The National Oceanic and Atmospheric Administration (NOAA), Department of Defense (DoD), and National Aeronautics and Space Administration (NASA) are jointly acquiring the next-generation weather and environmental satellite system; the National Polar-orbiting Operational Environmental Satellite System (NPOESS). NPOESS is an estimated \\$6.5 billion program replacing the current Polar-orbiting Operational Environmental Satellites (POES) managed by NOAA and the Defense Meteorological Satellite Program (DMSP) managed by the DoD. The NPOESS satellites carry a suite of sensors that collect meteorological, oceanographic, climatological, and solar-geophysical observations of the earth, atmosphere, and space. The ground data processing segment for NPOESS is the Interface Data Processing Segment (IDPS). The IDPS processes NPOESS satellite data to provide weather, oceanographic, and environmental data products to NOAA and DoD processing centers and field terminals operated by the United States government. This paper describes Raytheon's high performance computer and software architecture for the NPOESS IDPS. NOAA, the DoD, and NASA selected this architecture after a 2.5-year Program Definition and Risk Reduction (PDRR) competition. The PDRR phase concluded in August of 2002, and has been followed by the NPOESS Preparatory Project (NPP) phase. The NPP satellite, scheduled to launch in late 2006, will provide risk reduction for the future NPOESS satellites, and will enable data continuity between the current EOS missions and NPOESS. Efforts within the PDRR and NPP phases consist of: requirements definition and flowdown from system to segment to subsystem, Object-Oriented (OO) software design, software code development, science to operational code conversion, integration and qualification testing. The NPOESS phase, which supports a constellation of three satellites, will also consist of this same lifecycle during the 2005 through 2009 timeframe, with operations and support

  19. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  20. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS NEW RESTRICTIONS ON LOBBYING Exemptions § 28.500 Secretary of Defense. (a) Exemption authority. The Secretary of Defense may exempt, on...

  1. Acquired tracheoesophageal fistula in infancy and childhood.

    PubMed

    Szold, A; Udassin, R; Seror, D; Mogle, P; Godfrey, S

    1991-06-01

    Acquired tracheoesophageal fistula (TEF) is a rare entity in the pediatric age group. We report two pediatric patients with acquired TEF caused by shells of pistachio nuts. In both patients the primary operation did not resolve the problem and a second intervention for recurrent fistula was needed. The special nature of acquired TEF, particularly the one described herein, requires delayed surgical intervention and meticulous separation of the respiratory and alimentary tracts by an intercostal muscle flap. PMID:1941455

  2. Acquired stuttering due to recurrent anaplastic astrocytoma

    PubMed Central

    Peters, Katherine B; Turner, Scott

    2013-01-01

    Acquired (neurogenic) stuttering is a rare phenomenon seen after cerebral infarction or brain injury. Aetiology of this symptom is unclear, but recent evidence supports that it is a disturbance in the left hemispheric neural network involving the interplay between the cortex and basal ganglia. We present the case of a patient who develops acquired stuttering after a recurrence of a right temporoparietal anaplastic astrocytoma (WHO grade III). We also review other cases of acquired stuttering and known anatomical correlates. PMID:24252834

  3. Defense display strategy and roadmaps

    NASA Astrophysics Data System (ADS)

    Hopper, Darrel G.

    2002-08-01

    The Department of Defense (DoD) is developing a new strategy for displays. The new displays science and technology roadmap will incorporate urgent warfighter needs as well as investment opportunities where military advantage is foreseen. Thrusts now ending include the High Definition System (HDS) program and related initiatives, like flexible displays, at the Defense Advanced Research Projects Agency (DARPA). Continuing thrusts include a variety of Serviceled programs to develop micro-displays for virtual image helmet-/rifle-mounted systems for pilots and soldiers, novel displays, materials, and basic research. New thrusts are being formulated for ultra-resolution, true 3D, and intelligent displays (integration of computers and communication functions into screens). The new strategy is Service-led.

  4. Issues in national missile defense

    SciTech Connect

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any of them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.

  5. Homeland Security and Defense Applications

    SciTech Connect

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  6. Homeland Security and Defense Applications

    ScienceCinema

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  7. Second line of defense program

    SciTech Connect

    Cantut, L; Thomas, L L

    1999-07-15

    Since the collapse of the Soviet Union, the prospect of nuclear materials entering the world market has become an ever-increasing threat. The Second Line of Defense (SLD) program was developed by the U.S. Department of Energy's (DOE) Nuclear Transfer and Supplier Policy Division (NN-43) to assist the Russian Federation State Customs Committee (RFSCC) in strengthening its capability to prevent illicit trafficking of nuclear materials across Russia's borders. The SLD program is a natural complement to the Material Protection Control and Accounting (MPC and A) program, which represents a first line of defense against the theft and diversion of nuclear materials. The SLD program is the first U.S.-Russian cooperative program to combat the illicit trafficking of nuclear and nuclear-related materials to would-be proliferators across Russia's borders.

  8. Software Configuration Management Guidebook

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes which are used in software development. The Software Assurance Guidebook, SMAP-GB-A201, issued in September, 1989, provides an overall picture of the concepts and practices of NASA in software assurance. Lower level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the Software Configuration Management Guidebook which describes software configuration management in a way that is compatible with practices in industry and at NASA Centers. Software configuration management is a key software development process, and is essential for doing software assurance.

  9. Defense Programs Transportation Risk Assessment

    SciTech Connect

    Clauss, D.B.

    1994-08-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data.

  10. Stability of missile forces and defenses

    SciTech Connect

    Canavan, G.H.

    1997-04-01

    This note derives the exchange equation for mixes of missiles and defenses and discusses the impact on stability of varying their relative proportions. For fixed offenses increasing defenses decreases stability until first strikes fall to zero. The same is true of decreasing offenses for fixed defenses, although the decrease in indices is smaller. A judicious increase in defenses and decrease in offenses should effect that transition with minimum loss of stability.

  11. Problems of National Missile Defense

    NASA Astrophysics Data System (ADS)

    Cornwall, John

    2000-04-01

    The currently-proposed national missile defense (NMD) is supposed to counter accidental Russian or Chinese launches of intercontinental nuclear-armed missiles, or rogue nation launches of similar nuclear missiles or of missiles armed with biological weapons, by using mid-course hit-to-kill vehicles guided by IR and radar. But it seems very likely that any nation capable of building (or buying) such a missile offense can build (or buy) effective countermeasures to NMD. These include anti-simulation decoys made of multi-layer insulation (MLI), with warheads covered in MLI sheaths so their signatures resemble those of the decoys. MLI can be effective against both passive IR and radar detection/discrimination. Biological warheads can counter any mid-course defense by releasing a great number of submunitions early in flight. Both nuclear and biological weapons can be deployed by other means, including covert ships in port; trucks; and cruise missiles. The best defense against Russian/Chinese accidental launches is assistance to these countries in improving their launch control systems.

  12. Defense of a space elevator

    SciTech Connect

    Laubscher, B. E.

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  13. Improving the Agency's Software Acquisition Capability

    NASA Technical Reports Server (NTRS)

    Hankinson, Allen

    2003-01-01

    External development of software has oftc n led to unsatisfactory results and great frustration for the assurE 7ce community. Contracts frequently omit critical assuranc 4 processes or the right to oversee software development activitie: At a time when NASA depends more and more on software to in plement critical system functions, combination of three factors ex; cerbate this problem: I ) the ever-increasing trend to acquire rather than develop software in-house, 2) the trend toward performance based contracts, and 3) acquisition vehicles that only state softwar 2 requirements while leaving development standards and assur! ince methodologies up to the contractor. We propose to identify specific methods at d tools that NASA projects can use to mitigate the adverse el ects of the three problems. TWO broad classes of methoddt ols will be explored. The first will be those that provide NASA p ojects with insight and oversight into contractors' activities. The st cond will be those that help projects objectively assess, and thus i nprwe, their software acquisition capability. Of particular interest is the Software Engineering Institute's (SEI) Software Acqt isition Capability Maturity Model (SA-CMMO).

  14. Radiological Defense. Planning and Operations Guide. Revised.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    This guide is a reprint of published and draft materials from the Federal Civil Defense Guide. This guide is intended to assist the student in planning, developing, implementing and operating a local, county, or state radiological defense (RADEF) system. The state and local radiological defense program objectives are to create an effective and…

  15. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  16. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  17. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  18. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  19. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  20. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  1. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  2. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense service. 120.9 Section 120.9 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.9 Defense service. (a) Defense service means: (1) The furnishing of assistance (including training)...

  3. 75 FR 32416 - Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... of the Secretary Defense Science Board AGENCY: Department of Defense (DoD). ACTION: Notice of advisory committee meeting. SUMMARY: The Defense Science Board Task Force on the Survivability of DoD... Science Board Threat Reduction Advisory Committee (TRAC) Task Force findings, recommendations and...

  4. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  5. Teaching Gibb's Taxonomy of Defensiveness through Performance

    ERIC Educational Resources Information Center

    Thomson, Deborah M.

    2008-01-01

    The topic of defensiveness resonates with students, who are generally eager to learn how to prevent it. Gibb's taxonomy of defensive/supportive behaviors is widely published and used today. According to Gibb, defensiveness occurs when a communicator puts substantial effort into defending him/herself from a perceived communicative threat. This…

  6. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  7. Exosomes: The missing link between microchimerism and acquired tolerance?

    PubMed

    Burlingham, William J

    2014-01-01

    It has become increasingly clear that the immune system of viviparous mammals is much more in the business of acquiring tolerance to non-self antigens, than it is in rejecting cells that express them (for a recent review, highlighting the role of Treg cells, see ref. (1) ). It is also clear that both self-tolerance, and acquired tolerance to non-self is a dynamic process, with a natural ebb and flow. As has been often said of an effective team defense in sports, tolerance will "bend but does not break." How microchimerism, defined as the presence of extremely rare [1/10(4)-1/10(6)] cells of a genetically different individual, can induce either new immunogenetic pressures that push self-tolerance to the breaking point, or alternatively, provide relief from pre-existing immunogenetic risk, preventing development of autoimmune disease, remains a mystery. Indeed, the inability to directly correlate DNA-level microchimerism detected in blood samples by qPCR, with naturally occurring regulation to minor H and MHC alloantigens expressed by the rare cells themselves, has been frustrating to researchers in this field. (2) [Haynes, W.J. et al, this issue] However, recent developments in the areas of transplantation and reproductive immunology offer clues to how the effects of microchimerism can be amplified, and how a disproportionate immune impact might occur from a very limited cell source. PMID:26679558

  8. Software engineering environment tool set integration

    NASA Technical Reports Server (NTRS)

    Selfridge, William P.

    1986-01-01

    Space Transportation System Division (STSD) Engineering has a program to promote excellence within the engineering function. This program resulted in a capital funded facility based on a VAX cluster called the Rockwell Operational Engineering System (ROSES). The second phase of a three phase plan to establish an integrated software engineering environment for ROSES is examined. It discusses briefly phase one which establishes the basic capability for a modern software development environment to include a tool set, training and standards. Phase two is a tool set integration. The tool set is primarily off-the-shelf tools acquired through vendors or government agencies (public domain). These tools were placed into categories of software development. These categories are: requirements, design, and construction support; verification and validation support; and software management support. The integration of the tool set is being performed through concept prototyping and development of tools specifically designed to support the life cycle and provide transition from one phase to the next.

  9. Software for Simulation of Hyperspectral Images

    NASA Technical Reports Server (NTRS)

    Richtsmeier, Steven C.; Singer-Berk, Alexander; Bernstein, Lawrence S.

    2002-01-01

    A package of software generates simulated hyperspectral images for use in validating algorithms that generate estimates of Earth-surface spectral reflectance from hyperspectral images acquired by airborne and spaceborne instruments. This software is based on a direct simulation Monte Carlo approach for modeling three-dimensional atmospheric radiative transport as well as surfaces characterized by spatially inhomogeneous bidirectional reflectance distribution functions. In this approach, 'ground truth' is accurately known through input specification of surface and atmospheric properties, and it is practical to consider wide variations of these properties. The software can treat both land and ocean surfaces and the effects of finite clouds with surface shadowing. The spectral/spatial data cubes computed by use of this software can serve both as a substitute for and a supplement to field validation data.

  10. Immune defense in leaf-cutting ants: a cross-fostering approach.

    PubMed

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández; Nash, David R; Boomsma, Jacobus J

    2011-06-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily social defense, a Pseudonocardia bacteria that helps to control pathogens in the ants' fungus garden, showed a significant colony of origin by rearing environment interaction, whereby ants that acquired the bacteria of a foster colony obtained a less abundant cover of bacteria: one explanation for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses. PMID:21644963

  11. 78 FR 30233 - Defense Federal Acquisition Regulation Supplement; Government Support Contractor Access to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Noncommercial Technical Data and Computer Software--Small Business Innovation Research (SBIR) Program. (a... Register at 76 FR 11363 on March 2, 2011, to implement section 821 of the National Defense Authorization... DFARS 227.7104(b) and the definition of ``Small Business Innovation Research (SBIR) data rights''...

  12. 75 FR 25161 - Defense Federal Acquisition Regulation Supplement; Presumption of Development at Private Expense

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... Acquisition Regulation Supplement; Presumption of Development at Private Expense AGENCY: Defense Acquisition... validation of a contractor's or subcontractor's asserted restrictions on technical data and computer software... the presumption of development at private expense for major systems; and section 815(a)(2) of the...

  13. Formal methods in the development of safety critical software systems

    SciTech Connect

    Williams, L.G.

    1991-11-15

    As the use of computers in critical control systems such as aircraft controls, medical instruments, defense systems, missile controls, and nuclear power plants has increased, concern for the safety of those systems has also grown. Much of this concern has focused on the software component of those computer-based systems. This is primarily due to historical experience with software systems that often exhibit larger numbers of errors than their hardware counterparts and the fact that the consequences of a software error may endanger human life, property, or the environment. A number of different techniques have been used to address the issue of software safety. Some are standard software engineering techniques aimed at reducing the number of faults in a software protect, such as reviews and walkthroughs. Others, including fault tree analysis, are based on identifying and reducing hazards. This report examines the role of one such technique, formal methods, in the development of software for safety critical systems. The use of formal methods to increase the safety of software systems is based on their role in reducing the possibility of software errors that could lead to hazards. The use of formal methods in the development of software systems is controversial. Proponents claim that the use of formal methods can eliminate errors from the software development process, and produce programs that are probably correct. Opponents claim that they are difficult to learn and that their use increases development costs unacceptably. This report discusses the potential of formal methods for reducing failures in safety critical software systems.

