Science.gov

Sample records for acquiring defense software

  1. Estimating Software Effort Hours for Major Defense Acquisition Programs

    ERIC Educational Resources Information Center

    Wallshein, Corinne C.

    2010-01-01

    Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…

  2. Acquiring Software Design Schemas: A Machine Learning Perspective

    NASA Technical Reports Server (NTRS)

    Harandi, Mehdi T.; Lee, Hing-Yan

    1991-01-01

    In this paper, we describe an approach based on machine learning that acquires software design schemas from design cases of existing applications. An overview of the technique, design representation, and acquisition system are presented. the paper also addresses issues associated with generalizing common features such as biases. The generalization process is illustrated using an example.

  3. The Defense Technical Information Center: Acquiring Information and Imparting Knowledge.

    ERIC Educational Resources Information Center

    Molholm, Kurt N.; And Others

    1988-01-01

    This overview of the Defense Technical Information Center (DTIC) discusses how DTIC fits into the Department of Defense Scientific and Technical Information Program; its history, organization, users, and operations; types of information handled; subject classification; cataloging standards; Information Analysis Centers (IACs); and research and…

  4. Trade-offs between acquired and innate immune defenses in humans

    PubMed Central

    McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.

    2016-01-01

    Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325

  5. Defensive use of an acquired substance (carminic acid) by predaceous insect larvae.

    PubMed

    Eisner, T; Ziegler, R; McCormick, J L; Eisner, M; Hoebeke, E R; Meinwald, J

    1994-06-15

    Larvae of two insects, a coccinellid beetle (Hyperaspis trifurcata) and a chamaemyiid fly (Leucopis sp.), feed on cochineal insects and appropriate their prey's defensive chemical, carminic acid, for protective purposes of their own. H. trifurcata discharges the chemical with droplets of blood (hemolymph) that it emits when disturbed; Leucopis sp. ejects the compound with rectal fluid. Ants are thwarted by these defenses, which are compared with the previously-described defense of a pyralid caterpillar (Laetilia coccidivora) that disgorges carminic acid-laden crop fluid. The defensive fluid of all three larvae contains carminic acid at concentrations spanning a range (0.2-6.2%) proven deterrent to ants. Many insects are known to appropriate defensive substances from plants. Insects that acquire defensive chemicals from animal sources may be relatively rare. PMID:8020623

  6. 76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-05

    ... Software Public Meeting AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION... regarding the use of open source software in DoD contracts. DATES: Public Meeting: January 12, 2012, from 10... for the discussions in the meeting. Please cite ``Public Meeting, DFARS--Open Source Software'' in...

  7. 75 FR 25165 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... Regulation Supplement; Cost and Software Data Reporting System AGENCY: Defense Acquisition Regulations System... the Defense Federal Acquisition Regulation Supplement (DFARS) to set forth DoD Cost and Software Data... Software Data Reporting (CSDR) process offerors intend to use to satisfy the requirements of the...

  8. Acquiring Software Project Specifications in a Virtual World

    ERIC Educational Resources Information Center

    Ng, Vincent; Tang, Zoe

    2012-01-01

    In teaching software engineering, it is often interesting to introduce real life scenarios for students to experience and to learn how to collect information from respective clients. The ideal arrangement is to have some real clients willing to spend time to provide their ideas of a target system through interviews. However, this arrangement…

  9. Method for distributed object communications based on dynamically acquired and assembled software components

    NASA Technical Reports Server (NTRS)

    Sundermier, Amy (Inventor)

    2002-01-01

    A method for acquiring and assembling software components at execution time into a client program, where the components may be acquired from remote networked servers is disclosed. The acquired components are assembled according to knowledge represented within one or more acquired mediating components. A mediating component implements knowledge of an object model. A mediating component uses its implemented object model knowledge, acquired component class information and polymorphism to assemble components into an interacting program at execution time. The interactions or abstract relationships between components in the object model may be implemented by the mediating component as direct invocations or indirect events or software bus exchanges. The acquired components may establish communications with remote servers. The acquired components may also present a user interface representing data to be exchanged with the remote servers. The mediating components may be assembled into layers, allowing arbitrarily complex programs to be constructed at execution time.

  10. Systemic Acquired Resistance in Moss: Further Evidence for Conserved Defense Mechanisms in Plants

    PubMed Central

    Winter, Peter S.; Bowman, Collin E.; Villani, Philip J.; Dolan, Thomas E.; Hauck, Nathanael R.

    2014-01-01

    Vascular plants possess multiple mechanisms for defending themselves against pathogens. One well-characterized defense mechanism is systemic acquired resistance (SAR). In SAR, a plant detects the presence of a pathogen and transmits a signal throughout the plant, inducing changes in the expression of various pathogenesis-related (PR) genes. Once SAR is established, the plant is capable of mounting rapid responses to subsequent pathogen attacks. SAR has been characterized in numerous angiosperm and gymnosperm species; however, despite several pieces of evidence suggesting SAR may also exist in non-vascular plants6–8, its presence in non-vascular plants has not been conclusively demonstrated, in part due to the lack of an appropriate culture system. Here, we describe and use a novel culture system to demonstrate that the moss species Amblystegium serpens does initiate a SAR-like reaction upon inoculation with Pythium irregulare, a common soil-borne oomycete. Infection of A. serpens gametophores by P. irregulare is characterized by localized cytoplasmic shrinkage within 34 h and chlorosis and necrosis within 7 d of inoculation. Within 24 h of a primary inoculation (induction), moss gametophores grown in culture became highly resistant to infection following subsequent inoculation (challenge) by the same pathogen. This increased resistance was a response to the pathogen itself and not to physical wounding. Treatment with β-1,3 glucan, a structural component of oomycete cell walls, was equally effective at triggering SAR. Our results demonstrate, for the first time, that this important defense mechanism exists in a non-vascular plant, and, together with previous studies, suggest that SAR arose prior to the divergence of vascular and non-vascular plants. In addition, this novel moss – pathogen culture system will be valuable for future characterization of the mechanism of SAR in moss, which is necessary for a better understanding of the evolutionary history of SAR

  11. Issue paper for a Strategic Defense Initiative Organization software test and evaluation policy. Final report

    SciTech Connect

    Brykczynski, B.R.; Youngblut, C.

    1989-09-01

    The purpose of IDA Paper P-2266 is to document the goals and proposed contents of a software test and evaluation (T and E) policy for the Strategic Defense Initiative Organization (SDIO). Such a policy would enable SDIO to obtain consistent results from software T and E, obtain the maximum benefit from available T and E technology, and provide support for a Full-Scale Development decision. In general, the software T and E policy will be the mechanism for defining the activities and responsibilities of the various T and E participants in achieving the necessary change in practices and attitudes to ensure effective T and E. Findings, conclusions, and recommendations are listed.

  12. Framework for understanding the Strategic Defense Initiatives' software debates. Master's thesis

    SciTech Connect

    Adams, R.C.

    1990-06-01

    On March 23, 1983, then-President Ronald Reagan challenged a group of engineers and scientists to make nuclear weapons impotent and obsolete. This challenge led to the beginning of a new era in space technology and strategic defense, thus creating the Strategic Defense Initiative (SDI), better known as Star Wars. By 1984, several studies had begun to show that software in conjunction with Battle Management/Command, Control, and Communications techniques would play a major role in determining the effectiveness of the SDI. The results from these studies caused numerous controversial debates on the reliability, dependability, and trustworthiness of the software. This thesis provides a framework for understanding the complexities of the SDI software and points out some of the major issues involved in the software debates. The structure for this thesis is based on presenting the opinions of various computer scientists and engineers, indicating the issues that are controversial and those that have been defined as a necessity for the SDI program. One of the major highlights is the SDI summary chart that provides the reader with a very brief narrative of each individuals' opinion on the software issues discussed in this thesis.

  13. Engineering of Data Acquiring Mobile Software and Sustainable End-User Applications

    NASA Technical Reports Server (NTRS)

    Smith, Benton T.

    2013-01-01

    The criteria for which data acquiring software and its supporting infrastructure should be designed should take the following two points into account: the reusability and organization of stored online and remote data and content, and an assessment on whether abandoning a platform optimized design in favor for a multi-platform solution significantly reduces the performance of an end-user application. Furthermore, in-house applications that control or process instrument acquired data for end-users should be designed with a communication and control interface such that the application's modules can be reused as plug-in modular components in greater software systems. The application of the above mentioned is applied using two loosely related projects: a mobile application, and a website containing live and simulated data. For the intelligent devices mobile application AIDM, the end-user interface have a platform and data type optimized design, while the database and back-end applications store this information in an organized manner and manage access to that data to only to authorized user end application(s). Finally, the content for the website was derived from a database such that the content can be included and uniform to all applications accessing the content. With these projects being ongoing, I have concluded from my research that the applicable methods presented are feasible for both projects, and that a multi-platform design for the mobile application only marginally drop the performance of the mobile application.

  14. Delayed Hypersensitivity: Indicator of Acquired Failure of Host Defenses in Sepsis and Trauma

    PubMed Central

    Meakins, Jonathan L.; Pietsch, John B.; Bubenick, Oldrich; Kelly, Ralph; Rode, Harold; Gordon, Julius; MacLean, Lloyd D.

    1977-01-01

    Primary failure of host defense mechanisms has been associated with increased infection and mortality. Anergy, the failure of delayed hypersensitivity response, has been shown to identify surgical patients at increased risk for sepsis and related mortality. The anergic and relatively anergic patients whose skin tests failed to improve had a mortality rate of 74.4%, whereas those who improved their responses had a mortality rate of 5.1% (P < 0.001). This study documents abnormalities of neutrophil chemotaxis, T-lymphocyte rosetting in anergic patients and the effect of autologous serum. These abnormalities may account for the increased infection and mortality rates in anergic patients. Skin testing with five standard antigens has identified 110 anergic (A) or relatively anergic (RA) patients in whom neutrophil chemotaxis (CTX) and bactericidal function (NBF), T-lymphocyte rosettes, mixed lymphocyte culture (MLC), cell-mediated lympholysis (CML), and blastogenic factor (BF) were studied. The MLC, CML and BF were normal in the patients studied, and were not clinically helpful. Neutrophil CTX in 19 controls was 117.5 ± 1.6 u whereas in 40 A patients, neutrophils migrated 81.7 ± 2.3 u and in 15 RA patients 97.2 ± 3.8 u (P < 0.01). In 14 patients whose skin tests converted to normal, neutrophil migration improved from 78.2 ± 5.4 u to 107.2 ± 4.0 u (P < 0.01). Incubation of A or control neutrophils in A serum reduced migration in A patients from 93 ± 3.7 u to 86.2 ± 3.5 u (P < 0.01) and in normals from 121.2 ± 1.6 u to 103.6 ± 2.6 u (P < 0.001). The per cent rosette forming cells in 66 A patients was 42.5 ± 3.1 compared to 53.6 ± 2.8 in normal responders (P < 0.02). Incubation of normal lymphocytes in anergic serum further reduced rosetting by 30%. Restoration of delayed hypersensitivity responses and concurrent improvement in cellular and serum components of host defense were correlated with maintenance of adequate nutrition and aggressive surgical drainage

  15. Acquiring data in real time in Italy from the Antarctic Seismographic Argentinean Italian Network (ASAIN): testing the global capabilities of the EarthWorm and Antelope software suites.

    NASA Astrophysics Data System (ADS)

    Percy Plasencia Linares, Milton; Russi, Marino; Pesaresi, Damiano; Cravos, Claudio

    2010-05-01

    The Italian National Institute for Oceanography and Experimental Geophysics (Istituto Nazionale di Oceanografia e di Geofisica Sperimentale, OGS) is running the Antarctic Seismographic Argentinean Italian Network (ASAIN), made of 7 seismic stations located in the Scotia Sea region in Antarctica and in Tierra del Fuego - Argentina: data from these stations are transferred in real time to the OGS headquarters in Trieste (Italy) via satellite links provided by the Instituto Antártico Argentino (IAA). Data is collected and archived primarily in Güralp Compress Format (GCF) through the Scream! software at OGS and IAA, and transmitted also in real time to the Observatories and Research Facilities for European Seismology (ORFEUS). The main real time seismic data acquisition and processing system of the ASAIN network is based on the EarthWorm 7.3 (Open Source) software suite installed on a Linux server at the OGS headquarters in Trieste. It runs several software modules for data collection, data archiving, data publication on dedicated web servers: wave_serverV, Winston Wave Server, and data analysis and realtime monitoring through Swarm program. OGS is also running, in close cooperation with the Friuli-Venezia Giulia Civil Defense, the North East (NI) Italy seismic network, making use of the Antelope commercial software suite from BRTT as the main acquisition system. As a test to check the global capabilities of the Antelope software suite, we also set up an instance of Antelope acquiring data in real time from both the regional ASAIN seismic network in Antarctica and a subset of the Global Seismic Network (GSN) funded by the Incorporated Research Institution for Seismology (IRIS). The facilities of the IRIS Data Management System, and specifically the IRIS Data Management Center, were used for real time access to waveform required in this study. The first tests indicated that more than 80% of the earthquakes with magnitude M>5.0 listed in the Preliminary Determination

  16. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... the cost and software data reporting requirements. DoD published a proposed rule at 75 FR 25165 on May... from small entities and other interested parties (proposed rule at 75 FR 25165). No comments were... Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS Case 2008-D027)...

  17. A free lunch? No cost for acquiring defensive plant pyrrolizidine alkaloids in a specialist arctiid moth (Utetheisa ornatrix).

    PubMed

    Cogni, Rodrigo; Trigo, José R; Futuyma, Douglas J

    2012-12-01

    Many herbivorous insects sequester defensive chemicals from their host plants. We tested sequestration fitness costs in the specialist moth Utetheisa ornatrix (Lepidoptera: Arctiidae). We added pyrrolizidine alkaloids (PAs) to an artificial diet at different concentrations. Of all the larval and adult fitness components measured, only development time was negatively affected by PA concentration. These results were repeated under stressful laboratory conditions. On the other hand, the amount of PAs sequestered greatly increased with the diet PA concentration. Absence of a detectable negative effect does not necessarily imply a lack of costs if all individuals express the biochemical machinery of detoxification and sequestration constitutively. Therefore, we used qPCR to show that expression of the gene used to detoxify PAs, pyrrolizidine-alkaloid-N-oxygenase (pno), increased 41-fold in our highest PA treatment. Nevertheless, fitness components were affected only slightly or not at all, suggesting that sequestration in this species does not incur a strong cost. The apparent lack of costs has important implications for our understanding of the evolution of ecological interactions; for example, it implies that selection by specialist herbivores may decrease the levels of certain chemical defences in plant populations.

  18. A free lunch? No cost for acquiring defensive plant pyrrolizidine alkaloids in a specialist arctiid moth (Utetheisa ornatrix).

    PubMed

    Cogni, Rodrigo; Trigo, José R; Futuyma, Douglas J

    2012-12-01

    Many herbivorous insects sequester defensive chemicals from their host plants. We tested sequestration fitness costs in the specialist moth Utetheisa ornatrix (Lepidoptera: Arctiidae). We added pyrrolizidine alkaloids (PAs) to an artificial diet at different concentrations. Of all the larval and adult fitness components measured, only development time was negatively affected by PA concentration. These results were repeated under stressful laboratory conditions. On the other hand, the amount of PAs sequestered greatly increased with the diet PA concentration. Absence of a detectable negative effect does not necessarily imply a lack of costs if all individuals express the biochemical machinery of detoxification and sequestration constitutively. Therefore, we used qPCR to show that expression of the gene used to detoxify PAs, pyrrolizidine-alkaloid-N-oxygenase (pno), increased 41-fold in our highest PA treatment. Nevertheless, fitness components were affected only slightly or not at all, suggesting that sequestration in this species does not incur a strong cost. The apparent lack of costs has important implications for our understanding of the evolution of ecological interactions; for example, it implies that selection by specialist herbivores may decrease the levels of certain chemical defences in plant populations. PMID:23110459

  19. The Arabidopsis Mediator Complex Subunit16 Positively Regulates Salicylate-Mediated Systemic Acquired Resistance and Jasmonate/Ethylene-Induced Defense Pathways[W

    PubMed Central

    Zhang, Xudong; Wang, Chenggang; Zhang, Yanping; Sun, Yijun; Mou, Zhonglin

    2012-01-01

    Systemic acquired resistance (SAR) is a long-lasting plant immunity against a broad spectrum of pathogens. Biological induction of SAR requires the signal molecule salicylic acid (SA) and involves profound transcriptional changes that are largely controlled by the transcription coactivator NONEXPRESSOR OF PATHOGENESIS-RELATED GENES1 (NPR1). However, it is unclear how SAR signals are transduced from the NPR1 signaling node to the general transcription machinery. Here, we report that the Arabidopsis thaliana Mediator subunit16 (MED16) is an essential positive regulator of SAR. Mutations in MED16 reduced NPR1 protein levels and completely compromised biological induction of SAR. These mutations also significantly suppressed SA-induced defense responses, altered the transcriptional changes induced by the avirulent bacterial pathogen Pseudomonas syringae pv tomato (Pst) DC3000/avrRpt2, and rendered plants susceptible to both Pst DC3000/avrRpt2 and Pst DC3000. In addition, mutations in MED16 blocked the induction of several jasmonic acid (JA)/ethylene (ET)–responsive genes and compromised resistance to the necrotrophic fungal pathogens Botrytis cinerea and Alternaria brassicicola. The Mediator complex acts as a bridge between specific transcriptional activators and the RNA polymerase II transcription machinery; therefore, our data suggest that MED16 may be a signaling component in the gap between the NPR1 signaling node and the general transcription machinery and may relay signals from both the SA and the JA/ET pathways. PMID:23064320

  20. 4DCAPTURE: a general purpose software package for capturing and analyzing two- and three-dimensional motion data acquired from video sequences

    NASA Astrophysics Data System (ADS)

    Walton, James S.; Hodgson, Peter; Hallamasek, Karen; Palmer, Jake

    2003-07-01

    4DVideo is creating a general purpose capability for capturing and analyzing kinematic data from video sequences in near real-time. The core element of this capability is a software package designed for the PC platform. The software ("4DCapture") is designed to capture and manipulate customized AVI files that can contain a variety of synchronized data streams -- including audio, video, centroid locations -- and signals acquired from more traditional sources (such as accelerometers and strain gauges.) The code includes simultaneous capture or playback of multiple video streams, and linear editing of the images (together with the ancilliary data embedded in the files). Corresponding landmarks seen from two or more views are matched automatically, and photogrammetric algorithms permit multiple landmarks to be tracked in two- and three-dimensions -- with or without lens calibrations. Trajectory data can be processed within the main application or they can be exported to a spreadsheet where they can be processed or passed along to a more sophisticated, stand-alone, data analysis application. Previous attempts to develop such applications for high-speed imaging have been limited in their scope, or by the complexity of the application itself. 4DVideo has devised a friendly ("FlowStack") user interface that assists the end-user to capture and treat image sequences in a natural progression. 4DCapture employs the AVI 2.0 standard and DirectX technology which effectively eliminates the file size limitations found in older applications. In early tests, 4DVideo has streamed three RS-170 video sources to disk for more than an hour without loss of data. At this time, the software can acquire video sequences in three ways: (1) directly, from up to three hard-wired cameras supplying RS-170 (monochrome) signals; (2) directly, from a single camera or video recorder supplying an NTSC (color) signal; and (3) by importing existing video streams in the AVI 1.0 or AVI 2.0 formats. The

  1. Acquired lymphangiectasis.

    PubMed

    Celis, A V; Gaughf, C N; Sangueza, O P; Gourdin, F W

    1999-01-01

    Acquired lymphangiectasis is a dilatation of lymphatic vessels that can result as a complication of surgical intervention and radiation therapy for malignancy. Acquired lymphangiectasis shares clinical and histologic features with the congenital lesion, lymphangioma circumscriptum. Diagnosis and treatment of these vesiculo-bullous lesions is important because they may be associated with pain, chronic drainage, and cellulitis. We describe two patients who had these lesions after treatment for cancer and review the pertinent literature. Although a number of treatment options are available, we have found CO2 laser ablation particularly effective. PMID:9932832

  2. Systemic Acquired Resistance

    PubMed Central

    2006-01-01

    Upon infection with necrotizing pathogens many plants develop an enhanced resistance to further pathogen attack also in the uninoculated organs. This type of enhanced resistance is referred to as systemic acquired resistance (SAR). In the SAR state, plants are primed (sensitized) to more quickly and more effectively activate defense responses the second time they encounter pathogen attack. Since SAR depends on the ability to access past experience, acquired disease resistance is a paradigm for the existence of a form of “plant memory”. Although the phenomenon has been known since the beginning of the 20th century, major progress in the understanding of SAR was made over the past sixteen years. This review covers the current knowledge of molecular, biochemical and physiological mechanisms that are associated with SAR. PMID:19521483

  3. Acquired hyperpigmentations*

    PubMed Central

    Cestari, Tania Ferreira; Dantas, Lia Pinheiro; Boza, Juliana Catucci

    2014-01-01

    Cutaneous hyperpigmentations are frequent complaints, motivating around 8.5% of all dermatological consultations in our country. They can be congenital, with different patterns of inheritance, or acquired in consequence of skin problems, systemic diseases or secondary to environmental factors. The vast majority of them are linked to alterations on the pigment melanin, induced by different mechanisms. This review will focus on the major acquired hyperpigmentations associated with increased melanin, reviewing their mechanisms of action and possible preventive measures. Particularly prominent aspects of diagnosis and therapy will be emphasized, with focus on melasma, post-inflammatory hyperpigmentation, periorbital pigmentation, dermatosis papulosa nigra, phytophotodermatoses, flagellate dermatosis, erythema dyschromicum perstans, cervical poikiloderma (Poikiloderma of Civatte), acanthosis nigricans, cutaneous amyloidosis and reticulated confluent dermatitis PMID:24626644

  4. NASA Software Engineering Benchmarking Study

    NASA Technical Reports Server (NTRS)

    Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.

    2013-01-01

    To identify best practices for the improvement of software engineering on projects, NASA's Offices of Chief Engineer (OCE) and Safety and Mission Assurance (OSMA) formed a team led by Heather Rarick and Sally Godfrey to conduct this benchmarking study. The primary goals of the study are to identify best practices that: Improve the management and technical development of software intensive systems; Have a track record of successful deployment by aerospace industries, universities [including research and development (R&D) laboratories], and defense services, as well as NASA's own component Centers; and Identify candidate solutions for NASA's software issues. Beginning in the late fall of 2010, focus topics were chosen and interview questions were developed, based on the NASA top software challenges. Between February 2011 and November 2011, the Benchmark Team interviewed a total of 18 organizations, consisting of five NASA Centers, five industry organizations, four defense services organizations, and four university or university R and D laboratory organizations. A software assurance representative also participated in each of the interviews to focus on assurance and software safety best practices. Interviewees provided a wealth of information on each topic area that included: software policy, software acquisition, software assurance, testing, training, maintaining rigor in small projects, metrics, and use of the Capability Maturity Model Integration (CMMI) framework, as well as a number of special topics that came up in the discussions. NASA's software engineering practices compared favorably with the external organizations in most benchmark areas, but in every topic, there were ways in which NASA could improve its practices. Compared to defense services organizations and some of the industry organizations, one of NASA's notable weaknesses involved communication with contractors regarding its policies and requirements for acquired software. One of NASA's strengths

  5. Antiterrorist Software

    NASA Technical Reports Server (NTRS)

    Clark, David A.

    1998-01-01

    In light of the escalation of terrorism, the Department of Defense spearheaded the development of new antiterrorist software for all Government agencies by issuing a Broad Agency Announcement to solicit proposals. This Government-wide competition resulted in a team that includes NASA Lewis Research Center's Computer Services Division, who will develop the graphical user interface (GUI) and test it in their usability lab. The team launched a program entitled Joint Sphere of Security (JSOS), crafted a design architecture (see the following figure), and is testing the interface. This software system has a state-ofthe- art, object-oriented architecture, with a main kernel composed of the Dynamic Information Architecture System (DIAS) developed by Argonne National Laboratory. DIAS will be used as the software "breadboard" for assembling the components of explosions, such as blast and collapse simulations.

  6. Software assurance standard

    NASA Technical Reports Server (NTRS)

    1992-01-01

    This standard specifies the software assurance program for the provider of software. It also delineates the assurance activities for the provider and the assurance data that are to be furnished by the provider to the acquirer. In any software development effort, the provider is the entity or individual that actually designs, develops, and implements the software product, while the acquirer is the entity or individual who specifies the requirements and accepts the resulting products. This standard specifies at a high level an overall software assurance program for software developed for and by NASA. Assurance includes the disciplines of quality assurance, quality engineering, verification and validation, nonconformance reporting and corrective action, safety assurance, and security assurance. The application of these disciplines during a software development life cycle is called software assurance. Subsequent lower-level standards will specify the specific processes within these disciplines.

  7. Strategic Defense Initiative - an overview

    SciTech Connect

    Abrahamson, J.A.

    1985-01-01

    A general framework for developing the concept and implementing options for strategic ballistic missile defense systems is emerging. The objective of the Strategic Defense Initiative (SDI) program is to conduct research on those technologies for defensive system which could intercept ballistic missiles after they have been launched and prevent them from hitting their targets. Its goal is to acquire the technical knowledge as a basis for a later decision on deployment, not a program for deployment or star wars. Abrahamson reviews the basic technological questions facing researchers, outlines the multi-layered defense possibilities and summarizes the status of technology to date. He argues for a continuity of resources to conduct the program. 4 figures.

  8. The software engineering laboratory: An approach to measuring software technology

    NASA Technical Reports Server (NTRS)

    Mcgarry, F.

    1980-01-01

    The investigations of the software evaluation laboratory into the software development process at NASA/Goddard are described. A data collection process for acquiring detailed histories of software development projects is outlined. The application of different sets of software methodologies to specific applications projects is summarized. The effect of the development methodology on productivity is discussed.

  9. Space Station Software Recommendations

    NASA Technical Reports Server (NTRS)

    Voigt, S. (Editor)

    1985-01-01

    Four panels of invited experts and NASA representatives focused on the following topics: software management, software development environment, languages, and software standards. Each panel deliberated in private, held two open sessions with audience participation, and developed recommendations for the NASA Space Station Program. The major thrusts of the recommendations were as follows: (1) The software management plan should establish policies, responsibilities, and decision points for software acquisition; (2) NASA should furnish a uniform modular software support environment and require its use for all space station software acquired (or developed); (3) The language Ada should be selected for space station software, and NASA should begin to address issues related to the effective use of Ada; and (4) The space station software standards should be selected (based upon existing standards where possible), and an organization should be identified to promulgate and enforce them. These and related recommendations are described in detail in the conference proceedings.

  10. Defense use and defense understanding in children.

    PubMed

    Cramer, P; Brilliant, M A

    2001-04-01

    This study investigated the relation between children's use of defense mechanisms and their understanding of those defenses. We hypothesized that, once a child understands how a particular defense functions, the use of that defense will no longer be successful and will be replaced by another defense mechanism that is not yet understood. Defense use was assessed from the Thematic Appreception Test (TAT) stories told by 122 children; defense understanding was determined from the children's understanding of stories portraying defenses. The results indicated that younger children (mean age = 7-8) used the defense of denial more than the older children (mean age = 9-11). Older children understood the functioning of denial and projection better than the younger children. A comparison of children who did and did not understand a defense showed that younger children who understood the functioning of denial were less likely to themselves use denial. Likewise, older children who understood the functioning of projection were less likely to use this defense.

  11. Computer Software.

    ERIC Educational Resources Information Center

    Kay, Alan

    1984-01-01

    Discusses the nature and development of computer software. Programing, programing languages, types of software (including dynamic spreadsheets), and software of the future are among the topics considered. (JN)

  12. 32 CFR 552.32 - Authority to acquire real estate and interests therein.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Authority to acquire real estate and interests therein. 552.32 Section 552.32 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Acquisition of Real Estate and Interest Therein §...

  13. NASA Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Rosenberg, Linda

    1997-01-01

    If software is a critical element in a safety critical system, it is imperative to implement a systematic approach to software safety as an integral part of the overall system safety programs. The NASA-STD-8719.13A, "NASA Software Safety Standard", describes the activities necessary to ensure that safety is designed into software that is acquired or developed by NASA, and that safety is maintained throughout the software life cycle. A PDF version, is available on the WWW from Lewis. A Guidebook that will assist in the implementation of the requirements in the Safety Standard is under development at the Lewis Research Center (LeRC). After completion, it will also be available on the WWW from Lewis.

  14. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  15. Radiological Defense. Textbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This textbook has been prepared under the direction of the Defense Civil Preparedness Agency (DCPA) Staff College for use as a student reference manual in radiological defense (RADEF) courses. It provides much of the basic technical information necessary for a proper understanding of radiological defense and summarizes RADEF planning and expected…

  16. Acquired color vision deficiency.

    PubMed

    Simunovic, Matthew P

    2016-01-01

    Acquired color vision deficiency occurs as the result of ocular, neurologic, or systemic disease. A wide array of conditions may affect color vision, ranging from diseases of the ocular media through to pathology of the visual cortex. Traditionally, acquired color vision deficiency is considered a separate entity from congenital color vision deficiency, although emerging clinical and molecular genetic data would suggest a degree of overlap. We review the pathophysiology of acquired color vision deficiency, the data on its prevalence, theories for the preponderance of acquired S-mechanism (or tritan) deficiency, and discuss tests of color vision. We also briefly review the types of color vision deficiencies encountered in ocular disease, with an emphasis placed on larger or more detailed clinical investigations.

  17. Hospital-acquired pneumonia

    MedlinePlus

    ... tends to be more serious than other lung infections because: People in the hospital are often very sick and cannot fight off ... prevent pneumonia. Most hospitals have programs to prevent hospital-acquired infections.

  18. Acquired Cerebral Trauma: Epilogue.

    ERIC Educational Resources Information Center

    Bigler, Erin D., Ed.

    1988-01-01

    The article summarizes a series of articles concerning acquired cerebral trauma. Reviewed are technological advances, treatment, assessment, potential innovative therapies, long-term outcome, family impact of chronic brain injury, and prevention. (DB)

  19. Selecting Software.

    ERIC Educational Resources Information Center

    Pereus, Steven C.

    2002-01-01

    Describes a comprehensive computer software selection and evaluation process, including documenting district needs, evaluating software packages, weighing the alternatives, and making the purchase. (PKP)

  20. [Acquired haemophilia (acquired factor VIII inhibitor)].

    PubMed

    Ceresetto, José M; Duboscq, Cristina; Fondevila, Carlos; Tezanos Pinto, Miguel

    2015-01-01

    Acquired haemophilia is a rare disorder. The clinical picture ranges from mild ecchymosis and anaemia to life threatening bleeding in up to 20% of patients. The disease is produced by an antibody against Factor VIII and it usually occurs in the elderly, with no previous history of a bleeding disorder. It can be associated to an underlying condition such as cancer, autoimmune disorders, drugs or pregnancy. It has a typical laboratory pattern with isolated prolonged activated partial thromboplastin time (aPTT) that fails to correct upon mixing tests with normal plasma and low levels of factor VIII. Treatment recommendations are based on controlling the acute bleeding episodes with either bypassing agent, recombinant activated factor VII or activated prothrombin complex concentrate, and eradication of the antibody with immunosuppressive therapy.

  1. National Software Reference Library (NSRL)

    National Institute of Standards and Technology Data Gateway

    National Software Reference Library (NSRL) (PC database for purchase)   A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.

  2. Signal regulators of systemic acquired resistance

    PubMed Central

    Gao, Qing-Ming; Zhu, Shifeng; Kachroo, Pradeep; Kachroo, Aardra

    2015-01-01

    Salicylic acid (SA) is an important phytohormone that plays a vital role in a number of physiological responses, including plant defense. The last two decades have witnessed a number of breakthroughs related to biosynthesis, transport, perception and signaling mediated by SA. These findings demonstrate that SA plays a crictical role in both local and systemic defense responses. Systemic acquired resistance (SAR) is one such SA-dependent response. SAR is a long distance signaling mechanism that provides broad spectrum and long-lasting resistance to secondary infections throughout the plant. This unique feature makes SAR a highly desirable trait in crop production. This review summarizes the recent advances in the role of SA in SAR and discusses its relationship to other SAR inducers. PMID:25918514

  3. Community-acquired pneumonia.

    PubMed

    Falguera, M; Ramírez, M F

    2015-11-01

    This article not only reviews the essential aspects of community-acquired pneumonia for daily clinical practice, but also highlights the controversial issues and provides the newest available information. Community-acquired pneumonia is considered in a broad sense, without excluding certain variants that, in recent years, a number of authors have managed to delineate, such as healthcare-associated pneumonia. The latter form is nothing more than the same disease that affects more frail patients, with a greater number of risk factors, both sharing an overall common approach. PMID:26186969

  4. Acquired hypofibrinogenemia: current perspectives

    PubMed Central

    Besser, Martin W; MacDonald, Stephen G

    2016-01-01

    Acquired hypofibrinogenemia is most frequently caused by hemodilution and consumption of clotting factors. The aggressive replacement of fibrinogen has become one of the core principles of modern management of massive hemorrhage. The best method for determining the patient’s fibrinogen level remains controversial, and particularly in acquired dysfibrinogenemia, could have major therapeutic implications depending on which quantification method is chosen. This review introduces the available laboratory and point-of-care methods and discusses the relative advantages and limitations. It also discusses current strategies for the correction of hypofibrinogenemia. PMID:27713652

  5. Community-acquired pneumonia.

    PubMed

    Falguera, M; Ramírez, M F

    2015-11-01

    This article not only reviews the essential aspects of community-acquired pneumonia for daily clinical practice, but also highlights the controversial issues and provides the newest available information. Community-acquired pneumonia is considered in a broad sense, without excluding certain variants that, in recent years, a number of authors have managed to delineate, such as healthcare-associated pneumonia. The latter form is nothing more than the same disease that affects more frail patients, with a greater number of risk factors, both sharing an overall common approach.

  6. Two systems and defenses.

    PubMed

    Novick, Jack; Novick, Kerry Kelly

    2013-02-01

    The authors suggest that Freud's concept of defense differentiated psychoanalysis from other medical and psychological theories of personality development and functioning then and now. Reclaiming the concept's centrality and linking it with interdisciplinary research findings, they illustrate their extension of defense into a two-system model of self-protection and self-regulation with a clinical example. The authors suggest that the two-system model allows for the reintegration of defense into a multidimensional psychoanalytic theory and multimodal therapeutic technique.

