Sample records for computer network defence

  1. Dynamic Defensive Posture for Computer Network Defence

    DTIC Science & Technology

    2006-12-01

    12 4.1.1 Skybox View . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.1.2 CycSecure...Commercial projects 4.1.1 Skybox View Skybox View is a commercial product that aims to evaluate network risk by iden- tifying network resources that are...changes before implementing them on the live network. In these respects, it is a tool for identifying exposed resources. Skybox View also permits some

  2. Signalling Network Construction for Modelling Plant Defence Response

    PubMed Central

    Miljkovic, Dragana; Stare, Tjaša; Mozetič, Igor; Podpečan, Vid; Petek, Marko; Witek, Kamil; Dermastia, Marina; Lavrač, Nada; Gruden, Kristina

    2012-01-01

    Plant defence signalling response against various pathogens, including viruses, is a complex phenomenon. In resistant interaction a plant cell perceives the pathogen signal, transduces it within the cell and performs a reprogramming of the cell metabolism leading to the pathogen replication arrest. This work focuses on signalling pathways crucial for the plant defence response, i.e., the salicylic acid, jasmonic acid and ethylene signal transduction pathways, in the Arabidopsis thaliana model plant. The initial signalling network topology was constructed manually by defining the representation formalism, encoding the information from public databases and literature, and composing a pathway diagram. The manually constructed network structure consists of 175 components and 387 reactions. In order to complement the network topology with possibly missing relations, a new approach to automated information extraction from biological literature was developed. This approach, named Bio3graph, allows for automated extraction of biological relations from the literature, resulting in a set of (component1, reaction, component2) triplets and composing a graph structure which can be visualised, compared to the manually constructed topology and examined by the experts. Using a plant defence response vocabulary of components and reaction types, Bio3graph was applied to a set of 9,586 relevant full text articles, resulting in 137 newly detected reactions between the components. Finally, the manually constructed topology and the new reactions were merged to form a network structure consisting of 175 components and 524 reactions. The resulting pathway diagram of plant defence signalling represents a valuable source for further computational modelling and interpretation of omics data. The developed Bio3graph approach, implemented as an executable language processing and graph visualisation workflow, is publically available at http://ropot.ijs.si/bio3graph/and can be utilised for modelling other biological systems, given that an adequate vocabulary is provided. PMID:23272172

  3. Imaging techniques in digital forensic investigation: a study using neural networks

    NASA Astrophysics Data System (ADS)

    Williams, Godfried

    2006-09-01

    Imaging techniques have been applied to a number of applications, such as translation and classification problems in medicine and defence. This paper examines the application of imaging techniques in digital forensics investigation using neural networks. A review of applications of digital image processing is presented, whiles a Pedagogical analysis of computer forensics is also highlighted. A data set describing selected images in different forms are used in the simulation and experimentation.

  4. Hijacking common mycorrhizal networks for herbivore-induced defence signal transfer between tomato plants

    PubMed Central

    Song, Yuan Yuan; Ye, Mao; Li, Chuanyou; He, Xinhua; Zhu-Salzman, Keyan; Wang, Rui Long; Su, Yi Juan; Luo, Shi Ming; Zeng, Ren Sen

    2014-01-01

    Common mycorrhizal networks (CMNs) link multiple plants together. We hypothesized that CMNs can serve as an underground conduit for transferring herbivore-induced defence signals. We established CMN between two tomato plants in pots with mycorrhizal fungus Funneliformis mosseae, challenged a ‘donor' plant with caterpillar Spodoptera litura, and investigated defence responses and insect resistance in neighbouring CMN-connected ‘receiver' plants. After CMN establishment caterpillar infestation on ‘donor' plant led to increased insect resistance and activities of putative defensive enzymes, induction of defence-related genes and activation of jasmonate (JA) pathway in the ‘receiver' plant. However, use of a JA biosynthesis defective mutant spr2 as ‘donor' plants resulted in no induction of defence responses and no change in insect resistance in ‘receiver' plants, suggesting that JA signalling is required for CMN-mediated interplant communication. These results indicate that plants are able to hijack CMNs for herbivore-induced defence signal transfer and interplant defence communication. PMID:24468912

  5. The structure of gallery networks in the nests of termite Cubitermes spp. revealed by X-ray tomography

    NASA Astrophysics Data System (ADS)

    Perna, Andrea; Jost, Christian; Couturier, Etienne; Valverde, Sergi; Douady, Stéphane; Theraulaz, Guy

    2008-09-01

    Recent studies have introduced computer tomography (CT) as a tool for the visualisation and characterisation of insect architectures. Here, we use CT to map the three-dimensional networks of galleries inside Cubitermes nests in order to analyse them with tools from graph theory. The structure of these networks indicates that connections inside the nest are rearranged during the whole nest life. The functional analysis reveals that the final network topology represents an excellent compromise between efficient connectivity inside the nest and defence against attacking predators. We further discuss and illustrate the usefulness of CT to disentangle environmental and specific influences on nest architecture.