  14. Modernization of the multiple launch rocket system embedded system software

    NASA Astrophysics Data System (ADS)

    Mockensturm, Jeffrey J.

    1995-03-01

    Weapon systems in the Department of Defense (DOD) are becoming increasingly reliant on embedded software. As the size and level of complexity of these software development efforts have increased, the management of these programs has become more challenging. Additionally, as the Army strives to digitize the future battlefield, the demand for software will only increase. This thesis reviews the software development efforts associated with modernizing the Army's Multiple Launch Rocket System (MLRS). The thesis begins by presenting a background discussion of the Army's Fire Direction Data Manager (FDDM) development. After the FDDM background discussion, a case study of the troubled FDDM software development effort is presented. The FDDM case study follows the general format presented in the May 1992 General Accounting Office report on the FDDM software development difficulties. Following the FDDM review, the current MLRS software development effort, the Improved Fire Control System (IFCS), is presented. Next, the FDDM case study is reviewed to determine the software development lessons learned. Using the FDDM software lessons learned, the IFCS program is analyzed to determine the software risks, and to review the risk mitigation strategies of that program. The objective of the thesis is to provide insight into the use of modern software management methods in reducing software development program risk.

  15. Software distribution using xnetlib

    SciTech Connect

    Dongarra, J.J. |; Rowan, T.H.; Wade, R.C.

    1993-06-01

    Xnetlib is a new tool for software distribution. Whereas its predecessor netlib uses e-mail as the user interface to its large collection of public-domain mathematical software, xnetlib uses an X Window interface and socket-based communication. Xnetlib makes it easy to search through a large distributed collection of software and to retrieve requested software in seconds.

  16. Agile Software Development

    ERIC Educational Resources Information Center

    Biju, Soly Mathew

    2008-01-01

    Many software development firms are now adopting the agile software development method. This method involves the customer at every level of software development, thus reducing the impact of change in the requirement at a later stage. In this article, the principles of the agile method for software development are explored and there is a focus on…

  17. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  18. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... Secretary of Defense for Acquisition, Technology & Logistics and the Director, Missile Defense Agency... Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal Advisory Committee... System. The Under Secretary of Defense for Acquisition, Technology and Logistics or designee may act...

  19. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  20. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  1. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... (DLA) published a Notice of Availability (NOA) in the Federal Register (76 FR 28757) announcing the... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION:...

  2. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal...

  3. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., Washington, December 16, 2013. [FR Doc. 2013-30984 Filed 12-23-13; 11:15 am] Billing code 4710-10 ... Cooperation Council To Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961... that the furnishing of defense articles and defense services to the Gulf Cooperation Council...

  4. 22 CFR 120.2 - Designation of defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of defense articles and defense services. 120.2 Section 120.2 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.2 Designation of defense articles and defense services. The...

  5. Software productivity improvement through software engineering technology

    NASA Technical Reports Server (NTRS)

    Mcgarry, F. E.

    1985-01-01

    It has been estimated that NASA expends anywhere from 6 to 10 percent of its annual budget on the acquisition, implementation and maintenance of computer software. Although researchers have produced numerous software engineering approaches over the past 5-10 years; each claiming to be more effective than the other, there is very limited quantitative information verifying the measurable impact htat any of these technologies may have in a production environment. At NASA/GSFC, an extended research effort aimed at identifying and measuring software techniques that favorably impact productivity of software development, has been active over the past 8 years. Specific, measurable, software development technologies have been applied and measured in a production environment. Resulting software development approaches have been shown to be effective in both improving quality as well as productivity in this one environment.

  6. Software Formal Inspections Standard

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This Software Formal Inspections Standard (hereinafter referred to as Standard) is applicable to NASA software. This Standard defines the requirements that shall be fulfilled by the software formal inspections process whenever this process is specified for NASA software. The objective of this Standard is to define the requirements for a process that inspects software products to detect and eliminate defects as early as possible in the software life cycle. The process also provides for the collection and analysis of inspection data to improve the inspection process as well as the quality of the software.

  7. Acquired Surface Dyslexia: The Evidence from Hebrew.

    ERIC Educational Resources Information Center

    Birnboim, Smadar

    1995-01-01

    Investigates the symptoms of acquired surface dyslexia in Hebrew. Four acquired surface dyslexic adults were compared with eight normal second graders in terms of reading strategy. Homophones and homographs were a major source of difficulty for native Hebrew surface dyslexic readers; the normal second graders used a non-lexical strategy. (45…

  8. Acquiring and Managing Electronic Journals. ERIC Digest.

    ERIC Educational Resources Information Center

    Curtis, Donnelyn; Yue, Paoshan

    Electronic journals are both a blessing and a curse for libraries. To be meaningful in the current information environment--to meet users' ever-increasing demands--libraries must acquire as many appropriate full text resources as possible, as quickly as possible, and make them easy to use. This Digest provides tips for acquiring and providing…

  9. Acquired Zinc Deficiency in an Adult Female

    PubMed Central

    Saritha, Mohanan; Gupta, Divya; Chandrashekar, Laxmisha; Thappa, Devinder M; Rajesh, Nachiappa G

    2012-01-01

    Acrodermatitis enteropathica is an autosomal recessive inherited disorder of zinc absorption. Acquired cases are reported occasionally in patients with eating disorders or Crohn's disease. We report a 24-year-old housewife with acquired isolated severe zinc deficiency with no other comorbidities to highlight the rare occurrence of isolated nutritional zinc deficiency in an otherwise normal patient. PMID:23248371

  10. VOUS Software Facilitates Development Of Other Software

    NASA Technical Reports Server (NTRS)

    Oliger, Joseph; Pichumani, Ramini; Ponceleon, Dulce

    1992-01-01

    Visual Object Oriented Unification System (VOUS) computer program provides facility for development of other, high-level software. Does not replace, but rather extends, preexisting software tools for development of other software. Provides comprehensive, graphical, interactive medium for all phases in development of computer code from early exploration of concepts, through detailed coding-and-error-checking process, to final reporting of finished code and compilation of instruction manual for its use. Simplifies and partly automates programmer's task.

  11. Acquired hemophilia masked by warfarin therapy.

    PubMed

    Kantor, R; Mayan, H; Puritz, L; Varon, D; Farfel, Z

    2000-03-01

    People without hemophilia but with autoantibodies specifically directed against the procoagulant activity of factor VIII are known to have acquired hemophilia. The bleeding diathesis in these patients is often severe and life-threatening. The definite laboratory diagnosis of this disorder includes demonstration of low factor VIII levels in plasma with a high titer of factor VIII inhibitors, but the initial suspicion for its presence should rise in view of a prolonged partial thromboblastin time (PTT) and a normal prothrombin time associated with an acquired bleeding disorder. Oral anticoagulant treatment is known to prolong PTT as well, and the merger of these 2 situations may cause delayed diagnosis of acquired hemophilia with devastating consequences. We describe here the first reported case of acquired hemophilia diagnosed in a patient treated with warfarin. In such patients prolonged PTT may be ascribed to warfarin therapy rather than to acquired hemophilia, thus causing a dangerous delay in diagnosis. PMID:10746834

  12. Software For Computing Reliability Of Other Software

    NASA Technical Reports Server (NTRS)

    Nikora, Allen; Antczak, Thomas M.; Lyu, Michael

    1995-01-01

    Computer Aided Software Reliability Estimation (CASRE) computer program developed for use in measuring reliability of other software. Easier for non-specialists in reliability to use than many other currently available programs developed for same purpose. CASRE incorporates mathematical modeling capabilities of public-domain Statistical Modeling and Estimation of Reliability Functions for Software (SMERFS) computer program and runs in Windows software environment. Provides menu-driven command interface; enabling and disabling of menu options guides user through (1) selection of set of failure data, (2) execution of mathematical model, and (3) analysis of results from model. Written in C language.

  13. Starlink Software Submission

    NASA Astrophysics Data System (ADS)

    Lawden, M. D.

    The definition, structure and management of the Starlink Software Collection is described in SGP/20 which should be read by everyone involved in the production of software for the Starlink project. The Collection is managed by the Starlink Software Librarian (username STAR) who decides where new software should be stored in the existing structure and who has editorial control of Starlink documentation. This paper describes the principles governing the preparation and submission of software for inclusion in the Collection.

  14. Responsbility for unreliable software

    SciTech Connect

    Wahl, N.J.

    1994-12-31

    Unreliable software exposes software developers and distributors to legal risks. Under certain circumstances, the developer and distributor of unreliable software can be sued. To avoid lawsuits, software developers should do the following: determine what the risks am, understand the extent of the risks, and identify ways of avoiding the risks and lessening the consequences of the risks. Liability issues associated with unreliable software are explored in this article.

  15. Software component quality evaluation

    NASA Technical Reports Server (NTRS)

    Clough, A. J.

    1991-01-01

    The paper describes a software inspection process that can be used to evaluate the quality of software components. Quality criteria, process application, independent testing of the process and proposed associated tool support are covered. Early results indicate that this technique is well suited for assessing software component quality in a standardized fashion. With automated machine assistance to facilitate both the evaluation and selection of software components, such a technique should promote effective reuse of software components.

  16. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network. PMID:25768550

  17. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  18. The Gulf War's impact on ballistic missile defense systems

    SciTech Connect

    Likourezos, G.

    1993-01-01

    During Desert Storm the United States and its allies had an overwhelming advantage over the Iraqi armed forces. Nonetheless, the Iraqis managed to strike Israel and Saudi Arabia with Scud missiles. Because of the changing political climate and the expanding transfer of technology among nations, there is great concern by the US Government about missile proliferation and the ability of any country to obtain weapons of mass destruction. The US Government tried to downplay this concern for many years until the recent events in the Middle East affirmed its seriousness. The truth is that every year countries once thought to pose no international threat are acquiring biological, chemical, and nuclear weapons. Moreover, state-sponsored terrorist organizations could conceivably acquire these weapons in the future. In response to these concerns and in light of the lessons learned from the Gulf War, President George Bush in January 1991 redirected the SDI Program to concentrate on providing protection from limited ballistic missile strikes, rather than from an all-out nuclear missile attack by the Soviet Union. The Patriot air defense system, after knocking out Iraqi Scuds in the Gulf War with a near perfect record, appears for now to be the working model for the development of advanced ballistic missile defense systems - direct-kill missiles and projectiles instead of laser and particle beams. Even though the Patriot's use in Desert Storm has been argued by some to have been militarily insignificant, it has managed to change the viewpoint of many political and scientific leaders into believing that ballistic missile defense systems are needed to defend peaceful population centers and military installations from missile strikes like the ones on Israel and Saudi Arabia. 18 refs.

  19. Software Literacy and Student Learning in the Tertiary Environment: Powerpoint and Beyond

    ERIC Educational Resources Information Center

    Khoo, Elaine; Hight, Craig; Cowie, Bronwen; Torrens, Rob; Ferrarelli, Lisabeth

    2014-01-01

    In this paper, we explore the relationship between student success in acquiring software literacy and students' broader engagement and understanding of knowledge across different disciplines. We report on the first phase of a project that examines software literacies associated with Microsoft PowerPoint as a common software package encountered and…

  20. Software Quality Assurance Metrics

    NASA Technical Reports Server (NTRS)

    McRae, Kalindra A.

    2004-01-01

    Software Quality Assurance (SQA) is a planned and systematic set of activities that ensures conformance of software life cycle processes and products conform to requirements, standards and procedures. In software development, software quality means meeting requirements and a degree of excellence and refinement of a project or product. Software Quality is a set of attributes of a software product by which its quality is described and evaluated. The set of attributes includes functionality, reliability, usability, efficiency, maintainability, and portability. Software Metrics help us understand the technical process that is used to develop a product. The process is measured to improve it and the product is measured to increase quality throughout the life cycle of software. Software Metrics are measurements of the quality of software. Software is measured to indicate the quality of the product, to assess the productivity of the people who produce the product, to assess the benefits derived from new software engineering methods and tools, to form a baseline for estimation, and to help justify requests for new tools or additional training. Any part of the software development can be measured. If Software Metrics are implemented in software development, it can save time, money, and allow the organization to identify the caused of defects which have the greatest effect on software development. The summer of 2004, I worked with Cynthia Calhoun and Frank Robinson in the Software Assurance/Risk Management department. My task was to research and collect, compile, and analyze SQA Metrics that have been used in other projects that are not currently being used by the SA team and report them to the Software Assurance team to see if any metrics can be implemented in their software assurance life cycle process.

  1. Depression, responsibility, and criminal defenses.

    PubMed

    Hannan, Barbara

    2005-01-01

    The concepts of voluntary action, agency, free will, and responsibility, while central to moral and legal institutions, are generally poorly understood. Philosophers of law such as H.L.A. Hart, Joel Feinberg, and Robert F. Schopp have contributed significantly to understanding of these concepts through their work on the foundations of criminal defenses, including excuses based on mental illness. In this paper, I summarize and present their valuable insights, in the context of an argument (influenced by personal experience) that clinical depression, even when non-psychotic, may in some cases constitute a legitimate excuse for criminal or otherwise immoral failures to act. PMID:15913778

  2. Background issues for defensive interceptors

    SciTech Connect

    Canavan, G.H.

    1991-03-01

    Mean nuclear backgrounds are large, but are arguably amenable to frame-to-frame subtraction. Striated backgrounds on the sensors for defensive interceptors could, however, cause clutter leak-through, which could make detection and track difficult. Nominal motions and backgrounds give signal to clutter ratios too low to be useful. Clutter leakage due to line-of-sight drift can be reduced by stabilizing the line of sight around the background clutter itself. Current interceptors have detector arrays large enough for operation independent of nuclear backgrounds in their fields of view. 6 refs., 2 figs.

  3. 76 FR 21705 - Closed Meeting of the Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... Pentagon, Arlington, VA. The mission of the Defense Science Board is to advise the Secretary of Defense and..., Defense Science Board, 3140 Defense Pentagon, Room 3B888A, Washington, DC 20301-3140, via e-mail at...