  7. Dynamic defense workshop :

    SciTech Connect

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  8. The military insanity defense.

    PubMed

    Lande, R G

    1991-01-01

    This article describes the military insanity defense. The success of the litigated insanity defense is explored through the number of insanity acquittals over a 28-month period. A questionnaire distributed to all United States Army psychiatrists provided information on the number of forensic evaluations performed, the number of not criminally responsible (NCR) opinions made, and the disposition of noncontested NCR opinions. The questionnaire also tested the Army psychiatrists' knowledge about recent changes in the military insanity defense. This pilot study raises interesting questions about the military insanity defense that further research can address.

  9. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  10. Technologies for Distributed Defense

    SciTech Connect

    Seiders, Barbara AB; Rybka, Anthony J.

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of "citizen soldiers," with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  11. Acquired Brain Injury Program.

    ERIC Educational Resources Information Center

    Schwartz, Stacey Hunter

    This paper reviews the Acquired Brain Injury (ABI) Program at Coastline Community College (California). The ABI Program is a two-year, for-credit educational curriculum designed to provide structured cognitive retraining for adults who have sustained an ABI due to traumatic (such as motor vehicle accident or fall) or non-traumatic(such as…

  12. 78 FR 30898 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... Regulation Supplement; Rights in Technical Data and Computer Software AGENCY: Defense Acquisition Regulations... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information...

  13. 33 CFR 211.27 - Method of acquiring Federal jurisdiction.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Method of acquiring Federal jurisdiction. 211.27 Section 211.27 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE REAL ESTATE ACTIVITIES OF THE CORPS OF ENGINEERS IN CONNECTION WITH CIVIL...

  14. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  15. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  16. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  17. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  18. 22 CFR 130.4 - Defense articles and defense services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense articles and defense services. 130.4 Section 130.4 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS POLITICAL CONTRIBUTIONS, FEES AND COMMISSIONS § 130.4 Defense articles and defense services. Defense articles and...

  19. Defense Mechanisms: A Bibliography.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  20. Schools and Civil Defense.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…

  1. Forgiveness and Defense Style

    ERIC Educational Resources Information Center

    Maltby, John; Day, Liz

    2004-01-01

    Within the literature on the psychology of forgiveness, researchers have hypothesized that the 1st stage in the process of being able to forgive is the role of psychological defense. To examine such a hypothesis, the authors explored the relationship between forgiveness and defense style. The 304 respondents (151 men, 153 women) completed measures…

  2. Defense Workforce Training Programs.

    ERIC Educational Resources Information Center

    Fletcher, J. D.; And Others

    This report discusses the amount and kinds of Department of Defense (DoD) interactive courseware (ICW) programs that are candidates for transfer to the private sector. Candidates for transfer were identified through an analysis of the Defense Instructional Technology Information System (DITIS). Out of 4,644 ICW programs that have been reported to…

  3. Software Reviews.

    ERIC Educational Resources Information Center

    Smith, Richard L., Ed.

    1985-01-01

    Reviews software packages by providing extensive descriptions and discussions of their strengths and weaknesses. Software reviewed include (1) "VISIFROG: Vertebrate Anatomy" (grade seven-adult); (2) "Fraction Bars Computer Program" (grades three to six) and (3) four telecommunications utilities. (JN)

  4. Community-acquired pneumonia.

    PubMed

    Prina, Elena; Ranzani, Otavio T; Torres, Antoni

    2015-09-12

    Community-acquired pneumonia causes great mortality and morbidity and high costs worldwide. Empirical selection of antibiotic treatment is the cornerstone of management of patients with pneumonia. To reduce the misuse of antibiotics, antibiotic resistance, and side-effects, an empirical, effective, and individualised antibiotic treatment is needed. Follow-up after the start of antibiotic treatment is also important, and management should include early shifts to oral antibiotics, stewardship according to the microbiological results, and short-duration antibiotic treatment that accounts for the clinical stability criteria. New approaches for fast clinical (lung ultrasound) and microbiological (molecular biology) diagnoses are promising. Community-acquired pneumonia is associated with early and late mortality and increased rates of cardiovascular events. Studies are needed that focus on the long-term management of pneumonia.

  5. Software Program: Software Management Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this NASA Software Management Guidebook is twofold. First, this document defines the core products and activities required of NASA software projects. It defines life-cycle models and activity-related methods but acknowledges that no single life-cycle model is appropriate for all NASA software projects. It also acknowledges that the appropriate method for accomplishing a required activity depends on characteristics of the software project. Second, this guidebook provides specific guidance to software project managers and team leaders in selecting appropriate life cycles and methods to develop a tailored plan for a software engineering project.

  6. Proprietary software

    NASA Technical Reports Server (NTRS)

    Marnock, M. J.

    1971-01-01

    The protection of intellectual property by a patent, a copyright, or trade secrets is reviewed. The present and future use of computers and software are discussed, along with the governmental uses of software. The popularity of contractual agreements for sale or lease of computer programs and software services is also summarized.

  7. Computer software.

    PubMed

    Rosenthal, L E

    1986-10-01

    Software is the component in a computer system that permits the hardware to perform the various functions that a computer system is capable of doing. The history of software and its development can be traced to the early nineteenth century. All computer systems are designed to utilize the "stored program concept" as first developed by Charles Babbage in the 1850s. The concept was lost until the mid-1940s, when modern computers made their appearance. Today, because of the complex and myriad tasks that a computer system can perform, there has been a differentiation of types of software. There is software designed to perform specific business applications. There is software that controls the overall operation of a computer system. And there is software that is designed to carry out specialized tasks. Regardless of types, software is the most critical component of any computer system. Without it, all one has is a collection of circuits, transistors, and silicone chips.

  8. Two systems and defenses.

    PubMed

    Novick, Jack; Novick, Kerry Kelly

    2013-02-01

    The authors suggest that Freud's concept of defense differentiated psychoanalysis from other medical and psychological theories of personality development and functioning then and now. Reclaiming the concept's centrality and linking it with interdisciplinary research findings, they illustrate their extension of defense into a two-system model of self-protection and self-regulation with a clinical example. The authors suggest that the two-system model allows for the reintegration of defense into a multidimensional psychoanalytic theory and multimodal therapeutic technique. PMID:23421665

  9. Acquired methemoglobinemia revisited.

    PubMed

    Trapp, Larry; Will, John

    2010-10-01

    Dentistry has two medications in its pain management armamentarium that may cause the potentially life-threatening disorder methemoglobinemia. The first medications are the topical local anesthetics benzocaine and prilocaine. The second medication is the injectable local anesthetic prilocaine. Acquired methemoglobinemia remains a source of morbidity and mortality in dental and medical patients despite the fact that it is better understood now than it was even a decade ago. It is in the interest of all dental patients that their treating dentists review this disorder. The safety of dental patients mandates professional awareness.

  10. GLOBE (Global Oceanographic Bathymetry Explorer) : an innovative and generic software combining all necessary functionalities for cruise preparation, for collection, linking, processing and display of scientific data acquired during sea cruises, and for exporting data and information to the main marine data centers and networks.

    NASA Astrophysics Data System (ADS)

    Sinquin, J. M.; Sorribas, J.

    2014-12-01

    Within the EUROFLEETS project, and linked to the EMODNet and Geo-Seas European projects, GLOBE (Global Oceanographic Bathymetry Explorer) is an innovative and generic software. I. INTRODUCTION The first version can be used onboard during the survey to get a quick overview of acquired data, or later, to re-process data with accurate environmental data. II. MAIN FUNCTIONALITIES The version shown at AGU-2014 will present several key items : - 3D visualization: DTM multi-layers from EMODNet, - Water Column echogram, Seismic lines, ... - Bathymetry Plug-In: manual and automatic data cleaning, integration of EMODNet methodology to introduce CDI concept, filtering, spline, data gridding, ... - Backscatter with compensation, - Tectonic toolset, - Photo/Video Plug-In - Navigation 3D including tide correction, MRU corrections, GPS offsets correction, - WMS/WFS interfaces. III. FOCUS ON EMODNET One of the main objectives of the EMODNet European project is to elaborate a common processing flow for gridding the bathymetry data and for generating harmonized digital terrain model (DTM) : this flow includes the definition of the DTM characteristics (geodetic parameters, grid spacing, interpolation and smoothing parameters…) and also the specifications of a set of layers which enrich the basic depth layer : statistical layers (sounding density, standard deviation,…) and an innovative data source layer which indicates the source of the soundings and and which is linked and collects to the associated metadata. GLOBE Software provides the required tools for applying this methodology and is offered to the project partners. V. FOCUS ON THE TECTONIC TOOLSET The tectonic toolset allows the user to associate any DTM to 3D rotation movements. These rotations represent the movement of tectonic plates along discrete time lines (from 200 million years ago to now). One rotation is described by its axes, its value angle and its date. GLOBE can display the movement of tectonic plates

  11. Software safety

    NASA Technical Reports Server (NTRS)

    Leveson, Nancy

    1987-01-01

    Software safety and its relationship to other qualities are discussed. It is shown that standard reliability and fault tolerance techniques will not solve the safety problem for the present. A new attitude requires: looking at what you do NOT want software to do along with what you want it to do; and assuming things will go wrong. New procedures and changes to entire software development process are necessary: special software safety analysis techniques are needed; and design techniques, especially eliminating complexity, can be very helpful.

  12. Software Reviews.

    ERIC Educational Resources Information Center

    Beezer, Robert A.; And Others

    1988-01-01

    Reviews for three software packages are given. Those packages are: Linear Algebra Computer Companion; Probability and Statistics Demonstrations and Tutorials; and Math Utilities: CURVES, SURFS, AND DIFFS. (PK)

  13. Community-acquired pneumonia.

    PubMed

    Polverino, E; Torres Marti, A

    2011-02-01

    Despite the remarkable advances in antibiotic therapies, diagnostic tools, prevention campaigns and intensive care, community-acquired pneumonia (CAP) is still among the primary causes of death worldwide, and there have been no significant changes in mortality in the last decades. The clinical and economic burden of CAP makes it a major public health problem, particularly for children and the elderly. This issue provides a clinical overview of CAP, focusing on epidemiology, economic burden, diagnosis, risk stratification, treatment, clinical management, and prevention. Particular attention is given to some aspects related to the clinical management of CAP, such as the microbial etiology and the available tools to achieve it, the usefulness of new and old biomarkers, and antimicrobial and other non-antibiotic adjunctive therapies. Possible scenarios in which pneumonia does not respond to treatment are also analyzed to improve clinical outcomes of CAP. PMID:21242952

  14. Software Bridge

    NASA Technical Reports Server (NTRS)

    1995-01-01

    I-Bridge is a commercial version of software developed by I-Kinetics under a NASA Small Business Innovation Research (SBIR) contract. The software allows users of Windows applications to gain quick, easy access to databases, programs and files on UNIX services. Information goes directly onto spreadsheets and other applications; users need not manually locate, transfer and convert data.

  15. Software Reviews.

    ERIC Educational Resources Information Center

    Miller, Anne, Ed.; Radziemski, Cathy, Ed.

    1988-01-01

    Reviews two software packages for the Macintosh series. "Course Builder 2.0," a courseware authoring system, allows the user to create programs which stand alone and may be used independently in the classroom. "World Builder," an artificial intelligence software package, allows creative thinking, problem-solving, and decision-making. (YP)

  16. Software Reviews.

    ERIC Educational Resources Information Center

    Bitter, Gary G., Ed.

    1990-01-01

    Reviews three computer software: (1) "Elastic Lines: The Electronic Geoboard" on elementary geometry; (2) "Wildlife Adventures: Whales" on environmental science; and (3) "What Do You Do with a Broken Calculator?" on computation and problem solving. Summarizes the descriptions, strengths and weaknesses, and applications of each software. (YP)

  17. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen

    1988-01-01

    Presents reviews of six computer software programs for teaching science. Provides the publisher, grade level, cost, and descriptions of software, including: (1) "Recycling Logic"; (2) "Introduction to Biochemistry"; (3) "Food for Thought"; (4) "Watts in a Home"; (5) "Geology in Action"; and (6) "Biomes." All are for Apple series microcomputers.…

  18. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1988

    1988-01-01

    Reviews six software packages for the Apple II family. Programs reviewed include "Science Courseware: Earth Science Series"; "Heat and Light"; "In Search of Space: Introduction to Model Rocketry"; "Drug Education Series: Drugs--Their Effects on You'"; "Uncertainties and Measurement"; and "Software Films: Learning about Science Series," which…

  19. Moscow's defense intellectuals

    SciTech Connect

    Lambeth, B.S.

    1990-01-01

    This essay was originally written two decades ago as a seminar paper. A substantial portion of it addresses what were then only the first steps toward the establishment of a community of professional civilian defense analysts in the Soviet Union. Throughout most of the intervening period, that community found itself mired in immobilism as jurisdiction over such key Soviet national security inputs as military doctrine, force requirements, resource needs, and to a considerable degree, arms negotiating positions remained an exclusive prerogative of the Defense Ministry and the General Staff. Today, this former military monopoly has come to be challenged with increasing success by a host of newcomers to the Soviet defense scene, including the Foreign Ministry, the Supreme Soviet, and an ambitious cadre of civilian analysts attached to the social science research institutes of the Academy of Sciences. These individuals are making a determined bid for greater influence over Soviet defense policy, with the express encouragement of President Gorbachev and his supporters. The result has been an unprecedented infusion of pluralism into Soviet defense politics and a significant change in the content and goals of Soviet military policy.

  20. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  1. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  2. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  3. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  4. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a...

  5. Acquired aplastic anemia.

    PubMed

    Keohane, Elaine M

    2004-01-01

    Acquired aplastic anemia (AA) is a disorder characterized by a profound deficit of hematopoietic stem and progenitor cells, bone marrow hypocellularity, and peripheral blood pancytopenia. It primarily affects children, young adults, and those over 60 years of age. The majority of cases are idiopathic; however, idiosyncratic reactions to some drugs, chemicals, and viruses have been implicated in its etiology. An autoimmune T-cell reaction likely causes the stem cell depletion, but the precise mechanism, as well as the eliciting and target antigens, is unknown. Symptoms vary from severe life-threatening cytopenias to moderate or non-severe disease that does not require transfusion support. The peripheral blood typically exhibits pancytopenia, reticulocytopenia, and normocytic or macrocytic erythrocytes. The bone marrow is hypocellular and may exhibit dysplasia of the erythrocyte precursors. First line treatment for severe AA consists of hematopoietic stem cell transplantation in young patients with HLA identical siblings, while immunosuppression therapy is used for older patients and for those of any age who lack a HLA matched donor. Patients with AA have an increased risk of developing paroxysmal nocturnal hemoglobinuria (PNH), myelodysplastic syndrome (MDS), or acute leukemia. Further elucidation of the pathophysiology of this disease will result in a better understanding of the interrelationship among AA, PNH, and MDS, and may lead to novel targeted therapies.

  6. Credible Software and Simulation Uncertainty

    NASA Technical Reports Server (NTRS)

    Mehta, Unmeel B.; Nixon, David (Technical Monitor)

    1998-01-01

    The utility of software primarily depends on its reliability and performance; whereas, its significance depends solely on its credibility for intended use. The credibility of simulations confirms the credibility of software. The level of veracity and the level of validity of simulations determine the degree of credibility of simulations. The process of assessing this credibility in fields such as computational mechanics (CM) differs from that followed by the Defense Modeling and Simulation Office in operations research. Verification and validation (V&V) of CM simulations is not the same as V&V of CM software. Uncertainty is the measure of simulation credibility. Designers who use software are concerned with management of simulation uncertainty. Terminology and concepts are presented with a few examples from computational fluid dynamics.

  7. CERCLA's innocent landowner defense -- Consultants beware

    SciTech Connect

    Nijman, J.T. )

    1994-05-01

    Consultant liability is an area of the innocent landowner defense under CERCLA that is not often discussed. The only reasonable way to protect consultants hired by innocent purchasers'' is for Congress or state legislatures to establish standardized, regulated audit guidelines. However, even standardized guidelines do not protect consultants completely, because standards cannot specify all activity necessary to perform a particular task. Each project has unique circumstances, and standards arguably can become per se determinants of liability. CERCLA provides three defenses to its basic strict, joint and several liability provisions -- an act of God, an act of war, and an act or omission of a third party not in a contractual relationship with the current owner. Congress amended the third-party not in a contractual relationship with the current owner. Congress amended the third-party defense in SARA by redefining contractual relationship'' to exclude from liability owners who acquired the real property following disposal or placement of hazardous material, and established satisfactorily that the owner at the time of purchase neither knew nor had reason to know hazardous substances were disposed on the property -- the innocent landowner defense.

  8. Software Smarts

    NASA Technical Reports Server (NTRS)

    1998-01-01

    Under an SBIR (Small Business Innovative Research) contract with Johnson Space Center, Knowledge Based Systems Inc. (KBSI) developed an intelligent software environment for modeling and analyzing mission planning activities, simulating behavior, and, using a unique constraint propagation mechanism, updating plans with each change in mission planning activities. KBSI developed this technology into a commercial product, PROJECTLINK, a two-way bridge between PROSIm, KBSI's process modeling and simulation software and leading project management software like Microsoft Project and Primavera's SureTrak Project Manager.

  9. Software testing

    NASA Astrophysics Data System (ADS)

    Price-Whelan, Adrian M.

    2016-01-01

    Now more than ever, scientific results are dependent on sophisticated software and analysis. Why should we trust code written by others? How do you ensure your own code produces sensible results? How do you make sure it continues to do so as you update, modify, and add functionality? Software testing is an integral part of code validation and writing tests should be a requirement for any software project. I will talk about Python-based tools that make managing and running tests much easier and explore some statistics for projects hosted on GitHub that contain tests.

  10. Value of space defenses

    SciTech Connect

    Canavan, G.H.

    1992-10-29

    This report discusses the economic value of defenses against Near-Earth Object (NEO) impacts is bounded by calculating expected losses in their absence, which illustrates the contributions from NEOs of different sizes and the sensitivity of total expected losses to impact frequencies. For typical size distributions and damage of only a few decades duration, losses are most sensitive to small NEOs, and lead to defenses worth a few $M/yr. When the persistence of damage with NEO size is taken into account, that shifts the loss to the largest NEOs and greatly increases expected loss and values.

  11. 75 FR 59411 - Defense Federal Acquisition Regulation Supplement; Patents, Data, and Copyrights (DFARS Case 2010...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-27

    .... SUMMARY: DoD is proposing to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to update... unnecessary; relocates and integrates the coverage for computer software and computer software documentation... computer software, consistent with the revised and streamlined regulatory coverage; relocates,...

  12. Software Reviews.

    ERIC Educational Resources Information Center

    Dwyer, Donna; And Others

    1989-01-01

    Reviewed are seven software packages for Apple and IBM computers. Included are: "Toxicology"; "Science Corner: Space Probe"; "Alcohol and Pregnancy"; "Science Tool Kit Plus"; Computer Investigations: Plant Growth"; "Climatrolls"; and "Animal Watch: Whales." (CW)

  13. Software Reviews.

    ERIC Educational Resources Information Center

    McGrath, Diane

    1990-01-01

    Reviews two programs: (1) "The Weather Machine" on understanding weather and weather forecasting and (2) "The Mystery of the Hotel Victoria" on problem solving in mathematics. Presents the descriptions, advantages, and weaknesses of the software. (YP)

  14. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1990-01-01

    Reviewed are six computer software packages including "Lunar Greenhouse,""Dyno-Quest,""How Weather Works,""Animal Trackers,""Personal Science Laboratory," and "The Skeletal and Muscular Systems." Availability, functional, and hardware requirements are discussed. (CW)

  15. Software Reviews.

    ERIC Educational Resources Information Center

    Classroom Computer Learning, 1990

    1990-01-01

    Reviewed are three computer software packages including "Martin Luther King, Jr.: Instant Replay of History,""Weeds to Trees," and "The New Print Shop, School Edition." Discussed are hardware requirements, costs, grade levels, availability, emphasis, strengths, and weaknesses. (CW)

  16. Software Reviews.

    ERIC Educational Resources Information Center

    Davis, Shelly J., Ed.; Knaupp, Jon, Ed.

    1984-01-01

    Reviewed is computer software on: (1) classification of living things, a tutorial program for grades 5-10; and (2) polynomial practice using tiles, a drill-and-practice program for algebra students. (MNS)

  17. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1987-01-01

    Reviews seven computer software programs that can be used in science education programs. Describes courseware which deals with muscles and bones, terminology, classifying animals without backbones, molecular structures, drugs, genetics, and shaping the earth's surface. (TW)

  18. Software Reviews.

    ERIC Educational Resources Information Center

    Mathematics and Computer Education, 1988

    1988-01-01

    Presents reviews of six software packages. Includes (1) "Plain Vanilla Statistics"; (2) "MathCAD 2.0"; (3) "GrFx"; (4) "Trigonometry"; (5) "Algebra II"; (6) "Algebra Drill and Practice I, II, and III." (PK)

  19. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Eugene T., Ed.

    1988-01-01

    Presents reviews by classroom teachers of software for teaching science. Includes material on the work of geologists, genetics, earth science, classification of living things, astronomy, endangered species, skeleton, drugs, and heartbeat. Provides information on availability and equipment needed. (RT)

  20. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1987-01-01

    Provides a review of four science software programs. Includes topics such as plate tectonics, laboratory experiment simulations, the human body, and light and temperature. Contains information on ordering and reviewers' comments. (ML)

  1. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1987-01-01

    Provides reviews of six computer software programs designed for use in elementary science education programs. Provides the title, publisher, grade level, and descriptions of courseware on ant farms, drugs, genetics, beachcombing, matter, and test generation. (TW)

  2. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  3. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  4. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense...

  5. Plant defense activators: applications and prospects in cereal crops

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This review addresses the current understanding of the plant immune response and the molecular mechanisms responsible for systemic acquired resistance as well as the phenomenon of "priming" in plant defense. A detailed discussion of the role of salicylic acid in activating the plant transcription c...

  6. Mycobacterial disease, immunosuppression, and acquired immunodeficiency syndrome.

    PubMed Central

    Collins, F M

    1989-01-01

    The mycobacteria are an important group of acid-fast pathogens ranging from obligate intracellular parasites such as Mycobacterium leprae to environmental species such as M. gordonae and M. fortuitum. The latter may behave as opportunistic human pathogens if the host defenses have been depleted in some manner. The number and severity of such infections have increased markedly with the emergence of the acquired immunodeficiency syndrome (AIDS) epidemic. These nontuberculous mycobacteria tend to be less virulent for humans than M. tuberculosis, usually giving rise to self-limiting infections involving the cervical and mesenteric lymph nodes of young children. However, the more virulent serovars of M. avium complex can colonize the bronchial and intestinal mucosal surfaces of healthy individuals, becoming virtual members of the commensal gut microflora and thus giving rise to low levels of skin hypersensitivity to tuberculins prepared from M. avium and M. intracellulare. Systemic disease develops when the normal T-cell-mediated defenses become depleted as a result of old age, cancer chemotherapy, or infection with human immunodeficiency virus. As many as 50% of human immunodeficiency virus antibody-positive individuals develop mycobacterial infections at some time during their disease. Most isolates of M. avium complex from AIDS patients fall into serotypes 4 and 8. The presence of these drug-resistant mycobacteria in the lungs of the AIDS patient makes their effective clinical treatment virtually impossible. More effective chemotherapeutic, prophylactic, and immunotherapeutic reagents are urgently needed to treat this rapidly increasing patient population. PMID:2680057

  7. In Defense of Rubrics

    ERIC Educational Resources Information Center

    Spandel, Vicki

    2006-01-01

    In this article, the author expresses her views in defense of writing rubrics. She explains that when rubrics are thoughtfully crafted and used with discretion and understanding, they can be among the most useful instructional tools that teachers have. A rubric captures the essence of performance at various levels. Because rubric demands…

  8. Radiological Defense Manual.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    Originally prepared for use as a student textbook in Radiological Defense (RADEF) courses, this manual provides the basic technical information necessary for an understanding of RADEF. It also briefly discusses the need for RADEF planning and expected postattack emergency operations. There are 14 chapters covering these major topics: introduction…

  9. When management gets serious about managing software

    NASA Technical Reports Server (NTRS)

    Jansma, Patti A. 'Trisha'

    2005-01-01

    This paper describes JPL's approach to improving the management of software. It discusses the various products, services and training that were developed, describes the deployment approach used, and concludes with several 'lessons learned' about changing how software is managed, developed and acquired.

  10. The innocent landowner defense under CERCLA should be transferable to subsequent purchasers

    SciTech Connect

    Spertus, J.W.

    1993-12-31

    Under CERCLA, landowners are held strictly liable for cleaning up hazardous substances on their property. Purchasers who acquire title to contaminated property become liable for cleanup costs by virtue of their status as the current owner. Although liability under the Act is strict, joint, and several, a few limited defenses enable some landowners to avoid liability altogether. One such defense, known as the innocent landowner defense, is the subject of this article.

  11. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  12. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INTERPRETATIONS UNDER THE HART-SCOTT-RODINO ANTITRUST IMPROVEMENTS ACT OF 1976 COVERAGE RULES § 801.2 Acquiring... each holds half of V's shares. Therefore, A and B each control V (see § 801.1(b)), and V is included...” are acquiring persons. (b) Except as provided in paragraphs (a) and (b) of § 801.12, the...

  13. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INTERPRETATIONS UNDER THE HART-SCOTT-RODINO ANTITRUST IMPROVEMENTS ACT OF 1976 COVERAGE RULES § 801.2 Acquiring... each holds half of V's shares. Therefore, A and B each control V (see § 801.1(b)), and V is included...” are acquiring persons. (b) Except as provided in paragraphs (a) and (b) of § 801.12, the...

  14. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...” are acquiring persons. (b) Except as provided in paragraphs (a) and (b) of § 801.12, the person(s.... Examples: 1. Corporation A (the ultimate parent entity included within person “A”) proposes to acquire Y, a... to be carried out by merging Y into X, a wholly-owned subsidiary of A, with X surviving, and...

  15. 16 CFR 801.2 - Acquiring and acquired persons.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...” are acquiring persons. (b) Except as provided in paragraphs (a) and (b) of § 801.12, the person(s.... Examples: 1. Corporation A (the ultimate parent entity included within person “A”) proposes to acquire Y, a... to be carried out by merging Y into X, a wholly-owned subsidiary of A, with X surviving, and...

  16. Software reengineering

    NASA Technical Reports Server (NTRS)

    Fridge, Ernest M., III

    1991-01-01

    Today's software systems generally use obsolete technology, are not integrated properly with other software systems, and are difficult and costly to maintain. The discipline of reverse engineering is becoming prominent as organizations try to move their systems up to more modern and maintainable technology in a cost effective manner. JSC created a significant set of tools to develop and maintain FORTRAN and C code during development of the Space Shuttle. This tool set forms the basis for an integrated environment to re-engineer existing code into modern software engineering structures which are then easier and less costly to maintain and which allow a fairly straightforward translation into other target languages. The environment will support these structures and practices even in areas where the language definition and compilers do not enforce good software engineering. The knowledge and data captured using the reverse engineering tools is passed to standard forward engineering tools to redesign or perform major upgrades to software systems in a much more cost effective manner than using older technologies. A beta vision of the environment was released in Mar. 1991. The commercial potential for such re-engineering tools is very great. CASE TRENDS magazine reported it to be the primary concern of over four hundred of the top MIS executives.

  17. A Corpus-Based Comparative Study of "Learn" and "Acquire"

    ERIC Educational Resources Information Center

    Yang, Bei

    2016-01-01

    As an important yet intricate linguistic feature in English language, synonymy poses a great challenge for second language learners. Using the 100 million-word British National Corpus (BNC) as data and the software Sketch Engine (SkE) as an analyzing tool, this article compares the usage of "learn" and "acquire" used in natural…

  18. Survey of Software Assurance Techniques for Highly Reliable Systems

    NASA Technical Reports Server (NTRS)

    Nelson, Stacy

    2004-01-01

    This document provides a survey of software assurance techniques for highly reliable systems including a discussion of relevant safety standards for various industries in the United States and Europe, as well as examples of methods used during software development projects. It contains one section for each industry surveyed: Aerospace, Defense, Nuclear Power, Medical Devices and Transportation. Each section provides an overview of applicable standards and examples of a mission or software development project, software assurance techniques used and reliability achieved.

  19. CSAM Metrology Software Tool

    NASA Technical Reports Server (NTRS)

    Vu, Duc; Sandor, Michael; Agarwal, Shri

    2005-01-01

    CSAM Metrology Software Tool (CMeST) is a computer program for analysis of false-color CSAM images of plastic-encapsulated microcircuits. (CSAM signifies C-mode scanning acoustic microscopy.) The colors in the images indicate areas of delamination within the plastic packages. Heretofore, the images have been interpreted by human examiners. Hence, interpretations have not been entirely consistent and objective. CMeST processes the color information in image-data files to detect areas of delamination without incurring inconsistencies of subjective judgement. CMeST can be used to create a database of baseline images of packages acquired at given times for comparison with images of the same packages acquired at later times. Any area within an image can be selected for analysis, which can include examination of different delamination types by location. CMeST can also be used to perform statistical analyses of image data. Results of analyses are available in a spreadsheet format for further processing. The results can be exported to any data-base-processing software.

  20. Joint stabilizing projects in defense

    SciTech Connect

    Canavan, G.H.; Browne, J.C.; Joseph, R.J.

    1992-06-01

    Joint defensive projects could increase stability and decrease the alert rates of strategic forces. Areas include the defense of the US, Commonwealth of Independent States (CIS), and their allies against third world threats; protection against each other's accidental or unauthorized launches; and defense against intentional attacks. The most promising area appears to be defining interfaces for the handover of satellite warning and trajectory information, which applies to most phases of theater defense and mutual protection. 19 refs.

  1. Joint stabilizing projects in defense

    SciTech Connect

    Canavan, G.H.; Browne, J.C.; Joseph, R.J.

    1992-06-01

    Joint defensive projects could increase stability and decrease the alert rates of strategic forces. Areas include the defense of the US, Commonwealth of Independent States (CIS), and their allies against third world threats; protection against each other`s accidental or unauthorized launches; and defense against intentional attacks. The most promising area appears to be defining interfaces for the handover of satellite warning and trajectory information, which applies to most phases of theater defense and mutual protection. 19 refs.

  2. Acquiring and Organizing Curriculum Materials.

    ERIC Educational Resources Information Center

    Lare, Gary A.

    This book addresses two areas of need in a curriculum materials center--where to find curriculum materials for acquisition and how to organize these materials for efficient and effective access once they are acquired. The book is arranged in two parts: "Acquiring and Organizing the Collection" and "Resources." The book brings together many…

  3. [Software version and medical device software supervision].

    PubMed

    Peng, Liang; Liu, Xiaoyan

    2015-01-01

    The importance of software version in the medical device software supervision does not cause enough attention at present. First of all, the effect of software version in the medical device software supervision is discussed, and then the necessity of software version in the medical device software supervision is analyzed based on the discussion of the misunderstanding of software version. Finally the concrete suggestions on software version naming rules, software version supervision for the software in medical devices, and software version supervision scheme are proposed.

  4. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1990-01-01

    Reviewed are six software packages for Apple and/or IBM computers. Included are "Autograph,""The New Game Show,""Science Probe-Earth Science,""Pollution Patrol,""Investigating Plant Growth," and "AIDS: The Investigation." Discussed are the grade level, function, availability, cost, and hardware requirements of each. (CW)

  5. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1989

    1989-01-01

    Reviews of seven software packages are presented including "The Environment I: Habitats and EcoSystems; II Cycles and Interactions"; "Super Sign Maker"; "The Great Knowledge Race: Substance Abuse"; "Exploring Science: Temperature"; "Fast Food Calculator and RD Aide"; "The Human Body: Circulation and Respiration" and "Forces in Liquids and Gases."…

  6. Star Software.

    ERIC Educational Resources Information Center

    Kloza, Brad

    2000-01-01

    Presents a collection of computer software programs designed to spark learning enthusiasm at every grade level and across the curriculum. They include Reader Rabbit's Learn to Read, Spelling Power, Mind Twister Math, Community Construction Kit, Breaking the Code, Encarta Africana 2000, Virtual Serengeti, Operation: Frog (Deluxe), and My First…

  7. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1988

    1988-01-01

    Reviews five software packages for use with school age children. Includes "Science Toolkit Module 2: Earthquake Lab"; "Adaptations and Identification"; "Geoworld"; "Body Systems II Series: The Blood System: A Liquid of Life," all for Apple II, and "Science Courseware: Life Science/Biology" for Apple II and IBM. (CW)

  8. Software Update.

    ERIC Educational Resources Information Center

    Currents, 2000

    2000-01-01

    A chart of 40 alumni-development database systems provides information on vendor/Web site, address, contact/phone, software name, price range, minimum suggested workstation/suggested server, standard reports/reporting tools, minimum/maximum record capacity, and number of installed sites/client type. (DB)

  9. Software Comparison

    NASA Technical Reports Server (NTRS)

    Blanchard, D. C.

    1986-01-01

    Software Comparison Package (SCP) compares similar files. Normally, these are 90-character files produced by CDC UPDATE utility from program libraries that contain FORTRAN source code plus identifier. SCP also used to compare load maps, cross-reference outputs, and UPDATE corrections sets. Helps wherever line-by-line comparison of similarly structured files required.

  10. Software Reviews.

    ERIC Educational Resources Information Center

    Classroom Computer Learning, 1990

    1990-01-01

    Reviewed are two computer software packages: "Super Solvers Midnight Rescue!" a problem-solving program for IBM PCs; and "Interactive Physics," a simulation program for the Macintosh computer. The functions of the package are discussed including strengths and weaknesses and teaching suggestions. (CW)

  11. Software Reviews.

    ERIC Educational Resources Information Center

    Bitter, Gary G., Ed.