  6. Transition Plan For the Technology Demonstration of the Joint Network Defence and Management System (JNDMS)

    DTIC Science & Technology

    2009-11-01

    Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Brett Trask; Novembre 2009. Dès le départ, nous avons mis au point le... 13 5.1 System Specification... 13 5.1.1 Scope ............................................................................................................. 13 5.2 Security

  7. The Challenge of the Seamless Force: The Role of Informal Networks in Battlespace

    DTIC Science & Technology

    2005-06-01

    10th International Command and Control Research and Technology Symposium THE FUTURE OF C2 Symposium Theme: Lessons Learned Title: The... Technology Organisation Fern Hill Park Department of Defence Canberra ACT 2600 AUSTRALIA Phone +61 2 6256 6219 Fax +61 2 6256 6233...Email Leoni.Warne@dsto.defence.gov.au Derek Bopping Defence Science and Technology Organisation Fern Hill Park Department of Defence Canberra

  8. Weapon system simulation in flight (WaSiF)

    NASA Astrophysics Data System (ADS)

    Bartoldus, Klaus H.

    2005-05-01

    The research and technology demonstration program was co-funded by the Ministries of Defence of five European countries under the framework of the "EUropean Cooperation for the Long term in Defence" (EUCLID) MoU to include Germany, Italy, The Netherlands, Portugal and Turkey with considerable financial contribution from the industrial entities. EADS Military Aircraft Munich has led a team of seven industries and research centers, including Aermacchi of Italy, DutchSpace and NLR of The Netherlands, OGMA and INETI of Portugal and Marmara Research Center of Turkey. The purpose of the project was the design, realization and demonstration of an embedded real time simulation system allowing the combat training of operational aircrew in a virtual air defence scenario and threat environment against computer generated forces in the air and on the ground while flying on a real aircraft. The simulated scenario is focused on air-to-air beyond visual range engagements of fighter aircraft. WaSiF represents one of the first demonstrations of an advanced embedded real time training system onboard a fighter/training aircraft. The system is integrated onboard the MB339CX aircraft. The overall flight test activity covered a wide variety of test conditions for a total of 21 test flights; the operational airborne time of the WaSiF amounted to nearly 18 hours. The demonstration and evaluation were quite positive; the five-nation aircrew was very fond of their first encounter with the virtual world in the military flight training. A common view and approach towards Network Centric Warfare is but emerging. WaSiF in a future networked configuration holds lots of promise to serve the needs of Integrated Air Defence: Common training in a virtual environment.

  9. Defence Adademies and Colleges 2009 International Conference. Network Centric Learning: Towards Authentic ePractices, 25 - 27 March 2009

    DTIC Science & Technology

    2009-03-27

    to learning and collaborative working • Developing more immersive learning where learning is promoted through experiencing the style of thinking of... Student Talk in Promoting Quality Learning in Science Classroom”, MS. Morrison, P., Barlow, M., Bethel, G. and Clothier, S. (2005), “Proficient Soldier...on student perceptions of learning effectiveness. 1 Computer self-efficacy: “The learner’s perception of their ability to carry out a series of

  10. JNDMS Task Authorization 2 Report

    DTIC Science & Technology

    2013-10-01

    uses Barnyard to store alarms from all DREnet Snort sensors in a MySQL database. Barnyard is an open source tool designed to work with Snort to take...Technology ITI Information Technology Infrastructure J2EE Java 2 Enterprise Edition JAR Java Archive. This is an archive file format defined by Java ...standards. JDBC Java Database Connectivity JDW JNDMS Data Warehouse JNDMS Joint Network and Defence Management System JNDMS Joint Network Defence and

  11. Experimental Studies in a Reconfigurable C4 Test-bed for Network Enabled Capability

    DTIC Science & Technology

    2006-06-01

    Cross1, Dr R. Houghton1, and Mr R. McMaster1 Defence Technology Centre for Human factors Integration (DTC HFI ) BITlab, School of Engineering and Design...NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defence Technology Centre for Human factors Integration (DTC HFI ) BITlab, School of...studies into NEC by the Human Factors Integration Defence Technology Centre ( HFI -DTC). DEVELOPMENT OF THE TESTBED In brief, the C4 test-bed

  12. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

    PubMed Central

    Sampangi, Raghav V.; Sampalli, Srinivas

    2015-01-01

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899

  13. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    PubMed

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  14. Computer Aided Dosimetry and Verification of Exposure to Radiation

    DTIC Science & Technology

    2002-06-01

    Event matrix 2. Hematopoietic * Absolute blood counts * Relative blood counts 3. Dosimetry * TLD * EPDQuantitative * Radiation survey * Whole body...EI1 Defence Research and Recherche et developpement Development Canada pour la d6fense Canada DEFENCE •mI•DEFENSE Computer Aided Dosimetry and...Aided Dosimetry and Verification of Exposure to Radiation Edward Waller SAIC Canada Robert Z Stodilka Radiation Effects Group, Space Systems and