  4. Toward immunogenetic studies of amphibian chytridiomycosis: Linking innate and acquired immunity

    USGS Publications Warehouse

    Richmond, J.Q.; Savage, Anna E.; Zamudio, Kelly R.; Rosenblum, E.B.

    2009-01-01

    Recent declines in amphibian diversity and abundance have contributed significantly to the global loss of biodiversity. The fungal disease chytridiomycosis is widely considered to be a primary cause of these declines, yet the critical question of why amphibian species differ in susceptibility remains unanswered. Considerable evidence links environmental conditions and interspecific variability of the innate immune system to differential infection responses, but other sources of individual, population, or species-typical variation may also be important. In this article we review the preliminary evidence supporting a role for acquired immune defenses against chytridiomycosis, and advocate for targeted investigation of genes controlling acquired responses, as well as those that functionally bridge the innate and acquired immune systems. Immunogenetic data promise to answer key questions about chytridiomycosis susceptibility and host-pathogen coevolution, and will draw much needed attention to the importance of considering evolutionary processes in amphibian conservation management and practice. ?? 2009 by American Institute of Biological Sciences.

  5. Potential disadvantages of using socially acquired information.

    PubMed Central

    Giraldeau, Luc-Alain; Valone, Thomas J; Templeton, Jennifer J

    2002-01-01

    The acquisition and use of socially acquired information is commonly assumed to be profitable. We challenge this assumption by exploring hypothetical scenarios where the use of such information either provides no benefit or can actually be costly. First, we show that the level of incompatibility between the acquisition of personal and socially acquired information will directly affect the extent to which the use of socially acquired information can be profitable. When these two sources of information cannot be acquired simultaneously, there may be no benefit to socially acquired information. Second, we assume that a solitary individual's behavioural decisions will be based on cues revealed by its own interactions with the environment. However, in many cases, for social animals the only socially acquired information available to individuals is the behavioural actions of others that expose their decisions, rather than the cues on which these decisions were based. We argue that in such a situation the use of socially acquired information can lead to informational cascades that sometimes result in sub-optimal behaviour. From this theory of informational cascades, we predict that when erroneous cascades are costly, individuals should pay attention only to socially generated cues and not behavioural decisions. We suggest three scenarios that might be examples of informational cascades in nature. PMID:12495513

  6. Payload software technology: Software technology development plan

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Programmatic requirements for the advancement of software technology are identified for meeting the space flight requirements in the 1980 to 1990 time period. The development items are described, and software technology item derivation worksheets are presented along with the cost/time/priority assessments.

  7. Software For Simulation Of Development Of Software

    NASA Technical Reports Server (NTRS)

    Tausworthe, Robert C.

    1991-01-01

    SOFTREL is prototype software package simulating creation, detection, and repair of defects and faults during software-development project. Personnel, resources, errors, and other realistic factors represented in simulation. Available in executable form only for IBM PC. SOFTREL is copyrighted work with all copyright vested in NASA.

  8. Software Engineering Program: Software Process Improvement Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this document is to provide experience-based guidance in implementing a software process improvement program in any NASA software development or maintenance community. This guidebook details how to define, operate, and implement a working software process improvement program. It describes the concept of the software process improvement program and its basic organizational components. It then describes the structure, organization, and operation of the software process improvement program, illustrating all these concepts with specific NASA examples. The information presented in the document is derived from the experiences of several NASA software organizations, including the SEL, the SEAL, and the SORCE. Their experiences reflect many of the elements of software process improvement within NASA. This guidebook presents lessons learned in a form usable by anyone considering establishing a software process improvement program within his or her own environment. This guidebook attempts to balance general and detailed information. It provides material general enough to be usable by NASA organizations whose characteristics do not directly match those of the sources of the information and models presented herein. It also keeps the ideas sufficiently close to the sources of the practical experiences that have generated the models and information.

  9. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multicore, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to approx.50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  10. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multi-core, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to .50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  11. 2006 XSD Scientific Software Workshop report.

    SciTech Connect

    Evans, K., Jr.; De Carlo, F.; Jemian, P.; Lang, J.; Lienert, U.; Maclean, J.; Newville, M.; Tieman, B.; Toby, B.; van Veenendaal, B.; Univ. of Chicago

    2006-01-22

    In May of 2006, a committee was formed to assess the fundamental needs and opportunities in scientific software for x-ray data reduction, analysis, modeling, and simulation. This committee held a series of discussions throughout the summer, conducted a poll of the members of the x-ray community, and held a workshop. This report details the findings and recommendations of the committee. Each experiment performed at the APS requires three crucial ingredients: the powerful x-ray source, an optimized instrument to perform measurements, and computer software to acquire, visualize, and analyze the experimental observations. While the APS has invested significant resources in the accelerator, investment in other areas such as scientific software for data analysis and visualization has lagged behind. This has led to the adoption of a wide variety of software with variable levels of usability. In order to maximize the scientific output of the APS, it is essential to support the broad development of real-time analysis and data visualization software. As scientists attack problems of increasing sophistication and deal with larger and more complex data sets, software is playing an ever more important role. Furthermore, our need for excellent and flexible scientific software can only be expected to increase, as the upgrade of the APS facility and the implementation of advanced detectors create a host of new measurement capabilities. New software analysis tools must be developed to take full advantage of these capabilities. It is critical that the APS take the lead in software development and the implementation of theory to software to ensure the continued success of this facility. The topics described in this report are relevant to the APS today and critical for the APS upgrade plan. Implementing these recommendations will have a positive impact on the scientific productivity of the APS today and will be even more critical in the future.

  12. Organizational structure and operation of defense/aerospace information centers in the United States of America

    NASA Technical Reports Server (NTRS)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  13. Debugging software with animated graphics

    NASA Astrophysics Data System (ADS)

    Horn, Dawn; Scrip, Becky; Scrip, Bill

    1997-07-01

    The traditional use of graphics and animation in engineering software development has been to demonstrate the function and utility of individual engineering tools. This paper illustrates the use of graphical rendering and animation for debugging large integrated simulations. The tools presented are part of the THAAD integrated system effectiveness simulation (TISES). TISES has integrated different segment software models to be able to perform analysis of a full THAAD (theater high altitude area defense) battalion. Within each model are implicit coordinates, transformations, reference values (i.e. earth radius) used which may or may not match those of adjacent models. Each interface or integration between the models introduces a source of error. TISES also utilized many different input parameters from a variety of external sources that can be a source of error. The TISES development team has found graphics and animation to be extremely helpful in testing and debugging these interface problems. This paper includes examples of input data verification, model to model interface, and model versus model perceptions that have been utilized in TISES development.

  14. Biogeography of a defensive symbiosis

    PubMed Central

    Kaltenpoth, Martin; Roeser-Mueller, Kerstin; Stubblefield, J. William; Seger, Jon; Strohm, Erhard

    2014-01-01

    Mutualistic microorganisms play important roles in nutrition, reproduction and defense of many insects, yet the factors contributing to their maintenance and dispersal remain unknown in most cases. Theory suggests that collaboration can be maintained by repeated interaction of the same partners (partner fidelity) or by selective discrimination against non-cooperative partners (partner choice). In the defensive mutualism between solitary beewolf wasps and their antibiotic-producing Streptomyces bacteria, partner choice by host control of vertical symbiont transmission reinforces partner fidelity and has helped to maintain this highly specific association since it originated in the late Cretaceous. However, co-phylogenetic and biogeographic analyses suggest that there has also been considerable horizontal transmission of the symbionts. While the beewolves clearly have a paleotropic or palearctic origin, with later colonization of the nearctic and neotropics via Beringia and the Aves ridge, respectively, the bacteria show only weak geographical clustering, implying global dispersal or vicariance within the confines of an otherwise apparently exclusive symbiotic relationship. We discuss several hypotheses that may explain these patterns. Future studies investigating the occurrence of beewolf symbionts in the environment could yield broadly applicable insights into the relative impact of animal-vectored and free-living dispersal on the distribution of microorganisms in nature. PMID:26479018

  15. Defense mutualisms enhance plant diversification.

    PubMed

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity. PMID:25349406

  16. Defense mutualisms enhance plant diversification

    PubMed Central

    Weber, Marjorie G.; Agrawal, Anurag A.

    2014-01-01

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity. PMID:25349406

  17. Verification of excess defense material

    SciTech Connect

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-12-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials.

  18. Artificial intelligence and expert systems in-flight software testing

    NASA Technical Reports Server (NTRS)

    Demasie, M. P.; Muratore, J. F.

    1991-01-01

    The authors discuss the introduction of advanced information systems technologies such as artificial intelligence, expert systems, and advanced human-computer interfaces directly into Space Shuttle software engineering. The reconfiguration automation project (RAP) was initiated to coordinate this move towards 1990s software technology. The idea behind RAP is to automate several phases of the flight software testing procedure and to introduce AI and ES into space shuttle flight software testing. In the first phase of RAP, conventional tools to automate regression testing have already been developed or acquired. There are currently three tools in use.

  19. Defense against common mode failures in protection system design

    SciTech Connect

    Wyman, R.H.; Johnson, G.L.

    1997-08-27

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ``fact-of-life`` in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D&D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D&D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ``defense-in-depth and diversity analysis`` has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided.

  20. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. PMID:25389065

  1. 76 FR 60812 - Defense Business Board (DBB); Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... of the Secretary Defense Business Board (DBB); Meeting Notice AGENCY: Department of Defense (DoD... meeting of the Defense Business Board (DBB). DATES: The public meeting of the Defense Business Board...: Ms. Debora Duffy, Defense Business Board, 1155 Defense Pentagon, Room 5B1088A, Washington, DC...

  2. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  3. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  4. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  5. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  6. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO MILITARY JUSTICE COURTS OF CRIMINAL APPEALS RULES OF PRACTICE AND PROCEDURE § 150.10 Request for appellate defense counsel. An...

  7. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  8. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  9. 32 CFR 150.10 - Request for appellate defense counsel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Request for appellate defense counsel. 150.10 Section 150.10 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS... for appellate defense counsel. An accused may be represented before the Court by appellate...

  10. 32 CFR 28.500 - Secretary of Defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Secretary of Defense. 28.500 Section 28.500 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... making such a determination. (b) Policy. It is the policy of the Department of Defense that...

  11. Light Duty Utility Arm computer software configuration management plan

    SciTech Connect

    Philipp, B.L.

    1998-09-14

    This plan describes the configuration management for the Light Duty Utility Arm robotic manipulation arm control software. It identifies the requirement, associated documents, and the software control methodology. The Light Duty Utility Ann (LDUA) System is a multi-axis robotic manipulator arm and deployment vehicle, used to perform surveillance and characterization operations in support of remediation of defense nuclear wastes currently stored in the Hanford Underground Storage Tanks (USTs) through the available 30.5 cm (12 in.) risers. This plan describes the configuration management of the LDUA software.

  12. Near-Earth object intercept trajectory design for planetary defense

    NASA Astrophysics Data System (ADS)

    Vardaxis, George; Wie, Bong

    2014-08-01

    Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.

  13. Design software for reuse

    NASA Technical Reports Server (NTRS)

    Tracz, Will

    1990-01-01

    Viewgraphs are presented on the designing of software for reuse. Topics include terminology, software reuse maxims, the science of programming, an interface design example, a modularization example, and reuse and implementation guidelines.

  14. Guidelines for software inspections

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Quality control inspections are software problem finding procedures which provide defect removal as well as improvements in software functionality, maintenance, quality, and development and testing methodology is discussed. The many side benefits include education, documentation, training, and scheduling.

  15. Commercial Data Mining Software

    NASA Astrophysics Data System (ADS)

    Zhang, Qingyu; Segall, Richard S.

    This chapter discusses selected commercial software for data mining, supercomputing data mining, text mining, and web mining. The selected software are compared with their features and also applied to available data sets. The software for data mining are SAS Enterprise Miner, Megaputer PolyAnalyst 5.0, PASW (formerly SPSS Clementine), IBM Intelligent Miner, and BioDiscovery GeneSight. The software for supercomputing are Avizo by Visualization Science Group and JMP Genomics from SAS Institute. The software for text mining are SAS Text Miner and Megaputer PolyAnalyst 5.0. The software for web mining are Megaputer PolyAnalyst and SPSS Clementine . Background on related literature and software are presented. Screen shots of each of the selected software are presented, as are conclusions and future directions.

  16. Software Engineering Improvement Plan

    NASA Technical Reports Server (NTRS)

    2006-01-01

    In performance of this task order, bd Systems personnel provided support to the Flight Software Branch and the Software Working Group through multiple tasks related to software engineering improvement and to activities of the independent Technical Authority (iTA) Discipline Technical Warrant Holder (DTWH) for software engineering. To ensure that the products, comments, and recommendations complied with customer requirements and the statement of work, bd Systems personnel maintained close coordination with the customer. These personnel performed work in areas such as update of agency requirements and directives database, software effort estimation, software problem reports, a web-based process asset library, miscellaneous documentation review, software system requirements, issue tracking software survey, systems engineering NPR, and project-related reviews. This report contains a summary of the work performed and the accomplishments in each of these areas.

  17. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  18. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. PMID:26568089

  19. Critical technologies for national defense

    SciTech Connect

    Przemieniecki, J.S.

    1991-01-01

    The present volume furnishes systematic evaluations of the impact on future weapons systems of such advanced technologies as those of composite materials' reinforcing fibers, metallic and ceramic matrices, and component manufacturing methods; CFD hardware, software, and methodologies; data-fusion methods and their integration with expert systems; passive sensors for targeting; and integrated optical devices for communications, signal processing, and computation. Also discussed are semiconductors and IC preparation and photolithography, signal processing for spectral analysis and matched filtering; software producibility, airbreathing propulsion, machine intelligence and robotics, parallel computer architectures, noncooperative target-recognizing radars, radar cross section-reducing materials, atmospheric and undersea weapons environments, biotechnology materials, high energy density materials, hypervelocity projectiles, pulsed power sources, and superconductivity.