    1989-01-01

    Describes three software packages: (1) "MacMendeleev"--database/graphic display for chemistry, grades 10-12, Macintosh; (2) "Geometry One: Foundations"--geometry tutorial, grades 7-12, IBM; (3) "Mathematics Exploration Toolkit"--algebra and calculus tutorial, grades 8-12, IBM. (MVL)

  12. Software reengineering

    NASA Technical Reports Server (NTRS)

    Fridge, Ernest M., III

    1991-01-01

    Programs in use today generally have all of the function and information processing capabilities required to do their specified job. However, older programs usually use obsolete technology, are not integrated properly with other programs, and are difficult to maintain. Reengineering is becoming a prominent discipline as organizations try to move their systems to more modern and maintainable technologies. The Johnson Space Center (JSC) Software Technology Branch (STB) is researching and developing a system to support reengineering older FORTRAN programs into more maintainable forms that can also be more readily translated to a modern languages such as FORTRAN 8x, Ada, or C. This activity has led to the development of maintenance strategies for design recovery and reengineering. These strategies include a set of standards, methodologies, and the concepts for a software environment to support design recovery and reengineering. A brief description of the problem being addressed and the approach that is being taken by the STB toward providing an economic solution to the problem is provided. A statement of the maintenance problems, the benefits and drawbacks of three alternative solutions, and a brief history of the STB experience in software reengineering are followed by the STB new FORTRAN standards, methodology, and the concepts for a software environment.

  13. Software Patents.

    ERIC Educational Resources Information Center

    Burke, Edmund B.

    1994-01-01

    Outlines basic patent law information that pertains to computer software programs. Topics addressed include protection in other countries; how to obtain patents; kinds of patents; duration; classes of patentable subject matter, including machines and processes; patentability searches; experimental use prior to obtaining a patent; and patent…

  14. Software Reviews.

    ERIC Educational Resources Information Center

    Mathematics and Computer Education, 1987

    1987-01-01

    Presented are reviews of several microcomputer software programs. Included are reviews of: (1) Microstat (Zenith); (2) MathCAD (MathSoft); (3) Discrete Mathematics (True Basic); (4) CALCULUS (True Basic); (5) Linear-Kit (John Wiley); and (6) Geometry Sensei (Broderbund). (RH)

  15. Software Reviews.

    ERIC Educational Resources Information Center

    Smith, Richard L., Ed.

    1988-01-01

    Reviews two software packages, "Solutions Unlimited" and "BASIC Data Base System." Provides a description, summary, strengths and weaknesses, availability and costs. Includes reviews of three structured BASIC packages: "True BASIC (2.0)"; "Turbo BASIC (1.0)"; and "QuickBASIC (3.0)." Explains significant features such as graphics, costs,…

  16. Reviews: Software.

    ERIC Educational Resources Information Center

    Mackenzie, Norma N.; And Others

    1988-01-01

    Reviews four computer software packages including: "The Physical Science Series: Sound" which demonstrates making waves, speed of sound, doppler effect, and human hearing; "Andromeda" depicting celestial motions in any direction; "Biology Quiz: Humans" covering chemistry, cells, viruses, and human biology; and "MacStronomy" covering information on…

  17. Reviews, Software.

    ERIC Educational Resources Information Center

    Science Teacher, 1988

    1988-01-01

    Reviews two software programs for Apple series computers. Includes "Orbital Mech," a basic planetary orbital simulation for the Macintosh, and "START: Stimulus and Response Tools for Experiments in Memory, Learning, Cognition, and Perception," a program that demonstrates basic psychological principles and experiments. (CW)

  18. Software Reviews.

    ERIC Educational Resources Information Center

    Teles, Elizabeth, Ed.; And Others

    1990-01-01

    Reviewed are two computer software packages for Macintosh microcomputers including "Phase Portraits," an exploratory graphics tool for studying first-order planar systems; and "MacMath," a set of programs for exploring differential equations, linear algebra, and other mathematical topics. Features, ease of use, cost, availability, and hardware…

  19. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1989-01-01

    Six software packages are described in this review. Included are "Molecules and Atoms: Exploring the Essence of Matter"; "Heart Probe"; "GM Sunraycer"; "Six Puzzles"; "Information Laboratory--Life Science"; and "Science Test Builder." Hardware requirements, prices, and a summary of the abilities of each program are presented. (CW)

  20. Software Reviews.

    ERIC Educational Resources Information Center

    Wulfson, Stephen, Ed.

    1989-01-01

    Presents comments by classroom teachers on software for science teaching including topics on: the size of a molecule, matter, leaves, vitamins and minerals, dinosaurs, and collecting and measuring data. Each is an Apple computer series. Availability and costs are included. (RT)

  1. Software Reviews.

    ERIC Educational Resources Information Center

    Smith, Richard L., Ed.

    1987-01-01

    Reviewed are three computer software programs: the Astronomer (astronomy program for middle school students and older); Hands-on-Statistics: Explorations with a Microcomputer (statistics program for secondary school students and older); and CATGEN (a genetics program for secondary school students and older). Each review provides information on:…

  2. Software Review.

    ERIC Educational Resources Information Center

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed is a computer software package entitled "Audubon Wildlife Adventures: Grizzly Bears" for Apple II and IBM microcomputers. Included are availability, hardware requirements, cost, and a description of the program. The murder-mystery flavor of the program is stressed in this program that focuses on illegal hunting and game management. (CW)

  3. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1990

    1990-01-01

    Reviewed are seven computer software packages for IBM and/or Apple Computers. Included are "Windows on Science: Volume 1--Physical Science"; "Science Probe--Physical Science"; "Wildlife Adventures--Grizzly Bears"; "Science Skills--Development Programs"; "The Clean Machine"; "Rock Doctor"; and "Geology Search." Cost, quality, hardware, and…

  4. Software Reviews.

    ERIC Educational Resources Information Center

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed are two computer software programs for Apple II computers on weather for upper elementary and middle school grades. "Weather" introduces the major factors (temperature, humidity, wind, and air pressure) affecting weather. "How Weather Works" uses simulation and auto-tutorial formats on sun, wind, fronts, clouds, and storms. (YP)

  5. Software Reviews.

    ERIC Educational Resources Information Center

    Bitter, Gary G., Ed.

    1989-01-01

    Reviews three software packages: (1) "The Weather Machine Courseware Kit" for grades 7-12; (2) "Exploring Measurement, Time, and Money--Level I," for primary level mathematics; and (3) "Professor DOS with SmartGuide for DOS" providing an extensive tutorial covering DOS 2.1 to 4.0. Discusses the strengths and weaknesses of each package. (YP)

  6. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1990

    1990-01-01

    Reviewed are six computer software packages including "Invisible Bugs,""Chaos Plus...,""The Botanist's Apprentice,""A Baby is Born," Storyboard Plus-Version 2.0," and "Weather." Hardware requirements, functions, performance, and use in the classroom are discussed. (CW)

  7. Software Reviews.

    ERIC Educational Resources Information Center

    Science and Children, 1988

    1988-01-01

    Reviews six software packages for use with school age children ranging from grade 3 to grade 12. Includes "The Microcomputer Based Lab Project: Motion, Sound"; "Genetics"; "Geologic History"; "The Microscope Simulator"; and "Wiz Works" all for Apple II and "Reading for Information: Level II" for IBM. (CW)

  8. Software Reviews.

    ERIC Educational Resources Information Center

    Mackenzie, Norma N.; And Others

    1988-01-01

    Describes computer software for use with various age groups. Topics include activities involving temperature, simulations, earth science, the circulatory system, human body, reading in science, and ecology. Provides information on equipment needed, availability, package contents, and price. Comments of reviews are presented by classroom teachers.…

  9. Repository-based software engineering program

    NASA Technical Reports Server (NTRS)

    Wilson, James

    1992-01-01

    The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.

  10. 77 FR 3739 - Executive-led Aerospace and Defense Industry Trade Mission to Turkey-Notification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-25

    ... technologies, radars, electronic warfare and intelligence systems and defense systems technologies Turkish... ship vetting MIKES: Electronic warfare, radar warning receivers, electronic counter measure systems, chaff flare dispensing systems, electronic support measures, software solutions, avionics...

  11. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  12. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    ERIC Educational Resources Information Center

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  13. Writing software for the clinic.

    PubMed

    Rosen, I I

    1998-03-01

    Medical physicists often write computer programs to support scientific, educational, and clinical endeavors. Errors in scientific and educational software can waste time and effort by producing meaningless results, but errors in clinical software can contribute to patient injuries. Although the ultimate goal of error-free software is impossible to achieve except in very small programs, there are many good design, implementation, and testing practices that can be used by small development groups to significantly reduce errors, improve quality, and reduce maintenance. The software development process should include four basic steps: specifications, design, implementation, and testing. A specifications document defining what the software is intended to do is valuable for clearly delimiting the scope of the project and providing a benchmark for evaluating the final product. Keep the software design simple and straightforward. Document assumptions, and check them. Emphasize maintainability, portability, and reliability rather than speed. Use layers to isolate the application from hardware and the operating system. Plan for upgrades. Expect the software to be used in unplanned ways. Whenever possible, be generous with RAM and disk storage; hardware is cheaper than development and maintenance. During implementation, use well-known algorithms whenever possible. Use prototypes to try out ideas. Use generic modules, version numbering, unique file names, defensive programming, and operating system and language/compiler defaults. Avoid binary data files and clever tricks. Remember that real numbers are not exact in a computer. Get it right before making it faster. Document the software extensively. Test continuously during development; the later a problem is found, the more it costs to fix. Use a written procedure to test the final product exactly as a typical user would run it. Allow no changes after clinical release. Expect to spend at least an additional 50% of the initial

  14. Plant Defense against Insect Herbivores

    PubMed Central

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  15. Synthetic plant defense elicitors

    PubMed Central

    Bektas, Yasemin; Eulgem, Thomas

    2015-01-01

    To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug-like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection. PMID:25674095

  16. Space Station Software Issues

    NASA Technical Reports Server (NTRS)

    Voigt, S. (Editor); Beskenis, S. (Editor)

    1985-01-01

    Issues in the development of software for the Space Station are discussed. Software acquisition and management, software development environment, standards, information system support for software developers, and a future software advisory board are addressed.

  17. Allergic Host Defenses

    PubMed Central

    Palm, Noah W.; Rosenstein, Rachel K.

    2012-01-01

    Allergies are generally thought to be a detrimental outcome of a mistargeted immune response that evolved to provide immunity to macro-parasites. Here we present arguments to suggest that allergic immunity plays an important role in host defense against noxious environmental substances, including venoms, hematophagous fluids, environmental xenobiotics and irritants. We argue that appropriately targeted allergic reactions are beneficial, although they can become detrimental when excessive. Furthermore, we suggest that allergic hypersensitivity evolved to elicit anticipatory responses and to promote avoidance of suboptimal environments. PMID:22538607

  18. Nanomaterials for Defense Applications

    NASA Astrophysics Data System (ADS)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  19. Thermoregulatory defense mechanisms.

    PubMed

    Sessler, Daniel I

    2009-07-01

    Core body temperature is normally tightly regulated by an effective thermoregulatory system. Thermoregulatory control is sometimes impaired by serious illness, but more typically remains intact. The primary autonomic defenses against heat are sweating and active precapillary vasodilation; the primary autonomic defenses against cold are arteriovenous shunt vasoconstriction and shivering. The core temperature triggering each response defines its activation threshold. Temperatures between the sweating and vasoconstriction thresholds define the inter-threshold range. The shivering threshold is usually a full 1 degrees C below the vasoconstriction threshold and is therefore a "last resort" response. Both vasoconstriction and shivering are associated with autonomic and hemodynamic activation; and each response is effective, thus impeding induction of therapeutic hypothermia. It is thus helpful to accompany core cooling with drugs that pharmacologically induce a degree of thermal tolerance. No perfect drug or drug combination has been identified. Anesthetics, for example, induce considerable tolerance, but are rarely suitable. Meperidine-especially in combination with buspirone-is especially effective while provoking only modest toxicity. The combination of buspirone and dexmedetomidine is comparably effective while avoiding the respiratory depression association with opioid administration.

  20. Analysis Software

    NASA Technical Reports Server (NTRS)

    1994-01-01

    General Purpose Boundary Element Solution Technology (GPBEST) software employs the boundary element method of mechanical engineering analysis, as opposed to finite element. It is, according to one of its developers, 10 times faster in data preparation and more accurate than other methods. Its use results in less expensive products because the time between design and manufacturing is shortened. A commercial derivative of a NASA-developed computer code, it is marketed by Best Corporation to solve problems in stress analysis, heat transfer, fluid analysis and yielding and cracking of solids. Other applications include designing tractor and auto parts, household appliances and acoustic analysis.

  1. Scheduling Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    Advanced Scheduling Environment is a software product designed and marketed by AVYX, Inc. to provide scheduling solutions for complex manufacturing environments. It can be adapted to specific scheduling and manufacturing processes and has led to substantial cost savings. The system was originally developed for NASA use in scheduling Space Shuttle flights and satellite activities. AVYX, Inc. is an offshoot of a company formed to provide computer-related services to NASA. TREES-plus, the company's initial product became the programming language for the advanced scheduling environment system.

  2. Space Software

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Xontech, Inc.'s software package, XonVu, simulates the missions of Voyager 1 at Jupiter and Saturn, Voyager 2 at Jupiter, Saturn, Uranus and Neptune, and Giotto in close encounter with Comet Halley. With the program, the user can generate scenes of the planets, moons, stars or Halley's nucleus and tail as seen by Giotto, all graphically reproduced with high accuracy in wireframe representation. Program can be used on a wide range of computers, including PCs. User friendly and interactive, with many options, XonVu can be used by a space novice or a professional astronomer. With a companion user's manual, it sells for $79.

  3. Simulation Software

    NASA Technical Reports Server (NTRS)

    1996-01-01

    Various NASA Small Business Innovation Research grants from Marshall Space Flight Center, Langley Research Center and Ames Research Center were used to develop the 'kernel' of COMCO's modeling and simulation software, the PHLEX finite element code. NASA needed it to model designs of flight vehicles; one of many customized commercial applications is UNISIM, a PHLEX-based code for analyzing underground flows in oil reservoirs for Texaco, Inc. COMCO's products simulate a computational mechanics problem, estimate the solution's error and produce the optimal hp-adapted mesh for the accuracy the user chooses. The system is also used as a research or training tool in universities and in mechanical design in industrial corporations.

  4. Seminar Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The Society for Computer Simulation International is a professional technical society that distributes information on methodology techniques and uses of computer simulation. The society uses NETS, a NASA-developed program, to assist seminar participants in learning to use neural networks for computer simulation. NETS is a software system modeled after the human brain; it is designed to help scientists exploring artificial intelligence to solve pattern matching problems. Examples from NETS are presented to seminar participants, who can then manipulate, alter or enhance them for their own applications.

  5. Origin and Functional Diversification of an Amphibian Defense Peptide Arsenal

    PubMed Central

    Roelants, Kim; Fry, Bryan G.; Ye, Lumeng; Stijlemans, Benoit; Brys, Lea; Kok, Philippe; Clynen, Elke; Schoofs, Liliane; Cornelis, Pierre; Bossuyt, Franky

    2013-01-01

    The skin secretion of many amphibians contains an arsenal of bioactive molecules, including hormone-like peptides (HLPs) acting as defense toxins against predators, and antimicrobial peptides (AMPs) providing protection against infectious microorganisms. Several amphibian taxa seem to have independently acquired the genes to produce skin-secreted peptide arsenals, but it remains unknown how these originated from a non-defensive ancestral gene and evolved diverse defense functions against predators and pathogens. We conducted transcriptome, genome, peptidome and phylogenetic analyses to chart the full gene repertoire underlying the defense peptide arsenal of the frog Silurana tropicalis and reconstruct its evolutionary history. Our study uncovers a cluster of 13 transcriptionally active genes, together encoding up to 19 peptides, including diverse HLP homologues and AMPs. This gene cluster arose from a duplicated gastrointestinal hormone gene that attained a HLP-like defense function after major remodeling of its promoter region. Instead, new defense functions, including antimicrobial activity, arose by mutation of the precursor proteins, resulting in the proteolytic processing of secondary peptides alongside the original ones. Although gene duplication did not trigger functional innovation, it may have subsequently facilitated the convergent loss of the original function in multiple gene lineages (subfunctionalization), completing their transformation from HLP gene to AMP gene. The processing of multiple peptides from a single precursor entails a mechanism through which peptide-encoding genes may establish new functions without the need for gene duplication to avoid adaptive conflicts with older ones. PMID:23935531

  6. Software system safety

    NASA Technical Reports Server (NTRS)

    Uber, James G.

    1988-01-01

    Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of software safety are not yet available. Some past software failures, future NASA software trends, software engineering methods, and tools and techniques for various software safety analyses are reviewed. Recommendations to NASA are made based on this review.

  7. Defense acquisition programs

    SciTech Connect

    Not Available

    1990-06-01

    The continuing instability in the overall defense budget and the recent changes in Eastern Europe are forcing DOD and the military services to reexamine the need, priority, and annual funding levels for many weapon system acquisition programs. GAO reviewed six weapon system acquisition programs that DOD was scheduled to make an acquisition milestone decision on during fiscal year 1991. Under milestone authorization, up to five years funding can be approved to cover the entire acquisition phase for either full-scale development or full-rate production. This report examines the Non-Line-of-Sight Missile, the Light Helicopter, the MK-50 Torpedo, the Sensor Fuzed Weapon, the Advanced Tactical Fighter, and the Joint Tactical Information Distribution System Class 2 Terminals.

  8. Experimental research control software system

    NASA Astrophysics Data System (ADS)

    Cohn, I. A.; Kovalenko, A. G.; Vystavkin, A. N.

    2014-05-01

    A software system, intended for automation of a small scale research, has been developed. The software allows one to control equipment, acquire and process data by means of simple scripts. The main purpose of that development is to increase experiment automation easiness, thus significantly reducing experimental setup automation efforts. In particular, minimal programming skills are required and supervisors have no reviewing troubles. Interactions between scripts and equipment are managed automatically, thus allowing to run multiple scripts simultaneously. Unlike well-known data acquisition commercial software systems, the control is performed by an imperative scripting language. This approach eases complex control and data acquisition algorithms implementation. A modular interface library performs interaction with external interfaces. While most widely used interfaces are already implemented, a simple framework is developed for fast implementations of new software and hardware interfaces. While the software is in continuous development with new features being implemented, it is already used in our laboratory for automation of a helium-3 cryostat control and data acquisition. The software is open source and distributed under Gnu Public License.

  9. Antipredator defenses predict diversification rates

    PubMed Central

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  10. Adolescent Suicide and Defensive Style.

    ERIC Educational Resources Information Center

    Recklitis, Christopher J.; And Others

    1992-01-01

    Examined relationship between ego defense mechanisms, diagnoses, and suicidality among 200 adolescent psychiatric patients classified as suicide attempters, suicidal ideators, and nonsuicidal patients. Using Defense Mechanisms Inventory, found the suicidal adolescents score higher on turning-against-self and lower on reversal, as compared to…

  11. Acquired Equivalence Changes Stimulus Representations

    ERIC Educational Resources Information Center

    Meeter, M.; Shohamy, D.; Myers, C. E.

    2009-01-01

    Acquired equivalence is a paradigm in which generalization is increased between two superficially dissimilar stimuli (or antecedents) that have previously been associated with similar outcomes (or consequents). Several possible mechanisms have been proposed, including changes in stimulus representations, either in the form of added associations or…

  12. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly, ownership or control through an acquisition of shares, an acquisition of assets or assumption of...

  13. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly, ownership or control through an acquisition of shares, an acquisition of assets or assumption of...

  14. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly, ownership or control through an acquisition of shares, an acquisition of assets or assumption of...

  15. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly, ownership or control through an acquisition of shares, an acquisition of assets or assumption of...

  16. Choosing Software for Children.

    ERIC Educational Resources Information Center

    Spencer, Mima

    This Digest points out characteristics of quality computer software for children, describes different kinds of software, and suggests ways to get software for preview. The need to consider the purpose for which the software is to be used and the degree to which the software meets its stated goals is noted. Desirable software characteristics and…

  17. Maintaining the Health of Software Monitors

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Rungta, Neha

    2013-01-01

    Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors use information from the specification and implementation of the monitored software to detect violations, predict possible failures, and help the system recover from faults. Changes to the monitored software, such as adding new functionality or fixing defects, therefore, have the potential to impact the correctness of both the monitored software and the SWHM monitor. In this work, we describe how the results of a software change impact analysis technique, Directed Incremental Symbolic Execution (DiSE), can be applied to monitored software to identify the potential impact of the changes on the SWHM monitor software. The results of DiSE can then be used by other analysis techniques, e.g., testing, debugging, to help preserve and improve the integrity of the SWHM monitor as the monitored software evolves.

  18. Acquired Aplastic Anemia in Children

    PubMed Central

    Hartung, Helge D.; Olson, Timothy S.; Bessler, Monica

    2013-01-01

    SYNOPSIS This article provides a practice-based and concise review of the etiology, diagnosis, and management of acquired aplastic anemia in children. Bone marrow transplantation, immunosuppressive therapy, and supportive care are discussed in detail. The aim is to provide the clinician with a better understanding of the disease and to offer guidelines for the management of children with this uncommon yet serious disorder. PMID:24237973

  19. Epigenetic Control of Defense Signaling and Priming in Plants.

    PubMed

    Espinas, Nino A; Saze, Hidetoshi; Saijo, Yusuke

    2016-01-01

    Immune recognition of pathogen-associated molecular patterns or effectors leads to defense activation at the pathogen challenged sites. This is followed by systemic defense activation at distant non-challenged sites, termed systemic acquired resistance (SAR). These inducible defenses are accompanied by extensive transcriptional reprogramming of defense-related genes. SAR is associated with priming, in which a subset of these genes is kept at a poised state to facilitate subsequent transcriptional regulation. Transgenerational inheritance of defense-related priming in plants indicates the stability of such primed states. Recent studies have revealed the importance and dynamic engagement of epigenetic mechanisms, such as DNA methylation and histone modifications that are closely linked to chromatin reconfiguration, in plant adaptation to different biotic stresses. Herein we review current knowledge regarding the biological significance and underlying mechanisms of epigenetic control for immune responses in plants. We also argue for the importance of host transposable elements as critical regulators of interactions in the evolutionary "arms race" between plants and pathogens. PMID:27563304

  20. Epigenetic Control of Defense Signaling and Priming in Plants

    PubMed Central

    Espinas, Nino A.; Saze, Hidetoshi; Saijo, Yusuke

    2016-01-01

    Immune recognition of pathogen-associated molecular patterns or effectors leads to defense activation at the pathogen challenged sites. This is followed by systemic defense activation at distant non-challenged sites, termed systemic acquired resistance (SAR). These inducible defenses are accompanied by extensive transcriptional reprogramming of defense-related genes. SAR is associated with priming, in which a subset of these genes is kept at a poised state to facilitate subsequent transcriptional regulation. Transgenerational inheritance of defense-related priming in plants indicates the stability of such primed states. Recent studies have revealed the importance and dynamic engagement of epigenetic mechanisms, such as DNA methylation and histone modifications that are closely linked to chromatin reconfiguration, in plant adaptation to different biotic stresses. Herein we review current knowledge regarding the biological significance and underlying mechanisms of epigenetic control for immune responses in plants. We also argue for the importance of host transposable elements as critical regulators of interactions in the evolutionary “arms race” between plants and pathogens. PMID:27563304

  1. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier

    PubMed Central

    Ishikawa, Yuki; Aonuma, Hitoshi; Sasaki, Ken; Miura, Toru

    2016-01-01

    In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA) and tyramine (TA), as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG) and the OA level in brain were increased in soldiers than in pseudergates (worker caste). Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes. PMID:27196303

  2. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier.

    PubMed

    Ishikawa, Yuki; Aonuma, Hitoshi; Sasaki, Ken; Miura, Toru

    2016-01-01

    In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA) and tyramine (TA), as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG) and the OA level in brain were increased in soldiers than in pseudergates (worker caste). Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes. PMID:27196303

  3. Directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka

    2013-09-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. Numerous risk mitigation strategies have been described, most involving dedicated missions to a threatening object. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR for Directed Energy System for Targeting of Asteroids and exploRation. DE-STAR is a modular phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, test, and initial deployment, lowering cost, minimizing risk, and allowing for technological co-development, leading eventually to an orbiting structure that would be developed in stages with both technological and target milestones. The main objective of DE-STAR is to use the focused directed energy to raise the surface spot temperature to ~3,000K, allowing direct vaporization of all known substances. In the process of heating the surface ejecting evaporated material a large reaction force would alter the asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1-10km array) depending on the degree of protection desired. A DE-STAR 4 allows for asteroid engagement starting beyond 1AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in one year. Small asteroids and comets can be diverted/evaporated with a DESTAR 2 (100m) while space debris is vaporized with a DE-STAR 1 (10m).

  4. Emotional attention in acquired prosopagnosia.

    PubMed

    Peelen, Marius V; Lucas, Nadia; Mayer, Eugene; Vuilleumier, Patrik

    2009-09-01

    The present study investigated whether emotionally expressive faces guide attention and modulate fMRI activity in fusiform gyrus in acquired prosopagnosia. Patient PS, a pure case of acquired prosopagnosia with intact right middle fusiform gyrus, performed two behavioral experiments and a functional imaging experiment to address these questions. In a visual search task involving face stimuli, PS was faster to select the target face when it was expressing fear or happiness as compared to when it was emotionally neutral. In a change detection task, PS detected significantly more changes when the changed face was fearful as compared to when it was neutral. Finally, an fMRI experiment showed enhanced activation to emotionally expressive faces and bodies in right fusiform gyrus. In addition, PS showed normal body-selective activation in right fusiform gyrus, partially overlapping the fusiform face area. Together these behavioral and neuroimaging results show that attention was preferentially allocated to emotional faces in patient PS, as observed in healthy subjects. We conclude that systems involved in the emotional guidance of attention by facial expression can function normally in acquired prosopagnosia, and can thus be dissociated from systems involved in face identification.

  5. Acquired causes of intestinal malabsorption.

    PubMed

    van der Heide, F

    2016-04-01

    This review focuses on the acquired causes, diagnosis, and treatment of intestinal malabsorption. Intestinal absorption is a complex process that depends on many variables, including the digestion of nutrients within the intestinal lumen, the absorptive surface of the small intestine, the membrane transport systems, and the epithelial absorptive enzymes. Acquired causes of malabsorption are classified by focussing on the three phases of digestion and absorption: 1) luminal/digestive phase, 2) mucosal/absorptive phase, and 3) transport phase. Most acquired diseases affect the luminal/digestive phase. These include short bowel syndrome, extensive small bowel inflammation, motility disorders, and deficiencies of digestive enzymes or bile salts. Diagnosis depends on symptoms, physical examination, and blood and stool tests. There is no gold standard for the diagnosis of malabsorption. Further testing should be based on the specific clinical context and the suspected underlying disease. Therapy is directed at nutritional support by enteral or parenteral feeding and screening for and supplementation of deficiencies in vitamins and minerals. Early enteral feeding is important for intestinal adaptation in short bowel syndrome. Medicinal treatment options for diarrhoea in malabsorption include loperamide, codeine, cholestyramine, or antibiotics. PMID:27086886

  6. Insanity defenses: contested or conceded?

    PubMed

    Rogers, J L; Bloom, J D; Manson, S M

    1984-07-01

    The authors examined 316 Oregon criminal cases in which the accused successfully pleaded the insanity defense. Prosecutors agreed to the insanity verdict in more than four out of five cases. In most cases all examining experts diagnosed the defendant as psychotic. The smaller number of defendants who were diagnosed by the state hospital staff as displaying only personality disorders accounted for a disproportionately large percentage of the contested trials. Observing that Oregon's insanity defense system is run by consensus, the authors suggest a reorientation of the insanity defense debate.

  7. Software Model Of Software-Development Process

    NASA Technical Reports Server (NTRS)

    Lin, Chi Y.; Synott, Debra J.; Levary, Reuven R.

    1990-01-01

    Collection of computer programs constitutes software tool for simulation of medium- to large-scale software-development projects. Necessary to include easily identifiable and more-readily quantifiable characteristics like costs, times, and numbers of errors. Mathematical model incorporating these and other factors of dynamics of software-development process implemented in the Software Life Cycle Simulator (SLICS) computer program. Simulates dynamics of software-development process. In combination with input and output expert software systems and knowledge-based management software system, develops information for use in managing large software-development project. Intended to aid managers in planning, managing, and controlling software-development processes by reducing uncertainties in budgets, required personnel, and schedules.

  8. Simple solution to the medical instrumentation software problem

    NASA Astrophysics Data System (ADS)

    Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.

    1995-04-01

    Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.

  9. Quantification of moving target cyber defenses

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Cybenko, George

    2015-05-01

    Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential "game-changers" in an effort to increase the attacker's workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.

  10. Framework for Small-Scale Experiments in Software Engineering: Guidance and Control Software Project: Software Engineering Case Study

    NASA Technical Reports Server (NTRS)

    Hayhurst, Kelly J.

    1998-01-01

    Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.

  11. Defenseive Structuring and Environmental Stress

    ERIC Educational Resources Information Center

    Siegel, Bernard J.

    1970-01-01

    This essay explores a kind of adaptation, referred to as defenseive structuring, that recurs with great regularity among groups that perceive themselves as exposed to environmental stress of long duration with which they cannot cope directly and aggressively." (Author)

  12. The insanity defense on trial.

    PubMed

    Stone, A A

    1982-08-01

    What was once a great romance between law and psychiatry has ended in disenchantment on both sides. Legal rulings during the 1950s intended to increase the psychiatric presence in the courtroom have been repudiated, and there is now a mood to abolish the traditional insanity defense. Abolitionists charge that the insanity defense has been successfully employed by large numbers of dangerous criminals to avoid punishment, that psychiatrists are dishonest because they serve as expert witnesses for both sides, and that the existence of the defense is evidence of a permissive society that coddles violent criminals. Each of these charges is rebutted by the author, who contends that until recently the insanity defense was a profound hypocrisy: the courts found the defendants not guilty by reason of insanity and then relied on psychiatry to confine them for the rest of their lives. But legal reforms and changes in psychiatric practice during the past 20 years have made it more difficult to confine such persons, and thus the insanity defense has real meaning for the first time. The author believes that despite the loss of protection to society, there are important legal and moral barriers to abolishing the insanity defense.

  13. Strategic defense initiative: critical issues

    SciTech Connect

    Nuckolls, J.H.

    1985-06-01

    The objectives of the Strategic Defense Initiative (SDI) as outlined by President Reagan are discussed. The principal objective for SDI is as a defense against ballistic missiles. Soviet objections and a summary of US-USSR dialogue on the subject are reviewed. Most US studies have been critical of SDI. Four critical issues are addressed in depth: are defense weapons technologically feasible which have high economic leverage relative to offensive ballistic missiles; would the defense feasibility and leverage be degraded or enhanced in the technological race between weapons innovation and countermeasures; could stability be achieved during and after the transition to the defense dominated world envisioned by SDI proponents; would the deployment of high leverage defensive weapons increase or decrease the security of NATO Europe, and the probability of major conventional or nuclear wars. The issue of SDI may lead to a paradox that contains the seeds of catastrophe. The author concludes by warning that nuclear disarmament may eliminate the highly successful deterrent mechanism for avoiding another major world war. In a world made safe for major conventional wars by the apparent ''elimination'' of nuclear weapons, the leaders in a conventional World War III - involving unimaginable suffering, hatred, terror, and death - would be strongly motivated to introduce nuclear weapons in the crucial decisive battles. Even if diplomacy could ''eliminate'' nuclear weapons, man's knowledge of nuclear weapons can never be eliminated. The paradox is the attempt to eliminate nuclear weapons may maximize the probability of their use. (DMC)

  14. Cancer intelligence acquired (CIA): tumor glycosylation and sialylation codes dismantling antitumor defense.

    PubMed

    Boligan, Kayluz Frias; Mesa, Circe; Fernandez, Luis Enrique; von Gunten, Stephan

    2015-04-01

    Aberrant glycosylation is a key feature of malignant transformation and reflects epigenetic and genetic anomalies among the multitude of molecules involved in glycan biosynthesis. Although glycan biosynthesis is not template bound, altered tumor glycosylation is not random, but associated with common glycosylation patterns. Evidence suggests that acquisition of distinct glycosylation patterns evolves from a 'microevolutionary' process conferring advantages in terms of tumor growth, tumor dissemination, and immune escape. Such glycosylation modifications also involve xeno- and hypersialylation. Xeno-autoantigens such as Neu5Gc-gangliosides provide potential targets for immunotherapy. Hypersialylation may display 'enhanced self' to escape immunosurveillance and involves several not mutually exclusive inhibitory pathways that all rely on protein-glycan interactions. A better understanding of tumor 'glycan codes' as deciphered by lectins, such as siglecs, selectins, C-type lectins and galectins, may lead to novel treatment strategies, not only in cancer, but also in autoimmune disease or transplantation.

  15. Acquired Hearing Loss in Children.

    PubMed

    Kenna, Margaret A

    2015-12-01

    Hearing loss is the most common congenital sensory impairment. According to National Health and Nutrition Examination Survey data from 2001 to 2008, 20.3% of subjects aged greater than or equal to 12 had unilateral or bilateral hearing loss. The World Health Organization notes that, worldwide, there are 360 million people with disabling hearing loss, with 50% preventable. Although many hearing losses are acquired, many others are manifestations of preexisting conditions. The purpose of a pediatric hearing evaluation is to identify the degree and type of hearing loss and etiology and to outline a comprehensive strategy that supports language and social development and communication.