  15. Efflux drug transporters at the forefront of antimicrobial resistance.

    PubMed

    Rahman, Tahmina; Yarnall, Benjamin; Doyle, Declan A

    2017-10-01

    Bacterial antibiotic resistance is rapidly becoming a major world health consideration. To combat antibiotics, microorganisms employ their pre-existing defence mechanisms that existed long before man's discovery of antibiotics. Bacteria utilise levels of protection that range from gene upregulation, mutations, adaptive resistance, and production of resistant phenotypes (persisters) to communal behaviour, as in swarming and the ultimate defence of a biofilm. A major part of all of these responses involves the use of antibiotic efflux transporters. At the single cell level, it is becoming apparent that the use of efflux pumps is the first line of defence against an antibiotic, as these pumps decrease the intracellular level of antibiotic while the cell activates the various other levels of protection. This frontline of defence involves a coordinated network of efflux transporters. In the future, inhibition of this efflux transporter network, as a target for novel antibiotic therapy, will require the isolation and then biochemical/biophysical characterisation of each pump against all known and new antibiotics. This depth of knowledge is required so that we can fully understand and tackle the mechanisms of developing antimicrobial resistance.

  16. Role of plant hormones in plant defence responses.

    PubMed

    Bari, Rajendra; Jones, Jonathan D G

    2009-03-01

    Plant hormones play important roles in regulating developmental processes and signaling networks involved in plant responses to a wide range of biotic and abiotic stresses. Significant progress has been made in identifying the key components and understanding the role of salicylic acid (SA), jasmonates (JA) and ethylene (ET) in plant responses to biotic stresses. Recent studies indicate that other hormones such as abscisic acid (ABA), auxin, gibberellic acid (GA), cytokinin (CK), brassinosteroids (BR) and peptide hormones are also implicated in plant defence signaling pathways but their role in plant defence is less well studied. Here, we review recent advances made in understanding the role of these hormones in modulating plant defence responses against various diseases and pests.

  17. Mechanisms regulating skin immunity and inflammation.

    PubMed

    Pasparakis, Manolis; Haase, Ingo; Nestle, Frank O

    2014-05-01

    Immune responses in the skin are important for host defence against pathogenic microorganisms. However, dysregulated immune reactions can cause chronic inflammatory skin diseases. Extensive crosstalk between the different cellular and microbial components of the skin regulates local immune responses to ensure efficient host defence, to maintain and restore homeostasis, and to prevent chronic disease. In this Review, we discuss recent findings that highlight the complex regulatory networks that control skin immunity, and we provide new paradigms for the mechanisms that regulate skin immune responses in host defence and in chronic inflammation.

  18. Interplant communication of tomato plants through underground common mycorrhizal networks.

    PubMed

    Song, Yuan Yuan; Zeng, Ren Sen; Xu, Jian Feng; Li, Jun; Shen, Xiang; Yihdego, Woldemariam Gebrehiwot

    2010-10-13

    Plants can defend themselves to pathogen and herbivore attack by responding to chemical signals that are emitted by attacked plants. It is well established that such signals can be transferred through the air. In theory, plants can also communicate with each other through underground common mycorrhizal networks (CMNs) that interconnect roots of multiple plants. However, until now research focused on plant-to-plant carbon nutrient movement and there is no evidence that defense signals can be exchanged through such mycorrhizal hyphal networks. Here, we show that CMNs mediate plant-plant communication between healthy plants and pathogen-infected tomato plants (Lycopersicon esculentum Mill.). After establishment of CMNs with the arbuscular mycorrhizal fungus Glomus mosseae between tomato plants, inoculation of 'donor' plants with the pathogen Alternaria solani led to increases in disease resistance and activities of the putative defensive enzymes, peroxidase, polyphenol oxidase, chitinase, β-1,3-glucanase, phenylalanine ammonia-lyase and lipoxygenase in healthy neighbouring 'receiver' plants. The uninfected 'receiver' plants also activated six defence-related genes when CMNs connected 'donor' plants challenged with A. solani. This finding indicates that CMNs may function as a plant-plant underground communication conduit whereby disease resistance and induced defence signals can be transferred between the healthy and pathogen-infected neighbouring plants, suggesting that plants can 'eavesdrop' on defence signals from the pathogen-challenged neighbours through CMNs to activate defences before being attacked themselves.

  19. Fragmentation Data Analysis. I. Computer Program for Mass and Number Distributions and Effects of Errors on Mass Distributions

    DTIC Science & Technology

    1974-11-01

    PR(20)aPO(20)#NNC20)aNCC2S)DFOW(28)a 3FOM(90)*SOM(2@)iSOW(20) CALL IFILECI&SIIFRAGS) CALL OFILE(2a5HMENTS) I FORMAT(2A5) 2 FORMAT( F6 *0) 3 FORMAT...Department of National Defence (2 copies) The Director, Defence Scientific Information & Documentation Centre, India Director, Defence Research (entre, Ministry of Derence, Malaysia i; 4 * 4

  20. A Network Centric Warfare (NCW) Compliance Process for Australian Defence

    DTIC Science & Technology

    2006-08-01

    discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements

  1. Identifying individuality and variability in team tactics by means of statistical shape analysis and multilayer perceptrons.