  20. Software verification and testing

    NASA Technical Reports Server (NTRS)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  1. Agent Building Software

    NASA Technical Reports Server (NTRS)

    2000-01-01

    AgentBuilder is a software component developed under an SBIR contract between Reticular Systems, Inc., and Goddard Space Flight Center. AgentBuilder allows software developers without experience in intelligent agent technologies to easily build software applications using intelligent agents. Agents are components of software that will perform tasks automatically, with no intervention or command from a user. AgentBuilder reduces the time and cost of developing agent systems and provides a simple mechanism for implementing high-performance agent systems.

  2. Experimentation in software engineering

    NASA Technical Reports Server (NTRS)

    Basili, V. R.; Selby, R. W.; Hutchens, D. H.

    1986-01-01

    Experimentation in software engineering supports the advancement of the field through an iterative learning process. In this paper, a framework for analyzing most of the experimental work performed in software engineering over the past several years is presented. A variety of experiments in the framework is described and their contribution to the software engineering discipline is discussed. Some useful recommendations for the application of the experimental process in software engineering are included.

  3. Interaction of strategic defenses with crisis stability

    SciTech Connect

    Canavan, G.H.

    1991-03-01

    Crisis stability indices calculated for two-sided strategic interactions are used to discuss the impact of boost and midcourse defenses. They largely suppress missiles, leaving bombers and cruise missiles to deliver the bulk of restrikes. Boost-phase defenses are able to attrit missile attacks, but lack the preferentiality needed to defend specific targets. Midcourse layers could protect a significant fraction of forces; combined defenses could defend more. Results are sensitive to decoys and target sets. 29 refs., 26 figs.

  4. Defense spending and interregional labor migration.

    PubMed

    Ellis, M; Barff, R; Markusen, A R

    1993-04-01

    The impact of defense-related industry on labor migration within the United States is analyzed using census data for the period 1975-1980. The results "suggest that workers follow jobs in the defense industry, rather than vice versa, and indicate that a process of defense-related regional labor pool formation, amplified by interstate migration, adds to the volume of interregional labor flows." PMID:12286235

  5. Standard Annuciator Software overview

    SciTech Connect

    Anspach, D.A. ); Fox, E.T.; Kissock, P.S. )

    1990-01-01

    The Standard Annunciator Software is responsible for maintaining a current display of system status conditions. The software interfaces with other systems -- IACS, CCTV, UPS, and portable PC -- to determine their status and then displays this information at the operator's console. This manual describes the software organization, operation, and generation mechanisms for development and target environments. 6 figs.

  6. Java for flight software

    NASA Technical Reports Server (NTRS)

    Benowitz, E.; Niessner, A.

    2003-01-01

    This work involves developing representative mission-critical spacecraft software using the Real-Time Specification for Java (RTSJ). This work currently leverages actual flight software used in the design of actual flight software in the NASA's Deep Space 1 (DSI), which flew in 1998.

  7. Software Architecture Evolution

    ERIC Educational Resources Information Center

    Barnes, Jeffrey M.

    2013-01-01

    Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…

  8. CALIPSO Data Read Software

    Atmospheric Science Data Center

    2015-11-02

      CALIPSO Data Read Software Callable routines in Interactive Data Language ... Solutions . CALIPSO_READERS_3.5v1 Software (IDL) tar (611.5 KB) zip (261 KB) ... CALIPSO_READERS_3.4v1 Software (IDL) tar  (612.9 KB) zip  (261.4 KB) ...

  9. Evaluation Software in Counseling.

    ERIC Educational Resources Information Center

    Sabella, Russell A.

    Counselors today are presented with a number of differing applications software. This article intends to advance the counselor's knowledge and considerations of the various aspects of application software. Included is a discussion of the software applications typically of help to counselors in (a) managing their work (computer managed counseling);…

  10. SPEAR 3 Commissioning Software

    SciTech Connect

    Corbett, W.J.; Portmann, G.J.; Safranek, J.A.; Terebilo, A.; /SLAC, SSRL

    2005-05-09

    The short SPEAR 3 startup time required precommissioned software for machine setup, beam measurements and data analysis. To accomplish this goal, we used Matlab with the Accelerator Toolbox (AT), the Channel Access Toolbox (MCA) and Middle Layer software to integrate code and streamline production. This paper outlines the software architecture, describes the Middle Layer component and provides examples from SPEAR 3 commissioning.

  11. Astronomical Software Directory Service

    NASA Technical Reports Server (NTRS)

    Hanisch, R. J.; Payne, H.; Hayes, J.

    1998-01-01

    This is the final report on the development of the Astronomical Software Directory Service (ASDS), a distributable, searchable, WWW-based database of software packages and their related documentation. ASDS provides integrated access to 56 astronomical software packages, with more than 16,000 URL's indexed for full-text searching.

  12. Software Shopper. Revised.

    ERIC Educational Resources Information Center

    Davis, Sandra Hart, Comp.

    This annotated index describes and illustrates a wide selection of public domain instructional software that may be useful in the education of deaf students and provides educators with a way to order the listed programs. The software programs are designed for use on Apple computers and their compatibles. The software descriptions are presented in…

  13. Defense program pushes microchip frontiers

    NASA Astrophysics Data System (ADS)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  14. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. PMID:27086223

  15. Dynamic defense workshop : from research to practice.

    SciTech Connect

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  16. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    PubMed

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy. PMID:26241796

  17. Problem-Solving Software

    NASA Technical Reports Server (NTRS)

    1992-01-01

    CBR Express software solves problems by adapting sorted solutions to new problems specified by a user. It is applicable to a wide range of situations. The technology was originally developed by Inference Corporation for Johnson Space Center's Advanced Software Development Workstation. The project focused on the reuse of software designs, and Inference used CBR as part of the ACCESS prototype software. The commercial CBR Express is used as a "help desk" for customer support, enabling reuse of existing information when necessary. It has been adopted by several companies, among them American Airlines, which uses it to solve reservation system software problems.

  18. Tracker 300 Software

    SciTech Connect

    Wysor, R. Wes

    2006-01-12

    The Tracker300 software is downloaded to an off-the-shelf product called RCM3400/RCM3410 made by Rabbit Semiconductor. The software is a closed loop control which computes the sun's position and provides stability compensation. Using the RCM3400/RCM3410 module, the software stores and retrieves parameters from the onboard flash. The software also allows for communication with a host. It will allow the parameters to be downloaded or uploaded, it will show the status of the controller, it will provide real-time feedback, and it will send command acknowledgements. The software will capture the GPS response and ensure the internal clock is set correctly.

  19. Payload software technology

    NASA Technical Reports Server (NTRS)

    1976-01-01

    A software analysis was performed of known STS sortie payload elements and their associated experiments. This provided basic data for STS payload software characteristics and sizes. A set of technology drivers was identified based on a survey of future technology needs and an assessment of current software technology. The results will be used to evolve a planned approach to software technology development. The purpose of this plan is to ensure that software technology is advanced at a pace and a depth sufficient to fulfill the identified future needs.

  20. Buy, don`t build -- What does that mean for a software developer?

    SciTech Connect

    Little, T.; Rahi, M.A.; Sinclair, C.

    1995-06-01

    The buzz phrase of the 1990`s for the petroleum software industry has become ``buy, don`t build.`` For an end user in an oil company, this generally means acquiring application software rather than developing it internally. The concept of buy, don`t build can also apply for a software developer. Purchasing software toolkit components can expedite the development of an application as well as reduce future support requirements.

  1. Sentinel-1 Support in the GAMMA Software

    NASA Astrophysics Data System (ADS)

    Wegmuller, Urs; Werner, Charles; Stroozzi, Tazio; Wiesmann, Andreas; Frey, Othmar; Santoro, Maurizio

    2015-05-01

    First results using the new Sentinel-1 SAR look very promising but the special interferometric wide-swath data acquired in the TOPS mode makes InSAR processing challenging. The steep azimuth spectra ramp in each burst results in very stringent co-registration requirements. Combining the data of the individual bursts and sub-swaths into consistent mosaics requires careful “book-keeping” in the handling of the data and meta data and the large file sizes and high data throughputs require also a good performance. Considering these challenges good support from software is getting increasingly important. In this contribution we describe the Sentinel-1 support in the GAMMA Software, a high-level software package used by researchers, service providers and operational users in their SAR, InSAR and PSI work.

  2. HAZARD ANALYSIS SOFTWARE

    SciTech Connect

    Sommer, S; Tinh Tran, T

    2008-04-08

    Washington Safety Management Solutions, LLC developed web-based software to improve the efficiency and consistency of hazard identification and analysis, control selection and classification, and to standardize analysis reporting at Savannah River Site. In the new nuclear age, information technology provides methods to improve the efficiency of the documented safety analysis development process which includes hazard analysis activities. This software provides a web interface that interacts with a relational database to support analysis, record data, and to ensure reporting consistency. A team of subject matter experts participated in a series of meetings to review the associated processes and procedures for requirements and standard practices. Through these meetings, a set of software requirements were developed and compiled into a requirements traceability matrix from which software could be developed. The software was tested to ensure compliance with the requirements. Training was provided to the hazard analysis leads. Hazard analysis teams using the software have verified its operability. The software has been classified as NQA-1, Level D, as it supports the analysis team but does not perform the analysis. The software can be transported to other sites with alternate risk schemes. The software is being used to support the development of 14 hazard analyses. User responses have been positive with a number of suggestions for improvement which are being incorporated as time permits. The software has enforced a uniform implementation of the site procedures. The software has significantly improved the efficiency and standardization of the hazard analysis process.

  3. Healthcare Software Assurance

    PubMed Central

    Cooper, Jason G.; Pauley, Keith A.

    2006-01-01

    Software assurance is a rigorous, lifecycle phase-independent set of activities which ensure completeness, safety, and reliability of software processes and products. This is accomplished by guaranteeing conformance to all requirements, standards, procedures, and regulations. These assurance processes are even more important when coupled with healthcare software systems, embedded software in medical instrumentation, and other healthcare-oriented life-critical systems. The current Food and Drug Administration (FDA) regulatory requirements and guidance documentation do not address certain aspects of complete software assurance activities. In addition, the FDA’s software oversight processes require enhancement to include increasingly complex healthcare systems such as Hospital Information Systems (HIS). The importance of complete software assurance is introduced, current regulatory requirements and guidance discussed, and the necessity for enhancements to the current processes shall be highlighted. PMID:17238324

  4. Healthcare software assurance.

    PubMed

    Cooper, Jason G; Pauley, Keith A

    2006-01-01

    Software assurance is a rigorous, lifecycle phase-independent set of activities which ensure completeness, safety, and reliability of software processes and products. This is accomplished by guaranteeing conformance to all requirements, standards, procedures, and regulations. These assurance processes are even more important when coupled with healthcare software systems, embedded software in medical instrumentation, and other healthcare-oriented life-critical systems. The current Food and Drug Administration (FDA) regulatory requirements and guidance documentation do not address certain aspects of complete software assurance activities. In addition, the FDA's software oversight processes require enhancement to include increasingly complex healthcare systems such as Hospital Information Systems (HIS). The importance of complete software assurance is introduced, current regulatory requirements and guidance discussed, and the necessity for enhancements to the current processes shall be highlighted. PMID:17238324

  5. Defense Economic Impact Modeling System (DEIMS). A New Concept in Economic Forecasting for Defense Expenditures.

    ERIC Educational Resources Information Center

    Blond, David L.

    The Defense Economic Impact Modeling System (DEIMS) analyzes the economic effect of defense expenditures on the United States economy by using a consistent, reliable framework of economic models and government policy assumptions. Planning information on defense requirements is also provided to private sector firms. The DEIMS allows the Department…

  6. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  7. 3 CFR - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export... Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act Memorandum for the...) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and...

  8. Acquired cutis laxa associated with cutaneous mastocytosis.

    PubMed

    Hoang, Minh Van; Dang, Phuoc Van; Bui, Duc Van; Mejbel, Haider; Mani, Divya Thomas; Smoller, Bruce Robert; Phung, Thuy Linh

    2015-07-01

    Cutis laxa is characterized by dramatic wrinkling of skin that is lacking in elasticity due to inherent defects in dermal elastic fibers. Cutis laxa can be caused by genetic and metabolic disorders. It can also be acquired, possibly resulting from inflammatory processes with destruction of elastic fibers. This report describes a 26-year old woman who developed acquired cutis laxa and cutaneous mastocytosis leading to premature aging. She represents a unique co-occurrence of these two separate disease entities. To our knowledge, there has been only one published case report of acquired cutis laxa occurring in association with urticaria pigmentosa in a 4-year old girl. Our case would be a second case that exhibits the coexistence of these two disorders in an adult female. PMID:26436968

  9. Magnetic resonance imaging of acquired cardiac disease.

    PubMed Central

    Carrol, C L; Higgins, C B; Caputo, G R

    1996-01-01

    Over the last 15 years, advances in magnetic resonance imaging techniques have increased the accuracy and applicability of cardiovascular magnetic resonance imaging. These advances have improved the utility of magnetic resonance imaging in evaluating cardiac morphology, blood flow, and myocardial contractility, all significant diagnostic features in the evaluation of the patient with acquired heart disease. Utilization of cardiovascular magnetic resonance imaging has been limited, primarily due to clinical reliance upon nuclear scintigraphy and echocardiography. Recent developments in fast and ultrafast imaging should continue to enhance the significance of magnetic resonance imaging in this field. Widespread use of magnetic resonance imaging in the evaluation of the cardiovascular system will ultimately depend upon its maturation into a comprehensive, noninvasive imaging technique for the varying manifestations of acquired heart disease, including cardiomyopathy, ischemic heart disease, and acquired valvular disease. Images PMID:8792545

  10. Protecting the Self: Defense Mechanisms in Action

    ERIC Educational Resources Information Center

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  11. REPORT ON THE DEFENSE LANGUAGE INSTITUTE.

    ERIC Educational Resources Information Center

    BENOIT, LEROY JAMES

    A SUMMARY IS GIVEN OF THE LANGUAGE TRAINING ACTIVITIES OF THE DEFENSE LANGUAGE INSTITUTE, ESTABLISHED IN 1963 TO TEACH THE GLOBAL LANGUAGE REQUIREMENTS OF THE DEPARTMENT OF DEFENSE TO U.S. MILITARY PERSONNEL AND ENGLISH TO FOREIGN ALLIED MILITARY PERSONNEL. THE REPORT DESCRIBES THE AUDIOLINGUAL METHODOLOGY AND APPROACH USED IN ITS INTENSIVE…

  12. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  13. DEFENSE ENVIRONMENTAL NETWORK AND INFORMATION EXCHANGE (DENIX)

    EPA Science Inventory

    DENIX serves as a central platform for the dissemination of environment, safety and occupational health (ESOH) news, policy, and guidance within Department of Defense (DoD) activities worldwide, in support of the national defense mission. DENIX informs ESOH professionals of salie...