  16. The inhibition of acquired fear.

    PubMed

    Izquierdo, Iván; Cammarota, Martín; Vianna, Mónica M R; Bevilaqua, Lía R M

    2004-01-01

    A conditioned stimulus (CS) associated with a fearsome unconditioned stimulus (US) generates learned fear. Acquired fear is at the root of a variety of mental disorders, among which phobias, generalized anxiety, the posttraumatic stress disorder (PTSD) and some forms of depression. The simplest way to inhibit learned fear is to extinguish it, which is usually done by repeatedly presenting the CS alone, so that a new association, CS-"no US", will eventually overcome the previously acquired CS-US association. Extinction was first described by Pavlov as a form of "internal inhibition" and was recommended by Freud and Ferenczi in the 1920s (who called it "habituation") as the treatment of choice for phobic disorders. It is used with success till this day, often in association with anxiolytic drugs. Extinction has since then been applied, also successfully and also often in association with anxiolytics, to the treatment of panic, generalized anxiety disorders and, more recently, PTSD. Extinction of learned fear involves gene expression, protein synthesis, N-methyl-D-aspartate (NMDA) receptors and signaling pathways in the hippocampus and the amygdala at the time of the first CS-no US association. It can be enhanced by increasing the exposure to the "no US" component at the time of behavioral testing, to the point of causing the complete uninstallment of the original fear response. Some theorists have recently proposed that reiteration of the CS alone may induce a reconsolidation of the learned behavior instead of its extinction. Reconsolidation would preserve the original memory from the labilization induced by its retrieval. If true, this would of course be disastrous for the psychotherapy of fear-motivated disorders. Here we show that neither the CS nor retrieval cause anything remotely like reconsolidation, but just extinction. In fact, our findings indicate that the reconsolidation hypothesis is essentially incorrect, at least for the form of contextual fear most

  17. Organ-specific regulation of growth-defense tradeoffs by plants.

    PubMed

    Smakowska, Elwira; Kong, Jixiang; Busch, Wolfgang; Belkhadir, Youssef

    2016-02-01

    Plants grow while also defending themselves against phylogenetically unrelated pathogens. Because defense and growth are both costly programs, a plant's success in colonizing resource-scarce environments requires tradeoffs between the two. Here, we summarize efforts aimed at understanding how plants use iterative tradeoffs to modulate differential organ growth when defenses are elicited. First, we focus on shoots to illustrate how light, in conjunction with the growth hormone gibberellin (GA) and the defense hormone jasmonic acid (JA), act to finely regulate defense and growth programs in this organ. Second, we expand on the regulation of growth-defense trade-offs in the root, a less well-studied topic despite the critical role of this organ in acquiring resources in an environment deeply entrenched with disparate populations of microbes.

  18. Organ-specific regulation of growth-defense tradeoffs by plants.

    PubMed

    Smakowska, Elwira; Kong, Jixiang; Busch, Wolfgang; Belkhadir, Youssef

    2016-02-01

    Plants grow while also defending themselves against phylogenetically unrelated pathogens. Because defense and growth are both costly programs, a plant's success in colonizing resource-scarce environments requires tradeoffs between the two. Here, we summarize efforts aimed at understanding how plants use iterative tradeoffs to modulate differential organ growth when defenses are elicited. First, we focus on shoots to illustrate how light, in conjunction with the growth hormone gibberellin (GA) and the defense hormone jasmonic acid (JA), act to finely regulate defense and growth programs in this organ. Second, we expand on the regulation of growth-defense trade-offs in the root, a less well-studied topic despite the critical role of this organ in acquiring resources in an environment deeply entrenched with disparate populations of microbes. PMID:26802804

  19. Software attribute visualization for high integrity software

    SciTech Connect

    Pollock, G.M.

    1998-03-01

    This report documents a prototype tool developed to investigate the use of visualization and virtual reality technologies for improving software surety confidence. The tool is utilized within the execution phase of the software life cycle. It provides a capability to monitor an executing program against prespecified requirements constraints provided in a program written in the requirements specification language SAGE. The resulting Software Attribute Visual Analysis Tool (SAVAnT) also provides a technique to assess the completeness of a software specification.

  20. Peer review of the trusted software methodology

    SciTech Connect

    Chisholm, G.H.; Gannon, J.D. |; Kemmerer, R.A. |; McHugh, J. |

    1994-02-01

    The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described, and a brief introduction to the TSM is provided. The findings from the review fall into three categories: achievements, desirable additions, and changes. In addition, several recommendations are made with respect to application of the TSM within the purview of the Ballistic Missile Defense Organization.

  1. Global Software Engineering: A Software Process Approach

    NASA Astrophysics Data System (ADS)

    Richardson, Ita; Casey, Valentine; Burton, John; McCaffery, Fergal

    Our research has shown that many companies are struggling with the successful implementation of global software engineering, due to temporal, cultural and geographical distance, which causes a range of factors to come into play. For example, cultural, project managementproject management and communication difficulties continually cause problems for software engineers and project managers. While the implementation of efficient software processes can be used to improve the quality of the software product, published software process models do not cater explicitly for the recent growth in global software engineering. Our thesis is that global software engineering factors should be included in software process models to ensure their continued usefulness in global organisations. Based on extensive global software engineering research, we have developed a software process, Global Teaming, which includes specific practices and sub-practices. The purpose is to ensure that requirements for successful global software engineering are stipulated so that organisations can ensure successful implementation of global software engineering.

  2. Malaria acquired in Haiti - 2010.

    PubMed

    2010-03-01

    On January 12, 2010, a 7.0 magnitude earthquake struck Haiti, which borders the Dominican Republic on the island of Hispaniola. The earthquake's epicenter was 10 miles west of the Haiti capital city of Port-au-Prince (estimated population: 2 million). According to the Haitian government, approximately 200,000 persons were killed, and 500,000 were left homeless. Malaria caused by Plasmodium falciparum infection is endemic in Haiti, and the principal mosquito vector is Anopheles albimanus, which frequently bites outdoors. Thus, displaced persons living outdoors or in temporary shelters and thousands of emergency responders in Haiti are at substantial risk for malaria. During January 12-February 25, CDC received reports of 11 laboratory-confirmed cases of P. falciparum malaria acquired in Haiti. Patients included seven U.S. residents who were emergency responders, three Haitian residents, and one U.S. traveler. This report summarizes the 11 cases and provides chemoprophylactic and additional preventive recommendations to minimize the risk for acquiring malaria for persons traveling to Haiti.

  3. Software Process Improvement: Supporting the Linking of the Software and the Business Strategies

    NASA Astrophysics Data System (ADS)

    Albuquerque, Adriano Bessa; Rocha, Ana Regina; Lima, Andreia Cavalcanti

    The market is becoming more and more competitive, a lot of products and services depend of the software product and the software is one of the most important assets, which influence the organizations’ businesses. Considering this context, we can observe that the companies must to deal with the software, developing or acquiring, carefully. One of the perspectives that can help to take advantage of the software, supporting effectively the business, is to invest on the organization’s software processes. This paper presents an approach to evaluate and improve the processes assets of the software organizations, based on internationally well-known standards and process models. This approach is supported by automated tools from the TABA Workstation and is part of a wider improvement strategy constituted of three layers (organizational layer, process execution layer and external entity layer). Moreover, this paper presents the experience of use and their results.

  4. Report: Scientific Software.

    ERIC Educational Resources Information Center

    Borman, Stuart A.

    1985-01-01

    Discusses various aspects of scientific software, including evaluation and selection of commercial software products; program exchanges, catalogs, and other information sources; major data analysis packages; statistics and chemometrics software; and artificial intelligence. (JN)

  5. The neuroecology of chemical defenses.

    PubMed

    Derby, Charles D; Aggio, Juan F

    2011-11-01

    Chemicals are a frequent means whereby organisms defend themselves against predators, competitors, parasites, microbes, and other potentially harmful organisms. Much progress has been made in understanding how a phylogenetic diversity of organisms living in a variety of environments uses chemical defenses. Chief among these advances is determining the molecular identity of defensive chemicals and the roles they play in shaping interactions between individuals. Some progress has been made in deciphering the molecular, cellular, and systems level mechanisms underlying these interactions, as well as how these interactions can lead to structuring of communities and even ecosystems. The neuroecological approach unifies practices and principles from these diverse disciplines and at all scales as it attempts to explain in a single conceptual framework the abundances of organisms and the distributions of species within natural habitats. This article explores the neuroecology of chemical defenses with a focus on aquatic organisms and environments. We review the concept of molecules of keystone significance, including examples of how saxitoxin and tetrodotoxin can shape the organization and dynamics of marine and riparian communities, respectively. We also describe the current status and future directions of a topic of interest to our research group-the use of ink by marine molluscs, especially sea hares, in their defense. We describe a diversity of molecules and mechanisms mediating the protective effects of sea hares' ink, including use as chemical defenses against predators and as alarm cues toward conspecifics, and postulate that some defensive molecules may function as molecules of keystone significance. Finally, we propose future directions for studying the neuroecology of the chemical defenses of sea hares and their molluscan relatives, the cephalopods.

  6. Space Flight Software Development Software for Intelligent System Health Management

    NASA Technical Reports Server (NTRS)

    Trevino, Luis C.; Crumbley, Tim

    2004-01-01

    The slide presentation examines the Marshall Space Flight Center Flight Software Branch, including software development projects, mission critical space flight software development, software technical insight, advanced software development technologies, and continuous improvement in the software development processes and methods.

  7. Software Engineering Guidebook

    NASA Technical Reports Server (NTRS)

    Connell, John; Wenneson, Greg

    1993-01-01

    The Software Engineering Guidebook describes SEPG (Software Engineering Process Group) supported processes and techniques for engineering quality software in NASA environments. Three process models are supported: structured, object-oriented, and evolutionary rapid-prototyping. The guidebook covers software life-cycles, engineering, assurance, and configuration management. The guidebook is written for managers and engineers who manage, develop, enhance, and/or maintain software under the Computer Software Services Contract.

  8. 17 CFR 210.8-06 - Real estate operations acquired or to be acquired.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired. If, during the period for which income statements are required, the smaller reporting company has acquired... acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES...

  9. Is the insanity defense "unconscionable"?

    PubMed

    Perr, I N

    1975-01-01

    The debate over the meaningfulness and utility of the insanity defense has continued unabated ober the years. President Nixon has referred to the "unconscionably abuse" of the defense. This paper, presented as part of a panel on the subject, has propounded the view that the defense is unconscionable, using that aspect of the definition dealing with unreasonableness. The historical antecedents and the religious and social philosophy of the concept of responsibility and nonresponsibility have been reviewed. In addition to the inapplicability of the concept to current social problems, and the difficulties of applying current psychiatric knowledge to effect a rational delineation between the two legal entities encompassed under the rubric of responsibility and nonresponsibility, the potential problems and the potential opportunities which may result from the abolition of the plea are presented. With these factors in mind, as well as the obvious failure of the legal-social-penal system in handling the problems of the behaviorally deviant, I believe that the use of the current system has hampered the development of possibly more reasonable alternative systems and that, therefore, the maintenance of the insanity defense is unreasonable and harmful to our society. The insanity defense, as currently constituted and institutionalized, has evolved into a rigid and archaic vestige of the legal system of an earlier era and therefore its use has, in the sense defined, indeed become "unconscionable" and lacking in social meaningfulness.

  10. Lymphoma in acquired generalized lipodystrophy.

    PubMed

    Brown, Rebecca J; Chan, Jean L; Jaffe, Elaine S; Cochran, Elaine; DePaoli, Alex M; Gautier, Jean-Francois; Goujard, Cecile; Vigouroux, Corinne; Gorden, Phillip

    2016-01-01

    Acquired generalized lipodystrophy (AGL) is a rare disease thought to result from autoimmune destruction of adipose tissue. Peripheral T-cell lymphoma (PTCL) has been reported in two AGL patients. We report five additional cases of lymphoma in AGL, and analyze the role of underlying autoimmunity and recombinant human leptin (metreleptin) replacement in lymphoma development. Three patients developed lymphoma during metreleptin treatment (two PTCL and one ALK-positive anaplastic large cell lymphoma), and two developed lymphomas (mycosis fungoides and Burkitt lymphoma) without metreleptin. AGL is associated with high risk for lymphoma, especially PTCL. Autoimmunity likely contributes to this risk. Lymphoma developed with or without metreleptin, suggesting metreleptin does not directly cause lymphoma development; a theoretical role of metreleptin in lymphoma progression remains possible. For most patients with AGL and severe metabolic complications, the proven benefits of metreleptin on metabolic disease will likely outweigh theoretical risks of metreleptin in lymphoma development or progression.

  11. Genetic Determinism and the Innate-Acquired Distinction in Medicine

    PubMed Central

    2009-01-01

    This article illustrates in which sense genetic determinism is still part of the contemporary interactionist consensus in medicine. Three dimensions of this consensus are discussed: kinds of causes, a continuum of traits ranging from monogenetic diseases to car accidents, and different kinds of determination due to different norms of reaction. On this basis, this article explicates in which sense the interactionist consensus presupposes the innate–acquired distinction. After a descriptive Part 1, Part 2 reviews why the innate–acquired distinction is under attack in contemporary philosophy of biology. Three arguments are then presented to provide a limited and pragmatic defense of the distinction: an epistemic, a conceptual, and a historical argument. If interpreted in a certain manner, and if the pragmatic goals of prevention and treatment (ideally specifying what medicine and health care is all about) are taken into account, then the innate–acquired distinction can be a useful epistemic tool. It can help, first, to understand that genetic determination does not mean fatalism, and, second, to maintain a system of checks and balances in the continuing nature–nurture debates. PMID:20234831

  12. Software Configuration Management Guidebook

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes which are used in software development. The Software Assurance Guidebook, SMAP-GB-A201, issued in September, 1989, provides an overall picture of the concepts and practices of NASA in software assurance. Lower level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the Software Configuration Management Guidebook which describes software configuration management in a way that is compatible with practices in industry and at NASA Centers. Software configuration management is a key software development process, and is essential for doing software assurance.

  13. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  14. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  15. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  16. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  17. 7 CFR 926.10 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.10 Acquire. Acquire means to obtain cranberries by any means whatsoever for the purpose of handling cranberries....

  18. Flexible resource allocation during plant defense responses

    PubMed Central

    Schultz, Jack C.; Appel, Heidi M.; Ferrieri, Abigail P.; Arnold, Thomas M.

    2013-01-01

    Plants are organisms composed of modules connected by xylem and phloem transport streams. Attack by both insects and pathogens elicits sometimes rapid defense responses in the attacked module. We have also known for some time that proteins are often reallocated away from pathogen-infected tissues, while the same infection sites may draw carbohydrates to them. This has been interpreted as a tug of war in which the plant withdraws critical resources to block microbial growth while the microbes attempt to acquire more resources. Sink-source regulated transport among modules of critical resources, particularly carbon and nitrogen, is also altered in response to attack. Insects and jasmonate can increase local sink strength, drawing carbohydrates that support defense production. Shortly after attack, carbohydrates may also be drawn to the root. The rate and direction of movement of photosynthate or signals in phloem in response to attack is subject to constraints that include branching, degree of connection among tissues, distance between sources and sinks, proximity, strength, and number of competing sinks, and phloem loading/unloading regulators. Movement of materials (e.g., amino acids, signals) to or from attack sites in xylem is less well understood but is partly driven by transpiration. The root is an influential sink and may regulate sink-source interactions and transport above and below ground as well as between the plant and the rhizosphere and nearby, connected plants. Research on resource translocation in response to pathogens or herbivores has focused on biochemical mechanisms; whole-plant research is needed to determine which, if any, of these plant behaviors actually influence plant fitness. PMID:23986767

  19. Bulgy tadpoles: inducible defense morph.

    PubMed

    Kishida, Osamu; Nishimura, Kinya

    2004-08-01

    Predator induced morphological defenses are marked morphological shifts induced directly by cues associated with a predator. Generally, remote cues, i.e., chemical substances emitted from predators or injured conspecifics, are considered to be ideal signals to induce morphological change in aquatic environments rather than close cues, i.e., close chemical or tactile cues, since chemical substances that can propagate over relatively long distances and persist for a long period may allow organisms to keep safe and to deliberately change their morph. In fact, most organisms adopting an inducible morphological defense utilize remote chemical cues to detect predation risk and to produce morphological defenses. In this paper, we report a unique and functionally well designed inducible morphological defense strategy where the induction process requires close cues from a predator. The tadpoles of Rana pirica exhibited a bulgy bodied morphology when threatened with predation by larval salamanders, Hynobius retardatus, in close proximity. Predation trials and a function experiment showed that the induced bulgy morph is an adaptive defense phenotype against the gape-limited predator larval H. retardatus. Furthermore, R. pirica tadpoles use two adaptive strategies in terms of cost saving, i.e., adjustment of the extent of bulginess according to predation risk and reversibility by actual shrink of bulgy body after removing the predation threat. In general, R. pirica hatch earlier than H. retardatus. In natural ponds, during the early developmental stage R. pirica tadpoles live in close proximity to young H. retardatus larvae. As they grow, the salamanders gradually become serious predators and the predator-prey interaction becomes intimate. After a while, predation, cannibalism and metamorphosis decrease the number of salamanders in the ponds, and the predator-prey interaction weakens. Such a phenology in the predator-prey interaction allows the evolution of a close

  20. Bulgy tadpoles: inducible defense morph.

    PubMed

    Kishida, Osamu; Nishimura, Kinya

    2004-08-01

    Predator induced morphological defenses are marked morphological shifts induced directly by cues associated with a predator. Generally, remote cues, i.e., chemical substances emitted from predators or injured conspecifics, are considered to be ideal signals to induce morphological change in aquatic environments rather than close cues, i.e., close chemical or tactile cues, since chemical substances that can propagate over relatively long distances and persist for a long period may allow organisms to keep safe and to deliberately change their morph. In fact, most organisms adopting an inducible morphological defense utilize remote chemical cues to detect predation risk and to produce morphological defenses. In this paper, we report a unique and functionally well designed inducible morphological defense strategy where the induction process requires close cues from a predator. The tadpoles of Rana pirica exhibited a bulgy bodied morphology when threatened with predation by larval salamanders, Hynobius retardatus, in close proximity. Predation trials and a function experiment showed that the induced bulgy morph is an adaptive defense phenotype against the gape-limited predator larval H. retardatus. Furthermore, R. pirica tadpoles use two adaptive strategies in terms of cost saving, i.e., adjustment of the extent of bulginess according to predation risk and reversibility by actual shrink of bulgy body after removing the predation threat. In general, R. pirica hatch earlier than H. retardatus. In natural ponds, during the early developmental stage R. pirica tadpoles live in close proximity to young H. retardatus larvae. As they grow, the salamanders gradually become serious predators and the predator-prey interaction becomes intimate. After a while, predation, cannibalism and metamorphosis decrease the number of salamanders in the ponds, and the predator-prey interaction weakens. Such a phenology in the predator-prey interaction allows the evolution of a close

  1. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Missile Defense... notice that it is renewing the charter for the Missile Defense Advisory Committee (hereafter referred to... Secretary of Defense for Acquisition, Technology & Logistics and the Director, Missile Defense...

  2. 76 FR 61279 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Member (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-04

    ... Defense Acquisition Regulations System 48 CFR Parts 212, 247, and 252 RIN 0750-AG25 Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Member (DFARS Case 2007-D002) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is adopting...

  3. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Defense Acquisition Regulations System 48 CFR Parts 212, 247, and 252 RIN 0750-AG81 Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Interim rule with request for...

  4. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ... of Availability (NOA) in the Federal Register (76 FR 28757) announcing the revised Defense Logistics... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense....

  5. The Inflammasome in Host Defense

    PubMed Central

    Chen, Gang; Pedra, Joao H.F.

    2010-01-01

    Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL)-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes. PMID:22315529

  6. Violence and the epilepsy defense.

    PubMed

    Treiman, D M

    1999-05-01

    The essence of the epilepsy defense is the argument that a crime was committed as a result of the perpetrator having epilepsy, and thus that he or she should not be held responsible for a violent crime. Neurologists are frequently asked to pass judgment regarding whether an alleged act may have been the result of an epileptic condition; therefore, neurologists should be informed as to what criteria should be used to decide if a given act was, or could have been, the result of an epileptic seizure. This article discusses three cases where epilepsy is used as the defense argument. In addition, this article reviews types of epileptic seizures, syncopal events, and pseudoseizures.

  7. RNase 7 in Cutaneous Defense

    PubMed Central

    Rademacher, Franziska; Simanski, Maren; Harder, Jürgen

    2016-01-01

    RNase 7 belongs to the RNase A superfamily and exhibits a broad spectrum of antimicrobial activity against various microorganisms. RNase 7 is expressed in human skin, and expression in keratinocytes can be induced by cytokines and microbes. These properties suggest that RNase 7 participates in innate cutaneous defense. In this review, we provide an overview about the role of RNase 7 in cutaneous defense with focus on the molecular mechanism of the antimicrobial activity of RNase 7, the regulation of RNase 7 expression, and the role of RNase 7 in skin diseases. PMID:27089327

  8. 12 CFR 583.1 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AND LOAN HOLDING COMPANIES § 583.1 Acquire. The term acquire means to acquire, directly or indirectly, ownership or control through an acquisition of shares, an acquisition of assets or assumption of liabilities, a merger or consolidation, or any similar transaction....

  9. Software productivity improvement through software engineering technology

    NASA Technical Reports Server (NTRS)

    Mcgarry, F. E.

    1985-01-01

    It has been estimated that NASA expends anywhere from 6 to 10 percent of its annual budget on the acquisition, implementation and maintenance of computer software. Although researchers have produced numerous software engineering approaches over the past 5-10 years; each claiming to be more effective than the other, there is very limited quantitative information verifying the measurable impact htat any of these technologies may have in a production environment. At NASA/GSFC, an extended research effort aimed at identifying and measuring software techniques that favorably impact productivity of software development, has been active over the past 8 years. Specific, measurable, software development technologies have been applied and measured in a production environment. Resulting software development approaches have been shown to be effective in both improving quality as well as productivity in this one environment.

  10. Software distribution using xnetlib

    SciTech Connect

    Dongarra, J.J. |; Rowan, T.H.; Wade, R.C.

    1993-06-01

    Xnetlib is a new tool for software distribution. Whereas its predecessor netlib uses e-mail as the user interface to its large collection of public-domain mathematical software, xnetlib uses an X Window interface and socket-based communication. Xnetlib makes it easy to search through a large distributed collection of software and to retrieve requested software in seconds.

  11. Agile Software Development

    ERIC Educational Resources Information Center

    Biju, Soly Mathew

    2008-01-01

    Many software development firms are now adopting the agile software development method. This method involves the customer at every level of software development, thus reducing the impact of change in the requirement at a later stage. In this article, the principles of the agile method for software development are explored and there is a focus on…

  12. Optimal Resource Allocation in Electrical Network Defense

    SciTech Connect

    Yao, Y; Edmunds, T; Papageorgiou, D; Alvarez, R

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasures when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or

  13. Software Formal Inspections Standard

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This Software Formal Inspections Standard (hereinafter referred to as Standard) is applicable to NASA software. This Standard defines the requirements that shall be fulfilled by the software formal inspections process whenever this process is specified for NASA software. The objective of this Standard is to define the requirements for a process that inspects software products to detect and eliminate defects as early as possible in the software life cycle. The process also provides for the collection and analysis of inspection data to improve the inspection process as well as the quality of the software.

  14. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  15. Associative Learning Through Acquired Salience.

    PubMed

    Treviño, Mario

    2015-01-01

    Most associative learning studies describe the salience of stimuli as a fixed learning-rate parameter. Presumptive saliency signals, however, have also been linked to motivational and attentional processes. An interesting possibility, therefore, is that discriminative stimuli could also acquire salience as they become powerful predictors of outcomes. To explore this idea, we first characterized and extracted the learning curves from mice trained with discriminative images offering varying degrees of structural similarity. Next, we fitted a linear model of associative learning coupled to a series of mathematical representations for stimulus salience. We found that the best prediction, from the set of tested models, was one in which the visual salience depended on stimulus similarity and a non-linear function of the associative strength. Therefore, these analytic results support the idea that the net salience of a stimulus depends both on the items' effective salience and the motivational state of the subject that learns about it. Moreover, this dual salience model can explain why learning about a stimulus not only depends on the effective salience during acquisition but also on the specific learning trajectory that was used to reach this state. Our mathematical description could be instrumental for understanding aberrant salience acquisition under stressful situations and in neuropsychiatric disorders like schizophrenia, obsessive-compulsive disorder, and addiction.

  16. Infections Acquired in the Garden.

    PubMed

    Cunha, Cheston B; Cunha, Burke A

    2015-10-01

    Gardening is a wonderful pastime, and the garden is a very peaceful place to enjoy one's vacation. However, the garden may be a treacherous place for very young or compromised hosts when one takes into account the infectious potential residing in the soil, as well as the insect vectors on plants and animals. Even normal hosts may acquire a variety of infections from the soil, animals, or animal-related insect bites. The location of the garden, its natural animal and insect inhabitants, and the characteristics of the soil play a part in determining its infectious potential. The most important factor making the garden an infectious and dangerous place is the number and interaction of animals, whether they are pets or wild, that temporarily use the garden for part of their daily activities. The clinician should always ask about garden exposure, which will help in eliminating the diagnostic possibilities for the patient. The diagnostic approach is to use epidemiological principles in concert with clinical clues, which together should suggest a reasonable list of diagnostic possibilities. Organ involvement and specific laboratory tests help further narrow the differential diagnosis and determine the specific tests necessary to make a definitive diagnosis. PMID:26542044

  17. Inherited or acquired metabolic disorders.

    PubMed

    Eichler, Florian; Ratai, Eva; Carroll, Jason J; Masdeu, Joseph C

    2016-01-01

    This chapter starts with a description of imaging of inherited metabolic disorders, followed by a discussion on imaging of acquired toxic-metabolic disorders of the adult brain. Neuroimaging is crucial for the diagnosis and management of a number of inherited metabolic disorders. Among these, inherited white-matter disorders commonly affect both the nervous system and endocrine organs. Magnetic resonance imaging (MRI) has enabled new classifications of these disorders that have greatly enhanced both our diagnostic ability and our understanding of these complex disorders. Beyond the classic leukodystrophies, we are increasingly recognizing new hereditary leukoencephalopathies such as the hypomyelinating disorders. Conventional imaging can be unrevealing in some metabolic disorders, but proton magnetic resonance spectroscopy (MRS) may be able to directly visualize the metabolic abnormality in certain disorders. Hence, neuroimaging can enhance our understanding of pathogenesis, even in the absence of a pathologic specimen. This review aims to present pathognomonic brain MRI lesion patterns, the diagnostic capacity of proton MRS, and information from clinical and laboratory testing that can aid diagnosis. We demonstrate that applying an advanced neuroimaging approach enhances current diagnostics and management. Additional information on inherited and metabolic disorders of the brain can be found in Chapter 63 in the second volume of this series. PMID:27432685

  18. Infections Acquired in the Garden.

    PubMed

    Cunha, Cheston B; Cunha, Burke A

    2015-10-01

    Gardening is a wonderful pastime, and the garden is a very peaceful place to enjoy one's vacation. However, the garden may be a treacherous place for very young or compromised hosts when one takes into account the infectious potential residing in the soil, as well as the insect vectors on plants and animals. Even normal hosts may acquire a variety of infections from the soil, animals, or animal-related insect bites. The location of the garden, its natural animal and insect inhabitants, and the characteristics of the soil play a part in determining its infectious potential. The most important factor making the garden an infectious and dangerous place is the number and interaction of animals, whether they are pets or wild, that temporarily use the garden for part of their daily activities. The clinician should always ask about garden exposure, which will help in eliminating the diagnostic possibilities for the patient. The diagnostic approach is to use epidemiological principles in concert with clinical clues, which together should suggest a reasonable list of diagnostic possibilities. Organ involvement and specific laboratory tests help further narrow the differential diagnosis and determine the specific tests necessary to make a definitive diagnosis.

  19. Associative Learning Through Acquired Salience

    PubMed Central

    Treviño, Mario

    2016-01-01

    Most associative learning studies describe the salience of stimuli as a fixed learning-rate parameter. Presumptive saliency signals, however, have also been linked to motivational and attentional processes. An interesting possibility, therefore, is that discriminative stimuli could also acquire salience as they become powerful predictors of outcomes. To explore this idea, we first characterized and extracted the learning curves from mice trained with discriminative images offering varying degrees of structural similarity. Next, we fitted a linear model of associative learning coupled to a series of mathematical representations for stimulus salience. We found that the best prediction, from the set of tested models, was one in which the visual salience depended on stimulus similarity and a non-linear function of the associative strength. Therefore, these analytic results support the idea that the net salience of a stimulus depends both on the items' effective salience and the motivational state of the subject that learns about it. Moreover, this dual salience model can explain why learning about a stimulus not only depends on the effective salience during acquisition but also on the specific learning trajectory that was used to reach this state. Our mathematical description could be instrumental for understanding aberrant salience acquisition under stressful situations and in neuropsychiatric disorders like schizophrenia, obsessive-compulsive disorder, and addiction. PMID:26793078

  20. Associative Learning Through Acquired Salience.

    PubMed

    Treviño, Mario

    2015-01-01

    Most associative learning studies describe the salience of stimuli as a fixed learning-rate parameter. Presumptive saliency signals, however, have also been linked to motivational and attentional processes. An interesting possibility, therefore, is that discriminative stimuli could also acquire salience as they become powerful predictors of outcomes. To explore this idea, we first characterized and extracted the learning curves from mice trained with discriminative images offering varying degrees of structural similarity. Next, we fitted a linear model of associative learning coupled to a series of mathematical representations for stimulus salience. We found that the best prediction, from the set of tested models, was one in which the visual salience depended on stimulus similarity and a non-linear function of the associative strength. Therefore, these analytic results support the idea that the net salience of a stimulus depends both on the items' effective salience and the motivational state of the subject that learns about it. Moreover, this dual salience model can explain why learning about a stimulus not only depends on the effective salience during acquisition but also on the specific learning trajectory that was used to reach this state. Our mathematical description could be instrumental for understanding aberrant salience acquisition under stressful situations and in neuropsychiatric disorders like schizophrenia, obsessive-compulsive disorder, and addiction. PMID:26793078

  1. Responsbility for unreliable software

    SciTech Connect

    Wahl, N.J.

    1994-12-31

    Unreliable software exposes software developers and distributors to legal risks. Under certain circumstances, the developer and distributor of unreliable software can be sued. To avoid lawsuits, software developers should do the following: determine what the risks am, understand the extent of the risks, and identify ways of avoiding the risks and lessening the consequences of the risks. Liability issues associated with unreliable software are explored in this article.

  2. Software engineering environment tool set integration

    NASA Technical Reports Server (NTRS)

    Selfridge, William P.

    1986-01-01

    Space Transportation System Division (STSD) Engineering has a program to promote excellence within the engineering function. This program resulted in a capital funded facility based on a VAX cluster called the Rockwell Operational Engineering System (ROSES). The second phase of a three phase plan to establish an integrated software engineering environment for ROSES is examined. It discusses briefly phase one which establishes the basic capability for a modern software development environment to include a tool set, training and standards. Phase two is a tool set integration. The tool set is primarily off-the-shelf tools acquired through vendors or government agencies (public domain). These tools were placed into categories of software development. These categories are: requirements, design, and construction support; verification and validation support; and software management support. The integration of the tool set is being performed through concept prototyping and development of tools specifically designed to support the life cycle and provide transition from one phase to the next.

  3. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  4. Directions for Defense Digital Libraries.

    ERIC Educational Resources Information Center

    Larsen, Ronald L.

    1998-01-01

    Describes directions, challenges, and objectives of the information management program of the United States Defense Advanced Research Projects Agency (DARPA). The program envisions the rigor and organization normally associated with a research library to be virtually rendered and extended in the networked world of distributed information. (AEF)

  5. Radiological Defense Officer. Student Workbook.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Washington, DC.

    This student workbook includes the necessary administrative materials, briefs, exercises and answer sheets for the quizzes and final course examination as needed by the students during the conduct of the Radiological Defense Officer course. Among the briefs included are the following: (1) Reporting Forms; (2) Forecasting Dose Rates; (3) Dose…

  6. In Defense of Darwin's Theory.

    ERIC Educational Resources Information Center

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  7. In Defense of the Vendors

    ERIC Educational Resources Information Center

    Irwin, G. Brockett

    1975-01-01

    The problems that are encountered when cooperation breaks down between the industrial source operator and the pollution control equipment vendor are examined. The focal point of this examination is the study of defenses available to the equipment vendor when industrial source operators refuse to cooperate. (Author/BT)

  8. Formal methods in the development of safety critical software systems

    SciTech Connect

    Williams, L.G.

    1991-11-15

    As the use of computers in critical control systems such as aircraft controls, medical instruments, defense systems, missile controls, and nuclear power plants has increased, concern for the safety of those systems has also grown. Much of this concern has focused on the software component of those computer-based systems. This is primarily due to historical experience with software systems that often exhibit larger numbers of errors than their hardware counterparts and the fact that the consequences of a software error may endanger human life, property, or the environment. A number of different techniques have been used to address the issue of software safety. Some are standard software engineering techniques aimed at reducing the number of faults in a software protect, such as reviews and walkthroughs. Others, including fault tree analysis, are based on identifying and reducing hazards. This report examines the role of one such technique, formal methods, in the development of software for safety critical systems. The use of formal methods to increase the safety of software systems is based on their role in reducing the possibility of software errors that could lead to hazards. The use of formal methods in the development of software systems is controversial. Proponents claim that the use of formal methods can eliminate errors from the software development process, and produce programs that are probably correct. Opponents claim that they are difficult to learn and that their use increases development costs unacceptably. This report discusses the potential of formal methods for reducing failures in safety critical software systems.

  9. Chemical defense lowers plant competitiveness.

    PubMed

    Ballhorn, Daniel J; Godschalx, Adrienne L; Smart, Savannah M; Kautz, Stefanie; Schädler, Martin

    2014-11-01

    Both plant competition and plant defense affect biodiversity and food web dynamics and are central themes in ecology research. The evolutionary pressures determining plant allocation toward defense or competition are not well understood. According to the growth-differentiation balance hypothesis (GDB), the relative importance of herbivory and competition have led to the evolution of plant allocation patterns, with herbivore pressure leading to increased differentiated tissues (defensive traits), and competition pressure leading to resource investment towards cellular division and elongation (growth-related traits). Here, we tested the GDB hypothesis by assessing the competitive response of lima bean (Phaseolus lunatus) plants with quantitatively different levels of cyanogenesis-a constitutive direct, nitrogen-based defense against herbivores. We used high (HC) and low cyanogenic (LC) genotypes in different competition treatments (intra-genotypic, inter-genotypic, interspecific), and in the presence or absence of insect herbivores (Mexican bean beetle, Epilachna varivestis) to quantify vegetative and generative plant parameters (above and belowground biomass as well as seed production). Highly defended HC-plants had significantly lower aboveground biomass and seed production than LC-plants when grown in the absence of herbivores implying significant intrinsic costs of plant cyanogenesis. However, the reduced performance of HC- compared to LC-plants was mitigated in the presence of herbivores. The two plant genotypes exhibited fundamentally different responses to various stresses (competition, herbivory). Our study supports the GDB hypothesis by demonstrating that competition and herbivory affect different plant genotypes differentially and contributes to understanding the causes of variation in defense within a single plant species.