    PubMed

    Jäger, Jörg M; Schöllhorn, Wolfgang I

    2012-04-01

    Offensive and defensive systems of play represent important aspects of team sports. They include the players' positions at certain situations during a match, i.e., when players have to be on specific positions on the court. Patterns of play emerge based on the formations of the players on the court. Recognition of these patterns is important to react adequately and to adjust own strategies to the opponent. Furthermore, the ability to apply variable patterns of play seems to be promising since they make it harder for the opponent to adjust. The purpose of this study is to identify different team tactical patterns in volleyball and to analyze differences in variability. Overall 120 standard situations of six national teams in women's volleyball are analyzed during a world championship tournament. Twenty situations from each national team are chosen, including the base defence position (start configuration) and the two players block with middle back deep (end configuration). The shapes of the defence formations at the start and end configurations during the defence of each national team as well as the variability of these defence formations are statistically analyzed. Furthermore these shapes data are used to train multilayer perceptrons in order to test whether artificial neural networks can recognize the teams by their tactical patterns. Results show significant differences between the national teams in both the base defence position at the start and the two players block with middle back deep at the end of the standard defence situation. Furthermore, the national teams show significant differences in variability of the defence systems and start-positions are more variable than the end-positions. Multilayer perceptrons are able to recognize the teams at an average of 98.5%. It is concluded that defence systems in team sports are highly individual at a competitive level and variable even in standard situations. Artificial neural networks can be used to recognize teams by the shapes of the players' configurations. These findings support the concept that tactics and strategy have to be adapted for the team and need to be flexible in order to be successful. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. A Simplified Guidance for Target Missiles Used in Ballistic Missile Defence Evaluation

    NASA Astrophysics Data System (ADS)

    Prabhakar, N.; Kumar, I. D.; Tata, S. K.; Vaithiyanathan, V.

    2013-01-01

    A simplified guidance scheme for the target missiles used in Ballistic Missile Defence is presented in this paper. The proposed method has two major components, a Ground Guidance Computation (GGC) and an In-Flight Guidance Computation. The GGC which runs on the ground uses a missile model to generate attitude history in pitch plane and computes launch azimuth of the missile to compensate for the effect of earth rotation. The vehicle follows the pre launch computed attitude (theta) history in pitch plane and also applies the course correction in azimuth plane based on its deviation from the pre launch computed azimuth plane. This scheme requires less computations and counters In-flight disturbances such as wind, gust etc. quite efficiently. The simulation results show that the proposed method provides the satisfactory performance and robustness.

  3. Terpenoids in plant and arbuscular mycorrhiza-reinforced defence against herbivorous insects

    PubMed Central

    Sharma, Esha; Anand, Garima

    2017-01-01

    Background Plants, though sessile, employ various strategies to defend themselves against herbivorous insects and convey signals of an impending herbivore attack to other plant(s). Strategies include the production of volatiles that include terpenoids and the formation of symbiotic associations with fungi, such as arbuscular mycorrhiza (AM). This constitutes a two-pronged above-ground/below-ground attack–defence strategy against insect herbivores. Scope Terpenoids represent an important constituent of herbivore-induced plant volatiles that deter herbivores and/or attract their predators. Terpenoids serve as airborne signals that can induce defence responses in systemic undamaged parts of the plant and also prime defence responses in neighbouring plants. Colonization of roots by AM fungi is known to influence secondary metabolism in plants; this includes alteration of the concentration and composition of terpenoids, which can boost both direct and indirect plant defence against herbivorous insects. Enhanced nutrient uptake facilitated by AM, changes in plant morphology and physiology and increased transcription levels of certain genes involved in the terpenoid biosynthesis pathway result in alterations in plant terpenoid profiles. The common mycorrhizal networks of external hyphae have added a dimension to the two-pronged plant defence strategy. These act as conduits to transfer defence signals and terpenoids. Conclusion Improved understanding of the roles of terpenoids in plant and AM defences against herbivory and of interplant signalling in natural communities has significant implications for sustainable management of pests in agricultural ecosystems. PMID:28087662

  4. An introduction to intelligent networks

    NASA Astrophysics Data System (ADS)

    Getto, Wolf

    1994-02-01

    Intelligent networking is a new and developing technology that is already having significant impact on telecommunications architectures. This paper offers a summary of this technology, concluding with a brief discussion of how it is likely to affect the military communications of the Australian Defence Force (ADF).

  5. A Layered Decision Model for Cost-Effective System Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use inmore » deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.« less

  6. Shifting from priming of salicylic acid- to jasmonic acid-regulated defences by Trichoderma protects tomato against the root knot nematode Meloidogyne incognita.