  14. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS GENERAL ADMINISTRATIVE REQUIREMENTS Imposition of Civil Money Penalties § 160.410 Affirmative defenses. (a) For violations occurring prior...

  15. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... defense exists with respect to the violations, including the following: (1) The violation is an act... that an affirmative defense exists with respect to the violations, including the following: (1)...

  16. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... affirmative defense exists with respect to the violation, including the following: (1) The covered...

  17. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Affirmative defenses. 160.410 Section 160.410 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS GENERAL ADMINISTRATIVE REQUIREMENTS Imposition of Civil Money Penalties § 160.410 Affirmative defenses. (a) The Secretary may not: (1) Prior...

  18. 45 CFR 160.410 - Affirmative defenses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... defense exists with respect to the violations, including the following: (1) The violation is an act... that an affirmative defense exists with respect to the violations, including the following: (1)...

  19. Defense Contracting and Vocational Education in Illinois.

    ERIC Educational Resources Information Center

    Kjos, Diane; And Others

    A study examined the relationship between defense contracting and vocational education in Illinois. During the study, researchers analyzed data from a variety of national and Illinois state data sources, including the Department of Defense, the Bureau of Labor Statistics, the Illinois Department of Commerce and Community Affairs, the Research and…

  20. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  1. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center, atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  2. GPS Software Packages Deliver Positioning Solutions

    NASA Technical Reports Server (NTRS)

    2010-01-01

    "To determine a spacecraft s position, the Jet Propulsion Laboratory (JPL) developed an innovative software program called the GPS (global positioning system)-Inferred Positioning System and Orbit Analysis Simulation Software, abbreviated as GIPSY-OASIS, and also developed Real-Time GIPSY (RTG) for certain time-critical applications. First featured in Spinoff 1999, JPL has released hundreds of licenses for GIPSY and RTG, including to Longmont, Colorado-based DigitalGlobe. Using the technology, DigitalGlobe produces satellite imagery with highly precise latitude and longitude coordinates and then supplies it for uses within defense and intelligence, civil agencies, mapping and analysis, environmental monitoring, oil and gas exploration, infrastructure management, Internet portals, and navigation technology."

  3. Defensive externality and blame projection following failure.

    PubMed

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals. PMID:1177087

  4. Primitive defenses: cognitive aspects and therapeutic handling.

    PubMed

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process. PMID:7429737

  5. NASA software documentation standard software engineering program

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as Standard) can be applied to the documentation of all NASA software. This Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. This basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  6. [Neutrophils and immunity: is it innate or acquired?].

    PubMed

    Chakravarti, Arpita; Allaeys, Isabelle; Poubelle, Patrice E

    2007-10-01

    The neutrophil has long been considered a phagocytic cell with a short life-span whose major role is to destroy intruders to the body. Toll receptors and anti-infectious factors such as defensin, perforin and granzymes are newly discovered mechanisms used by neutrophils for the first line of defense against invaders. Moreover, subpopulations of neutrophils share specific functions like the synthesis of certain cytokines and chemokines, as well as the expression of immunoreceptors like the T cell receptor. A primary consequence of inflammation on neutrophils is a delay in their spontaneous programmed cell death. Hence, this multifunctional cell is also a necessary actor of the acquired immune response. Neutrophils have the capacity to degrade and process antigens as well as efficiently present antigenic peptides to lymphocytes. Neutrophil interactions with immune cells, in particular dendritic cells, lead to the formation of IL-12 and TNF-alpha deviating the immune response towards a Th1 phenotype. Thus, the neutrophil exhibits a cellular plasticity that explains its capacity to transdifferentiate depending on the local requirements of the immune response. The neutrophil is probably the most underappreciated immune cell among hematopoietic leukocytes, and many neutrophil functions remain to be unraveled. PMID:17937896

  7. Toward directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka; O'Neill, Hugh

    2014-02-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR, for Directed Energy System for Targeting of Asteroids and exploRation. The DE-STAR is a modular-phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, minimizing risk, and allowing for technological codevelopment. An orbiting structure would be developed in stages. The main objective of the DE-STAR is to use focused directed energy to raise the surface spot temperature to ˜3000 K, sufficient to vaporize all known substances. Ejection of evaporated material creates a large reaction force that would alter an asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1- to 10-km array) depending on the degree of protection desired. A DE-STAR 4 allows initial engagement beyond 1 AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in 1 year. Small objects can be diverted with a DE-STAR 2 (100 m) while space debris is vaporized with a DE-STAR 1 (10 m).

  8. The First Line of Defense

    PubMed Central

    Hammer, Adam M.; Morris, Niya L.; Earley, Zachary M.; Choudhry, Mashkoor A.

    2015-01-01

    Alcohol (ethanol) is one of the most globally abused substances, and is one of the leading causes of premature death in the world. As a result of its complexity and direct contact with ingested alcohol, the intestine represents the primary source from which alcohol-associated pathologies stem. The gut is the largest reservoir of bacteria in the body, and under healthy conditions, it maintains a barrier preventing bacteria from translocating out of the intestinal lumen. The intestinal barrier is compromised following alcohol exposure, which can lead to life-threatening systemic complications including sepsis and multiple organ failure. Furthermore, alcohol is a major confounding factor in pathology associated with trauma. Experimental data from both human and animal studies suggest that alcohol perturbs the intestinal barrier and its function, which is exacerbated by a “second hit” from traumatic injury. This article highlights the role of alcohol-mediated alterations of the intestinal epithelia and its defense against bacteria within the gut, and the impact of alcohol on intestinal immunity, specifically on T cells and neutrophils. Finally, it discusses how the gut microbiome both contributes to and protects the intestines from dysbiosis after alcohol exposure and trauma. PMID:26695746

  9. Analyzing plant defenses in nature

    PubMed Central

    Kautz, Stefanie; Heil, Martin; Hegeman, Adrian D

    2009-01-01

    A broad range of chemical plant defenses against herbivores has been studied extensively under laboratory conditions. In many of these cases there is still little understanding of their relevance in nature. In natural systems, functional analyses of plant traits are often complicated by an extreme variability, which affects the interaction with higher trophic levels. Successful analyses require consideration of the numerous sources of variation that potentially affect the plant trait of interest. In our recent study on wild lima bean (Phaseolus lunatus L.) in South Mexico, we applied an integrative approach combining analyses for quantitative correlations of cyanogenic potential (HCNp; the maximum amount of cyanide that can be released from a given tissue) and herbivory in the field with subsequent feeding trials under controlled conditions. This approach allowed us to causally explain the consequences of quantitative variation of HCNp on herbivore-plant interactions in nature and highlights the importance of combining data obtained in natural systems with analyses under controlled conditions. PMID:19820300

  10. Scientific Software for the Macintosh.

    ERIC Educational Resources Information Center

    Watkins, Douglas; Gabaldon, Diana J.

    1985-01-01

    Lists and describes representative software for Macintosh microcomputers. Included are Apple University Consortium software, word processing software, statistics packages, integrated packages, database management systems, and others. Source of software and costs (when available) are included. (JN)

  11. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  12. An assessment of space shuttle flight software development processes

    NASA Technical Reports Server (NTRS)

    1993-01-01

    In early 1991, the National Aeronautics and Space Administration's (NASA's) Office of Space Flight commissioned the Aeronautics and Space Engineering Board (ASEB) of the National Research Council (NRC) to investigate the adequacy of the current process by which NASA develops and verifies changes and updates to the Space Shuttle flight software. The Committee for Review of Oversight Mechanisms for Space Shuttle Flight Software Processes was convened in Jan. 1992 to accomplish the following tasks: (1) review the entire flight software development process from the initial requirements definition phase to final implementation, including object code build and final machine loading; (2) review and critique NASA's independent verification and validation process and mechanisms, including NASA's established software development and testing standards; (3) determine the acceptability and adequacy of the complete flight software development process, including the embedded validation and verification processes through comparison with (1) generally accepted industry practices, and (2) generally accepted Department of Defense and/or other government practices (comparing NASA's program with organizations and projects having similar volumes of software development, software maturity, complexity, criticality, lines of code, and national standards); (4) consider whether independent verification and validation should continue. An overview of the study, independent verification and validation of critical software, and the Space Shuttle flight software development process are addressed. Findings and recommendations are presented.

  13. COTS software selection process.

    SciTech Connect

    Watkins, William M. (Strike Wire Technologies, Louisville, CO); Lin, Han Wei; McClelland, Kelly (U.S. Security Associates, Livermore, CA); Ullrich, Rebecca Ann; Khanjenoori, Soheil; Dalton, Karen; Lai, Anh Tri; Kuca, Michal; Pacheco, Sandra; Shaffer-Gant, Jessica

    2006-05-01

    Today's need for rapid software development has generated a great interest in employing Commercial-Off-The-Shelf (COTS) software products as a way of managing cost, developing time, and effort. With an abundance of COTS software packages to choose from, the problem now is how to systematically evaluate, rank, and select a COTS product that best meets the software project requirements and at the same time can leverage off the current corporate information technology architectural environment. This paper describes a systematic process for decision support in evaluating and ranking COTS software. Performed right after the requirements analysis, this process provides the evaluators with more concise, structural, and step-by-step activities for determining the best COTS software product with manageable risk. In addition, the process is presented in phases that are flexible to allow for customization or tailoring to meet various projects' requirements.

  14. 77 FR 66443 - Renewal of the Defense Health Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-05

    ... of the Secretary Renewal of the Defense Health Board AGENCY: DoD. ACTION: Renewal of Federal Advisory... Defense gives notice that it is renewing the charter for the Defense Health Board (hereinafter referred to... Secretary of Defense''), and the Assistant Secretary of Defense for Health Affairs, independent advice...

  15. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false The Defense Commissioner. 0.181 Section 0.181..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is designated by the Commission. The Defense Commissioner directs the homeland security, national security...

  16. 32 CFR 644.333 - Screening for defense needs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Screening for defense needs. 644.333 Section 644.333 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL... Air Force will be screened against requirements of other Department of Defense (DOD) agencies and...

  17. Long-distance communication and signal amplification in systemic acquired resistance.

    PubMed

    Shah, Jyoti; Zeier, Jürgen

    2013-01-01

    Systemic acquired resistance (SAR) is an inducible defense mechanism in plants that confers enhanced resistance against a variety of pathogens. SAR is activated in the uninfected systemic (distal) organs in response to a prior (primary) infection elsewhere in the plant. SAR is associated with the activation of salicylic acid (SA) signaling and the priming of defense responses for robust activation in response to subsequent infections. The activation of SAR requires communication by the primary infected tissues with the distal organs. The vasculature functions as a conduit for the translocation of factors that facilitate long-distance intra-plant communication. In recent years, several metabolites putatively involved in long-distance signaling have been identified. These include the methyl ester of SA (MeSA), the abietane diterpenoid dehydroabietinal (DA), the dicarboxylic acid azelaic acid (AzA), and a glycerol-3-phosphate (G3P)-dependent factor. Long-distance signaling by some of these metabolites also requires the lipid-transfer protein DIR1 (DEFECTIVE IN INDUCED RESISTANCE 1). The relative contribution of these factors in long-distance signaling is likely influenced by environmental conditions, for example light. In the systemic leaves, the AGD2-LIKE DEFENSE RESPONSE PROTEIN1 (ALD1)-dependent production of the lysine catabolite pipecolic acid (Pip), FLAVIN-DEPENDENT MONOOXYGENASE1 (FMO1) signaling, as well as SA synthesis and downstream signaling are required for the activation of SAR. This review summarizes the involvement and interaction between long-distance SAR signals and details the recently discovered role of Pip in defense amplification and priming that allows plants to acquire immunity at the systemic level. Recent advances in SA signaling and perception are also highlighted. PMID:23440336

  18. Clinical impact of RehaCom software for cognitive rehabilitation of patients with acquired brain injury.

    PubMed

    Fernández, Elízabeth; Bringas, María Luisa; Salazar, Sonia; Rodríguez, Daymí; García, María Eugenia; Torres, Maydané

    2012-10-01

    We describe the clinical impact of the RehaCom computerized cognitive training program instituted in the International Neurological Restoration Center for rehabilitation of brain injury patients. Fifty patients admitted from 2008 through 2010 were trained over 60 sessions. Attention and memory functions were assessed with a pre- and post-treatment design, using the Mini-Mental State Examination, Wechsler Memory Scale and Trail Making Test (Parts A and B). Negative effects were assessed, including mental fatigue, headache and eye irritation. The program's clinical usefulness was confirmed, with 100% of patients showing improved performance in trained functions. PMID:23154316

  19. Ultrasound of Inherited vs. Acquired Demyelinating Polyneuropathies

    PubMed Central

    Zaidman, Craig M.; Harms, Matthew B.; Pestronk, Alan

    2013-01-01

    Introduction We compared features of nerve enlargement in inherited and acquired demyelinating neuropathies using ultrasound. Methods We measured median and ulnar nerve cross-sectional areas in proximal and distal regions in 128 children and adults with inherited (Charcot-Marie Tooth-1 (CMT-1) (n=35)) and acquired (Chronic Inflammatory Demyelinating Polyneuropathy (CIDP) (n=55), Guillaine-Barre Syndrome (GBS) (n=21) and Multifocal Motor Neuropathy (MMN) (n=17)) demyelinating neuropathies. We classified nerve enlargement by degree and number of regions affected. We defined patterns of nerve enlargement as: none- no enlargement; mild-nerves enlarged but never more than twice normal; regional- nerves normal at at least one region and enlarged more than twice normal at atleast one region; diffuse- nerves enlarged at all four regions with atleast one region more than twice normal size. Results Nerve enlargement was commonly diffuse (89%) and generally more than twice normal size in CMT-1, but not (p<0.001) in acquired disorders which mostly had either no, mild or regional nerve enlargement (CIDP (64%), GBS (95%), and MMN (100%)). In CIDP, subjects treated within three months of disease onset had less nerve enlargement than those treated later. Discussion Ultrasound identified patterns of diffuse nerve enlargement can be used to screen patients suspected of having CMT-1. Normal, mildly, or regionally enlarged nerves in demyelinating polyneuropathy suggests an acquired etiology. Early treatment in CIDP may impede nerve enlargement. PMID:24101129

  20. Acquiring a Second Language for School.

    ERIC Educational Resources Information Center

    Collier, Virginia P.