  10. DOD USER-NEEDS STUDY, PHASE II -- FLOW OF SCIENTIFIC AND TECHNICAL INFORMATION WITHIN THE DEFENSE INDUSTRY. FINAL REPORT. VOLUME II, A. TECHNICAL DESCRIPTION, B. TECHNICAL APPENDICES.

    ERIC Educational Resources Information Center

    GOODMAN, ARNOLD F.; AND OTHERS

    IN PHASE II OF THE DEPARTMENT OF DEFENSE (DOD) SURVEY TO FIND OUT HOW SCIENTISTS AND ENGINEERS IN GOVERNMENT AND INDUSTRIAL RESEARCH, DEVELOPMENT, AND PRODUCTION ACTIVITIES ACQUIRE INFORMATION, SCIENTIFIC PERSONNEL IN THE DEFENSE INDUSTRY WERE INTERVIEWED TO DETERMINE THEIR INFORMATION NEEDS AND THE FLOW OF INFORMATION INHERENT IN SATISFYING THESE…

  11. Software Quality Assurance Metrics

    NASA Technical Reports Server (NTRS)

    McRae, Kalindra A.

    2004-01-01

    Software Quality Assurance (SQA) is a planned and systematic set of activities that ensures conformance of software life cycle processes and products conform to requirements, standards and procedures. In software development, software quality means meeting requirements and a degree of excellence and refinement of a project or product. Software Quality is a set of attributes of a software product by which its quality is described and evaluated. The set of attributes includes functionality, reliability, usability, efficiency, maintainability, and portability. Software Metrics help us understand the technical process that is used to develop a product. The process is measured to improve it and the product is measured to increase quality throughout the life cycle of software. Software Metrics are measurements of the quality of software. Software is measured to indicate the quality of the product, to assess the productivity of the people who produce the product, to assess the benefits derived from new software engineering methods and tools, to form a baseline for estimation, and to help justify requests for new tools or additional training. Any part of the software development can be measured. If Software Metrics are implemented in software development, it can save time, money, and allow the organization to identify the caused of defects which have the greatest effect on software development. The summer of 2004, I worked with Cynthia Calhoun and Frank Robinson in the Software Assurance/Risk Management department. My task was to research and collect, compile, and analyze SQA Metrics that have been used in other projects that are not currently being used by the SA team and report them to the Software Assurance team to see if any metrics can be implemented in their software assurance life cycle process.

  12. Clinicopathological associations of acquired erythroblastopenia

    PubMed Central

    Gunes, Gursel; Malkan, Umit Yavuz; Yasar, Hatime Arzu; Eliacik, Eylem; Haznedaroglu, Ibrahim Celalettin; Demiroglu, Haluk; Sayinalp, Nilgun; Aksu, Salih; Etgul, Sezgin; Aslan, Tuncay; Goker, Hakan; Ozcebe, Osman Ilhami; Buyukasik, Yahya

    2015-01-01

    Introduction: Acquired erythroblastopenia (AE) is a rare clinical situation. It is characterized by the reduction of erythroid precursors in the bone marrow together with the low reticulocyte counts in the peripheral blood. Background: Main secondary causes of AE are drugs, Parvovirus B19 and other infectious reasons, lymphoid and myeloid neoplasia, autoimmune diseases, thymoma and pregnancy. The aim of this study is to assess the frequencies and clinical associations of AE via analyzing 12340 bone marrow samples in a retrospective manner. Material and method: Bone marrow aspirations which were obtained from patients who applied to Hacettepe University Hematology Clinic between 2002 and 2013, were analyzed retrospectively. Results: Thirty four erythroblastopenia cases were found. Patients ranged in age from 16 to 80 years with a median of 38 years. Fifteen patients were men (44%) and nineteen were women (56%). In these patients, detected causes of erythroblastopenia were MDS, idiopathic pure red cell aplasia (PRCA), parvovirus infection, post chemotherapy aplasia, plasma proliferative diseases, copper deficiency due to secondary amyloidosis, fever of unknown origin, hemophagocytic syndrome, enteric fever and legionella pneumonia. We found that between those reasons the most common causes of erythroblastopenia are MDS (17.7%) and idiopathic PRCA (17.7%). Discussion: As a result, erythroblastopenia in the bone marrow may be an early sign of MDS. In those AE cases possibility of being MDS must be kept in mind as it can be mistaken for PRCA. Conclusion: To conclude, in adults MDS without excess blast is one of the most common causes of erythroblastopenia in clinical practice and in case of erythroblastopenia the presence of MDS should be investigated. PMID:26885236

  13. Payload software technology: Software technology development plan

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Programmatic requirements for the advancement of software technology are identified for meeting the space flight requirements in the 1980 to 1990 time period. The development items are described, and software technology item derivation worksheets are presented along with the cost/time/priority assessments.

  14. Software Engineering Program: Software Process Improvement Guidebook

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The purpose of this document is to provide experience-based guidance in implementing a software process improvement program in any NASA software development or maintenance community. This guidebook details how to define, operate, and implement a working software process improvement program. It describes the concept of the software process improvement program and its basic organizational components. It then describes the structure, organization, and operation of the software process improvement program, illustrating all these concepts with specific NASA examples. The information presented in the document is derived from the experiences of several NASA software organizations, including the SEL, the SEAL, and the SORCE. Their experiences reflect many of the elements of software process improvement within NASA. This guidebook presents lessons learned in a form usable by anyone considering establishing a software process improvement program within his or her own environment. This guidebook attempts to balance general and detailed information. It provides material general enough to be usable by NASA organizations whose characteristics do not directly match those of the sources of the information and models presented herein. It also keeps the ideas sufficiently close to the sources of the practical experiences that have generated the models and information.

  15. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multicore, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to approx.50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  16. Software Defined Radio with Parallelized Software Architecture

    NASA Technical Reports Server (NTRS)

    Heckler, Greg

    2013-01-01

    This software implements software-defined radio procession over multi-core, multi-CPU systems in a way that maximizes the use of CPU resources in the system. The software treats each processing step in either a communications or navigation modulator or demodulator system as an independent, threaded block. Each threaded block is defined with a programmable number of input or output buffers; these buffers are implemented using POSIX pipes. In addition, each threaded block is assigned a unique thread upon block installation. A modulator or demodulator system is built by assembly of the threaded blocks into a flow graph, which assembles the processing blocks to accomplish the desired signal processing. This software architecture allows the software to scale effortlessly between single CPU/single-core computers or multi-CPU/multi-core computers without recompilation. NASA spaceflight and ground communications systems currently rely exclusively on ASICs or FPGAs. This software allows low- and medium-bandwidth (100 bps to .50 Mbps) software defined radios to be designed and implemented solely in C/C++ software, while lowering development costs and facilitating reuse and extensibility.

  17. Defensive Practice as ‘Fear-Based’ Practice: Social Work's Open Secret?

    PubMed Central

    Whittaker, Andrew; Havard, Tirion

    2016-01-01

    Defensive practice has received attention through the Munro review of child protection, which has identified that current organisational cultures increase the likelihood of defensive practice. Whilst the wider socio-political climate that gives rise to defensive practice has been explored within the literature, little attention has been paid to the everyday realities of defensive practice. This paper reports the findings of a study into final year social work students' attitudes towards defensive practice within social work. Three focus groups were completed with a total of ninety final-year students that collected qualitative and quantitative data using interactive software. This paper examines how participants perceived defensive practice, both in general and when faced with real-life vignettes. Participants distinguished between pro-active behaviour (sins of commission) and passive behaviour (sins of omission), generally regarding the latter as less serious because it was less tangible and easier to attribute to more positive motives. Whilst the literature identifies defensive practice as deliberate behaviour, the focus group discussions suggest that it is a subtler and less conscious process. Whilst there was there was a general consensus about the nature of defensive practice, there was considerable disagreement about specific vignettes and several competing explanations are explored. PMID:27559220

  18. Integrated review software advances at Los Alamos

    SciTech Connect

    Klosterbuer, S. F.; Michel, K. D.; Betts, S. E.; Determan, J. C.; Longo, J. F.; Parker, R. F.; Pelowitz, D. G.; Rothrock, R. B.; Schneider, C. M.; Nordquist, H. M.

    2004-01-01

    Since 1988, Los Alamos National Laboratory (LANL) has been developing software for unattended monitoring systems. These systems are composed of three categories of software: acquisition, collection and review. The data acquisition software is contained in modular instrumentation distributed throughout facilities to continuously acquire data from devices ranging from radiation detectors to cameras to binary switches. The data collection software runs on computers connected to the instruments and offloads and stores the acquired data. The review software enables the end user to quickly and easily examine the data collected from these different systems and compare the results to declared operator activities. This paper addresses the review software. The original standalone review software processed only radiation data. This software was expanded to include new programs (tools) to display and correlate video and operator declarations and added an interface to the standard neutron coincidence counter analysis program. This expanded review software containing multiple review tools is referred to collectively as the Integrated Review Software (IRS). The IRS continues to expand and evolve. Two primary IRS developments will be described in this paper. First, the IRS was expanded to include review tools to display and analyze new data types. Position Review was developed to display Global Positioning System (GPS) location data to aid in tracking radiation movements. Isotopic Review is being developed to provide a link to the standard gamma isotopic analysis software. In addition significant enhancements are being added to the existing review tools such as Operator Review, Radiation Review and Digital Video Review. A second IRS development is to produce standardized components with published interfaces enabling other parties to produce custom components that plug into review software. It is anticipated that there will be four primary types of components that could be

  19. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  20. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  1. Acquire: an open-source comprehensive cancer biobanking system

    PubMed Central

    Dowst, Heidi; Pew, Benjamin; Watkins, Chris; McOwiti, Apollo; Barney, Jonathan; Qu, Shijing; Becnel, Lauren B.

    2015-01-01

    Motivation: The probability of effective treatment of cancer with a targeted therapeutic can be improved for patients with defined genotypes containing actionable mutations. To this end, many human cancer biobanks are integrating more tightly with genomic sequencing facilities and with those creating and maintaining patient-derived xenografts (PDX) and cell lines to provide renewable resources for translational research. Results: To support the complex data management needs and workflows of several such biobanks, we developed Acquire. It is a robust, secure, web-based, database-backed open-source system that supports all major needs of a modern cancer biobank. Its modules allow for i) up-to-the-minute ‘scoreboard’ and graphical reporting of collections; ii) end user roles and permissions; iii) specimen inventory through caTissue Suite; iv) shipping forms for distribution of specimens to pathology, genomic analysis and PDX/cell line creation facilities; v) robust ad hoc querying; vi) molecular and cellular quality control metrics to track specimens’ progress and quality; vii) public researcher request; viii) resource allocation committee distribution request review and oversight and ix) linkage to available derivatives of specimen. Availability and Implementation: Acquire implements standard controlled vocabularies, ontologies and objects from the NCI, CDISC and others. Here we describe the functionality of the system, its technological stack and the processes it supports. A test version Acquire is available at https://tcrbacquire-stg.research.bcm.edu; software is available in https://github.com/BCM-DLDCC/Acquire; and UML models, data and workflow diagrams, behavioral specifications and other documents are available at https://github.com/BCM-DLDCC/Acquire/tree/master/supplementaryMaterials. Contact: becnel@bcm.edu PMID:25573920

  2. Software Literacy and Student Learning in the Tertiary Environment: Powerpoint and Beyond

    ERIC Educational Resources Information Center

    Khoo, Elaine; Hight, Craig; Cowie, Bronwen; Torrens, Rob; Ferrarelli, Lisabeth

    2014-01-01

    In this paper, we explore the relationship between student success in acquiring software literacy and students' broader engagement and understanding of knowledge across different disciplines. We report on the first phase of a project that examines software literacies associated with Microsoft PowerPoint as a common software package encountered and…

  3. 2006 XSD Scientific Software Workshop report.

    SciTech Connect

    Evans, K., Jr.; De Carlo, F.; Jemian, P.; Lang, J.; Lienert, U.; Maclean, J.; Newville, M.; Tieman, B.; Toby, B.; van Veenendaal, B.; Univ. of Chicago

    2006-01-22

    In May of 2006, a committee was formed to assess the fundamental needs and opportunities in scientific software for x-ray data reduction, analysis, modeling, and simulation. This committee held a series of discussions throughout the summer, conducted a poll of the members of the x-ray community, and held a workshop. This report details the findings and recommendations of the committee. Each experiment performed at the APS requires three crucial ingredients: the powerful x-ray source, an optimized instrument to perform measurements, and computer software to acquire, visualize, and analyze the experimental observations. While the APS has invested significant resources in the accelerator, investment in other areas such as scientific software for data analysis and visualization has lagged behind. This has led to the adoption of a wide variety of software with variable levels of usability. In order to maximize the scientific output of the APS, it is essential to support the broad development of real-time analysis and data visualization software. As scientists attack problems of increasing sophistication and deal with larger and more complex data sets, software is playing an ever more important role. Furthermore, our need for excellent and flexible scientific software can only be expected to increase, as the upgrade of the APS facility and the implementation of advanced detectors create a host of new measurement capabilities. New software analysis tools must be developed to take full advantage of these capabilities. It is critical that the APS take the lead in software development and the implementation of theory to software to ensure the continued success of this facility. The topics described in this report are relevant to the APS today and critical for the APS upgrade plan. Implementing these recommendations will have a positive impact on the scientific productivity of the APS today and will be even more critical in the future.

  4. Issues in national missile defense

    SciTech Connect

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any of them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.

  5. Defense bill: Earmarking as usual

    NASA Astrophysics Data System (ADS)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  6. The insanity defense to suicide.

    PubMed

    Massello, W

    1986-07-01

    The certification of suicide as the manner of death can result in either the complete loss or a significant reduction in life insurance benefits to the victim's survivors. It is, thus, not uncommon for these beneficiaries to contest suicide as the manner of death. Insanity is a recognized defense in law against suicide. It is recognized in law that, in some cases, an insane man cannot intentionally destroy himself. However, it is also recognized that life insurers can exclude suicide by an insane man from coverage. This article discusses the common law doctrines upon which the insanity defense to suicide is based, with references to judicial opinions from cases which involve contested suicides and the issue of insanity.

  7. Homeland Security and Defense Applications

    SciTech Connect

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  8. Second line of defense program

    SciTech Connect

    Cantut, L; Thomas, L L

    1999-07-15

    Since the collapse of the Soviet Union, the prospect of nuclear materials entering the world market has become an ever-increasing threat. The Second Line of Defense (SLD) program was developed by the U.S. Department of Energy's (DOE) Nuclear Transfer and Supplier Policy Division (NN-43) to assist the Russian Federation State Customs Committee (RFSCC) in strengthening its capability to prevent illicit trafficking of nuclear materials across Russia's borders. The SLD program is a natural complement to the Material Protection Control and Accounting (MPC and A) program, which represents a first line of defense against the theft and diversion of nuclear materials. The SLD program is the first U.S.-Russian cooperative program to combat the illicit trafficking of nuclear and nuclear-related materials to would-be proliferators across Russia's borders.

  9. Homeland Security and Defense Applications

    ScienceCinema

    None

    2016-07-12

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  10. Technical issues in theater missile defense

    SciTech Connect

    Canavan, G.H.

    1992-05-01

    This note discusses technical issues in theater missile defenses in the terminal, midcourse, and boost phases. The first two are familiar and developed, but face fundamental countermeasures. Boost phase intercepts engage missiles when they are most vulnerable, but have been studied less for theater defense because the engagement times are short. Overall, theater missile defenses resemble strategic defenses, complicated by the tenfold shorter boost phase. 12 refs.

  11. Software Engineering Improvement Plan

    NASA Technical Reports Server (NTRS)

    2006-01-01

    In performance of this task order, bd Systems personnel provided support to the Flight Software Branch and the Software Working Group through multiple tasks related to software engineering improvement and to activities of the independent Technical Authority (iTA) Discipline Technical Warrant Holder (DTWH) for software engineering. To ensure that the products, comments, and recommendations complied with customer requirements and the statement of work, bd Systems personnel maintained close coordination with the customer. These personnel performed work in areas such as update of agency requirements and directives database, software effort estimation, software problem reports, a web-based process asset library, miscellaneous documentation review, software system requirements, issue tracking software survey, systems engineering NPR, and project-related reviews. This report contains a summary of the work performed and the accomplishments in each of these areas.

  12. Commercial Data Mining Software

    NASA Astrophysics Data System (ADS)

    Zhang, Qingyu; Segall, Richard S.

    This chapter discusses selected commercial software for data mining, supercomputing data mining, text mining, and web mining. The selected software are compared with their features and also applied to available data sets. The software for data mining are SAS Enterprise Miner, Megaputer PolyAnalyst 5.0, PASW (formerly SPSS Clementine), IBM Intelligent Miner, and BioDiscovery GeneSight. The software for supercomputing are Avizo by Visualization Science Group and JMP Genomics from SAS Institute. The software for text mining are SAS Text Miner and Megaputer PolyAnalyst 5.0. The software for web mining are Megaputer PolyAnalyst and SPSS Clementine . Background on related literature and software are presented. Screen shots of each of the selected software are presented, as are conclusions and future directions.

  13. Guidelines for software inspections

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Quality control inspections are software problem finding procedures which provide defect removal as well as improvements in software functionality, maintenance, quality, and development and testing methodology is discussed. The many side benefits include education, documentation, training, and scheduling.

  14. The Problem of Software.

    ERIC Educational Resources Information Center

    Alexander, Wilma Jean

    1982-01-01

    Explains how schools can purchase computer software. Lists are presented of (1) sources of published evaluations of selected software, (2) publications which contain names and sources of programs, and (3) magazines providing program listings appropriate for classroom use. (CT)

  15. Design software for reuse

    NASA Technical Reports Server (NTRS)

    Tracz, Will

    1990-01-01

    Viewgraphs are presented on the designing of software for reuse. Topics include terminology, software reuse maxims, the science of programming, an interface design example, a modularization example, and reuse and implementation guidelines.

  16. Defense of a space elevator

    SciTech Connect

    Laubscher, B. E.

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  17. Problems of National Missile Defense

    NASA Astrophysics Data System (ADS)

    Cornwall, John

    2000-04-01

    The currently-proposed national missile defense (NMD) is supposed to counter accidental Russian or Chinese launches of intercontinental nuclear-armed missiles, or rogue nation launches of similar nuclear missiles or of missiles armed with biological weapons, by using mid-course hit-to-kill vehicles guided by IR and radar. But it seems very likely that any nation capable of building (or buying) such a missile offense can build (or buy) effective countermeasures to NMD. These include anti-simulation decoys made of multi-layer insulation (MLI), with warheads covered in MLI sheaths so their signatures resemble those of the decoys. MLI can be effective against both passive IR and radar detection/discrimination. Biological warheads can counter any mid-course defense by releasing a great number of submunitions early in flight. Both nuclear and biological weapons can be deployed by other means, including covert ships in port; trucks; and cruise missiles. The best defense against Russian/Chinese accidental launches is assistance to these countries in improving their launch control systems.

  18. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  19. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  20. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  1. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  2. 22 CFR 120.6 - Defense article.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  3. 22 CFR 120.9 - Defense service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  4. Radiological Defense. Planning and Operations Guide. Revised.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    This guide is a reprint of published and draft materials from the Federal Civil Defense Guide. This guide is intended to assist the student in planning, developing, implementing and operating a local, county, or state radiological defense (RADEF) system. The state and local radiological defense program objectives are to create an effective and…

  5. Artificial intelligence and expert systems in-flight software testing

    NASA Technical Reports Server (NTRS)

    Demasie, M. P.; Muratore, J. F.

    1991-01-01

    The authors discuss the introduction of advanced information systems technologies such as artificial intelligence, expert systems, and advanced human-computer interfaces directly into Space Shuttle software engineering. The reconfiguration automation project (RAP) was initiated to coordinate this move towards 1990s software technology. The idea behind RAP is to automate several phases of the flight software testing procedure and to introduce AI and ES into space shuttle flight software testing. In the first phase of RAP, conventional tools to automate regression testing have already been developed or acquired. There are currently three tools in use.

  6. DSS command software update

    NASA Technical Reports Server (NTRS)

    Stinnett, W. G.

    1980-01-01

    The modifications, additions, and testing results for a version of the Deep Space Station command software, generated for support of the Voyager Saturn encounter, are discussed. The software update requirements included efforts to: (1) recode portions of the software to permit recovery of approximately 2000 words of memory; (2) correct five Voyager Ground data System liens; (3) provide capability to automatically turn off the command processor assembly local printer during periods of low activity; and (4) correct anomalies existing in the software.

  7. Software verification and testing

    NASA Technical Reports Server (NTRS)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  8. Immune defense in leaf-cutting ants: a cross-fostering approach.

    PubMed

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández; Nash, David R; Boomsma, Jacobus J

    2011-06-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily social defense, a Pseudonocardia bacteria that helps to control pathogens in the ants' fungus garden, showed a significant colony of origin by rearing environment interaction, whereby ants that acquired the bacteria of a foster colony obtained a less abundant cover of bacteria: one explanation for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses.

  9. Astronomical Software Directory Service

    NASA Technical Reports Server (NTRS)

    Hanisch, R. J.; Payne, H.; Hayes, J.

    1998-01-01

    This is the final report on the development of the Astronomical Software Directory Service (ASDS), a distributable, searchable, WWW-based database of software packages and their related documentation. ASDS provides integrated access to 56 astronomical software packages, with more than 16,000 URL's indexed for full-text searching.

  10. Software Shopper. Revised.

    ERIC Educational Resources Information Center

    Davis, Sandra Hart, Comp.

    This annotated index describes and illustrates a wide selection of public domain instructional software that may be useful in the education of deaf students and provides educators with a way to order the listed programs. The software programs are designed for use on Apple computers and their compatibles. The software descriptions are presented in…

  11. Software Architecture Evolution

    ERIC Educational Resources Information Center

    Barnes, Jeffrey M.

    2013-01-01

    Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…

  12. Java for flight software

    NASA Technical Reports Server (NTRS)

    Benowitz, E.; Niessner, A.

    2003-01-01

    This work involves developing representative mission-critical spacecraft software using the Real-Time Specification for Java (RTSJ). This work currently leverages actual flight software used in the design of actual flight software in the NASA's Deep Space 1 (DSI), which flew in 1998.

  13. 78 FR 78163 - Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., Washington, December 16, 2013. [FR Doc. 2013-30984 Filed 12-23-13; 11:15 am] Billing code 4710-10 ... Cooperation Council To Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961... that the furnishing of defense articles and defense services to the Gulf Cooperation Council...

  14. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-18

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE... Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor-Prot g Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition Regulations System, Department of Defense...

  15. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE... Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor-Prot g Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition Regulations System, Department of Defense...

  16. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal...

  17. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... (DLA) published a Notice of Availability (NOA) in the Federal Register (76 FR 28757) announcing the... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION:...

  18. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  19. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  20. Defensive bacteriome symbiont with a drastically reduced genome.

    PubMed

    Nakabachi, Atsushi; Ueoka, Reiko; Oshima, Kenshiro; Teta, Roberta; Mangoni, Alfonso; Gurgui, Mihaela; Oldham, Neil J; van Echten-Deckert, Gerhild; Okamura, Keiko; Yamamoto, Kohei; Inoue, Hiromitsu; Ohkuma, Moriya; Hongoh, Yuichi; Miyagishima, Shin-ya; Hattori, Masahira; Piel, Jörn; Fukatsu, Takema

    2013-08-01

    Diverse insect species harbor symbiotic bacteria, which play important roles such as provisioning nutrients and providing defense against natural enemies [1-6]. Whereas nutritional symbioses are often indispensable for both partners, defensive symbioses tend to be of a facultative nature [1-12]. The Asian citrus psyllid Diaphorina citri is a notorious agricultural pest that transmits Liberibacter spp. (Alphaproteobacteria), causing the devastating citrus greening disease or Huanglongbing [13, 14]. In a symbiotic organ called the bacteriome, D. citri harbors two distinct intracellular symbionts: a putative nutrition provider, Carsonella_DC (Gammaproteobacteria), and an unnamed betaproteobacterium with unknown function [15], for which we propose the name "Candidatus Profftella armatura." Here we report that Profftella is a defensive symbiont presumably of an obligate nature with an extremely streamlined genome. The genomes of Profftella and Carsonella_DC were drastically reduced to 464,857 bp and 174,014 bp, respectively, suggesting their ancient and mutually indispensible association with the host. Strikingly, 15% of the small Profftella genome encoded horizontally acquired genes for synthesizing a novel polyketide toxin. The toxin was extracted, pharmacologically and structurally characterized, and designated diaphorin. The presence of Profftella and its diaphorin-biosynthetic genes was perfectly conserved in the world's D. citri populations. PMID:23850282

  1. Problem-Solving Software

    NASA Technical Reports Server (NTRS)

    1992-01-01

    CBR Express software solves problems by adapting sorted solutions to new problems specified by a user. It is applicable to a wide range of situations. The technology was originally developed by Inference Corporation for Johnson Space Center's Advanced Software Development Workstation. The project focused on the reuse of software designs, and Inference used CBR as part of the ACCESS prototype software. The commercial CBR Express is used as a "help desk" for customer support, enabling reuse of existing information when necessary. It has been adopted by several companies, among them American Airlines, which uses it to solve reservation system software problems.

  2. Bioinformatics software resources.

    PubMed

    Gilbert, Don

    2004-09-01

    This review looks at internet archives, repositories and lists for obtaining popular and useful biology and bioinformatics software. Resources include collections of free software, services for the collaborative development of new programs, software news media and catalogues of links to bioinformatics software and web tools. Problems with such resources arise from needs for continued curator effort to collect and update these, combined with less than optimal community support, funding and collaboration. Despite some problems, the available software repositories provide needed public access to many tools that are a foundation for analyses in bioscience research efforts.

  3. Tracker 300 Software

    SciTech Connect

    Wysor, R. Wes

    2006-01-12

    The Tracker300 software is downloaded to an off-the-shelf product called RCM3400/RCM3410 made by Rabbit Semiconductor. The software is a closed loop control which computes the sun's position and provides stability compensation. Using the RCM3400/RCM3410 module, the software stores and retrieves parameters from the onboard flash. The software also allows for communication with a host. It will allow the parameters to be downloaded or uploaded, it will show the status of the controller, it will provide real-time feedback, and it will send command acknowledgements. The software will capture the GPS response and ensure the internal clock is set correctly.

  4. Payload software technology

    NASA Technical Reports Server (NTRS)

    1976-01-01

    A software analysis was performed of known STS sortie payload elements and their associated experiments. This provided basic data for STS payload software characteristics and sizes. A set of technology drivers was identified based on a survey of future technology needs and an assessment of current software technology. The results will be used to evolve a planned approach to software technology development. The purpose of this plan is to ensure that software technology is advanced at a pace and a depth sufficient to fulfill the identified future needs.

  5. Acquired Surface Dyslexia: The Evidence from Hebrew.

    ERIC Educational Resources Information Center

    Birnboim, Smadar

    1995-01-01

    Investigates the symptoms of acquired surface dyslexia in Hebrew. Four acquired surface dyslexic adults were compared with eight normal second graders in terms of reading strategy. Homophones and homographs were a major source of difficulty for native Hebrew surface dyslexic readers; the normal second graders used a non-lexical strategy. (45…

  6. Healthcare Software Assurance

    PubMed Central

    Cooper, Jason G.; Pauley, Keith A.

    2006-01-01

    Software assurance is a rigorous, lifecycle phase-independent set of activities which ensure completeness, safety, and reliability of software processes and products. This is accomplished by guaranteeing conformance to all requirements, standards, procedures, and regulations. These assurance processes are even more important when coupled with healthcare software systems, embedded software in medical instrumentation, and other healthcare-oriented life-critical systems. The current Food and Drug Administration (FDA) regulatory requirements and guidance documentation do not address certain aspects of complete software assurance activities. In addition, the FDA’s software oversight processes require enhancement to include increasingly complex healthcare systems such as Hospital Information Systems (HIS). The importance of complete software assurance is introduced, current regulatory requirements and guidance discussed, and the necessity for enhancements to the current processes shall be highlighted. PMID:17238324

  7. Priming of antiherbivore defensive responses in plants.

    PubMed

    Kim, Jinwon; Felton, Gary W

    2013-06-01

    Defense priming is defined as increased readiness of defense induction. A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses, both biotic and abiotic, and upon the following stimulus, induce defenses more quickly and strongly. For instance, some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding. Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently, but significant advances were made in the past three years, including non-HIPV-mediated defense priming, epigenetic modifications as the molecular mechanism of priming, and others. It is timely to consider the advances in research on defense priming in the plant-insect interactions.

  8. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... in public safety, homeland security, national security, emergency preparedness, disaster management..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is... emergency preparedness, and defense activities of the Commission and has the following duties...

  9. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... in public safety, homeland security, national security, emergency preparedness, disaster management..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is... emergency preparedness, and defense activities of the Commission and has the following duties...

  10. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... in public safety, homeland security, national security, emergency preparedness, disaster management..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is... emergency preparedness, and defense activities of the Commission and has the following duties...

  11. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... in public safety, homeland security, national security, emergency preparedness, disaster management..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is... emergency preparedness, and defense activities of the Commission and has the following duties...

  12. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... in public safety, homeland security, national security, emergency preparedness, disaster management..., Defense and Emergency Preparedness Functions § 0.181 The Defense Commissioner. The Defense Commissioner is... emergency preparedness, and defense activities of the Commission and has the following duties...

  13. Sentinel-1 Support in the GAMMA Software

    NASA Astrophysics Data System (ADS)

    Wegmuller, Urs; Werner, Charles; Stroozzi, Tazio; Wiesmann, Andreas; Frey, Othmar; Santoro, Maurizio

    2015-05-01

    First results using the new Sentinel-1 SAR look very promising but the special interferometric wide-swath data acquired in the TOPS mode makes InSAR processing challenging. The steep azimuth spectra ramp in each burst results in very stringent co-registration requirements. Combining the data of the individual bursts and sub-swaths into consistent mosaics requires careful “book-keeping” in the handling of the data and meta data and the large file sizes and high data throughputs require also a good performance. Considering these challenges good support from software is getting increasingly important. In this contribution we describe the Sentinel-1 support in the GAMMA Software, a high-level software package used by researchers, service providers and operational users in their SAR, InSAR and PSI work.

  14. Background issues for defensive interceptors

    SciTech Connect

    Canavan, G.H.

    1991-03-01

    Mean nuclear backgrounds are large, but are arguably amenable to frame-to-frame subtraction. Striated backgrounds on the sensors for defensive interceptors could, however, cause clutter leak-through, which could make detection and track difficult. Nominal motions and backgrounds give signal to clutter ratios too low to be useful. Clutter leakage due to line-of-sight drift can be reduced by stabilizing the line of sight around the background clutter itself. Current interceptors have detector arrays large enough for operation independent of nuclear backgrounds in their fields of view. 6 refs., 2 figs.

  15. Toward immunogenetic studies of amphibian chytridiomycosis: Linking innate and acquired immunity

    USGS Publications Warehouse

    Richmond, J.Q.; Savage, Anna E.; Zamudio, Kelly R.; Rosenblum, E.B.

    2009-01-01

    Recent declines in amphibian diversity and abundance have contributed significantly to the global loss of biodiversity. The fungal disease chytridiomycosis is widely considered to be a primary cause of these declines, yet the critical question of why amphibian species differ in susceptibility remains unanswered. Considerable evidence links environmental conditions and interspecific variability of the innate immune system to differential infection responses, but other sources of individual, population, or species-typical variation may also be important. In this article we review the preliminary evidence supporting a role for acquired immune defenses against chytridiomycosis, and advocate for targeted investigation of genes controlling acquired responses, as well as those that functionally bridge the innate and acquired immune systems. Immunogenetic data promise to answer key questions about chytridiomycosis susceptibility and host-pathogen coevolution, and will draw much needed attention to the importance of considering evolutionary processes in amphibian conservation management and practice. ?? 2009 by American Institute of Biological Sciences.

  16. NASA software documentation standard software engineering program

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as Standard) can be applied to the documentation of all NASA software. This Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. This basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  17. Organizational structure and operation of defense/aerospace information centers in the United States of America

    NASA Technical Reports Server (NTRS)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  18. Defense against common mode failures in protection system design

    SciTech Connect

    Wyman, R.H.; Johnson, G.L.

    1997-08-27

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ``fact-of-life`` in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D&D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D&D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ``defense-in-depth and diversity analysis`` has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided.

  19. Potential disadvantages of using socially acquired information.

    PubMed Central

    Giraldeau, Luc-Alain; Valone, Thomas J; Templeton, Jennifer J

    2002-01-01

    The acquisition and use of socially acquired information is commonly assumed to be profitable. We challenge this assumption by exploring hypothetical scenarios where the use of such information either provides no benefit or can actually be costly. First, we show that the level of incompatibility between the acquisition of personal and socially acquired information will directly affect the extent to which the use of socially acquired information can be profitable. When these two sources of information cannot be acquired simultaneously, there may be no benefit to socially acquired information. Second, we assume that a solitary individual's behavioural decisions will be based on cues revealed by its own interactions with the environment. However, in many cases, for social animals the only socially acquired information available to individuals is the behavioural actions of others that expose their decisions, rather than the cues on which these decisions were based. We argue that in such a situation the use of socially acquired information can lead to informational cascades that sometimes result in sub-optimal behaviour. From this theory of informational cascades, we predict that when erroneous cascades are costly, individuals should pay attention only to socially generated cues and not behavioural decisions. We suggest three scenarios that might be examples of informational cascades in nature. PMID:12495513

  20. Near-Earth object intercept trajectory design for planetary defense

    NASA Astrophysics Data System (ADS)

    Vardaxis, George; Wie, Bong

    2014-08-01

    Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.

  1. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems.

  2. Nrf2 and cardiovascular defense.

    PubMed

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  3. Defense mutualisms enhance plant diversification.