    PubMed

    Martínez-Medina, Ainhoa; Fernandez, Ivan; Lok, Gerrit B; Pozo, María J; Pieterse, Corné M J; Van Wees, Saskia C M

    2017-02-01

    Beneficial root endophytes such as Trichoderma spp. can reduce infections by parasitic nematodes through triggering host defences. Little is currently known about the complex hormone signalling underlying the induction of resistance. In this study, we investigated whether Trichoderma modulates the hormone signalling network in the host to induce resistance to nematodes. We investigated the role and the timing of the jasmonic acid (JA)- and salicylic acid (SA)-regulated defensive pathways in Trichoderma-induced resistance to the root knot nematode Meloidogyne incognita. A split-root system of tomato (Solanum lycopersicum) was used to study local and systemic induced defences by analysing nematode performance, defence gene expression, responsiveness to exogenous hormone application, and dependence on SA and JA signalling of Trichoderma-induced resistance. Root colonization by Trichoderma impeded nematode performance both locally and systemically at multiple stages of the parasitism, that is, invasion, galling and reproduction. First, Trichoderma primed SA-regulated defences, which limited nematode root invasion. Then, Trichoderma enhanced JA-regulated defences, thereby antagonizing the deregulation of JA-dependent immunity by the nematodes, which compromised galling and fecundity. Our results show that Trichoderma primes SA- and JA-dependent defences in roots, and that the priming of responsiveness to these hormones upon nematode attack is plastic and adaptive to the parasitism stage. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  7. Molecular signatures in Arabidopsis thaliana in response to insect attack and bacterial infection.

    PubMed

    Barah, Pankaj; Winge, Per; Kusnierczyk, Anna; Tran, Diem Hong; Bones, Atle M

    2013-01-01

    Under the threat of global climatic change and food shortages, it is essential to take the initiative to obtain a comprehensive understanding of common and specific defence mechanisms existing in plant systems for protection against different types of biotic invaders. We have implemented an integrated approach to analyse the overall transcriptomic reprogramming and systems-level defence responses in the model plant species Arabidopsis thaliana (A. thaliana henceforth) during insect Brevicoryne brassicae (B. brassicae henceforth) and bacterial Pseudomonas syringae pv. tomato strain DC3000 (P. syringae henceforth) attacks. The main aim of this study was to identify the attacker-specific and general defence response signatures in A. thaliana when attacked by phloem-feeding aphids or pathogenic bacteria. The obtained annotated networks of differentially expressed transcripts indicated that members of transcription factor families, such as WRKY, MYB, ERF, BHLH and bZIP, could be crucial for stress-specific defence regulation in Arabidopsis during aphid and P. syringae attack. The defence response pathways, signalling pathways and metabolic processes associated with aphid attack and P. syringae infection partially overlapped. Components of several important biosynthesis and signalling pathways, such as salicylic acid (SA), jasmonic acid (JA), ethylene (ET) and glucosinolates, were differentially affected during the two the treatments. Several stress-regulated transcription factors were known to be associated with stress-inducible microRNAs. The differentially regulated gene sets included many signature transcription factors, and our co-expression analysis showed that they were also strongly co-expressed during 69 other biotic stress experiments. Defence responses and functional networks that were unique and specific to aphid or P. syringae stresses were identified. Furthermore, our analysis revealed a probable link between biotic stress and microRNAs in Arabidopsis and, thus gives indicates a new direction for conducting large-scale targeted experiments to explore the detailed regulatory links between them. The presented results provide a comparative understanding of Arabidopsis - B. brassicae and Arabidopsis - P. syringae interactions at the transcriptomic level.

  8. Inter-plant communication through mycorrhizal networks mediates complex adaptive behaviour in plant communities.

    PubMed

    Gorzelak, Monika A; Asay, Amanda K; Pickles, Brian J; Simard, Suzanne W

    2015-05-15

    Adaptive behaviour of plants, including rapid changes in physiology, gene regulation and defence response, can be altered when linked to neighbouring plants by a mycorrhizal network (MN). Mechanisms underlying the behavioural changes include mycorrhizal fungal colonization by the MN or interplant communication via transfer of nutrients, defence signals or allelochemicals. We focus this review on our new findings in ectomycorrhizal ecosystems, and also review recent advances in arbuscular mycorrhizal systems. We have found that the behavioural changes in ectomycorrhizal plants depend on environmental cues, the identity of the plant neighbour and the characteristics of the MN. The hierarchical integration of this phenomenon with other biological networks at broader scales in forest ecosystems, and the consequences we have observed when it is interrupted, indicate that underground 'tree talk' is a foundational process in the complex adaptive nature of forest ecosystems. Published by Oxford University Press on behalf of the Annals of Botany Company.

  9. A systems biology perspective on plant-microbe interactions: biochemical and structural targets of pathogen effectors.