    1995-01-01

    This report offers a conceptual model for use with language minority children who are entering a new school when they must acquire the language of the majority student population. The model has four development components or processes: sociocultural, linguistic, academic, and cognitive. These four components are described in detail. Research is…

  1. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 8 2013-01-01 2013-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  2. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 8 2014-01-01 2014-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  3. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  4. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 8 2011-01-01 2011-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  5. Eye Movement Correlates of Acquired Central Dyslexia

    ERIC Educational Resources Information Center

    Schattka, Kerstin I.; Radach, Ralph; Huber, Walter

    2010-01-01

    Based on recent progress in theory and measurement techniques, the analysis of eye movements has become one of the major methodological tools in experimental reading research. Our work uses this approach to advance the understanding of impaired information processing in acquired central dyslexia of stroke patients with aphasia. Up to now there has…

  6. How Did Light Acquire a Velocity?

    ERIC Educational Resources Information Center

    Lauginie, Pierre

    2013-01-01

    We discuss how light acquired a velocity through history, from the ancient Greeks to the early modern era. Combining abstract debates, models of light, practical needs, planned research and chance, this history illustrates several key points that should be brought out in science education.

  7. Group Treatment in Acquired Brain Injury Rehabilitation

    ERIC Educational Resources Information Center

    Bertisch, Hilary; Rath, Joseph F.; Langenbahn, Donna M.; Sherr, Rose Lynn; Diller, Leonard

    2011-01-01

    The current article describes critical issues in adapting traditional group-treatment methods for working with individuals with reduced cognitive capacity secondary to acquired brain injury. Using the classification system based on functional ability developed at the NYU Rusk Institute of Rehabilitation Medicine (RIRM), we delineate the cognitive…

  8. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN IN... possession of raisins by a handler at his packing or processing plant or at any other established receiving station operated by him: Provided, That a handler shall not be deemed to acquire any raisins...

  9. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Acquire. 926.10 Section 926.10 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE DATA COLLECTION, REPORTING AND...

  10. A Case Of Bilateral Acquired Localized Lipoatrophy

    PubMed Central

    Tanrıkulu, Osman; Yesilova, Yavuz; Aksoy, Mustafa

    2016-01-01

    Lipoatrophy is characterized by inflammation and tissue loss in fatty tissue. This disease may be congenital or acquired, primary or secondary. Secondary lipoatrophy develops with infections, collagen tissue diseases, tumors and drug injections. In this report, we present the case of a 14-year-old female patient who developed lipoatrophy following intramuscular steroid injection to both buttocks. PMID:27504088

  11. Neural Correlates of Acquired Color Category Effects

    ERIC Educational Resources Information Center

    Clifford, Alexandra; Franklin, Anna; Holmes, Amanda; Drivonikou, Vicky G.; Ozgen, Emre; Davies, Ian R. L.

    2012-01-01

    Category training can induce category effects, whereby color discrimination of stimuli spanning a newly learned category boundary is enhanced relative to equivalently spaced stimuli from within the newly learned category (e.g., categorical perception). However, the underlying mechanisms of these acquired category effects are not fully understood.…

  12. Acquired structural defects of the hair.

    PubMed

    Chetty, G N; Kamalam, A; Thambiah, A S

    1981-03-01

    Acquired hair shaft abnormalities resembling genetic trichorrhexis nodosa were seen in two patients. Selenium shampoo and bacterial infection with trichomycosis axillaris may have been the contributing factors. There is a possibility that strongyloides larvae caused trichonodosis in one patient. PMID:7216593

  13. Community-acquired Acinetobacter meningitis in adults.

    PubMed

    Chang, W N; Lu, C H; Huang, C R; Chuang, Y C

    2000-01-01

    Community-acquired Acinetobacter meningitis in adults is an extremely rare infection of the central nervous system (CNS). Here we report one adult case of this rare CNS infection and review the clinical data of another seven cases reported in the English language literature. In total, eight patients (six men and two women) aged between 19 and 63 years were studied. The causative pathogen in our patient was Acinetobacter baumannii; in the other reported cases they were most likely Acinetobacter Iwoffii, Acinetobacter johnsonii, Acinetobacter junii, a genomic species 3 or 6. No underlying disease was found in seven of the eight cases and six of the eight patients acquired the infections before the age of 30 years. Fever and consciousness disturbance were the most common clinical manifestations. Waterhouse-Friderichsen syndrome (WFS) was found in two cases. Unlike the Acinetobacter strains found in nosocomial infections, the strain of Acinetobacter meningitis in the community-acquired case did not show multiple antibiotic resistance. Most adult patients with community-acquired Acinetobacter meningitis can be saved by timely therapy with appropriate antibiotics before deterioration of the systemic condition and impairment of consciousness. PMID:11139162

  14. Interviewing Children with Acquired Brain Injury (ABI)

    ERIC Educational Resources Information Center

    Boylan, Anne-Marie; Linden, Mark; Alderdice, Fiona

    2009-01-01

    Research into the lives of children with acquired brain injury (ABI) often neglects to incorporate children as participants, preferring to obtain the opinions of the adult carer (e.g. McKinlay et al., 2002). There has been a concerted attempt to move away from this position by those working in children's research with current etiquette…

  15. Support Network Responses to Acquired Brain Injury

    ERIC Educational Resources Information Center

    Chleboun, Steffany; Hux, Karen

    2011-01-01

    Acquired brain injury (ABI) affects social relationships; however, the ways social and support networks change and evolve as a result of brain injury is not well understood. This study explored ways in which survivors of ABI and members of their support networks perceive relationship changes as recovery extends into the long-term stage. Two…

  16. Standard Annunciator software overview

    SciTech Connect

    Anspach, D.A. ); Fox, E.T.; Kissock, P.S. )

    1992-10-01

    The Standard Annunciator Software is responsible for controlling the AN/GSS-41 and AN/GSS-44 Annunciator Systems. The software interfaces with other systems-ACS, ECS, CCTV, UPS-to determine current alarm, tamper, and hardware status. Current system status conditions are displayed at the operator's console and on display maps. This manual describes the organization and functionality of the software as well as the generation mechanisms for development and target environments.

  17. Standard Annunciator software overview

    SciTech Connect

    Anspach, D.A.; Fox, E.T.; Kissock, P.S.

    1992-10-01

    The Standard Annunciator Software is responsible for controlling the AN/GSS-41 and AN/GSS-44 Annunciator Systems. The software interfaces with other systems-ACS, ECS, CCTV, UPS-to determine current alarm, tamper, and hardware status. Current system status conditions are displayed at the operator`s console and on display maps. This manual describes the organization and functionality of the software as well as the generation mechanisms for development and target environments.

  18. Gammasphere software development

    SciTech Connect

    Piercey, R.B.

    1993-01-01

    Activities of the nuclear physics group are described. Progress was made in organizing the Gammasphere Software Working Group, establishing a nuclear computing facility, participating in software development at Lawrence Berkeley, developing a common data file format, and adapting the ORNL UPAK software to run at Gammasphere. A universal histogram object was developed that defines a file format and provides for an objective-oriented programming model. An automated liquid nitrogen fill system was developed for Gammasphere (110 Ge detectors comprise the sphere).

  19. IRAS software analysis library

    NASA Technical Reports Server (NTRS)

    Domik, Gitta; Merkle, C. Scott

    1991-01-01

    The goal of this project was to collect 'research software' written in Interactive Data Language (IDL) to support analysis of data from the Infrared Astronomical Satellite (IRAS) and make it available to the larger community. 'Research Software' describes software created by researchers and staff for a specific research goal, but lacks sufficient documentation, easy to use interfaces, and rigorous debugging. Additionally, most of the IDL/IRAS code available needed to be ported to a (largely) hardware independent new version of IDL.

  20. Statistical modelling of software reliability

    NASA Technical Reports Server (NTRS)

    Miller, Douglas R.

    1991-01-01

    During the six-month period from 1 April 1991 to 30 September 1991 the following research papers in statistical modeling of software reliability appeared: (1) A Nonparametric Software Reliability Growth Model; (2) On the Use and the Performance of Software Reliability Growth Models; (3) Research and Development Issues in Software Reliability Engineering; (4) Special Issues on Software; and (5) Software Reliability and Safety.

  1. Rapid Software Evolution

    NASA Astrophysics Data System (ADS)

    Iordanov, Borislav

    The high complexity of modern software systems, described more than twenty years ago in the well-know paper by Fred Brooks [Brooks 1986] has become proverbial amongst practitioners. While the software engineering community has accepted and learned to cope, albeit in a limited way, with what Brooks termed essential difficulties, i.e. intractable obstacles due to the nature of software itself, there is a consensus that the ultra large-scale systems of the future call for a fundamental change in our understanding and practice of software construction [Northrop 2006].

  2. Classification software technique assessment

    NASA Technical Reports Server (NTRS)

    Jayroe, R. R., Jr.; Atkinson, R.; Dasarathy, B. V.; Lybanon, M.; Ramapryian, H. K.

    1976-01-01

    A catalog of software options is presented for the use of local user communities to obtain software for analyzing remotely sensed multispectral imagery. The resources required to utilize a particular software program are described. Descriptions of how a particular program analyzes data and the performance of that program for an application and data set provided by the user are shown. An effort is made to establish a statistical performance base for various software programs with regard to different data sets and analysis applications, to determine the status of the state-of-the-art.

  3. Software Reuse Issues

    NASA Technical Reports Server (NTRS)

    Voigt, Susan J. (Editor); Smith, Kathryn A. (Editor)

    1989-01-01

    NASA Langley Research Center sponsored a Workshop on NASA Research in Software Reuse on November 17-18, 1988 in Melbourne, Florida, hosted by Software Productivity Solutions, Inc. Participants came from four NASA centers and headquarters, eight NASA contractor companies, and three research institutes. Presentations were made on software reuse research at the four NASA centers; on Eli, the reusable software synthesis system designed and currently under development by SPS; on Space Station Freedom plans for reuse; and on other reuse research projects. This publication summarizes the presentations made and the issues discussed during the workshop.

  4. Architecture for Verifiable Software

    NASA Technical Reports Server (NTRS)

    Reinholtz, William; Dvorak, Daniel

    2005-01-01

    Verifiable MDS Architecture (VMA) is a software architecture that facilitates the construction of highly verifiable flight software for NASA s Mission Data System (MDS), especially for smaller missions subject to cost constraints. More specifically, the purpose served by VMA is to facilitate aggressive verification and validation of flight software while imposing a minimum of constraints on overall functionality. VMA exploits the state-based architecture of the MDS and partitions verification issues into elements susceptible to independent verification and validation, in such a manner that scaling issues are minimized, so that relatively large software systems can be aggressively verified in a cost-effective manner.

  5. On Software Compatibility.

    ERIC Educational Resources Information Center

    Ershov, Andrei P.

    The problem of compatibility of software hampers the development of computer application. One solution lies in standardization of languages, terms, peripherais, operating systems and computer characteristics. (AB)

  6. Dtest Testing Software

    NASA Technical Reports Server (NTRS)

    Jain, Abhinandan; Cameron, Jonathan M.; Myint, Steven

    2013-01-01

    This software runs a suite of arbitrary software tests spanning various software languages and types of tests (unit level, system level, or file comparison tests). The dtest utility can be set to automate periodic testing of large suites of software, as well as running individual tests. It supports distributing multiple tests over multiple CPU cores, if available. The dtest tool is a utility program (written in Python) that scans through a directory (and its subdirectories) and finds all directories that match a certain pattern and then executes any tests in that directory as described in simple configuration files.

  7. NASA's Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Ramsay, Christopher M.

    2005-01-01

    NASA (National Aeronautics and Space Administration) relies more and more on software to control, monitor, and verify its safety critical systems, facilities and operations. Since the 1960's there has hardly been a spacecraft (manned or unmanned) launched that did not have a computer on board that provided vital command and control services. Despite this growing dependence on software control and monitoring, there has been no consistent application of software safety practices and methodology to NASA's projects with safety critical software. Led by the NASA Headquarters Office of Safety and Mission Assurance, the NASA Software Safety Standard (STD-18l9.13B) has recently undergone a significant update in an attempt to provide that consistency. This paper will discuss the key features of the new NASA Software Safety Standard. It will start with a brief history of the use and development of software in safety critical applications at NASA. It will then give a brief overview of the NASA Software Working Group and the approach it took to revise the software engineering process across the Agency.

  8. Software Use Control

    SciTech Connect

    Trussell, F.G.

    1994-03-01

    The topic of this technical presentation is Use Control Software. The nuclear weapon software design community is being subjected to many surety forces that are stretching the envelope of their designs. Given that software is a critical part of the use control system design, we must work to limit the errors of the software development process. The objective of this paper is to discuss a methodology that the author, as a member of the Security and Use Control Assessment Department, is working on. This is the first introduction of the proposed methodology. Software that is a part of any use control system, subsystem, device, or component is critical to the operation of that apparatus. The software is expected to meet the criteria of modern software quality. In a use control application, meeting the normal quality standards is short of the expectations in meeting the use control obligations. The NWC community expects the use control features of a nuclear weapon to provide assurance that the weapon is protected from unauthorized nuclear detonation. The methodology that the author is proposing will provide a focused scrutiny to software that is used in the hardware of use control systems, subsystems, devices, and components. The methodology proposes further scrutiny of the structure of the software, memory, variables, storage, and control features.

  9. Hsp27 gene in Drosophila ananassae subgroup was split by a recently acquired intron.

    PubMed

    Zhang, Li; Kang, Han; Jin, Shan; Zeng, Qing Tao; Yang, Yong

    2016-06-01

    In Drosophila, heat shock protein 27 (Hsp27) is a critical single-copy intron-free nuclear gene involved in the defense response against fungi and bacteria, and is a regulator of adult lifespan. In the present study, 33 homologous Hsp27 nucleotide sequences from different Drosophila species were amplified by PCR and reverse transcription PCR, and the phylogenetic relationships were analysed using neighbour-joining, maximum-likelihood and Bayesian methods. The phylogenetic topologies from analysis with different algorithms were similar, suggesting that the Hsp27 gene was split by a recently acquired intron during the evolution of the Drosophila ananassae subgroup. PMID:27350667

  10. 77 FR 27615 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary 32 CFR Part 236 Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary... other forms of information technology. (a) Title: Defense Industrial Base Cyber Security/Information... added to read as follows: PART 236--DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB)...