    PubMed

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  4. Biogeography of a defensive symbiosis

    PubMed Central

    Kaltenpoth, Martin; Roeser-Mueller, Kerstin; Stubblefield, J. William; Seger, Jon; Strohm, Erhard

    2014-01-01

    Mutualistic microorganisms play important roles in nutrition, reproduction and defense of many insects, yet the factors contributing to their maintenance and dispersal remain unknown in most cases. Theory suggests that collaboration can be maintained by repeated interaction of the same partners (partner fidelity) or by selective discrimination against non-cooperative partners (partner choice). In the defensive mutualism between solitary beewolf wasps and their antibiotic-producing Streptomyces bacteria, partner choice by host control of vertical symbiont transmission reinforces partner fidelity and has helped to maintain this highly specific association since it originated in the late Cretaceous. However, co-phylogenetic and biogeographic analyses suggest that there has also been considerable horizontal transmission of the symbionts. While the beewolves clearly have a paleotropic or palearctic origin, with later colonization of the nearctic and neotropics via Beringia and the Aves ridge, respectively, the bacteria show only weak geographical clustering, implying global dispersal or vicariance within the confines of an otherwise apparently exclusive symbiotic relationship. We discuss several hypotheses that may explain these patterns. Future studies investigating the occurrence of beewolf symbionts in the environment could yield broadly applicable insights into the relative impact of animal-vectored and free-living dispersal on the distribution of microorganisms in nature. PMID:26479018

  5. Defense mutualisms enhance plant diversification

    PubMed Central

    Weber, Marjorie G.; Agrawal, Anurag A.

    2014-01-01

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity. PMID:25349406

  6. Defensive anality and anal narcissism.

    PubMed

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  7. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center, atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  8. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image stabilization and Registration (VISAR), which is illustrated in this Quick Time movie. VISAR is a computer algorithm that stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. VISAR could also have applications in law enforcement, medical, and meteorological imaging. The software can be used for defense application by improving reconnaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  9. GPS Software Packages Deliver Positioning Solutions

    NASA Technical Reports Server (NTRS)

    2010-01-01

    "To determine a spacecraft s position, the Jet Propulsion Laboratory (JPL) developed an innovative software program called the GPS (global positioning system)-Inferred Positioning System and Orbit Analysis Simulation Software, abbreviated as GIPSY-OASIS, and also developed Real-Time GIPSY (RTG) for certain time-critical applications. First featured in Spinoff 1999, JPL has released hundreds of licenses for GIPSY and RTG, including to Longmont, Colorado-based DigitalGlobe. Using the technology, DigitalGlobe produces satellite imagery with highly precise latitude and longitude coordinates and then supplies it for uses within defense and intelligence, civil agencies, mapping and analysis, environmental monitoring, oil and gas exploration, infrastructure management, Internet portals, and navigation technology."

  10. COTS software selection process.

    SciTech Connect

    Watkins, William M. (Strike Wire Technologies, Louisville, CO); Lin, Han Wei; McClelland, Kelly (U.S. Security Associates, Livermore, CA); Ullrich, Rebecca Ann; Khanjenoori, Soheil; Dalton, Karen; Lai, Anh Tri; Kuca, Michal; Pacheco, Sandra; Shaffer-Gant, Jessica

    2006-05-01

    Today's need for rapid software development has generated a great interest in employing Commercial-Off-The-Shelf (COTS) software products as a way of managing cost, developing time, and effort. With an abundance of COTS software packages to choose from, the problem now is how to systematically evaluate, rank, and select a COTS product that best meets the software project requirements and at the same time can leverage off the current corporate information technology architectural environment. This paper describes a systematic process for decision support in evaluating and ranking COTS software. Performed right after the requirements analysis, this process provides the evaluators with more concise, structural, and step-by-step activities for determining the best COTS software product with manageable risk. In addition, the process is presented in phases that are flexible to allow for customization or tailoring to meet various projects' requirements.

  11. Gammasphere software development

    SciTech Connect

    Piercey, R.B.

    1993-01-01

    Activities of the nuclear physics group are described. Progress was made in organizing the Gammasphere Software Working Group, establishing a nuclear computing facility, participating in software development at Lawrence Berkeley, developing a common data file format, and adapting the ORNL UPAK software to run at Gammasphere. A universal histogram object was developed that defines a file format and provides for an objective-oriented programming model. An automated liquid nitrogen fill system was developed for Gammasphere (110 Ge detectors comprise the sphere).

  12. Acquired Skills Profiles for Environmental Science Students.

    ERIC Educational Resources Information Center

    Harrison, S. J.; Grieve, T.

    1996-01-01

    Describes a project that developed software for the production of skills profiles for individual students as an appendix to the curriculum vitae submitted with employment applications. The software is specifically designed for students in modular degree programs in environmental education. (DDR)

  13. Dtest Testing Software

    NASA Technical Reports Server (NTRS)

    Jain, Abhinandan; Cameron, Jonathan M.; Myint, Steven

    2013-01-01

    This software runs a suite of arbitrary software tests spanning various software languages and types of tests (unit level, system level, or file comparison tests). The dtest utility can be set to automate periodic testing of large suites of software, as well as running individual tests. It supports distributing multiple tests over multiple CPU cores, if available. The dtest tool is a utility program (written in Python) that scans through a directory (and its subdirectories) and finds all directories that match a certain pattern and then executes any tests in that directory as described in simple configuration files.

  14. NASA's Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Ramsay, Christopher M.

    2005-01-01

    NASA (National Aeronautics and Space Administration) relies more and more on software to control, monitor, and verify its safety critical systems, facilities and operations. Since the 1960's there has hardly been a spacecraft (manned or unmanned) launched that did not have a computer on board that provided vital command and control services. Despite this growing dependence on software control and monitoring, there has been no consistent application of software safety practices and methodology to NASA's projects with safety critical software. Led by the NASA Headquarters Office of Safety and Mission Assurance, the NASA Software Safety Standard (STD-18l9.13B) has recently undergone a significant update in an attempt to provide that consistency. This paper will discuss the key features of the new NASA Software Safety Standard. It will start with a brief history of the use and development of software in safety critical applications at NASA. It will then give a brief overview of the NASA Software Working Group and the approach it took to revise the software engineering process across the Agency.

  15. Software Reuse Issues

    NASA Technical Reports Server (NTRS)

    Voigt, Susan J. (Editor); Smith, Kathryn A. (Editor)

    1989-01-01

    NASA Langley Research Center sponsored a Workshop on NASA Research in Software Reuse on November 17-18, 1988 in Melbourne, Florida, hosted by Software Productivity Solutions, Inc. Participants came from four NASA centers and headquarters, eight NASA contractor companies, and three research institutes. Presentations were made on software reuse research at the four NASA centers; on Eli, the reusable software synthesis system designed and currently under development by SPS; on Space Station Freedom plans for reuse; and on other reuse research projects. This publication summarizes the presentations made and the issues discussed during the workshop.

  16. On Software Compatibility.

    ERIC Educational Resources Information Center

    Ershov, Andrei P.

    The problem of compatibility of software hampers the development of computer application. One solution lies in standardization of languages, terms, peripherais, operating systems and computer characteristics. (AB)

  17. Architecture for Verifiable Software

    NASA Technical Reports Server (NTRS)

    Reinholtz, William; Dvorak, Daniel

    2005-01-01

    Verifiable MDS Architecture (VMA) is a software architecture that facilitates the construction of highly verifiable flight software for NASA s Mission Data System (MDS), especially for smaller missions subject to cost constraints. More specifically, the purpose served by VMA is to facilitate aggressive verification and validation of flight software while imposing a minimum of constraints on overall functionality. VMA exploits the state-based architecture of the MDS and partitions verification issues into elements susceptible to independent verification and validation, in such a manner that scaling issues are minimized, so that relatively large software systems can be aggressively verified in a cost-effective manner.

  18. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  19. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  20. The methodological defense of realism scrutinized.

    PubMed

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. PMID:26568089

  1. Statistical modelling of software reliability

    NASA Technical Reports Server (NTRS)

    Miller, Douglas R.

    1991-01-01

    During the six-month period from 1 April 1991 to 30 September 1991 the following research papers in statistical modeling of software reliability appeared: (1) A Nonparametric Software Reliability Growth Model; (2) On the Use and the Performance of Software Reliability Growth Models; (3) Research and Development Issues in Software Reliability Engineering; (4) Special Issues on Software; and (5) Software Reliability and Safety.

  2. Acquired Brown's syndrome: an unusual cause.

    PubMed

    Booth-Mason, S; Kyle, G M; Rossor, M; Bradbury, P

    1985-10-01

    A 62-year-old man with acquired Brown's syndrome is presented. This was due to an orbital metastatic deposit, a cause not previously reported. Other causes of this disorder and its treatment are discussed.

  3. Teaching Social Software with Social Software

    ERIC Educational Resources Information Center

    Mejias, Ulises

    2006-01-01

    Ulises Mejias examines how social software--information and communications technologies that facilitate the collaboration and exchange of ideas--enables students to participate in distributed research, an approach to learning in which knowledge is collectively constructed and shared. During Fall 2005, Mejias taught a graduate seminar that provided…

  4. NASA's Software Safety Standard

    NASA Technical Reports Server (NTRS)

    Ramsay, Christopher M.

    2007-01-01

    NASA relies more and more on software to control, monitor, and verify its safety critical systems, facilities and operations. Since the 1960's there has hardly been a spacecraft launched that does not have a computer on board that will provide command and control services. There have been recent incidents where software has played a role in high-profile mission failures and hazardous incidents. For example, the Mars Orbiter, Mars Polar Lander, the DART (Demonstration of Autonomous Rendezvous Technology), and MER (Mars Exploration Rover) Spirit anomalies were all caused or contributed to by software. The Mission Control Centers for the Shuttle, ISS, and unmanned programs are highly dependant on software for data displays, analysis, and mission planning. Despite this growing dependence on software control and monitoring, there has been little to no consistent application of software safety practices and methodology to NASA's projects with safety critical software. Meanwhile, academia and private industry have been stepping forward with procedures and standards for safety critical systems and software, for example Dr. Nancy Leveson's book Safeware: System Safety and Computers. The NASA Software Safety Standard, originally published in 1997, was widely ignored due to its complexity and poor organization. It also focused on concepts rather than definite procedural requirements organized around a software project lifecycle. Led by NASA Headquarters Office of Safety and Mission Assurance, the NASA Software Safety Standard has recently undergone a significant update. This new standard provides the procedures and guidelines for evaluating a project for safety criticality and then lays out the minimum project lifecycle requirements to assure the software is created, operated, and maintained in the safest possible manner. This update of the standard clearly delineates the minimum set of software safety requirements for a project without detailing the implementation for those

  5. An assessment of space shuttle flight software development processes

    NASA Technical Reports Server (NTRS)

    1993-01-01

    In early 1991, the National Aeronautics and Space Administration's (NASA's) Office of Space Flight commissioned the Aeronautics and Space Engineering Board (ASEB) of the National Research Council (NRC) to investigate the adequacy of the current process by which NASA develops and verifies changes and updates to the Space Shuttle flight software. The Committee for Review of Oversight Mechanisms for Space Shuttle Flight Software Processes was convened in Jan. 1992 to accomplish the following tasks: (1) review the entire flight software development process from the initial requirements definition phase to final implementation, including object code build and final machine loading; (2) review and critique NASA's independent verification and validation process and mechanisms, including NASA's established software development and testing standards; (3) determine the acceptability and adequacy of the complete flight software development process, including the embedded validation and verification processes through comparison with (1) generally accepted industry practices, and (2) generally accepted Department of Defense and/or other government practices (comparing NASA's program with organizations and projects having similar volumes of software development, software maturity, complexity, criticality, lines of code, and national standards); (4) consider whether independent verification and validation should continue. An overview of the study, independent verification and validation of critical software, and the Space Shuttle flight software development process are addressed. Findings and recommendations are presented.

  6. Flexible defense strategies: competition modifies investment in behavioral vs. morphological defenses.

    PubMed

    Teplitsky, Céline; Laurila, Anssi

    2007-07-01

    Competition is predicted to affect the expression of inducible defenses, but because costs of behavioral and morphological antipredator defenses differ along resource gradients, its effects on defenses may depend on the traits considered. We tested the predictions from different defense models in tadpoles of the common frog Rana temporaria, which exhibit both types of defenses. In an outdoor experiment, we exposed the tadpoles to nonlethal predators (Aeshna dragonfly larvae) and to a gradient of intraspecific competition. Morphological responses did not follow any of the expected patterns, since investment in defense was not affected by resource level. Instead, tail depth decreased in the absence of predators. Behavioral defenses followed a state-dependent model. Overall, the defense strategy of the tadpoles revealed a shift from morphological and behavioral defenses at low tadpole density to morphological defense only at high density. This difference probably reflects the different efficiency of the defenses. Hiding is an effective means of defense, but it is unsustainable when resources are scarce. Morphological responses become more important with increasing density to compensate for the increase in behavioral risk-taking. Our results indicate that competition can strongly affect reaction norms of inducible defenses and highlight the importance of integrating ecological parameters that affect the cost-benefit balance of phenotypic plasticity.

  7. Theater missile defense programs: Status and prospects

    SciTech Connect

    Pike, J.

    1994-09-01

    The Clinton administration now calls the Strategic Defense Initiative (SDI) the ballistic missile defense program. But the names have simply been changed to protect the guilty - the new program exhibits substantial continuity with the old in technology and goals. While acronyms have been changed, many of the programs continued by the Clinton administration date from the Reagan or Bush eras. And most strikingly, the Clinton administrations` ambitions for a virtually perfect defense against theater ballistic missiles harken to the unattainable goals for strategic defense initially set by President Reagan over a decade ago.

  8. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups. PMID:27086223

  9. Defense styles in Intermittent Explosive Disorder.

    PubMed

    Puhalla, Alexander A; McCloskey, Michael S; Brickman, Lauren J; Fauber, Robert; Coccaro, Emil F

    2016-04-30

    The overreliance on immature and/or neurotic defense mechanisms, as opposed to more mature defensive functioning has been linked to several psychiatric disorders. However, to date, the role of defense styles among individuals with Intermittent Explosive Disorder (IED) has not been examined. Given that individuals with IED display difficulties controlling their anger and aggression, one might expect these individuals to exhibit more immature and less mature defense styles. The current study compared participants with IED to a personality disorder (PD) comparison group, as well as to healthy volunteers (HV) on the Defense Style Questionnaire, a self-report measure that assesses the extent to which individuals endorse using mature, immature, and neurotic defense styles. Subjects with IED had significantly higher scores than both comparison groups on immature defense styles and exhibited lower scores on mature defense mechanisms. Hierarchical regression of significant defense style subscales showed that higher levels of acting out and lower levels of sublimation uniquely discriminated participants with IED from the PD and HV comparison groups.

  10. Antibiotics, microbiota, and immune defense.

    PubMed

    Ubeda, Carles; Pamer, Eric G

    2012-09-01

    The gastrointestinal tract microbiota contributes to the development and differentiation of the mammalian immune system. The composition of the microbiota affects immune responses and affects susceptibility to infection by intestinal pathogens and development of allergic and inflammatory bowel diseases. Antibiotic administration, while facilitating clearance of targeted infections, also perturbs commensal microbial communities and decreases host resistance to antibiotic-resistant microbes. Here, we review recent advances that begin to define the interactions between complex intestinal microbial populations and the mammalian immune system and how this relation is perturbed by antibiotic administration. We further discuss how antibiotic-induced disruption of the microbiota and immune homeostasis can lead to disease and we review strategies to restore immune defenses during antibiotic administration.

  11. Communications Software for Microcomputers.

    ERIC Educational Resources Information Center

    Bruman, Janet L.

    Focusing on the use of microcomputers as "smart terminals" for accessing time-sharing systems for libraries, this document discusses the communications software needed to allow the microcomputer to appear as a terminal to the remote host. The functions which communications software programs are designed to perform are defined and explained,…

  12. Selecting the Right Software.

    ERIC Educational Resources Information Center

    Shearn, Joseph

    1987-01-01

    Selection of administrative software requires analyzing present needs and, to meet future needs, choosing software that will function with a more powerful computer system. Other important factors to include are a professional system demonstration, maintenance and training, and financial considerations that allow leasing or renting alternatives.…

  13. UWB Tracking Software Development

    NASA Technical Reports Server (NTRS)

    Gross, Julia; Arndt, Dickey; Ngo, Phong; Phan, Chau; Dusl, John; Ni, Jianjun; Rafford, Melinda

    2006-01-01

    An Ultra-Wideband (UWB) two-cluster Angle of Arrival (AOA) tracking prototype system is currently being developed and tested at NASA Johnson Space Center for space exploration applications. This talk discusses the software development efforts for this UWB two-cluster AOA tracking system. The role the software plays in this system is to take waveform data from two UWB radio receivers as an input, feed this input into an AOA tracking algorithm, and generate the target position as an output. The architecture of the software (Input/Output Interface and Algorithm Core) will be introduced in this talk. The development of this software has three phases. In Phase I, the software is mostly Matlab driven and calls C++ socket functions to provide the communication links to the radios. This is beneficial in the early stage when it is necessary to frequently test changes in the algorithm. Phase II of the development is to have the software mostly C++ driven and call a Matlab function for the AOA tracking algorithm. This is beneficial in order to send the tracking results to other systems and also to improve the tracking update rate of the system. The third phase is part of future work and is to have the software completely C++ driven with a graphics user interface. This software design enables the fine resolution tracking of the UWB two-cluster AOA tracking system.

  14. A User's Software Dilemma.

    ERIC Educational Resources Information Center

    Splittgerber, Fred; Stirzaker, N. A.

    1989-01-01

    Discusses several issues associated with purchasing computer software packages: (1) continual updates; (2) lack of industrial standards for software development; and (3) expense. Many packages fail to provide technical assistance from a local dealer or the package developer. Without standards, costs to business, education, and the general public…

  15. Plating Tank Control Software

    1998-03-01

    The Plating Tank Control Software is a graphical user interface that controls and records plating process conditions for plating in high aspect ratio channels that require use of low current and long times. The software is written for a Pentium II PC with an 8 channel data acquisition card, and the necessary shunt resistors for measuring currents in the millampere range.

  16. Software process assessments

    NASA Technical Reports Server (NTRS)

    Miller, Sharon E.; Tucker, George T.; Verducci, Anthony J., Jr.

    1992-01-01

    Software process assessments (SPA's) are part of an ongoing program of continuous quality improvements in AT&T. Their use was found to be very beneficial by software development organizations in identifying the issues facing the organization and the actions required to increase both quality and productivity in the organization.

  17. Reusable Software Technology

    NASA Technical Reports Server (NTRS)

    Morgan, Timothy E.

    1995-01-01

    The objective of the Reusable Software System (RSS) is to provide NASA Langley Research Center and its contractor personnel with a reusable software technology through the Internet. The RSS is easily accessible, provides information that is extractable, and the capability to submit information or data for the purpose of scientific research at NASA Langley Research Center within the Atmospheric Science Division.

  18. Cartographic applications software

    USGS Publications Warehouse

    U.S. Geological Survey

    1992-01-01

    The Office of the Assistant Division Chief for Research, National Mapping Division, develops computer software for the solution of geometronic problems in the fields of surveying, geodesy, remote sensing, and photogrammetry. Software that has been developed using public funds is available on request for a nominal charge to recover the cost of duplication.

  19. Learning from Software Localization.

    ERIC Educational Resources Information Center

    Guo, She-Sen

    2003-01-01

    Localization is the process of adapting a product to meet the language, cultural and other requirements of a specific target environment or market. This article describes ways in which software localization impacts upon curriculum, and discusses what students will learn from software localization. (AEF)

  20. Measuring software technology

    NASA Technical Reports Server (NTRS)

    Agresti, W. W.; Card, D. N.; Church, V. E.; Page, G.; Mcgarry, F. E.

    1983-01-01

    Results are reported from a series of investigations into the effectiveness of various methods and tools used in a software production environment. The basis for the analysis is a project data base, built through extensive data collection and process instrumentation. The project profiles become an organizational memory, serving as a reference point for an active program of measurement and experimentation on software technology.

  1. Software engineering ethics

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    Software engineering ethics is reviewed. The following subject areas are covered: lack of a system viewpoint; arrogance of PC DOS software vendors; violation od upward compatibility; internet worm; internet worm revisited; student cheating and company hiring interviews; computing practitioners and the commodity market; new projects and old programming languages; schedule and budget; and recent public domain comments.

  2. Software measurement guidebook

    NASA Technical Reports Server (NTRS)

    Bassman, Mitchell J.; Mcgarry, Frank; Pajerski, Rose

    1994-01-01

    This software Measurement Guidebook presents information on the purpose and importance of measurement. It discusses the specific procedures and activities of a measurement program and the roles of the people involved. The guidebook also clarifies the roles that measurement can and must play in the goal of continual, sustained improvement for all software production and maintenance efforts.

  3. Cactus: Software Priorities

    ERIC Educational Resources Information Center

    Hyde, Hartley

    2009-01-01

    The early eighties saw a period of rapid change in computing and teachers lost control of how they used computers in their classrooms. Software companies produced computer tools that looked so good that teachers forgot about writing their own classroom materials and happily purchased software--that offered much more than teachers needed--from…

  4. Fastbus software progress

    SciTech Connect

    Gustavson, D.B.

    1982-01-01

    The current status of the Fastbus software development program of the Fastbus Software Working Group is reported, and future plans are discussed. A package of Fastbus interface subroutines has been prepared as a proposed standard, language support for diagnostics and bench testing has been developed, and new documentation to help users find these resources and use them effectively is being written.

  5. NASA Software Documentation Standard

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as "Standard") is designed to support the documentation of all software developed for NASA; its goal is to provide a framework and model for recording the essential information needed throughout the development life cycle and maintenance of a software system. The NASA Software Documentation Standard can be applied to the documentation of all NASA software. The Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. The basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  6. Cathodoluminescence Spectrum Imaging Software

    2011-04-07

    The software developed for spectrum imaging is applied to the analysis of the spectrum series generated by our cathodoluminescence instrumentation. This software provides advanced processing capabilities s such: reconstruction of photon intensity (resolved in energy) and photon energy maps, extraction of the spectrum from selected areas, quantitative imaging mode, pixel-to-pixel correlation spectrum line scans, ASCII, output, filling routines, drift correction, etc.

  7. ITOUGH2 software qualification

    SciTech Connect

    Finsterle, S.; Pruess, K.; Fraser, P.

    1996-10-01

    The purpose of this report is to provide all software baseline documents necessary for the software qualification of ITOUGH2. ITOUGH2 is a computer program providing inverse modeling capabilities for TOUGH2. TOUGH2 is a numerical simulation code for multi-dimensional coupled fluid and heat flow of multiphase, multicomponent fluid mixtures in porous and fractured media.

  8. Measuring software design

    NASA Technical Reports Server (NTRS)

    1986-01-01

    An extensive series of studies of software design measures conducted by the Software Engineering Laboratory is described. Included are the objectives and results of the studies, the method used to perform the studies, and the problems encountered. The document should be useful to researchers planning similar studies as well as to managers and designers concerned with applying quantitative design measures.

  9. PREVAPORATION PERFORMANCE PREDICTION SOFTWARE

    EPA Science Inventory

    The Pervaporation, Performance, Prediction Software and Database (PPPS&D) computer software program is currently being developed within the USEPA, NRMRL. The purpose of the PPPS&D program is to educate and assist potential users in identifying opportunities for using pervaporati...

  10. Software Solution Saves Dollars

    ERIC Educational Resources Information Center

    Trotter, Andrew

    2004-01-01

    This article discusses computer software that can give classrooms and computer labs the capabilities of costly PC's at a small fraction of the cost. A growing number of cost-conscious school districts are finding budget relief in low-cost computer software known as "open source" that can do everything from manage school Web sites to equip…

  11. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    PubMed

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  12. Software quality in 1997

    SciTech Connect

    Jones, C.

    1997-11-01

    For many years, software quality assurance lagged behind hardware quality assurance in terms of methods, metrics, and successful results. New approaches such as Quality Function Deployment (QFD) the ISO 9000-9004 standards, the SEI maturity levels, and Total Quality Management (TQM) are starting to attract wide attention, and in some cases to bring software quality levels up to a parity with manufacturing quality levels. Since software is on the critical path for many engineered products, and for internal business systems as well, the new approaches are starting to affect global competition and attract widespread international interest. It can be hypothesized that success in mastering software quality will be a key strategy for dominating global software markets in the 21st century.

  13. Software safety hazard analysis

    SciTech Connect

    Lawrence, J.D.

    1996-02-01

    Techniques for analyzing the safety and reliability of analog-based electronic protection systems that serve to mitigate hazards in process control systems have been developed over many years, and are reasonably well understood. An example is the protection system in a nuclear power plant. The extension of these techniques to systems which include digital computers is not well developed, and there is little consensus among software engineering experts and safety experts on how to analyze such systems. One possible technique is to extend hazard analysis to include digital computer-based systems. Software is frequently overlooked during system hazard analyses, but this is unacceptable when the software is in control of a potentially hazardous operation. In such cases, hazard analysis should be extended to fully cover the software. A method for performing software hazard analysis is proposed in this paper.

  14. Tracker 300 Software

    2006-01-12

    The Tracker300 software is downloaded to an off-the-shelf product called RCM3400/RCM3410 made by Rabbit Semiconductor. The software is a closed loop control which computes the sun's position and provides stability compensation. Using the RCM3400/RCM3410 module, the software stores and retrieves parameters from the onboard flash. The software also allows for communication with a host. It will allow the parameters to be downloaded or uploaded, it will show the status of the controller, it will providemore » real-time feedback, and it will send command acknowledgements. The software will capture the GPS response and ensure the internal clock is set correctly.« less

  15. Scientific Software Component Technology

    SciTech Connect

    Kohn, S.; Dykman, N.; Kumfert, G.; Smolinski, B.

    2000-02-16

    We are developing new software component technology for high-performance parallel scientific computing to address issues of complexity, re-use, and interoperability for laboratory software. Component technology enables cross-project code re-use, reduces software development costs, and provides additional simulation capabilities for massively parallel laboratory application codes. The success of our approach will be measured by its impact on DOE mathematical and scientific software efforts. Thus, we are collaborating closely with library developers and application scientists in the Common Component Architecture forum, the Equation Solver Interface forum, and other DOE mathematical software groups to gather requirements, write and adopt a variety of design specifications, and develop demonstration projects to validate our approach. Numerical simulation is essential to the science mission at the laboratory. However, it is becoming increasingly difficult to manage the complexity of modern simulation software. Computational scientists develop complex, three-dimensional, massively parallel, full-physics simulations that require the integration of diverse software packages written by outside development teams. Currently, the integration of a new software package, such as a new linear solver library, can require several months of effort. Current industry component technologies such as CORBA, JavaBeans, and COM have all been used successfully in the business domain to reduce software development costs and increase software quality. However, these existing industry component infrastructures will not scale to support massively parallel applications in science and engineering. In particular, they do not address issues related to high-performance parallel computing on ASCI-class machines, such as fast in-process connections between components, language interoperability for scientific languages such as Fortran, parallel data redistribution between components, and massively

  16. Defense on multiple fronts: how do plants cope with diverse enemies?

    PubMed

    Maleck; Dietrich

    1999-06-01

    Plants have evolved an array of defense mechanisms to protect themselves against the wide variety of pathogens and pests with which they are confronted. Included in these defense mechanisms are inducible responses that are turned on systemically in the plant in response to attempted infection or predation. The two most studied inducible responses are systemic acquired resistance, which provides enhanced resistance to pathogen infection, and the wound response pathway, resulting in enhanced resistance to insect feeding. Recent research suggests that the two pathways are not completely independent, and the induction of one might affect the expression of the other. However, the evidence for cross-talk between different induced defense response pathways is somewhat confusing, and at times contradictory. Here, we review recent advances in our understanding of how the different pathways might interact.

  17. Seven Processes that Enable NASA Software Engineering Technologies

    NASA Technical Reports Server (NTRS)

    Housch, Helen; Godfrey, Sally

    2011-01-01

    This slide presentation reviews seven processes that NASA uses to ensure that software is developed, acquired and maintained as specified in the NPR 7150.2A requirement. The requirement is to ensure that all software be appraised for the Capability Maturity Model Integration (CMMI). The enumerated processes are: (7) Product Integration, (6) Configuration Management, (5) Verification, (4) Software Assurance, (3) Measurement and Analysis, (2) Requirements Management and (1) Planning & Monitoring. Each of these is described and the group(s) that are responsible is described.

  18. Clinical impact of RehaCom software for cognitive rehabilitation of patients with acquired brain injury.

    PubMed

    Fernández, Elízabeth; Bringas, María Luisa; Salazar, Sonia; Rodríguez, Daymí; García, María Eugenia; Torres, Maydané

    2012-10-01

    We describe the clinical impact of the RehaCom computerized cognitive training program instituted in the International Neurological Restoration Center for rehabilitation of brain injury patients. Fifty patients admitted from 2008 through 2010 were trained over 60 sessions. Attention and memory functions were assessed with a pre- and post-treatment design, using the Mini-Mental State Examination, Wechsler Memory Scale and Trail Making Test (Parts A and B). Negative effects were assessed, including mental fatigue, headache and eye irritation. The program's clinical usefulness was confirmed, with 100% of patients showing improved performance in trained functions. PMID:23154316

  19. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    ERIC Educational Resources Information Center

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  20. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  1. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  2. Defense Economic Impact Modeling System (DEIMS). A New Concept in Economic Forecasting for Defense Expenditures.

    ERIC Educational Resources Information Center

    Blond, David L.

    The Defense Economic Impact Modeling System (DEIMS) analyzes the economic effect of defense expenditures on the United States economy by using a consistent, reliable framework of economic models and government policy assumptions. Planning information on defense requirements is also provided to private sector firms. The DEIMS allows the Department…

  3. Acquired bleeding disorders in the elderly.

    PubMed

    Kruse-Jarres, Rebecca

    2015-01-01

    The hemostatic balance changes with advancing age which may be due to factors such as platelet activation, increase of certain clotting factor proteins, slowing of the fibrinolytic system, and modification of the endothelium and blood flow. Generally, this predisposes the elderly to thrombosis rather than bleeding. It often necessitates antiplatelet or anticoagulation therapy, which can cause significant bleeding problems in an aging population. Additionally, changing renal function, modification in immune regulation, and a multitude of other disease processes, can give rise to acquired bleeding disorders. Bleeding can prove difficult to treat in a dynamic environment and in a population that may have underlying thrombotic risk factors.This article discusses some specific challenges of acquired bleeding arising in the elderly. The use of anticoagulation and nonsteroidal anti-inflammatory medications is prevalent in the treatment of the elderly and predisposes them to increased bleeding risk as their physiology changes. When prescribing and monitoring these therapies, it is exceedingly important to weigh thrombotic versus bleeding risks. There are additional rare acquired bleeding disorders that predominantly affect the elderly. One of them is acquired hemophilia, which is an autoimmune disorder arising from antibodies against factor VIII. The treatment challenge rests in the use of hemostatic agents in a population that is already at increased risk for thrombotic complications. Another rare disorder of intensifying interest, acquired von Willebrand syndrome, has a multitude of etiologic mechanisms. Understanding the underlying pathophysiology is essential in making a treatment decision for this disorder.

  4. Department of Defense Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... American Act. Timetable: Action Date FR Cite NPRM 06/00/10 Regulatory Flexibility Analysis Required: Yes... DoD oversight of contractor business systems. Timetable: Action Date FR Cite NPRM 01/15/10 75 FR 2457... Part V Department of Defense Semiannual Regulatory Agenda ] DEPARTMENT OF DEFENSE (DOD)...

  5. Protecting the Self: Defense Mechanisms in Action

    ERIC Educational Resources Information Center

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  6. Density-dependent adjustment of inducible defenses

    PubMed Central

    Tollrian, Ralph; Duggen, Sonja; Weiss, Linda C.; Laforsch, Christian; Kopp, Michael

    2015-01-01

    Predation is a major factor driving evolution, and organisms have evolved adaptations increasing their survival chances. However, most defenses incur trade-offs between benefits and costs. Many organisms save costs by employing inducible defenses as responses to fluctuating predation risk. The level of defense often increases with predator densities. However, individual predation risk should not only depend on predator density but also on the density of conspecifics. If the predator has a saturating functional response one would predict a negative correlation between prey density and individual predation risk and hence defense expression. Here, we tested this hypothesis using six model systems, covering a taxonomic range from protozoa to rotifers and crustaceans. In all six systems, we found that the level of defense expression increased with predator density but decreased with prey density. In one of our systems, i.e. in Daphnia, we further show that the response to prey density is triggered by a chemical cue released by conspecifics and congeners. Our results indicate that organisms adjust the degree of defense to the acute predation risk, rather than merely to predators’ densities. Our study suggests that density-dependent defense expression reflects accurate predation-risk assessment and is a general principle in many inducible-defense systems. PMID:26235428

  7. The Defense Mechanisms of Coronary Patients.

    ERIC Educational Resources Information Center

    Peglar, Marian; Borgen, Fred H.

    1984-01-01

    Tested 73 male inpatients with coronary heart disease on the Defense Mechanisms Inventory, State-Trait Anxiety Inventory, and a perception of health measure. Subjects were followed for five years. Principalization was discovered to be the most successful and projection the least successful defense. (JAC)

  8. Software Measurement Guidebook

    NASA Technical Reports Server (NTRS)

    1995-01-01

    This Software Measurement Guidebook is based on the extensive experience of several organizations that have each developed and applied significant measurement programs over a period of at least 10 years. The lessons derived from those experiences reflect not only successes but also failures. By applying those lessons, an organization can minimize, or at least reduce, the time, effort, and frustration of introducing a software measurement program. The Software Measurement Guidebook is aimed at helping organizations to begin or improve a measurement program. It does not provide guidance for the extensive application of specific measures (such as how to estimate software cost or analyze software complexity) other than by providing examples to clarify points. It does contain advice for establishing and using an effective software measurement program and for understanding some of the key lessons that other organizations have learned. Some of that advice will appear counterintuitive, but it is all based on actual experience. Although all of the information presented in this guidebook is derived from specific experiences of mature measurement programs, the reader must keep in mind that the characteristics of every organization are unique. Some degree of measurement is critical for all software development and maintenance organizations, and most of the key rules captured in this report will be generally applicable. Nevertheless, each organization must strive to understand its own environment so that the measurement program can be tailored to suit its characteristics and needs.