    PubMed

    Pritchard, Leighton; Birch, Paul

    2011-04-01

    Plants have biochemical defences against stresses from predators, parasites and pathogens. In this review we discuss the interaction of plant defences with microbial pathogens such as bacteria, fungi and oomycetes, and viruses. We examine principles of complex dynamic networks that allow identification of network components that are differentially and predictably sensitive to perturbation, thus making them likely effector targets. We relate these principles to recent developments in our understanding of known effector targets in plant-pathogen systems, and propose a systems-level framework for the interpretation and modelling of host-microbe interactions mediated by effectors. We describe this framework briefly, and conclude by discussing useful experimental approaches for populating this framework. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  10. Coordinated Radar Resource Management for Networked Phased Array Radars

    DTIC Science & Technology

    2014-12-01

    Coordinated radar resource management for networked phased array radars Peter W. Moo and Zhen Ding Radar Sensing & Exploitation Section Defence...15] P.W. Moo . Scheduling for multifunction radar via two-slope benefit functions. Radar, Sonar Navigation, IET, 5(8):884 –894, Oct. 2011. [16] M.I

  11. Variable Discretisation for Anomaly Detection using Bayesian Networks

    DTIC Science & Technology

    2017-01-01

    UNCLASSIFIED DST- Group –TR–3328 1 Introduction Bayesian network implementations usually require each variable to take on a finite number of mutually...UNCLASSIFIED Variable Discretisation for Anomaly Detection using Bayesian Networks Jonathan Legg National Security and ISR Division Defence Science...and Technology Group DST- Group –TR–3328 ABSTRACT Anomaly detection is the process by which low probability events are automatically found against a

  12. Neurons of self-defence: neuronal innervation of the exocrine defence glands in stick insects.

    PubMed

    Stolz, Konrad; von Bredow, Christoph-Rüdiger; von Bredow, Yvette M; Lakes-Harlan, Reinhard; Trenczek, Tina E; Strauß, Johannes

    2015-01-01

    Stick insects (Phasmatodea) use repellent chemical substances (allomones) for defence which are released from so-called defence glands in the prothorax. These glands differ in size between species, and are under neuronal control from the CNS. The detailed neural innervation and possible differences between species are not studied so far. Using axonal tracing, the neuronal innervation is investigated comparing four species. The aim is to document the complexity of defence gland innervation in peripheral nerves and central motoneurons in stick insects. In the species studied here, the defence gland is innervated by the intersegmental nerve complex (ISN) which is formed by three nerves from the prothoracic (T1) and suboesophageal ganglion (SOG), as well as a distinct suboesophageal nerve (Nervus anterior of the suboesophageal ganglion). In Carausius morosus and Sipyloidea sipylus, axonal tracing confirmed an innervation of the defence glands by this N. anterior SOG as well as N. anterior T1 and N. posterior SOG from the intersegmental nerve complex. In Peruphasma schultei, which has rather large defence glands, only the innervation by the N. anterior SOG was documented by axonal tracing. In the central nervous system of all species, 3-4 neuron types are identified by axonal tracing which send axons in the N. anterior SOG likely innervating the defence gland as well as adjacent muscles. These neurons are mainly suboesophageal neurons with one intersegmental neuron located in the prothoracic ganglion. The neuron types are conserved in the species studied, but the combination of neuron types is not identical. In addition, the central nervous system in S. sipylus contains one suboesophageal and one prothoracic neuron type with axons in the intersegmental nerve complex contacting the defence gland. Axonal tracing shows a very complex innervation pattern of the defence glands of Phasmatodea which contains different neurons in different nerves from two adjacent body segments. The gland size correlates to the size of a neuron soma in the suboesophageal ganglion, which likely controls gland contraction. In P. schultei, the innervation pattern appears simplified to the anterior suboesophageal nerve. Hence, some evolutionary changes are notable in a conserved neuronal network.

  13. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  14. Experimental Evaluation of the IP Address Space Randomisation (IASR) Technique and Its Disruption to Selected Network Services

    DTIC Science & Technology

    2014-11-01

    Canada (Department of National Defence), 2014 c© Sa Majesté la Reine en droit du Canada (Ministère de la Défense nationale), 2014 Abstract In recent...2006), Network security mechanisms utilising network address translation, International journal of critical infrastructures, 2(1), 10–49. [5] Dunlop...Lu, S. (2008), Full service hopping for proactive cyber-defense, In ICNSC 2008: IEEE International Conference on Networking, Sensing and Control, pp

  15. A post-gene silencing bioinformatics protocol for plant-defence gene validation and underlying process identification: case study of the Arabidopsis thaliana NPR1.