  11. NASA's Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Ramsay, Christopher M.

    2007-01-01

    NASA relies more and more on software to control, monitor, and verify its safety critical systems, facilities and operations. Since the 1960's there has hardly been a spacecraft launched that does not have a computer on board that will provide command and control services. There have been recent incidents where software has played a role in high-profile mission failures and hazardous incidents. For example, the Mars Orbiter, Mars Polar Lander, the DART (Demonstration of Autonomous Rendezvous Technology), and MER (Mars Exploration Rover) Spirit anomalies were all caused or contributed to by software. The Mission Control Centers for the Shuttle, ISS, and unmanned programs are highly dependant on software for data displays, analysis, and mission planning. Despite this growing dependence on software control and monitoring, there has been little to no consistent application of software safety practices and methodology to NASA's projects with safety critical software. Meanwhile, academia and private industry have been stepping forward with procedures and standards for safety critical systems and software, for example Dr. Nancy Leveson's book Safeware: System Safety and Computers. The NASA Software Safety Standard, originally published in 1997, was widely ignored due to its complexity and poor organization. It also focused on concepts rather than definite procedural requirements organized around a software project lifecycle. Led by NASA Headquarters Office of Safety and Mission Assurance, the NASA Software Safety Standard has recently undergone a significant update. This new standard provides the procedures and guidelines for evaluating a project for safety criticality and then lays out the minimum project lifecycle requirements to assure the software is created, operated, and maintained in the safest possible manner. This update of the standard clearly delineates the minimum set of software safety requirements for a project without detailing the implementation for those

  12. Teaching Social Software with Social Software

    ERIC Educational Resources Information Center

    Mejias, Ulises

    2006-01-01

    Ulises Mejias examines how social software--information and communications technologies that facilitate the collaboration and exchange of ideas--enables students to participate in distributed research, an approach to learning in which knowledge is collectively constructed and shared. During Fall 2005, Mejias taught a graduate seminar that provided…

  13. Structured Analysis Tool interface to the Strategic Defense Initiative architecture dataflow modeling technique. Master's thesis

    SciTech Connect

    Austin, K.A.

    1989-12-01

    A software interface was designed and implemented that extends the use of Structured Analysis (SA) Tool (SAtool) as a graphical front-end to the Strategic Defense Initiative Architecture Dataflow Modeling Technique (SADMT). SAtool is a computer-aided software engineering tool developed at the Air Force Institute of Technology that automates the requirements analysis phase of software development using a graphics editor. The tool automates two approaches for documenting software requirements analysis: SA diagrams and data dictionaries. SADMT is an Ada based simulation framework that enables users to model real-world architectures for simulation purposes. This research was accomplished in three phases. During the first phase, entity-relationship (E-R) models of each software package were developed. From these E-R models, relationships between the two software packages were identified and used to develop a mapping from SAtool to SADMT. The next phase of the research was the development of a software interface in Ada based on the mapping developed in the first phase. A combination of a top-down and a bottom-up approach was used in developing the software.

  14. ATLAS software packaging

    NASA Astrophysics Data System (ADS)

    Rybkin, Grigory

    2012-12-01

    Software packaging is indispensable part of build and prerequisite for deployment processes. Full ATLAS software stack consists of TDAQ, HLT, and Offline software. These software groups depend on some 80 external software packages. We present tools, package PackDist, developed and used to package all this software except for TDAQ project. PackDist is based on and driven by CMT, ATLAS software configuration and build tool, and consists of shell and Python scripts. The packaging unit used is CMT project. Each CMT project is packaged as several packages—platform dependent (one per platform available), source code excluding header files, other platform independent files, documentation, and debug information packages (the last two being built optionally). Packaging can be done recursively to package all the dependencies. The whole set of packages for one software release, distribution kit, also includes configuration packages and contains some 120 packages for one platform. Also packaged are physics analysis projects (currently 6) used by particular physics groups on top of the full release. The tools provide an installation test for the full distribution kit. Packaging is done in two formats for use with the Pacman and RPM package managers. The tools are functional on the platforms supported by ATLAS—GNU/Linux and Mac OS X. The packaged software is used for software deployment on all ATLAS computing resources from the detector and trigger computing farms, collaboration laboratories computing centres, grid sites, to physicist laptops, and CERN VMFS and covers the use cases of running all applications as well as of software development.

  15. Directed energy missile defense in space

    NASA Astrophysics Data System (ADS)

    Carter, A. B.

    1984-04-01

    Current concepts for directed-energy ballistic missile defense in space are described and assessed. Its purpose is to provide Members of Congress, their staffs, and the public with a readable introduction to the so-called Star Wars technologies that some suggest might form the basis of a future nationwide defense against Soviet nuclear ballistic missiles. Since these technologies are a relatively new focus for U.S. missile defense efforts, little information about them has been readily available outside the expert community.

  16. Strategic defense initiative: Folly or future

    SciTech Connect

    Haley, P.E.; Merritt, J.

    1986-01-01

    This collection of analyses is a guide through the maze of claims and criticisms about ''Star Wars,'' the controversial effort of the Reagan administration to reorient United States nuclear strategy to strategic defense. The text starts with an introduction by the editors followed by individual chapters outlining the strategic defense initiative as originally conceived and subsequently modified by the Reagan administration; the arguments for and against the plan's strategic and technical feasibility; and assessments of the harmful and constructive effects of strategic defense on U.S.-Soviet and U.S.-allied relations.

  17. Seven Processes that Enable NASA Software Engineering Technologies

    NASA Technical Reports Server (NTRS)

    Housch, Helen; Godfrey, Sally

    2011-01-01

    This slide presentation reviews seven processes that NASA uses to ensure that software is developed, acquired and maintained as specified in the NPR 7150.2A requirement. The requirement is to ensure that all software be appraised for the Capability Maturity Model Integration (CMMI). The enumerated processes are: (7) Product Integration, (6) Configuration Management, (5) Verification, (4) Software Assurance, (3) Measurement and Analysis, (2) Requirements Management and (1) Planning & Monitoring. Each of these is described and the group(s) that are responsible is described.

  18. 78 FR 41331 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 225 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to insert a hyperlink and direct contracting officers to the DFARS Procedures,...

  19. 77 FR 19128 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 203 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to add a reference for reporting suspected lobbying violations. DATES: Effective...

  20. 77 FR 11775 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 252 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: February 28, 2012. FOR...

  1. 78 FR 36113 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 222 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: June 17, 2013. FOR...

  2. 76 FR 6766 - Meeting of the Defense Science Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... February 23-24, 2011; at the Pentagon, Arlington, VA. The mission of the Defense Science Board is to advise... Rose, Executive Officer, Defense Science Board, 3140 Defense Pentagon, Room 3B888A, Washington,...

  3. The Strategic Defense Initiative bibliography and reference guide

    SciTech Connect

    Lawrence, R.M.

    1986-01-01

    The ballistic missile defense debate, which has permeated strategic discussion in the United States for nearly three decades, received an impressive stimulus when President Ronald Reagan addressed the nation on the evening of March 23, 1983. In that address, dubbed the ''Star Wars'' speech by the media, the president asked the scientific community to pursue research and development of hardware and software that would enable the nation to switch from the deterrence doctrine of Mutual Assured Destruction (MAD) to a policy based on the unilateral capability to physically defend the country against ballistic missile attack. The editors have assembled approximately one thousand citations - including books, monographs, articles, and government documents - that reflect the full spectrum of thought on the issue. Seminal references have been abstracted and divided into three sections: technical parameters of the debate, arguments in favor of SDI, and arguments against SDI. Each section contains an essay that integrates and amplifies the information presented in the abstracted materials.

  4. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  5. Cactus: Software Priorities

    ERIC Educational Resources Information Center

    Hyde, Hartley

    2009-01-01

    The early eighties saw a period of rapid change in computing and teachers lost control of how they used computers in their classrooms. Software companies produced computer tools that looked so good that teachers forgot about writing their own classroom materials and happily purchased software--that offered much more than teachers needed--from…

  6. Learning from Software Localization.

    ERIC Educational Resources Information Center

    Guo, She-Sen

    2003-01-01

    Localization is the process of adapting a product to meet the language, cultural and other requirements of a specific target environment or market. This article describes ways in which software localization impacts upon curriculum, and discusses what students will learn from software localization. (AEF)

  7. Software measurement guidebook

    NASA Technical Reports Server (NTRS)

    Bassman, Mitchell J.; Mcgarry, Frank; Pajerski, Rose

    1994-01-01

    This software Measurement Guidebook presents information on the purpose and importance of measurement. It discusses the specific procedures and activities of a measurement program and the roles of the people involved. The guidebook also clarifies the roles that measurement can and must play in the goal of continual, sustained improvement for all software production and maintenance efforts.

  8. Plating Tank Control Software

    1998-03-01

    The Plating Tank Control Software is a graphical user interface that controls and records plating process conditions for plating in high aspect ratio channels that require use of low current and long times. The software is written for a Pentium II PC with an 8 channel data acquisition card, and the necessary shunt resistors for measuring currents in the millampere range.

  9. Predicting software reliability

    NASA Technical Reports Server (NTRS)

    Littlewood, B.

    1989-01-01

    A detailed look is given to software reliability techniques. A conceptual model of the failure process is examined, and some software reliability growth models are discussed. Problems for which no current solutions exist are addressed, emphasizing the very difficult problem of safety-critical systems for which the reliability requirements can be enormously demanding.

  10. Communications Software for Microcomputers.

    ERIC Educational Resources Information Center

    Bruman, Janet L.

    Focusing on the use of microcomputers as "smart terminals" for accessing time-sharing systems for libraries, this document discusses the communications software needed to allow the microcomputer to appear as a terminal to the remote host. The functions which communications software programs are designed to perform are defined and explained,…

  11. Measuring software technology

    NASA Technical Reports Server (NTRS)

    Agresti, W. W.; Card, D. N.; Church, V. E.; Page, G.; Mcgarry, F. E.

    1983-01-01

    Results are reported from a series of investigations into the effectiveness of various methods and tools used in a software production environment. The basis for the analysis is a project data base, built through extensive data collection and process instrumentation. The project profiles become an organizational memory, serving as a reference point for an active program of measurement and experimentation on software technology.

  12. Reusable Software Technology

    NASA Technical Reports Server (NTRS)

    Morgan, Timothy E.

    1995-01-01

    The objective of the Reusable Software System (RSS) is to provide NASA Langley Research Center and its contractor personnel with a reusable software technology through the Internet. The RSS is easily accessible, provides information that is extractable, and the capability to submit information or data for the purpose of scientific research at NASA Langley Research Center within the Atmospheric Science Division.

  13. Software Solution Saves Dollars

    ERIC Educational Resources Information Center

    Trotter, Andrew

    2004-01-01

    This article discusses computer software that can give classrooms and computer labs the capabilities of costly PC's at a small fraction of the cost. A growing number of cost-conscious school districts are finding budget relief in low-cost computer software known as "open source" that can do everything from manage school Web sites to equip…

  14. Technology 84: software

    SciTech Connect

    Wallich, P.

    1984-01-01

    Progress is reported with regard to knowledge systems-artificial intelligence software capable of giving expert advice or analyzing complex information-and their major tasks and applications. A standard military language, ADA, is also discussed along with efforts to standardize software environments.

  15. Measuring software design

    NASA Technical Reports Server (NTRS)

    1986-01-01

    An extensive series of studies of software design measures conducted by the Software Engineering Laboratory is described. Included are the objectives and results of the studies, the method used to perform the studies, and the problems encountered. The document should be useful to researchers planning similar studies as well as to managers and designers concerned with applying quantitative design measures.

  16. NASA Software Documentation Standard

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as "Standard") is designed to support the documentation of all software developed for NASA; its goal is to provide a framework and model for recording the essential information needed throughout the development life cycle and maintenance of a software system. The NASA Software Documentation Standard can be applied to the documentation of all NASA software. The Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. The basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  17. No System? No Software!

    ERIC Educational Resources Information Center

    Conley, Donna

    1989-01-01

    Noting that the computer software cataloging system at the media center of the Washington (Illinois) Center for Continuing Education is essentially a card catalog in notebook form, this article describes aspects of the development and utilization of the system. Major sections describe: (1) software cataloging system terminology; (2) steps for…

  18. SEED Software Annotations.

    ERIC Educational Resources Information Center

    Bethke, Dee; And Others

    This document provides a composite index of the first five sets of software annotations produced by Project SEED. The software has been indexed by title, subject area, and grade level, and it covers sets of annotations distributed in September 1986, April 1987, September 1987, November 1987, and February 1988. The date column in the index…

  19. Selecting the Right Software.

    ERIC Educational Resources Information Center

    Shearn, Joseph

    1987-01-01

    Selection of administrative software requires analyzing present needs and, to meet future needs, choosing software that will function with a more powerful computer system. Other important factors to include are a professional system demonstration, maintenance and training, and financial considerations that allow leasing or renting alternatives.…

  20. Software Marketing Considerations.

    ERIC Educational Resources Information Center

    Fuchs, Victor E.

    Seven factors that currently affect the potential for marketing and publishing computer software for education are discussed: (1) computers as an inplace technology in education, (2) marketing and distribution patterns for software, (3) consumer demand, (4) quality, (5) timelessenss, (6) basic skills, and (7) the future. The proliferation of…

  1. Who Owns Computer Software?

    ERIC Educational Resources Information Center

    Branscomb, Anne Wells

    1995-01-01

    Discusses the protection of intellectual property as it applies to computer software and its impact on private enterprise and the public good. Highlights include the role of patents, copyrights, and trade secrets; some court cases; and recommendations for alternatives to the existing legal framework for protecting computer software. (KRN)

  2. Software process assessments

    NASA Technical Reports Server (NTRS)

    Miller, Sharon E.; Tucker, George T.; Verducci, Anthony J., Jr.