  9. CASE: Software design technologies

    SciTech Connect

    Kalyanov, G.N.

    1994-05-01

    CASE (Computer-Aided Software Engineering) is a set of methodologies for software design, development, and maintenance supported by a complex of interconnected automation tools. CASE is a set of tools for the programmer, analyst, and developer for the automation of software design and development. Today, CASE has become an independent discipline in software engineering that has given rise to a powerful CASE industry made up of hundreds of firms and companies of various kinds. They include companies that develop tools for software analysis and design and have a wide network of distributors and dealers, firms that develop specialized tools for narrow subject areas or for individual stages of the software life cycle, firms that organize seminars and courses for specialists, consulting firms, which demonstrate the practical power of CASE toolkits for specific applications, and companies specializing in the publication of periodicals and bulletins on CASE. The principal purchasers of CASE toolkits abroad are military organizations, data-processing centers, and commercial software developers.

  10. Software Formal Inspections Guidebook

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The Software Formal Inspections Guidebook is designed to support the inspection process of software developed by and for NASA. This document provides information on how to implement a recommended and proven method for conducting formal inspections of NASA software. This Guidebook is a companion document to NASA Standard 2202-93, Software Formal Inspections Standard, approved April 1993, which provides the rules, procedures, and specific requirements for conducting software formal inspections. Application of the Formal Inspections Standard is optional to NASA program or project management. In cases where program or project management decide to use the formal inspections method, this Guidebook provides additional information on how to establish and implement the process. The goal of the formal inspections process as documented in the above-mentioned Standard and this Guidebook is to provide a framework and model for an inspection process that will enable the detection and elimination of defects as early as possible in the software life cycle. An ancillary aspect of the formal inspection process incorporates the collection and analysis of inspection data to effect continual improvement in the inspection process and the quality of the software subjected to the process.

  11. Software packager user's guide

    NASA Technical Reports Server (NTRS)

    Callahan, John R.

    1995-01-01

    Software integration is a growing area of concern for many programmers and software managers because the need to build new programs quickly from existing components is greater than ever. This includes building versions of software products for multiple hardware platforms and operating systems, building programs from components written in different languages, and building systems from components that must execute on different machines in a distributed network. The goal of software integration is to make building new programs from existing components more seamless -- programmers should pay minimal attention to the underlying configuration issues involved. Libraries of reusable components and classes are important tools but only partial solutions to software development problems. Even though software components may have compatible interfaces, there may be other reasons, such as differences between execution environments, why they cannot be integrated. Often, components must be adapted or reimplemented to fit into another application because of implementation differences -- they are implemented in different programming languages, dependent on different operating system resources, or must execute on different physical machines. The software packager is a tool that allows programmers to deal with interfaces between software components and ignore complex integration details. The packager takes modular descriptions of the structure of a software system written in the package specification language and produces an integration program in the form of a makefile. If complex integration tools are needed to integrate a set of components, such as remote procedure call stubs, their use is implied by the packager automatically and stub generation tools are invoked in the corresponding makefile. The programmer deals only with the components themselves and not the details of how to build the system on any given platform.

  12. Computer-Based Educational Software System. Final Report.

    ERIC Educational Resources Information Center

    Brandt, Richard C.; Davis, Bradley N.

    CBESS (Computer-Based Educational Software System) is a set of 22 programs addressing authoring, instructional delivery, and instructional management. The programs are divided into five groups: (1) Computer-Based Memorization System (CBMS), which helps students acquire and maintain declarative (factual) knowledge (11 programs); (2) Language Skills…

  13. The Company Approach to Software Engineering Project Courses

    ERIC Educational Resources Information Center

    Broman, D.; Sandahl, K.; Abu Baker, M.

    2012-01-01

    Teaching larger software engineering project courses at the end of a computing curriculum is a way for students to learn some aspects of real-world jobs in industry. Such courses, often referred to as capstone courses, are effective for learning how to apply the skills they have acquired in, for example, design, test, and configuration management.…

  14. Defensive externality and blame projection following failure.

    PubMed

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  15. Research and technology for strategic defense

    SciTech Connect

    Rankine, R.R. Jr.

    1984-04-01

    In response to President Reagan's speech related to the objective for putting an end to the threat of nuclear ballistic missiles, an intensive study was conducted by the Dept. of Defense regarding the technologies applicable to ballistic-missile defense. It was concluded that emerging technologies do hold substantial promise for achieving the President's long-term ballistic-missile defense goal. The committee recommended a long-term program to bring the new technologies to a point of readiness where a decision could be made whether to enter full-scale development. Based on the results of the study, DOD has established a new program for the President's Strategic Defense Initiative (SDI). Details regarding the SDI program are discussed. Surveillance, acquisition, tracking, and kill assessment (SATKA) programs will culminate in technical demonstrations. Attention is given to directed energy weapons, battle management, and survivable defenses.

  16. Primitive defenses: cognitive aspects and therapeutic handling.

    PubMed

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  17. Primitive defenses: cognitive aspects and therapeutic handling.

    PubMed

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process. PMID:7429737

  18. Investment in defense and cost of predator-induced defense along a resource gradient.

    PubMed

    Steiner, Ulrich K

    2007-05-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models. In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated with these defenses were reduced developmental rate, reduced growth, and reduced survival. At low resource availability, these costs predominately resulted in reduced survival, while at high resource availability the costs yielded a reduced developmental rate. Defensive traits responded strongly to predation risk, but did not respond to resource availability (with the exception of feeding activity), whereas traits construed as costs of defenses showed the opposite pattern. Therefore, defensive traits were highly sensitive to predation risk, while traits construed as costs of defense were highly sensitive to resource allocation tradeoffs. This difference in sensitivity between the two groups of traits may explain why the correlation between the expression of defensive traits and the expression of the associated defense costs was weak. Furthermore, my results indicate that genetic linkages and mechanistic integration of multiple defensive traits and their associated costs may constrain time and resource allocation in ways that are not addressed in existing models.

  19. Ascent/Descent Software

    NASA Technical Reports Server (NTRS)

    Brown, Charles; Andrew, Robert; Roe, Scott; Frye, Ronald; Harvey, Michael; Vu, Tuan; Balachandran, Krishnaiyer; Bly, Ben

    2012-01-01

    The Ascent/Descent Software Suite has been used to support a variety of NASA Shuttle Program mission planning and analysis activities, such as range safety, on the Integrated Planning System (IPS) platform. The Ascent/Descent Software Suite, containing Ascent Flight Design (ASC)/Descent Flight Design (DESC) Configuration items (Cis), lifecycle documents, and data files used for shuttle ascent and entry modeling analysis and mission design, resides on IPS/Linux workstations. A list of tools in Navigation (NAV)/Prop Software Suite represents tool versions established during or after the IPS Equipment Rehost-3 project.

  20. Advanced fingerprint verification software

    NASA Astrophysics Data System (ADS)

    Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.

    2016-05-01

    We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.

  1. Error Free Software

    NASA Technical Reports Server (NTRS)

    1985-01-01

    A mathematical theory for development of "higher order" software to catch computer mistakes resulted from a Johnson Space Center contract for Apollo spacecraft navigation. Two women who were involved in the project formed Higher Order Software, Inc. to develop and market the system of error analysis and correction. They designed software which is logically error-free, which, in one instance, was found to increase productivity by 600%. USE.IT defines its objectives using AXES -- a user can write in English and the system converts to computer languages. It is employed by several large corporations.

  2. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, Xin; Zhao, Hai-bin; Xia, Yan; Lu, Hao; Li, Bin

    2016-01-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the messaging mechanism based on the WebSocket protocol, and possesses good flexibility and expansibility. The user interface based on the responsive web design has realized the remote observations under both desktop and mobile devices. The stable operation of the software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  3. CNEOST Control Software System

    NASA Astrophysics Data System (ADS)

    Wang, X.; Zhao, H. B.; Xia, Y.; Lu, H.; Li, B.

    2015-03-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the message passing mechanism via WebSocket protocol, and improves its flexibility, expansibility, and scalability. The user interface with responsive web design realizes the remote operating under both desktop and mobile devices. The stable operating of software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  4. Multiphase flow calculation software

    DOEpatents

    Fincke, James R.

    2003-04-15

    Multiphase flow calculation software and computer-readable media carrying computer executable instructions for calculating liquid and gas phase mass flow rates of high void fraction multiphase flows. The multiphase flow calculation software employs various given, or experimentally determined, parameters in conjunction with a plurality of pressure differentials of a multiphase flow, preferably supplied by a differential pressure flowmeter or the like, to determine liquid and gas phase mass flow rates of the high void fraction multiphase flows. Embodiments of the multiphase flow calculation software are suitable for use in a variety of applications, including real-time management and control of an object system.

  5. Towards a software profession

    NASA Technical Reports Server (NTRS)

    Berard, Edward V.

    1986-01-01

    An increasing number of programmers have attempted to change their image. They have made it plain that they wish not only to be taken seriously, but they also wish to be regarded as professionals. Many programmers now wish to referred to as software engineers. If programmers wish to be considered professionals in every sense of the word, two obstacles must be overcome: the inability to think of software as a product, and the idea that little or no skill is required to create and handle software throughout its life cycle. The steps to be taken toward professionalization are outlined along with recommendations.

  6. Software quality assurance handbook

    SciTech Connect

    Not Available

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  7. Speakeasy software development

    NASA Astrophysics Data System (ADS)

    Baskinger, Patricia J.; Ozarow, Larry; Chruscicki, Mary C.

    1993-08-01

    The Speakeasy Software Development Project had three primary objectives. The first objective was to perform Independent Verification and Validation (IV & V) of the software and documentation associated with the signal processor being developed by Hazeltine and TRW under the Speakeasy program. The IV & V task also included an analysis and assessment of the ability of the signal processor software to provide LPI communications functions. The second objective was to assist in the enhancement and modification of an existing Rome Lab signal processor workstation. Finally, TASC developed project management support tools and provided program management support to the Speakeasy Program Office.

  8. Orbit Software Suite

    NASA Technical Reports Server (NTRS)

    Osgood, Cathy; Williams, Kevin; Gentry, Philip; Brownfield, Dana; Hallstrom, John; Stuit, Tim

    2012-01-01

    Orbit Software Suite is used to support a variety of NASA/DM (Dependable Multiprocessor) mission planning and analysis activities on the IPS (Intrusion Prevention System) platform. The suite of Orbit software tools (Orbit Design and Orbit Dynamics) resides on IPS/Linux workstations, and is used to perform mission design and analysis tasks corresponding to trajectory/ launch window, rendezvous, and proximity operations flight segments. A list of tools in Orbit Software Suite represents tool versions established during/after the Equipment Rehost-3 Project.

  9. Acquired cutis laxa associated with cutaneous mastocytosis.

    PubMed

    Hoang, Minh Van; Dang, Phuoc Van; Bui, Duc Van; Mejbel, Haider; Mani, Divya Thomas; Smoller, Bruce Robert; Phung, Thuy Linh

    2015-07-01

    Cutis laxa is characterized by dramatic wrinkling of skin that is lacking in elasticity due to inherent defects in dermal elastic fibers. Cutis laxa can be caused by genetic and metabolic disorders. It can also be acquired, possibly resulting from inflammatory processes with destruction of elastic fibers. This report describes a 26-year old woman who developed acquired cutis laxa and cutaneous mastocytosis leading to premature aging. She represents a unique co-occurrence of these two separate disease entities. To our knowledge, there has been only one published case report of acquired cutis laxa occurring in association with urticaria pigmentosa in a 4-year old girl. Our case would be a second case that exhibits the coexistence of these two disorders in an adult female. PMID:26436968

  10. Discovery of functional genes for systemic acquired resistance in Arabidopsis thaliana through integrated data mining.

    PubMed

    Pan, Youlian; Pylatuik, Jeffrey D; Ouyang, Junjun; Famili, A Fazel; Fobert, Pierre R

    2004-12-01

    Various data mining techniques combined with sequence motif information in the promoter region of genes were applied to discover functional genes that are involved in the defense mechanism of systemic acquired resistance (SAR) in Arabidopsis thaliana. A series of K-Means clustering with difference-in-shape as distance measure was initially applied. A stability measure was used to validate this clustering process. A decision tree algorithm with the discover-and-mask technique was used to identify a group of most informative genes. Appearance and abundance of various transcription factor binding sites in the promoter region of the genes were studied. Through the combination of these techniques, we were able to identify 24 candidate genes involved in the SAR defense mechanism. The candidate genes fell into 2 highly resolved categories, each category showing significantly unique profiles of regulatory elements in their promoter regions. This study demonstrates the strength of such integration methods and suggests a broader application of this approach.

  11. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    NASA Technical Reports Server (NTRS)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  12. Congenital and acquired bleeding disorders in infancy.

    PubMed

    Campbell, Sally Elizabeth; Bolton-Maggs, Paula H B

    2015-11-01

    The diagnosis of congenital and acquired bleeding disorders in infants requires an understanding of developmental haemostasis and the effect on laboratory testing. A systematic approach to bleeding in neonates will aid clinicians in the diagnosis and treatment, which may be caused by a wide variety of diseases. The clinical setting will help to direct the diagnostic pathway. This review will focus on the presentation and diagnosis of congenital and acquired bleeding disorders, including platelet disorders. Current research in this field is ongoing, including investigation into neonatal platelets and their different functionalities, platelet transfusion thresholds and how changes in coagulation factors may be linked to other homeostatic mechanisms.

  13. Analyzing plant defenses in nature

    PubMed Central

    Kautz, Stefanie; Heil, Martin; Hegeman, Adrian D

    2009-01-01

    A broad range of chemical plant defenses against herbivores has been studied extensively under laboratory conditions. In many of these cases there is still little understanding of their relevance in nature. In natural systems, functional analyses of plant traits are often complicated by an extreme variability, which affects the interaction with higher trophic levels. Successful analyses require consideration of the numerous sources of variation that potentially affect the plant trait of interest. In our recent study on wild lima bean (Phaseolus lunatus L.) in South Mexico, we applied an integrative approach combining analyses for quantitative correlations of cyanogenic potential (HCNp; the maximum amount of cyanide that can be released from a given tissue) and herbivory in the field with subsequent feeding trials under controlled conditions. This approach allowed us to causally explain the consequences of quantitative variation of HCNp on herbivore-plant interactions in nature and highlights the importance of combining data obtained in natural systems with analyses under controlled conditions. PMID:19820300

  14. Defensive medicine: two historical cases.

    PubMed

    Lascaratos, J; Dalla-Vorgia, P

    1996-01-01

    Two characteristic historical examples of defensive medicine are referred to and analysed. The first of them relates to the behaviour of the eminent and experienced physician Critobulus, a member of the family of Asclepiades of Cos Island, native island of Hippocrates, who hesitated to undertake the operation on the severely wounded Alexander the Great, who was hurt during the siege of a town of the Mallians in India (326 BC). The second case refers to the Byzantine Emperor, Justin II (578 AD), when his physicians hesitated to undertake an operation for a possible wedging of a stone in the urethra, which caused painful inflammation. In both cases, the physicians proceeded to the operation after being reassured by their illustrious patients that they would not be punished in the event of failure. Furthermore, in the second case, of the mentally unbalanced Justin II, the physicians requested, obviously in the presence of witnesses, their immunity from punishment with the symbolic gesture of the handing over of the scalpel to them by the patient. This act symbolised the agreement of the patient to the operation.

  15. Toward directed energy planetary defense

    NASA Astrophysics Data System (ADS)

    Lubin, Philip; Hughes, Gary B.; Bible, Johanna; Bublitz, Jesse; Arriola, Josh; Motta, Caio; Suen, Jon; Johansson, Isabella; Riley, Jordan; Sarvian, Nilou; Clayton-Warwick, Deborah; Wu, Jane; Milich, Andrew; Oleson, Mitch; Pryor, Mark; Krogen, Peter; Kangas, Miikka; O'Neill, Hugh

    2014-02-01

    Asteroids and comets that cross Earth's orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of potentially hazardous objects to the vaporization point as a feasible approach to impact risk mitigation. We call the system DE-STAR, for Directed Energy System for Targeting of Asteroids and exploRation. The DE-STAR is a modular-phased array of kilowatt class lasers powered by photovoltaic's. Modular design allows for incremental development, minimizing risk, and allowing for technological codevelopment. An orbiting structure would be developed in stages. The main objective of the DE-STAR is to use focused directed energy to raise the surface spot temperature to ˜3000 K, sufficient to vaporize all known substances. Ejection of evaporated material creates a large reaction force that would alter an asteroid's orbit. The baseline system is a DE-STAR 3 or 4 (1- to 10-km array) depending on the degree of protection desired. A DE-STAR 4 allows initial engagement beyond 1 AU with a spot temperature sufficient to completely evaporate up to 500-m diameter asteroids in 1 year. Small objects can be diverted with a DE-STAR 2 (100 m) while space debris is vaporized with a DE-STAR 1 (10 m).

  16. Duodenal Chemosensing and Mucosal Defenses

    PubMed Central

    Akiba, Yasutada; Kaunitz, Jonathan D.

    2011-01-01

    The duodenal mucosa is exposed to endogenous and exogenous chemicals, including acid, CO2, bile acids and nutrients. Mucosal chemical sensors are necessary to exert physiological responses such as secretion, digestion, absorption, and motility. We propose a mucosal chemosensing system by which luminal chemicals are sensed via mucosal acid sensors and G-protein-coupled receptors. Luminal acid/CO2 sensing consists of ecto- and cytosolic carbonic anhydrases, epithelial ion transporters, and acid sensors expressed on the afferent nerves in the duodenum. Furthermore, a luminal L-glutamate signal is mediated via mucosal L-glutamate receptors, including metabotropic glutamate receptors and taste receptor 1 family heterodimers, with activation of afferent nerves and cyclooxygenase, whereas luminal Ca2+ is differently sensed via the calcium-sensing receptor in the duodenum. Recent studies also show the involvement of enteroendocrine G-protein-coupled receptors in bile acid and fatty acid sensing in the duodenum. These luminal chemosensors help activate mucosal defense mechanisms in or- der to maintain the mucosal integrity and physiological responses. Stimulation of luminal chemosensing in the duodenal mucosa may prevent mucosal injury, affect nutrient metabolism, and modulate sensory nerve activity. PMID:21389725

  17. Immune defense against pneumonic plague

    PubMed Central

    Smiley, Stephen T.

    2009-01-01

    Summary Yersinia pestis is one of the world's most virulent human pathogens. Inhalation of this Gram-negative bacterium causes pneumonic plague, a rapidly progressing and usually fatal disease. Extensively antibiotic-resistant strains of Y. pestis exist and have significant potential for exploitation as agents of terrorism and biowarfare. Subunit vaccines comprised of the Y. pestis F1 and LcrV proteins are well-tolerated and immunogenic in humans but cannot be tested for efficacy, because pneumonic plague outbreaks are uncommon and intentional infection of humans is unethical. In animal models, F1/LcrV-based vaccines protect mice and cynomolgus macaques but have failed, thus far, to adequately protect African green monkeys. We lack an explanation for this inconsistent efficacy. We also lack reliable correlate assays for protective immunity. These deficiencies are hampering efforts to improve vaccine efficacy. Here, I review the immunology of pneumonic plague, focusing on evidence that humoral and cellular defense mechanisms collaborate to defend against pulmonary Y. pestis infection. PMID:18837787

  18. The myoepithelial defense: a host defense against cancer.

    PubMed

    Sternlicht, M D; Barsky, S H

    1997-01-01

    advance our hypothesis that host myoepithelial cells regulate the progression of in situ to invasive carcinoma by providing an important host defense against cancer invasion.

  19. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... Federal Acquisition Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services... Act as extended by the Defense Base Act. DATES: Interested parties should submit written comments to... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of...

  20. 77 FR 13013 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-05

    ... Defense Acquisition Regulations System 48 CFR Parts 225 and 252 Defense Federal Acquisition Regulation Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulations System, OUSD (AT&L) DPAP (DARS), Room 3B855, 3060 Defense Pentagon, Washington, DC...

  1. 75 FR 78619 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-16

    ... Defense Acquisition Regulations System 48 CFR Parts 216 and 237 Defense Federal Acquisition Regulation Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is making technical amendments to the Defense Federal...

  2. PDT - PARTICLE DISPLACEMENT TRACKING SOFTWARE

    NASA Technical Reports Server (NTRS)

    Wernet, M. P.

    1994-01-01

    Particle Imaging Velocimetry (PIV) is a quantitative velocity measurement technique for measuring instantaneous planar cross sections of a flow field. The technique offers very high precision (1%) directionally resolved velocity vector estimates, but its use has been limited by high equipment costs and complexity of operation. Particle Displacement Tracking (PDT) is an all-electronic PIV data acquisition and reduction procedure which is simple, fast, and easily implemented. The procedure uses a low power, continuous wave laser and a Charged Coupled Device (CCD) camera to electronically record the particle images. A frame grabber board in a PC is used for data acquisition and reduction processing. PDT eliminates the need for photographic processing, system costs are moderately low, and reduced data are available within seconds of acquisition. The technique results in velocity estimate accuracies on the order of 5%. The software is fully menu-driven from the acquisition to the reduction and analysis of the data. Options are available to acquire a single image or 5- or 25-field series of images separated in time by multiples of 1/60 second. The user may process each image, specifying its boundaries to remove unwanted glare from the periphery and adjusting its background level to clearly resolve the particle images. Data reduction routines determine the particle image centroids and create time history files. PDT then identifies the velocity vectors which describe the particle movement in the flow field. Graphical data analysis routines are included which allow the user to graph the time history files and display the velocity vector maps, interpolated velocity vector grids, iso-velocity vector contours, and flow streamlines. The PDT data processing software is written in FORTRAN 77 and the data acquisition routine is written in C-Language for 80386-based IBM PC compatibles running MS-DOS v3.0 or higher. Machine requirements include 4 MB RAM (3 MB Extended), a single or

  3. ACS: ALMA Common Software

    NASA Astrophysics Data System (ADS)

    Chiozzi, Gianluca; Šekoranja, Matej

    2013-02-01

    ALMA Common Software (ACS) provides a software infrastructure common to all ALMA partners and consists of a documented collection of common patterns and components which implement those patterns. The heart of ACS is based on a distributed Component-Container model, with ACS Components implemented as CORBA objects in any of the supported programming languages. ACS provides common CORBA-based services such as logging, error and alarm management, configuration database and lifecycle management. Although designed for ALMA, ACS can and is being used in other control systems and distributed software projects, since it implements proven design patterns using state of the art, reliable technology. It also allows, through the use of well-known standard constructs and components, that other team members whom are not authors of ACS easily understand the architecture of software modules, making maintenance affordable even on a very large project.

  4. Software Design Analyzer System

    NASA Technical Reports Server (NTRS)

    Tausworthe, R. C.

    1985-01-01

    CRISP80 software design analyzer system a set of programs that supports top-down, hierarchic, modular structured design, and programing methodologies. CRISP80 allows for expression of design as picture of program.

  5. Software interface verifier

    NASA Technical Reports Server (NTRS)

    Soderstrom, Tomas J.; Krall, Laura A.; Hope, Sharon A.; Zupke, Brian S.

    1994-01-01

    A Telos study of 40 recent subsystem deliveries into the DSN at JPL found software interface testing to be the single most expensive and error-prone activity, and the study team suggested creating an automated software interface test tool. The resulting Software Interface Verifier (SIV), which was funded by NASA/JPL and created by Telos, employed 92 percent software reuse to quickly create an initial version which incorporated early user feedback. SIV is now successfully used by developers for interface prototyping and unit testing, by test engineers for formal testing, and by end users for non-intrusive data flow tests in the operational environment. Metrics, including cost, are included. Lessons learned include the need for early user training. SIV is ported to many platforms and can be successfully used or tailored by other NASA groups.

  6. A Symphony of Software.

    ERIC Educational Resources Information Center

    Currents, 2002

    2002-01-01

    Offers a descriptive table of databases that help higher education institutions orchestrate advancement operations. Information includes vendor, contact, software, price, database engine/server platform, recommended reporting tools, record capacity, and client type. (EV)

  7. HOMER® Energy Modeling Software

    2000-12-31

    The HOMER® energy modeling software is a tool for designing and analyzing hybrid power systems, which contain a mix of conventional generators, cogeneration, wind turbines, solar photovoltaic, hydropower, batteries, fuel cells, hydropower, biomass and other inputs.

  8. Writing Instructional Software.

    ERIC Educational Resources Information Center

    Lorenz, Marian; Moose, Allan

    1983-01-01

    Discusses the main categories of instructional software, including drill/practice, tutorials, simulation/problem solving, games, and management, along with factors involved in their design. (Author/MBR)

  9. Software Solutions for ICME

    NASA Astrophysics Data System (ADS)

    Schmitz, G. J.; Engstrom, A.; Bernhardt, R.; Prahl, U.; Adam, L.; Seyfarth, J.; Apel, M.; de Saracibar, C. Agelet; Korzhavyi, P.; Ågren, J.; Patzak, B.

    2016-01-01

    The Integrated Computational Materials Engineering expert group (ICMEg), a coordination activity of the European Commission, aims at developing a global and open standard for information exchange between the heterogeneous varieties of numerous simulation tools. The ICMEg consortium coordinates respective developments by a strategy of networking stakeholders in the first International Workshop on Software Solutions for ICME, compiling identified and relevant software tools into the Handbook of Software Solutions for ICME, discussing strategies for interoperability between different software tools during a second (planned) international workshop, and eventually proposing a scheme for standardized information exchange in a future book or document. The present article summarizes these respective actions to provide the ICME community with some additional insights and resources from which to help move this field forward.

  10. Computer Center: Software Review.

    ERIC Educational Resources Information Center

    Duhrkopf, Richard, Ed.; Belshe, John F., Ed.

    1988-01-01

    Reviews a software package, "Mitosis-Meiosis," available for Apple II or IBM computers with colorgraphics capabilities. Describes the documentation, presentation and flexibility of the program. Rates the program based on graphics and usability in a biology classroom. (CW)

  11. Economics of software utilization

    SciTech Connect

    Sidorov, N.A.

    1995-01-01

    The application of the reuse principle to software (use of methods, concepts, or system components in a context or a situation which is different from that originally envisaged in the development phase) requires solving many problems of technical, economic, organizational, and legal nature. At present, it is the technical problems of reuse that are receiving the greater attention. Economic aspects of reuse, which are the subject of this paper, are only beginning to be studied. In our analysis, an integrated approach to the economics of software recycling suggests three models that can be applied to examine reusability. Section 1 characterizes the application of the reuse principle in software systems. Section 2 identifies the factors which are relevant for reuse. Section 3 briefly describes the main processes of reuse. Section 4 presents the metrics for the evaluation of reuse models. Section 5 examines the reuse models, and Section 6 presents some recommendations for reducing the development costs of reusable software.

  12. Error-Free Software

    NASA Technical Reports Server (NTRS)

    1989-01-01

    001 is an integrated tool suited for automatically developing ultra reliable models, simulations and software systems. Developed and marketed by Hamilton Technologies, Inc. (HTI), it has been applied in engineering, manufacturing, banking and software tools development. The software provides the ability to simplify the complex. A system developed with 001 can be a prototype or fully developed with production quality code. It is free of interface errors, consistent, logically complete and has no data or control flow errors. Systems can be designed, developed and maintained with maximum productivity. Margaret Hamilton, President of Hamilton Technologies, also directed the research and development of USE.IT, an earlier product which was the first computer aided software engineering product in the industry to concentrate on automatically supporting the development of an ultrareliable system throughout its life cycle. Both products originated in NASA technology developed under a Johnson Space Center contract.

  13. Astronomical Software Directory Service

    NASA Technical Reports Server (NTRS)

    Hanisch, Robert J.; Payne, Harry; Hayes, Jeffrey

    1997-01-01

    With the support of NASA's Astrophysics Data Program (NRA 92-OSSA-15), we have developed the Astronomical Software Directory Service (ASDS): a distributed, searchable, WWW-based database of software packages and their related documentation. ASDS provides integrated access to 56 astronomical software packages, with more than 16,000 URLs indexed for full-text searching. Users are performing about 400 searches per month. A new aspect of our service is the inclusion of telescope and instrumentation manuals, which prompted us to change the name to the Astronomical Software and Documentation Service. ASDS was originally conceived to serve two purposes: to provide a useful Internet service in an area of expertise of the investigators (astronomical software), and as a research project to investigate various architectures for searching through a set of documents distributed across the Internet. Two of the co-investigators were then installing and maintaining astronomical software as their primary job responsibility. We felt that a service which incorporated our experience in this area would be more useful than a straightforward listing of software packages. The original concept was for a service based on the client/server model, which would function as a directory/referral service rather than as an archive. For performing the searches, we began our investigation with a decision to evaluate the Isite software from the Center for Networked Information Discovery and Retrieval (CNIDR). This software was intended as a replacement for Wide-Area Information Service (WAIS), a client/server technology for performing full-text searches through a set of documents. Isite had some additional features that we considered attractive, and we enjoyed the cooperation of the Isite developers, who were happy to have ASDS as a demonstration project. We ended up staying with the software throughout the project, making modifications to take advantage of new features as they came along, as well as

  14. Biological Imaging Software Tools

    PubMed Central

    Eliceiri, Kevin W.; Berthold, Michael R.; Goldberg, Ilya G.; Ibáñez, Luis; Manjunath, B.S.; Martone, Maryann E.; Murphy, Robert F.; Peng, Hanchuan; Plant, Anne L.; Roysam, Badrinath; Stuurman, Nico; Swedlow, Jason R.; Tomancak, Pavel; Carpenter, Anne E.

    2013-01-01

    Few technologies are more widespread in modern biological laboratories than imaging. Recent advances in optical technologies and instrumentation are providing hitherto unimagined capabilities. Almost all these advances have required the development of software to enable the acquisition, management, analysis, and visualization of the imaging data. We review each computational step that biologists encounter when dealing with digital images, the challenges in that domain, and the overall status of available software for bioimage informatics, focusing on open source options. PMID:22743775

  15. LIGA Scanner Control Software

    1999-02-01

    The LIGA Scanner Software is a graphical user interface package that facilitates controlling the scanning operation of x-rays from a synchrotron and sample manipulation for making LIGA parts. The process requires scanning of the LIGA mask and the PMMA resist through a stationary x-ray beam to provide an evenly distributed x-ray exposure over the wafer. This software package has been written specifically to interface with Aerotech motor controllers.

  16. Public Key FPGA Software

    SciTech Connect

    Hymel, Ross

    2013-07-25

    The Public Key (PK) FPGA software performs asymmetric authentication using the 163-bit Elliptic Curve Digital Signature Algorithm (ECDSA) on an embedded FPGA platform. A digital signature is created on user-supplied data, and communication with a host system is performed via a Serial Peripheral Interface (SPI) bus. Software includes all components necessary for signing, including custom random number generator for key creation and SHA-256 for data hashing.

  17. Image Processing Software

    NASA Technical Reports Server (NTRS)

    1990-01-01

    The Ames digital image velocimetry technology has been incorporated in a commercially available image processing software package that allows motion measurement of images on a PC alone. The software, manufactured by Werner Frei Associates, is IMAGELAB FFT. IMAGELAB FFT is a general purpose image processing system with a variety of other applications, among them image enhancement of fingerprints and use by banks and law enforcement agencies for analysis of videos run during robberies.

  18. Engineering and Software Engineering

    NASA Astrophysics Data System (ADS)

    Jackson, Michael

    The phrase ‘software engineering' has many meanings. One central meaning is the reliable development of dependable computer-based systems, especially those for critical applications. This is not a solved problem. Failures in software development have played a large part in many fatalities and in huge economic losses. While some of these failures may be attributable to programming errors in the narrowest sense—a program's failure to satisfy a given formal specification—there is good reason to think that most of them have other roots. These roots are located in the problem of software engineering rather than in the problem of program correctness. The famous 1968 conference was motivated by the belief that software development should be based on “the types of theoretical foundations and practical disciplines that are traditional in the established branches of engineering.” Yet after forty years of currency the phrase ‘software engineering' still denotes no more than a vague and largely unfulfilled aspiration. Two major causes of this disappointment are immediately clear. First, too many areas of software development are inadequately specialised, and consequently have not developed the repertoires of normal designs that are the indispensable basis of reliable engineering success. Second, the relationship between structural design and formal analytical techniques for software has rarely been one of fruitful synergy: too often it has defined a boundary between competing dogmas, at which mutual distrust and incomprehension deprive both sides of advantages that should be within their grasp. This paper discusses these causes and their effects. Whether the common practice of software development will eventually satisfy the broad aspiration of 1968 is hard to predict; but an understanding of past failure is surely a prerequisite of future success.

  19. Software for the EVLA

    NASA Astrophysics Data System (ADS)

    Butler, Bryan J.; van Moorsel, Gustaaf; Tody, Doug

    2004-09-01

    The Expanded Very Large Array (EVLA) project is the next generation instrument for high resolution long-millimeter to short-meter wavelength radio astronomy. It is currently funded by NSF, with completion scheduled for 2012. The EVLA will upgrade the VLA with new feeds, receivers, data transmission hardware, correlator, and a new software system to enable the instrument to achieve its full potential. This software includes both that required for controlling and monitoring the instrument and that involved with the scientific dataflow. We concentrate here on a portion of the dataflow software, including: proposal preparation, submission, and handling; observation preparation, scheduling, and remote monitoring; data archiving; and data post-processing, including both automated (pipeline) and manual processing. The primary goals of the software are: to maximize the scientific return of the EVLA; provide ease of use, for both novices and experts; exploit commonality amongst all NRAO telescopes where possible. This last point is both a bane and a blessing: we are not at liberty to do whatever we want in the software, but on the other hand we may borrow from other projects (notably ALMA and GBT) where appropriate. The software design methodology includes detailed initial use-cases and requirements from the scientists, intimate interaction between the scientists and the programmers during design and implementation, and a thorough testing and acceptance plan.

  20. Star Wars software debate

    SciTech Connect

    Myers, W.