    PubMed

    Yocgo, Rosita E; Geza, Ephifania; Chimusa, Emile R; Mazandu, Gaston K

    2017-11-23

    Advances in forward and reverse genetic techniques have enabled the discovery and identification of several plant defence genes based on quantifiable disease phenotypes in mutant populations. Existing models for testing the effect of gene inactivation or genes causing these phenotypes do not take into account eventual uncertainty of these datasets and potential noise inherent in the biological experiment used, which may mask downstream analysis and limit the use of these datasets. Moreover, elucidating biological mechanisms driving the induced disease resistance and influencing these observable disease phenotypes has never been systematically tackled, eliciting the need for an efficient model to characterize completely the gene target under consideration. We developed a post-gene silencing bioinformatics (post-GSB) protocol which accounts for potential biases related to the disease phenotype datasets in assessing the contribution of the gene target to the plant defence response. The post-GSB protocol uses Gene Ontology semantic similarity and pathway dataset to generate enriched process regulatory network based on the functional degeneracy of the plant proteome to help understand the induced plant defence response. We applied this protocol to investigate the effect of the NPR1 gene silencing to changes in Arabidopsis thaliana plants following Pseudomonas syringae pathovar tomato strain DC3000 infection. Results indicated that the presence of a functionally active NPR1 reduced the plant's susceptibility to the infection, with about 99% of variability in Pseudomonas spore growth between npr1 mutant and wild-type samples. Moreover, the post-GSB protocol has revealed the coordinate action of target-associated genes and pathways through an enriched process regulatory network, summarizing the potential target-based induced disease resistance mechanism. This protocol can improve the characterization of the gene target and, potentially, elucidate induced defence response by more effectively utilizing available phenotype information and plant proteome functional knowledge.

  16. Optimising the Parallelisation of OpenFOAM Simulations

    DTIC Science & Technology

    2014-06-01

    UNCLASSIFIED UNCLASSIFIED Optimising the Parallelisation of OpenFOAM Simulations Shannon Keough Maritime Division Defence...Science and Technology Organisation DSTO-TR-2987 ABSTRACT The OpenFOAM computational fluid dynamics toolbox allows parallel computation of...performance of a given high performance computing cluster with several OpenFOAM cases, running using a combination of MPI libraries and corresponding MPI

  17. Future Technology Themes: 2030 to 2060

    DTIC Science & Technology

    2013-07-01

    Rocket-Based Combined Cycle RF Radio Frequency RNA Ribonucleic Acid SA Situational Awareness SEAD Suppression of Enemy Air Defences SME...and re-routing light in information processing and optical communications ; or for processing radio signals in mobile phones [44]. UNCLASSIFIED DSTO...make use of network polymorphism technologies from 2020 onwards to create frequency -agile and adaptive14 communications links that would change network

  18. Architectural Design Document for the Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2009-09-21

    specified by contract no. W7714-040875/001/SV. This document contains the design of the JNDMS software to the system architecture level. Other...alternative for the presentation functions. ASP, Java, ActiveX , DLL, HTML, DHTML, SOAP, .NET HTML, DHTML, XML, Jscript, VBScript, SOAP, .NET...retrieved through the network, typically by a network management console. Information is contained in a Management Information Base (MIB), which is a data

  19. Contractor Final Report: For the Technology Demonstration of the Joint Network Defence and Management System (JNDMS)

    DTIC Science & Technology

    2013-10-01

    opérationnel. Importance: Nous avons démontré des fonctions cruciales en utilisant des outils d’entreprise pour comprendre en profondeur un domaine...by the Minister of National Defence, 2009 © Sa Majesté la Reine ( en droit du Canada), telle que représentée par le ministre de la Défense nationale...interarmées de défense et de gestion des réseaux (SIDGR), en vertu du contrat W7714-04-0875/001/SV. Il touche l’exécution et les résultats de cette

  20. The Vital Planning and Analysis (ViPA) ORBAT Data Service Architecture and Design Overview

    DTIC Science & Technology

    2016-07-01

    ORBAT Data Service is a  Web  Service for storing force structures to be used by the ADF. The service is composed into what is known   as   a   Service...DRN) and the Defence Secret Network (DSN) by Defence project JP2030. The ORBAT Data Service is a  Web  Service for storing force structures to be used by...the ADF.    Web  Services are software used to share business logic and data across a network through   application  programming   interfaces   (APIs

  1. Limbic control of aggression in the cat.

    PubMed

    Adamec, R E; Stark-Adamec, C I

    1983-01-01

    Over a decade of work by Flynn and colleagues has delineated a network of limbic circuits which function to modulate the expression of predatory aggression and defence in the cat, and aspects of this work are reviewed. In particular, Flynn's work revealed a circuit involving the basomedial amygdala which functions to suppress attack, and at the same time facilitates defence. A second circuit, involving the ventral hippocampus, is involved in attack facilitation. Studies relating stable differences in excitability in these two circuits to developmentally determined behavioural dispositions toward aggression or defence are summarized. Finally, the impact of experimentally induced limbic seizures on interictally maintained expression of aggression and defence behaviourally, and on limbic excitability are reviewed. Taken together, the data indicate that the behavioural balance of attack and defence is under the tonic control of opponent limbic circuits, which are themselves biased in a measureable manner. Developmental studies indicate that adult defensiveness is determined early in life, so early as to suggest some pre-programmed neuro-developmental process. Experimentally induced seizures alter behaviour lastingly, producing an increase in defensive disposition. At the same time there is an equally lasting potentiation of interictal transmission of neural activity from the amygdala to the hypothalamus. Moreover, seizures may reduce interictal transmission of activity through the ventral hippocampus by potentiating recurrent inhibition. These effects of seizures are of interest since seizures reproduce naturally occurring differences in limbic excitability seen in naturally defensive cats.