    1992-01-01

    Software process assessments (SPA's) are part of an ongoing program of continuous quality improvements in AT&T. Their use was found to be very beneficial by software development organizations in identifying the issues facing the organization and the actions required to increase both quality and productivity in the organization.

  3. ITOUGH2 software qualification

    SciTech Connect

    Finsterle, S.; Pruess, K.; Fraser, P.

    1996-10-01

    The purpose of this report is to provide all software baseline documents necessary for the software qualification of ITOUGH2. ITOUGH2 is a computer program providing inverse modeling capabilities for TOUGH2. TOUGH2 is a numerical simulation code for multi-dimensional coupled fluid and heat flow of multiphase, multicomponent fluid mixtures in porous and fractured media.

  4. Cartographic applications software

    USGS Publications Warehouse

    U.S. Geological Survey

    1992-01-01

    The Office of the Assistant Division Chief for Research, National Mapping Division, develops computer software for the solution of geometronic problems in the fields of surveying, geodesy, remote sensing, and photogrammetry. Software that has been developed using public funds is available on request for a nominal charge to recover the cost of duplication.

  5. Cathodoluminescence Spectrum Imaging Software

    2011-04-07

    The software developed for spectrum imaging is applied to the analysis of the spectrum series generated by our cathodoluminescence instrumentation. This software provides advanced processing capabilities s such: reconstruction of photon intensity (resolved in energy) and photon energy maps, extraction of the spectrum from selected areas, quantitative imaging mode, pixel-to-pixel correlation spectrum line scans, ASCII, output, filling routines, drift correction, etc.

  6. UWB Tracking Software Development

    NASA Technical Reports Server (NTRS)

    Gross, Julia; Arndt, Dickey; Ngo, Phong; Phan, Chau; Dusl, John; Ni, Jianjun; Rafford, Melinda

    2006-01-01

    An Ultra-Wideband (UWB) two-cluster Angle of Arrival (AOA) tracking prototype system is currently being developed and tested at NASA Johnson Space Center for space exploration applications. This talk discusses the software development efforts for this UWB two-cluster AOA tracking system. The role the software plays in this system is to take waveform data from two UWB radio receivers as an input, feed this input into an AOA tracking algorithm, and generate the target position as an output. The architecture of the software (Input/Output Interface and Algorithm Core) will be introduced in this talk. The development of this software has three phases. In Phase I, the software is mostly Matlab driven and calls C++ socket functions to provide the communication links to the radios. This is beneficial in the early stage when it is necessary to frequently test changes in the algorithm. Phase II of the development is to have the software mostly C++ driven and call a Matlab function for the AOA tracking algorithm. This is beneficial in order to send the tracking results to other systems and also to improve the tracking update rate of the system. The third phase is part of future work and is to have the software completely C++ driven with a graphics user interface. This software design enables the fine resolution tracking of the UWB two-cluster AOA tracking system.

  7. PREVAPORATION PERFORMANCE PREDICTION SOFTWARE

    EPA Science Inventory

    The Pervaporation, Performance, Prediction Software and Database (PPPS&D) computer software program is currently being developed within the USEPA, NRMRL. The purpose of the PPPS&D program is to educate and assist potential users in identifying opportunities for using pervaporati...

  8. Software engineering ethics

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    Software engineering ethics is reviewed. The following subject areas are covered: lack of a system viewpoint; arrogance of PC DOS software vendors; violation od upward compatibility; internet worm; internet worm revisited; student cheating and company hiring interviews; computing practitioners and the commodity market; new projects and old programming languages; schedule and budget; and recent public domain comments.

  9. Spatial proximity amplifies valence in emotional memory and defensive approach-avoidance

    PubMed Central

    Åhs, Fredrik; Dunsmoor, Joseph E.; Zielinski, David; LaBar, Kevin S.

    2015-01-01

    In urban areas, people often have to stand or move in close proximity to others. The egocentric distance to stimuli is a powerful determinant of defensive behavior in animals. Yet, little is known about how spatial proximity to others alters defensive responses in humans. We hypothesized that the valence of social cues scales with egocentric distance, such that proximal social stimuli have more positive or negative valence than distal stimuli. This would predict enhanced defensive responses to proximal threat and reduced defensive responses to proximal reward. We tested this hypothesis across four experiments using 3-D virtual reality simulations. Results from Experiment 1 confirmed that proximal social stimuli facilitate defensive responses, as indexed by fear-potentiated startle, relative to distal stimuli. Experiment 2 revealed that interpersonal defensive boundaries flexibly increase with aversive learning. Experiment 3 examined whether spatial proximity enhances memory for aversive experiences. Fear memories for social threats encroaching on the body were more persistent than those acquired at greater interpersonal distances, as indexed by startle. Lastly, Experiment 4 examined how egocentric distance influenced startle responses to social threats during defensive approach and avoidance. Whereas fear-potentiated startle increased with proximity when participants actively avoided receiving shocks, startle decreased with proximity when participants tolerated shocks to receive monetary rewards, implicating opposing gradients of distance on threat versus reward. Thus, proximity in egocentric space amplifies the valence of social stimuli that, in turn, facilitates emotional memory and approach-avoidance responses. These findings have implications for understanding the consequences of increased urbanization on affective interpersonal behavior. PMID:25541499

  10. An Experimental Approach to the Estimation of the Contribution of Skills Acquired during Military Training and Service in the Civilian Sector.

    ERIC Educational Resources Information Center

    Spencer, Daniel L.; Woroniak, Alexander

    This report describes a pioneering attempt to establish and quantify the transfer of military-acquired technical skills to civilian occupations. It provides a concrete demonstration of a method by which the military's non-defense contribution to the civilian economy can be estimated in money terms. Based on a sample of Japanese Air Self Defense…

  11. The Company Approach to Software Engineering Project Courses

    ERIC Educational Resources Information Center

    Broman, D.; Sandahl, K.; Abu Baker, M.

    2012-01-01

    Teaching larger software engineering project courses at the end of a computing curriculum is a way for students to learn some aspects of real-world jobs in industry. Such courses, often referred to as capstone courses, are effective for learning how to apply the skills they have acquired in, for example, design, test, and configuration management.…

  12. Cleanroom software development

    NASA Technical Reports Server (NTRS)

    Dyer, M.; Mills, H. D.

    1981-01-01

    The 'cleanroom' software development process is a technical and organizational approach to developing software with certifiable reliability. Key ideas behind the process are well structured software specifications, randomized testing methods and the introduction of statistical controls; but the main point is to deny entry for defects during the development of software. This latter point suggests the use of the term 'cleanroom' in analogy to the defect prevention controls used in the manufacturing of high technology hardware. In the 'cleanroom', the entire software development process is embedded within a formal statistical design, in contrast to executing selected tests and appealing to the randomness of operational settings for drawing statistical inferences. Instead, random testing is introduced as a part of the statistical design itself so that when development and testing are completed, statistical inferences are made about the operation of the system.

  13. Tracker 300 Software

    2006-01-12

    The Tracker300 software is downloaded to an off-the-shelf product called RCM3400/RCM3410 made by Rabbit Semiconductor. The software is a closed loop control which computes the sun's position and provides stability compensation. Using the RCM3400/RCM3410 module, the software stores and retrieves parameters from the onboard flash. The software also allows for communication with a host. It will allow the parameters to be downloaded or uploaded, it will show the status of the controller, it will providemore » real-time feedback, and it will send command acknowledgements. The software will capture the GPS response and ensure the internal clock is set correctly.« less

  14. Software quality in 1997

    SciTech Connect

    Jones, C.

    1997-11-01

    For many years, software quality assurance lagged behind hardware quality assurance in terms of methods, metrics, and successful results. New approaches such as Quality Function Deployment (QFD) the ISO 9000-9004 standards, the SEI maturity levels, and Total Quality Management (TQM) are starting to attract wide attention, and in some cases to bring software quality levels up to a parity with manufacturing quality levels. Since software is on the critical path for many engineered products, and for internal business systems as well, the new approaches are starting to affect global competition and attract widespread international interest. It can be hypothesized that success in mastering software quality will be a key strategy for dominating global software markets in the 21st century.

  15. Current treatment options of acquired flatfoot.

    PubMed

    Lesić, Aleksandar R; Atkinson, Henry Dushan E; Zagorac, Slavisa G; Bumbasirević, Marko

    2013-01-01

    Symptomatic acquired flatfoot is an important orthopaedic problem, due to progressive loss of whole foot function and the increasing problem of patient disability. It is a complex entity, involving the tibialis posterior tendon, ankle joint, hindfoot and midfoot. In most cases the posterior tibial tendon (PTT) is the root cause of acquired flat foot, but there are other contributors and many different factors have an influence. The clinical picture varies depending on the stage of the deformity, as well as the treatment approach. Initially soft tissue procedures, synoviectomy and augmentation of the PTT are advised. In stage 2, lateral column lengthening and calcaneal osteotomy, with soft tissue - tendon transfers (TA, FHL, FDL) are recommended. In stage 3 subtalar, double or triplearthodesis is preferable, while in stage 4 pantalar fusion is indicated. This article elaborates on the etiology, the clinical picture, diagnosis and treatment modalities. PMID:24669559

  16. Acquired Cystic Fibrosis Transmembrane Conductance Regulator Deficiency.

    PubMed

    Cho, Do-Yeon; Woodworth, Bradford A

    2016-01-01

    In the genetic airway disease cystic fibrosis (CF), deficiency or dysfunction of the cystic fibrosis membrane conductance regulator (CFTR) alters anion transport in respiratory epithelium and consequently disrupts mucociliary clearance. An enriched understanding of the role of CFTR in the maintenance of normal epithelial function has revealed that mild and variable CFTR mutations play a causative role in a number of diseases not classically associated with CF. Furthermore, recent evidence indicates that acquired defects in wild-type CFTR protein processing, endocytic recycling and function can contribute to the pathogenesis of airway diseases, such as chronic obstructive pulmonary disease. In this chapter, we discuss emerging findings implicating acquired CFTR dysfunction in the pathogenesis of chronic rhinosinusitis and propose a new and leading edge approach to future CRS therapy using CFTR potentiators. PMID:27466849

  17. Phagocytic defense in the lung.

    PubMed

    Reynolds, H Y

    1985-01-01

    Phagocytic defense in the normal lung is shared principally by two kinds of cells - alveolar macrophages that reside on the air surface and roam the alveoli and PMNs that circulate in the intravascular space or are stored transiently in areas adjacent to the capillary-alveolar interface (marginated in capillaries) and can reach the alveolar space quickly. The nature of the stimulating microorganism or aerosol particle reaching the alveolar surface may determine which phagocytic cell ultimately responds to contain the intruder. Ingestion and containment (either intracellular killing or enzymatic degradation) are the goals, and an 'opsonin' may be necessary to enhance the efficiency of phagocytosis. In the lung this is very complex, reflecting the interdependence on immune and nonimmune opsonins. For immune mediated phagocytosis by alveolar macrophages, IgG antibody is preferable. Among the four subclasses of IgG, certain ones seem to bind preferentially to macrophages, whereas others are already adherent to the cells as cytophilic antibody. In the respiratory tract milieu of subjects with CF, the interaction of immune and nonimmune opsonins is much more complex because of proteolytic enzymes that can degrade antibodies creating various fragments. Now that we are in an era of very specific humoral replacement therapy with intravenous IgG that contains IgG subclasses and the potential for using monoclonal antibodies for very precisely directed replacement, special attention must be given to identifying the appropriate class and subclass of antibody that may be required. This may be relatively simple when forms of passive immune therapy are being considered. More difficult will be devising ways to actively immunize patients (or animals) and manipulate their antibody responses so that selective immunoglobulin subclasses are produced. To obtain such control over the humoral immune response will require much more basic work in animal models. More attention to the form of

  18. Scientific Software Component Technology

    SciTech Connect

    Kohn, S.; Dykman, N.; Kumfert, G.; Smolinski, B.

    2000-02-16

    We are developing new software component technology for high-performance parallel scientific computing to address issues of complexity, re-use, and interoperability for laboratory software. Component technology enables cross-project code re-use, reduces software development costs, and provides additional simulation capabilities for massively parallel laboratory application codes. The success of our approach will be measured by its impact on DOE mathematical and scientific software efforts. Thus, we are collaborating closely with library developers and application scientists in the Common Component Architecture forum, the Equation Solver Interface forum, and other DOE mathematical software groups to gather requirements, write and adopt a variety of design specifications, and develop demonstration projects to validate our approach. Numerical simulation is essential to the science mission at the laboratory. However, it is becoming increasingly difficult to manage the complexity of modern simulation software. Computational scientists develop complex, three-dimensional, massively parallel, full-physics simulations that require the integration of diverse software packages written by outside development teams. Currently, the integration of a new software package, such as a new linear solver library, can require several months of effort. Current industry component technologies such as CORBA, JavaBeans, and COM have all been used successfully in the business domain to reduce software development costs and increase software quality. However, these existing industry component infrastructures will not scale to support massively parallel applications in science and engineering. In particular, they do not address issues related to high-performance parallel computing on ASCI-class machines, such as fast in-process connections between components, language interoperability for scientific languages such as Fortran, parallel data redistribution between components, and massively

  19. Hepcidin and Host Defense against Infectious Diseases

    PubMed Central

    Michels, Kathryn; Nemeth, Elizabeta; Ganz, Tomas; Mehrad, Borna

    2015-01-01

    Hepcidin is the master regulator of iron homeostasis in vertebrates. The synthesis of hepcidin is induced by systemic iron levels and by inflammatory stimuli. While the role of hepcidin in iron regulation is well established, its contribution to host defense is emerging as complex and multifaceted. In this review, we summarize the literature on the role of hepcidin as a mediator of antimicrobial immunity. Hepcidin induction during infection causes depletion of extracellular iron, which is thought to be a general defense mechanism against many infections by withholding iron from invading pathogens. Conversely, by promoting iron sequestration in macrophages, hepcidin may be detrimental to cellular defense against certain intracellular infections, although critical in vivo studies are needed to confirm this concept. It is not yet clear whether hepcidin exerts any iron-independent effects on host defenses. PMID:26291319

  20. Happiness and Defense Styles in Psychiatrists.

    PubMed

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness. PMID:26731124