    1986-02-01

    David L. Parnas, Landsdowne Professor of Computer Science at the University of Victoria resigned from the SDI Organization's Panel on Computing in Support of Battle Management on June 28, 1985. Parnas, with 20 years of research on software engineering plus 8 years of work on military aircraft real-time software, says the software portion of SDI cannot be built error-free and he doesn't expect the next 20 years of research to change that fact. Since Parnas resigned, there have been several public debates on Star Wars software questions. In November 1985 the SDIO panel from which Parnas resigned released a draft of its report, reflecting its effort to critics of the project. While one might think that errors could be entirely eliminated with enough care and checking, most software professionals believe there will always be some residue of errors in a system of this size and complexity. The general line of the critics' argument is that the larger the amount of software in a single, unified system, the higher the percentage of errors it will contain. Proponents counter that the one very large system can be divided into a number of smaller, relatively independent pieces, thus reducing the proportionate number of errors in each separate piece. This approach is in turn countered by those who point to the intricate relations between these pieces, which themselves contribute to error.

  1. Software Process Assessment (SPA)

    NASA Technical Reports Server (NTRS)

    Rosenberg, Linda H.; Sheppard, Sylvia B.; Butler, Scott A.

    1994-01-01

    NASA's environment mirrors the changes taking place in the nation at large, i.e. workers are being asked to do more work with fewer resources. For software developers at NASA's Goddard Space Flight Center (GSFC), the effects of this change are that we must continue to produce quality code that is maintainable and reusable, but we must learn to produce it more efficiently and less expensively. To accomplish this goal, the Data Systems Technology Division (DSTD) at GSFC is trying a variety of both proven and state-of-the-art techniques for software development (e.g., object-oriented design, prototyping, designing for reuse, etc.). In order to evaluate the effectiveness of these techniques, the Software Process Assessment (SPA) program was initiated. SPA was begun under the assumption that the effects of different software development processes, techniques, and tools, on the resulting product must be evaluated in an objective manner in order to assess any benefits that may have accrued. SPA involves the collection and analysis of software product and process data. These data include metrics such as effort, code changes, size, complexity, and code readability. This paper describes the SPA data collection and analysis methodology and presents examples of benefits realized thus far by DSTD's software developers and managers.

  2. Encyclopedia of software components

    NASA Technical Reports Server (NTRS)

    Vanwarren, Lloyd (Inventor); Beckman, Brian C. (Inventor)

    1991-01-01

    Intelligent browsing through a collection of reusable software components is facilitated with a computer having a video monitor and a user input interface such as a keyboard or a mouse for transmitting user selections, by presenting a picture of encyclopedia volumes with respective visible labels referring to types of software, in accordance with a metaphor in which each volume includes a page having a list of general topics under the software type of the volume and pages having lists of software components for each one of the generic topics, altering the picture to open one of the volumes in response to an initial user selection specifying the one volume to display on the monitor a picture of the page thereof having the list of general topics and altering the picture to display the page thereof having a list of software components under one of the general topics in response to a next user selection specifying the one general topic, and then presenting a picture of a set of different informative plates depicting different types of information about one of the software components in response to a further user selection specifying the one component.

  3. Encyclopedia of Software Components

    NASA Technical Reports Server (NTRS)

    Warren, Lloyd V. (Inventor); Beckman, Brian C. (Inventor)

    1997-01-01

    Intelligent browsing through a collection of reusable software components is facilitated with a computer having a video monitor and a user input interface such as a keyboard or a mouse for transmitting user selections, by presenting a picture of encyclopedia volumes with respective visible labels referring to types of software, in accordance with a metaphor in which each volume includes a page having a list of general topics under the software type of the volume and pages having lists of software components for each one of the generic topics, altering the picture to open one of the volumes in response to an initial user selection specifying the one volume to display on the monitor a picture of the page thereof having the list of general topics and altering the picture to display the page thereof having a list of software components under one of the general topics in response to a next user selection specifying the one general topic, and then presenting a picture of a set of different informative plates depicting different types of information about one of the software components in response to a further user selection specifying the one component.

  4. The cognitive connection: Software maintenance and documentation

    NASA Technical Reports Server (NTRS)

    Soloway, E.; Letovsky, S.; Loerinc, B.; Zygielbaum, A.

    1984-01-01

    With the goal of trying to understand what software maintainers do, talking aloud, video taped protocols with four expert maintainers were conducted as they were actively engaged in the process of enhancing a relatively small, interactive database program. The subjects exhibited a number of different types of information gathering strategies. Underlying these patterns of behavior, however, was the use of expectations about what should be seen in the program under examination. These expectations were generated on the basis of knowledge previously acquired as to the goals and programming plans that are typically employed in realizing interactive database programs. Thus, while the experts seemed to posses adequate programming knowledge, their actual code patches violated a basic principle of program structure. This failure by the programmers was attributed to ineffective program documentation. Suggestions for changes in the content of program documentation that should better facilitate software maintenance are presented.

  5. A Case Of Bilateral Acquired Localized Lipoatrophy

    PubMed Central

    Tanrıkulu, Osman; Yesilova, Yavuz; Aksoy, Mustafa

    2016-01-01

    Lipoatrophy is characterized by inflammation and tissue loss in fatty tissue. This disease may be congenital or acquired, primary or secondary. Secondary lipoatrophy develops with infections, collagen tissue diseases, tumors and drug injections. In this report, we present the case of a 14-year-old female patient who developed lipoatrophy following intramuscular steroid injection to both buttocks. PMID:27504088

  6. Mitral valve repair in acquired dextrocardia.

    PubMed

    Elmistekawy, Elsayed; Chan, Vincent; Hynes, Mark; Mesana, Thierry

    2015-10-01

    Surgical correction of valvular heart disease in patients with dextrocardia is extremely rare. We report a surgical case of mitral valve repair in a patient with acquired dextrocardia. Successful mitral valve repair was performed through a right lateral thoracotomy. We describe our surgical strategy and summarize the literature.

  7. Acquired immunodeficiency syndrome with subacute sclerosing panencephalitis.

    PubMed

    Gowda, Vykuntaraju K N; Sukanya, V; Shivananda

    2012-11-01

    A 7-year-old boy with acquired immunodeficiency syndrome, receiving antiretroviral drugs for 2 years, presented with a recent onset of myoclonic jerks and cognitive deterioration. On examination, he manifested myoclonic jerks once every 10-15 seconds. His electroencephalogram indicated periodic complexes, and his cerebrospinal fluid tested positive for measles antibodies.

  8. How Did Light Acquire a Velocity?

    ERIC Educational Resources Information Center

    Lauginie, Pierre

    2013-01-01

    We discuss how light acquired a velocity through history, from the ancient Greeks to the early modern era. Combining abstract debates, models of light, practical needs, planned research and chance, this history illustrates several key points that should be brought out in science education.

  9. Group Treatment in Acquired Brain Injury Rehabilitation

    ERIC Educational Resources Information Center

    Bertisch, Hilary; Rath, Joseph F.; Langenbahn, Donna M.; Sherr, Rose Lynn; Diller, Leonard

    2011-01-01

    The current article describes critical issues in adapting traditional group-treatment methods for working with individuals with reduced cognitive capacity secondary to acquired brain injury. Using the classification system based on functional ability developed at the NYU Rusk Institute of Rehabilitation Medicine (RIRM), we delineate the cognitive…

  10. Support Network Responses to Acquired Brain Injury

    ERIC Educational Resources Information Center

    Chleboun, Steffany; Hux, Karen

    2011-01-01

    Acquired brain injury (ABI) affects social relationships; however, the ways social and support networks change and evolve as a result of brain injury is not well understood. This study explored ways in which survivors of ABI and members of their support networks perceive relationship changes as recovery extends into the long-term stage. Two…

  11. Interviewing Children with Acquired Brain Injury (ABI)

    ERIC Educational Resources Information Center

    Boylan, Anne-Marie; Linden, Mark; Alderdice, Fiona

    2009-01-01

    Research into the lives of children with acquired brain injury (ABI) often neglects to incorporate children as participants, preferring to obtain the opinions of the adult carer (e.g. McKinlay et al., 2002). There has been a concerted attempt to move away from this position by those working in children's research with current etiquette…

  12. Eye Movement Correlates of Acquired Central Dyslexia

    ERIC Educational Resources Information Center

    Schattka, Kerstin I.; Radach, Ralph; Huber, Walter

    2010-01-01

    Based on recent progress in theory and measurement techniques, the analysis of eye movements has become one of the major methodological tools in experimental reading research. Our work uses this approach to advance the understanding of impaired information processing in acquired central dyslexia of stroke patients with aphasia. Up to now there has…

  13. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 8 2013-01-01 2013-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  14. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  15. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 8 2014-01-01 2014-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  16. 7 CFR 989.17 - Acquire.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 8 2011-01-01 2011-01-01 false Acquire. 989.17 Section 989.17 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE RAISINS PRODUCED FROM GRAPES GROWN...

  17. Neural Correlates of Acquired Color Category Effects

    ERIC Educational Resources Information Center

    Clifford, Alexandra; Franklin, Anna; Holmes, Amanda; Drivonikou, Vicky G.; Ozgen, Emre; Davies, Ian R. L.

    2012-01-01

    Category training can induce category effects, whereby color discrimination of stimuli spanning a newly learned category boundary is enhanced relative to equivalently spaced stimuli from within the newly learned category (e.g., categorical perception). However, the underlying mechanisms of these acquired category effects are not fully understood.…

  18. California's diminished capacity defense: evolution and transformation.

    PubMed

    Weinstock, R; Leong, G B; Silva, J A

    1996-01-01

    Diminished capacity survives in California as a severely attenuated mens rea defense known as diminished actuality. Some other states have similar limited strict mens rea defenses. The lost advantages of California's former expanded concept of diminished capacity are reviewed. As opposed to the all-or-none insanity defense, mens rea defenses permit the trier of fact to find gradations of guilt but are generally inapplicable unless the elements of a crime are redefined to permit consideration of motivational aspects, as California had done. The change from diminished capacity to a diminished actuality defense was a return to the complex, somewhat artificial legal concept of intent and a resurrection of confusing and antiquated common law definitions. The change was made in response to an unpopular jury verdict and a political climate in which little interest existed or still exists for understanding the reasons behind the commission of any crime. Some of the later restrictions imposed by the California Supreme Court on allowing voluntary intoxication to reduce murder to voluntary manslaughter logically should not apply to mental illness. Knowledge of the complex mens rea issues and the various relevant current defenses is essential for any forensic psychiatrist evaluating defendants in jurisdictions in which such defenses are admissible.

  19. Strategic defenses and crisis stability. Interim report

    SciTech Connect

    Wilkening, D.; Watman, K.; Kennedy, M.; Darilek, R.

    1989-04-01

    The effect that defenses have on crisis stability is one of the central issues in the current debate over the Strategic Defense Initiative (SDI). Crisis stability would be threatened in a situation in which either the United States or the Soviet Union feels pressure to strike first in the hope of producing a more favorable outcome to what appears to be inevitable nuclear war. This note examines various issues surrounding the question of crisis stability. In particular, it considers options for ameliorating any potential instabilities that might arise during a transition to higher levels of strategic defenses. The authors suggest that a crisis-stable transition is possible, that the mutual survivability of strategic offensive forces is crucial to maintaining crisis stability, that space-based defenses of strategic offensive forces (SOF) are potentially crisis-destabilizing unless they are backed up by terminal defenses of SOF, and that the mutual survivability of strategic defenses and defense suppression forces is also critical to crisis stability.

  20. An approach to ensuring quality in environmental software

    SciTech Connect

    Gelston, G.M.; Lundgren, R.E.; McDonald, J.P.; Hoopes, B.L.

    1998-05-01

    Environmental software is often used to determine impacts to the public, workers, and the environment from environmental contamination. It is vital, therefore, that the modeling results, and the software that provides them, be scientifically defensible and capable of withstanding the most rigorous of technical reviews. The control and assurance of quality is a critical factor for the project team that develops environmental software at the Pacific Northwest National Laboratory. This document describes the philosophy, process, and activities that ensure a quality product throughout the life cycle of requirements analysis, design, programming, modification, testing, and implementation of environmental software. Environmental software developed by the project team is designed using an object-oriented approach. This software offers increased benefits, such as ease of maintenance and retention of the development and testing legacy of individual components, over traditional hard wired software. These benefits allow the design and testing of the models and future additions to be faster and less costly. This software is developed using a modular framework concept that allows a variety of models to work within a single construct. This software has two parts: an overall system framework and a set of modules. Each module has up to three components: a user interface, a scientific model, and pre/post-processors. Each of these pieces has a different set of quality criteria associated with it. However, whatever form this software might take for a particular client, standard processes apply to protect the information from inappropriate use. The information contained within this document can be applied to most environmental software to analyze risk in multiple environmental media.

  1. Software management at Fermilab

    SciTech Connect

    Robert M. Harris

    1998-10-01

    We describe the structure and performance of a software management system in wide use at Fermilab. The system provides software version control with Con- current Versions System (CVS) con gured in a client-server mode. Management and building of software is provided by Software Release Tools (SoftRelTools) originally developed by the BaBar collaboration. Support for SoftRelTools, the heart of the system, is organized by the Fermilab computing division in close communication with the end users: CDF, D0, BTeV and CMS. Unix Product Support (UPS) is used to initialize environmental variables for multiple versions of software on multiple platforms. Distribution of frozen releases is currently handled by internally developed scripts, but will soon be performed by Unix Product Distribution (UPD). At CDF the development version of the software is also distributed daily and built in place on 18 di erent machines, with new machines added weekly. Although primarily intended for UNIX platforms, in- cluding Linux, the system is also supported for Windows NT by D0. This system handles the version control, management, building, and distri- bution of code written in Fortran, C, and C++. A single executable can call routines written in all three languages. A distinguishing feature of the system is its ability to allow rapid asynchronous development of package versions, which can be easily integrated into complete consistent releases of the entire o ine software. Daily rebuilds of all the software, along with automatic mailings of build errors to developers, test robustness and allow speedy integration. This system has been used since January 1997 by CDF, D0 and BTeV for the development and release of software for the next run of the Tevatron Collider. At CDF it has been used by roughly 30 developers to make over a dozen frozen releases of a million lines of software. D0's use is similar to CDF, and the system is just beginning to be used by CMS. The cooperative maintenance and

  2. Computing and software

    USGS Publications Warehouse

    White, Gary C.; Hines, J.E.

    2004-01-01

    The reality is that the statistical methods used for analysis of data depend upon the availability of software. Analysis of marked animal data is no different than the rest of the statistical field. The methods used for analysis are those that are available in reliable software packages. Thus, the critical importance of having reliable, up–to–date software available to biologists is obvious. Statisticians have continued to develop more robust models, ever expanding the suite of potential analysis methodsavailable. But without software to implement these newer methods, they will languish in the abstract, and not be applied to the problems deserving them.In the Computers and Software Session, two new software packages are described, a comparison of implementation of methods for the estimation of nest survival is provided, and a more speculative paper about how the next generation of software might be structured is presented.Rotella et al. (2004) compare nest survival estimation with different software packages: SAS logistic regression, SAS non–linear mixed models, and Program MARK. Nests are assumed to be visited at various, possibly infrequent, intervals. All of the approaches described compute nest survival with the same likelihood, and require that the age of the nest is known to account for nests that eventually hatch. However, each approach offers advantages and disadvantages, explored by Rotella et al. (2004).Efford et al. (2004) present a new software package called DENSITY. The package computes population abundance and density from trapping arrays and other detection methods with a new and unique approach. DENSITY represents the first major addition to the analysis of trapping arrays in 20 years.Barker & White (2004) discuss how existing software such as Program MARK require that each new model’s likelihood must be programmed specifically for that model. They wishfully think that future software might allow the user to combine pieces of likelihood

  3. Strategic defense initiative: Folly or future

    SciTech Connect

    Haley, P.E.; Merritt, J.

    1986-01-01

    This collection of analyses is a guide through the maze of claims and criticisms about ''Star Wars,'' the controversial effort of the Reagan administration to reorient United States nuclear strategy to strategic defense. The text starts with an introduction by the editors followed by individual chapters outlining the strategic defense initiative as originally conceived and subsequently modified by the Reagan administration; the arguments for and against the plan's strategic and technical feasibility; and assessments of the harmful and constructive effects of strategic defense on U.S.-Soviet and U.S.-allied relations.

  4. The insanity defense: the case for abolition.

    PubMed

    Perr, I N

    1985-01-01

    The author discusses psychiatrists' objections to the insanity defense, including the negative publicity generated by murder trials in which psychiatrists provide expert testimony. He also examines the legal profession's attitudes toward the defense and the pressure applied to expert witnesses through our adversarial system of justice. The abolition of the insanity defense might expedite the legal process, the author concludes, but it would not greatly affect the courtroom role of psychiatrists. Psychiatric evaluation would still be required in certain cases, such as those involving diminished responsibility and competency to stand trial.

  5. Video Image Stabilization and Registration (VISAR) Software

    NASA Technical Reports Server (NTRS)

    1999-01-01

    Two scientists at NASA's Marshall Space Flight Center,atmospheric scientist Paul Meyer and solar physicist Dr. David Hathaway, developed promising new software, called Video Image Stabilization and Registration (VISAR). VISAR may help law enforcement agencies catch criminals by improving the quality of video recorded at crime scenes. In this photograph, the single frame at left, taken at night, was brightened in order to enhance details and reduce noise or snow. To further overcome the video defects in one frame, Law enforcement officials can use VISAR software to add information from multiple frames to reveal a person. Images from less than a second of videotape were added together to create the clarified image at right. VISAR stabilizes camera motion in the horizontal and vertical as well as rotation and zoom effects producing clearer images of moving objects, smoothes jagged edges, enhances still images, and reduces video noise or snow. VISAR could also have applications in medical and meteorological imaging. It could steady images of ultrasounds, which are infamous for their grainy, blurred quality. The software can be used for defense application by improving recornaissance video imagery made by military vehicles, aircraft, and ships traveling in harsh, rugged environments.

  6. 78 FR 36113 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 222 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: June 17, 2013. FOR...

  7. 77 FR 10976 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 252 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: February 24, 2012. FOR...

  8. 77 FR 11775 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 252 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: February 28, 2012. FOR...

  9. 76 FR 27274 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 225 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to direct contracting officers to additional guidance on supporting contingency...

  10. 78 FR 41331 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 225 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to insert a hyperlink and direct contracting officers to the DFARS Procedures,...

  11. 77 FR 19128 - Defense Federal Acquisition Regulation Supplement; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 203 Defense Federal Acquisition Regulation Supplement... Supplement (DFARS) to add a reference for reporting suspected lobbying violations. DATES: Effective...

  12. The Strategic Defense Initiative bibliography and reference guide

    SciTech Connect

    Lawrence, R.M.

    1986-01-01

    The ballistic missile defense debate, which has permeated strategic discussion in the United States for nearly three decades, received an impressive stimulus when President Ronald Reagan addressed the nation on the evening of March 23, 1983. In that address, dubbed the ''Star Wars'' speech by the media, the president asked the scientific community to pursue research and development of hardware and software that would enable the nation to switch from the deterrence doctrine of Mutual Assured Destruction (MAD) to a policy based on the unilateral capability to physically defend the country against ballistic missile attack. The editors have assembled approximately one thousand citations - including books, monographs, articles, and government documents - that reflect the full spectrum of thought on the issue. Seminal references have been abstracted and divided into three sections: technical parameters of the debate, arguments in favor of SDI, and arguments against SDI. Each section contains an essay that integrates and amplifies the information presented in the abstracted materials.

  13. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  14. Spatial proximity amplifies valence in emotional memory and defensive approach-avoidance.

    PubMed

    Åhs, Fredrik; Dunsmoor, Joseph E; Zielinski, David; LaBar, Kevin S

    2015-04-01

    In urban areas, people often have to stand or move in close proximity to others. The egocentric distance to stimuli is a powerful determinant of defensive behavior in animals. Yet, little is known about how spatial proximity to others alters defensive responses in humans. We hypothesized that the valence of social cues scales with egocentric distance, such that proximal social stimuli have more positive or negative valence than distal stimuli. This would predict enhanced defensive responses to proximal threat and reduced defensive responses to proximal reward. We tested this hypothesis across four experiments using 3-D virtual reality simulations. Results from Experiment 1 confirmed that proximal social stimuli facilitate defensive responses, as indexed by fear-potentiated startle, relative to distal stimuli. Experiment 2 revealed that interpersonal defensive boundaries flexibly increase with aversive learning. Experiment 3 examined whether spatial proximity enhances memory for aversive experiences. Fear memories for social threats encroaching on the body were more persistent than those acquired at greater interpersonal distances, as indexed by startle. Lastly, Experiment 4 examined how egocentric distance influenced startle responses to social threats during defensive approach and avoidance. Whereas fear-potentiated startle increased with proximity when participants actively avoided receiving shocks, startle decreased with proximity when participants tolerated shocks to receive monetary rewards, implicating opposing gradients of distance on threat versus reward. Thus, proximity in egocentric space amplifies the valence of social stimuli that, in turn, facilitates emotional memory and approach-avoidance responses. These findings have implications for understanding the consequences of increased urbanization on affective interpersonal behavior. PMID:25541499

  15. Spatial proximity amplifies valence in emotional memory and defensive approach-avoidance.

    PubMed

    Åhs, Fredrik; Dunsmoor, Joseph E; Zielinski, David; LaBar, Kevin S

    2015-04-01

    In urban areas, people often have to stand or move in close proximity to others. The egocentric distance to stimuli is a powerful determinant of defensive behavior in animals. Yet, little is known about how spatial proximity to others alters defensive responses in humans. We hypothesized that the valence of social cues scales with egocentric distance, such that proximal social stimuli have more positive or negative valence than distal stimuli. This would predict enhanced defensive responses to proximal threat and reduced defensive responses to proximal reward. We tested this hypothesis across four experiments using 3-D virtual reality simulations. Results from Experiment 1 confirmed that proximal social stimuli facilitate defensive responses, as indexed by fear-potentiated startle, relative to distal stimuli. Experiment 2 revealed that interpersonal defensive boundaries flexibly increase with aversive learning. Experiment 3 examined whether spatial proximity enhances memory for aversive experiences. Fear memories for social threats encroaching on the body were more persistent than those acquired at greater interpersonal distances, as indexed by startle. Lastly, Experiment 4 examined how egocentric distance influenced startle responses to social threats during defensive approach and avoidance. Whereas fear-potentiated startle increased with proximity when participants actively avoided receiving shocks, startle decreased with proximity when participants tolerated shocks to receive monetary rewards, implicating opposing gradients of distance on threat versus reward. Thus, proximity in egocentric space amplifies the valence of social stimuli that, in turn, facilitates emotional memory and approach-avoidance responses. These findings have implications for understanding the consequences of increased urbanization on affective interpersonal behavior.

  16. 78 FR 54968 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: September 9,...

  17. 78 FR 30232 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective: May 22, 2013....

  18. 78 FR 38235 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to provide needed editorial changes. DATES: Effective Date: June 26, 2013....

  19. 78 FR 13543 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-28

    ... Federal Acquisition Regulation Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations... the Defense Federal Acquisition Regulation Supplement (DFARS) to provide needed editorial...

  20. Happiness and Defense Styles in Psychiatrists.

    PubMed

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  1. Department of Defense Helps "Fight" Poverty Too

    ERIC Educational Resources Information Center

    Opportunity, 1971

    1971-01-01

    Begun in April, 1969, the Department of Defense Domestic Action Program's activities include: loan of equipment to Community Action Agencies; use of DOD facilities for training and recreation; assistance in technical areas; and, general aid. (JM)

  2. Defense mechanisms: 40 years of empirical research.

    PubMed

    Cramer, Phebe

    2015-01-01

    This article reviews research on defense mechanisms carried out over the past 40 years with children, adolescents, adults, and psychiatric patients. Both experimental and observational studies are included.

  3. Defense mechanisms and psychological adjustment in childhood.

    PubMed

    Sandstrom, Marlene J; Cramer, Phebe

    2003-08-01

    The association between maturity of defense use and psychological functioning was assessed in a group of 95 elementary school children. Defense mechanisms were measured using a valid and reliable storytelling task, and psychological adjustment was assessed through a combination of parent and self-report questionnaires. Correlational analyses indicated that children who relied on the developmentally immature defense of denial reported higher levels of self-rated social anxiety and depression and received higher ratings of parent-reported internalizing and externalizing behavior problems. However, children who made use of the developmentally mature defense of identification exhibited higher scores on perceived competence in social, academic, conduct, athletic, and global domains. Significantly, there was no relationship between children's use of denial and their level of perceived competence or between children's use of identification and their degree of maladjustment.

  4. Defense and Veterans Brain Injury Center

    MedlinePlus

    ... Headache Following Concussion/Mild TBI Clinical Recommendation DCoE Blog TBI Highlights Give Concussion the Red Card (link ... of TBI (link is external) Read more DCoE blog articles » Defense and Veterans Brain Injury Center Crisis ...

  5. Self-defense training for college women.

    PubMed

    Cummings, N

    1992-01-01

    This article explores the effectiveness of self-defense training for college women. Advocates of self-defense training believe these courses will not only provide women with the physical survival techniques necessary to repel attacks effectively, but that this kind of training will also help to prevent future violence by developing traits such as assertiveness and confidence in individuals. There is evidence that women who convey such characteristics are less likely to be victimized. Opponents argue that self-defense training does not properly prepare women for an attack, does not adequately address acquaintance rape threats, and can provide a dangerous false sense of security to students. This article reviews the relevant literature, outlines practical suggestions for initiatives in this area, and describes a model self-defense course at one university. Guidelines for evaluation and implications for university policy and program decisions that address violence against women on college campuses are included. PMID:1583240

  6. Impact of Agile Software Development Model on Software Maintainability

    ERIC Educational Resources Information Center

    Gawali, Ajay R.

    2012-01-01

    Software maintenance and support costs account for up to 60% of the overall software life cycle cost and often burdens tightly budgeted information technology (IT) organizations. Agile software development approach delivers business value early, but implications on software maintainability are still unknown. The purpose of this quantitative study…

  7. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 14

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  8. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 15

    NASA Technical Reports Server (NTRS)

    1997-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  9. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 13

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  10. [Medical Service of the Estonian Defense Forces].

    PubMed

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  11. [Irony and cynicism as forms of defense].

    PubMed

    Blaser, A

    1976-01-01

    Irony and Cynicism are understood to be defense mechanisms. The principle of opposites explains Irony best: it serves the purpose of avoiding the negative affect of a state by maintaining its dialectic opposite. Irony can thus be attributed to counter-cathexis. Cynicism has already been shown in its historical development to be a form of denial with the purpose to minimize the importance of the object. Sarcasm is not a defense but a form of aggressive discharge.

  12. Software reliability perspectives

    NASA Technical Reports Server (NTRS)

    Wilson, Larry; Shen, Wenhui

    1987-01-01

    Software which is used in life critical functions must be known to be highly reliable before installation. This requires a strong testing program to estimate the reliability, since neither formal methods, software engineering nor fault tolerant methods can guarantee perfection. Prior to the final testing software goes through a debugging period and many models have been developed to try to estimate reliability from the debugging data. However, the existing models are poorly validated and often give poor performance. This paper emphasizes the fact that part of their failures can be attributed to the random nature of the debugging data given to these models as input, and it poses the problem of correcting this defect as an area of future research.

  13. SAR Product Control Software

    NASA Astrophysics Data System (ADS)

    Meadows, P. J.; Hounam, D.; Rye, A. J.; Rosich, B.; Börner, T.; Closa, J.; Schättler, B.; Smith, P. J.; Zink, M.

    2003-03-01

    As SAR instruments and their operating modes become more complex, as new applications place more and more demands on image quality and as our understanding of their imperfections becomes more sophisticated, there is increasing recognition that SAR data quality has to be controlled more completely to keep pace. The SAR product CONtrol software (SARCON) is a comprehensive SAR product control software suite tailored to the latest generation of SAR sensors. SARCON profits from the most up-to-date thinking on SAR image performance derived from other spaceborne and airborne SAR projects and is based on the newest applications. This paper gives an overview of the structure and the features of this new software tool, which is a product of a co-operation between teams at BAE SYSTEMS Advanced Technology Centre and DLR under contract to ESA (ESRIN). Work on SARCON began in 1999 and is continuing.

  14. The Ettention software package.

    PubMed

    Dahmen, Tim; Marsalek, Lukas; Marniok, Nico; Turoňová, Beata; Bogachev, Sviatoslav; Trampert, Patrick; Nickels, Stefan; Slusallek, Philipp

    2016-02-01

    We present a novel software package for the problem "reconstruction from projections" in electron microscopy. The Ettention framework consists of a set of modular building-blocks for tomographic reconstruction algorithms. The well-known block iterative reconstruction method based on Kaczmarz algorithm is implemented using these building-blocks, including adaptations specific to electron tomography. Ettention simultaneously features (1) a modular, object-oriented software design, (2) optimized access to high-performance computing (HPC) platforms such as graphic processing units (GPU) or many-core architectures like Xeon Phi, and (3) accessibility to microscopy end-users via integration in the IMOD package and eTomo user interface. We also provide developers with a clean and well-structured application programming interface (API) that allows for extending the software easily and thus makes it an ideal platform for algorithmic research while hiding most of the technical details of high-performance computing. PMID:26686659

  15. Astronomers as Software Developers

    NASA Astrophysics Data System (ADS)

    Pildis, Rachel A.

    2016-01-01

    Astronomers know that their research requires writing, adapting, and documenting computer software. Furthermore, they often have to learn new computer languages and figure out how existing programs work without much documentation or guidance and with extreme time pressure. These are all skills that can lead to a software development job, but recruiters and employers probably won't know that. I will discuss all the highly useful experience that astronomers may not know that they already have, and how to explain that knowledge to others when looking for non-academic software positions. I will also talk about some of the pitfalls I have run into while interviewing for jobs and working as a developer, and encourage you to embrace the curiosity employers might have about your non-standard background.

  16. Secure software practices among Malaysian software practitioners: An exploratory study

    NASA Astrophysics Data System (ADS)

    Mohamed, Shafinah Farvin Packeer; Baharom, Fauziah; Deraman, Aziz; Yahya, Jamaiah; Mohd, Haslina

    2016-08-01

    Secure software practices is increasingly gaining much importance among software practitioners and researchers due to the rise of computer crimes in the software industry. It has become as one of the determinant factors for producing high quality software. Even though its importance has been revealed, its current practice in the software industry is still scarce, particularly in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software practices, however, they lack of appropriate implementation, which could affect the quality of produced software.

  17. Acquired undescended testis: putting the pieces together.

    PubMed

    Hack, W W M; Goede, J; van der Voort-Doedens, L M; Meijer, R W

    2012-02-01

    Acquired undescended testis is now a well-recognized disorder. It is seen in 1.5% of pre-pubertal boys and accounts for the 1-2% orchidopexy rate in older boys. Its pathogenesis remains largely unclear, but it may be caused by a fibrous remnant of the processus vaginalis. There is much controversy over its management, and the proper management awaits a randomized-controlled trial. Until now, follow-up data are available only for cases of spontaneous descent or pubertal orchidopexy. It is speculated that acquired undescended testis is in fact congenital and because of a short funiculus at birth, allowing a low-scrotal position early in life. However, as the boy grows, the testis might evolve into an undescended state. When testosterone surges at puberty, spontaneous descent occurs in three of every four cases.

  18. Clinical laboratory data: acquire, analyze, communicate, liberate.

    PubMed

    Azzazy, Hassan M E; Elbehery, Ali H A

    2015-01-01

    The availability of portable healthcare devices, which can acquire and transmit medical data to remote experts would dramatically affect healthcare in areas with poor infrastructure. Smartphones, which feature touchscreen computer capabilities and sophisticated cameras, have become widely available with over billion units shipped in 2013. In the clinical laboratory, smartphones have recently brought the capabilities of key instruments such as spectrophotometers, fluorescence analyzers and microscopes into the palm of the hand. Several research groups have developed sensitive and low-cost smartphone-based diagnostic assay prototypes for testing cholesterol, albumin, vitamin D, tumor markers, and the detection of infectious agents. This review covers the use of smartphones to acquire, analyze, communicate, and liberate clinical laboratory data. Smartphones promise to dramatically improve the quality and quantity of healthcare offered in resource-limited areas.

  19. Acquired Cystic Fibrosis Transmembrane Conductance Regulator Deficiency.

    PubMed

    Cho, Do-Yeon; Woodworth, Bradford A

    2016-01-01

    In the genetic airway disease cystic fibrosis (CF), deficiency or dysfunction of the cystic fibrosis membrane conductance regulator (CFTR) alters anion transport in respiratory epithelium and consequently disrupts mucociliary clearance. An enriched understanding of the role of CFTR in the maintenance of normal epithelial function has revealed that mild and variable CFTR mutations play a causative role in a number of diseases not classically associated with CF. Furthermore, recent evidence indicates that acquired defects in wild-type CFTR protein processing, endocytic recycling and function can contribute to the pathogenesis of airway diseases, such as chronic obstructive pulmonary disease. In this chapter, we discuss emerging findings implicating acquired CFTR dysfunction in the pathogenesis of chronic rhinosinusitis and propose a new and leading edge approach to future CRS therapy using CFTR potentiators. PMID:27466849

  20. Acquired portosystemic collaterals: anatomy and imaging*

    PubMed Central

    Leite, Andréa Farias de Melo; Mota Jr., Américo; Chagas-Neto, Francisco Abaeté; Teixeira, Sara Reis; Elias Junior, Jorge; Muglia, Valdair Francisco

    2016-01-01

    Portosystemic shunts are enlarged vessels that form collateral pathological pathways between the splanchnic circulation and the systemic circulation. Although their causes are multifactorial, portosystemic shunts all have one mechanism in common-increased portal venous pressure, which diverts the blood flow from the gastrointestinal tract to the systemic circulation. Congenital and acquired collateral pathways have both been described in the literature. The aim of this pictorial essay was to discuss the distinct anatomic and imaging features of portosystemic shunts, as well as to provide a robust method of differentiating between acquired portosystemic shunts and similar pathologies, through the use of illustrations and schematic drawings. Imaging of portosystemic shunts provides subclinical markers of increased portal venous pressure. Therefore, radiologists play a crucial role in the identification of portosystemic shunts. Early detection of portosystemic shunts can allow ample time to perform endovascular shunt operations, which can relieve portal hypertension and prevent acute or chronic complications in at-risk patient populations. PMID:27777479