  2. Implementing an Integrated Network Defense Construct

    DTIC Science & Technology

    2013-06-01

    hierarchical structure under the Air Defence of Great Britain initiative ( Checkland and Holwell, 1998). This implementation was the earliest concept...Framework for Detecting and Defending against Insider IT Attacks. Auerbach Publications. 2008. Checkland , Peter and Holwell, Sue. "Information, Systems

  3. Programmed cell death as a defence against infection

    PubMed Central

    Jorgensen, Ine; Rayamajhi, Manira; Miao, Edward A.

    2017-01-01

    Eukaryotic cells can die from physical trauma, resulting in necrosis. Alternately, they can die via programmed cell death upon stimulation of specific signalling pathways. Here we discuss the utility of four cell death pathways in innate immune defence against bacterial and viral infection: apoptosis, necroptosis, pyroptosis and NETosis. We describe the interactions that interweave different programmed cell death pathways, which create complex signalling networks that cross-guard each other in the evolutionary arms race with pathogens. Finally, we describe how the resulting cell corpses — apoptotic bodies, pore-induced intracellular traps (PITs) and neutrophil extracellular traps (NETs) — promote clearance of infection. PMID:28138137

  4. The wheat NB-LRR gene TaRCR1 is required for host defence response to the necrotrophic fungal pathogen Rhizoctonia cerealis.

    PubMed

    Zhu, Xiuliang; Lu, Chungui; Du, Lipu; Ye, Xingguo; Liu, Xin; Coules, Anne; Zhang, Zengyan

    2017-06-01

    The necrotrophic fungus Rhizoctonia cerealis is the major pathogen causing sharp eyespot disease in wheat (Triticum aestivum). Nucleotide-binding leucine-rich repeat (NB-LRR) proteins often mediate plant disease resistance to biotrophic pathogens. Little is known about the role of NB-LRR genes involved in wheat response to R. cerealis. In this study, a wheat NB-LRR gene, named TaRCR1, was identified in response to R. cerealis infection using Artificial Neural Network analysis based on comparative transcriptomics and its defence role was characterized. The transcriptional level of TaRCR1 was enhanced after R. cerealis inoculation and associated with the resistance level of wheat. TaRCR1 was located on wheat chromosome 3BS and encoded an NB-LRR protein that was consisting of a coiled-coil domain, an NB-ARC domain and 13 imperfect leucine-rich repeats. TaRCR1 was localized in both the cytoplasm and the nucleus. Silencing of TaRCR1 impaired wheat resistance to R. cerealis, whereas TaRCR1 overexpression significantly increased the resistance in transgenic wheat. TaRCR1 regulated certain reactive oxygen species (ROS)-scavenging and production, and defence-related genes, and peroxidase activity. Furthermore, H 2 O 2 pretreatment for 12-h elevated expression levels of TaRCR1 and the above defence-related genes, whereas treatment with a peroxidase inhibitor for 12 h reduced the resistance of TaRCR1-overexpressing transgenic plants and expression levels of these defence-related genes. Taken together, TaRCR1 positively contributes to defence response to R. cerealis through maintaining ROS homoeostasis and regulating the expression of defence-related genes. © 2016 The Authors. Plant Biotechnology Journal published by Society for Experimental Biology and The Association of Applied Biologists and John Wiley & Sons Ltd.

  5. Use of Open Architecture Middleware for Autonomous Platforms

    NASA Astrophysics Data System (ADS)

    Naranjo, Hector; Diez, Sergio; Ferrero, Francisco

    2011-08-01

    Network Enabled Capabilities (NEC) is the vision for next-generation systems in the defence domain formulated by governments, the European Defence Agency (EDA) and the North Atlantic Treaty Organization (NATO). It involves the federation of military information systems, rather than just a simple interconnection, to provide each user with the "right information, right place, right time - and not too much". It defines openness, standardization and flexibility principles in military systems, likewise applicable in the civilian space applications.This paper provides the conclusions drawn from "Architecture for Embarked Middleware" (EMWARE) study, funded by the European Defence Agency (EDA).The aim of the EMWARE project was to provide the information and understanding to facilitate the adoption of informed decisions regarding the specification and implementation of Open Architecture Middleware in future distributed systems, linking it with the NEC goal.EMWARE project included the definition of four business cases, each devoted to a different field of application (Unmanned Aerial Vehicles, Helicopters, Unmanned Ground Vehicles and the Satellite Ground Segment).

  6. Prioritizing plant defence over growth through WRKY regulation facilitates infestation by non-target herbivores.

    PubMed

    Li, Ran; Zhang, Jin; Li, Jiancai; Zhou, Guoxin; Wang, Qi; Bian, Wenbo; Erb, Matthias; Lou, Yonggen

    2015-06-17

    Plants generally respond to herbivore attack by increasing resistance and decreasing growth. This prioritization is achieved through the regulation of phytohormonal signaling networks. However, it remains unknown how this prioritization affects resistance against non-target herbivores. In this study, we identify WRKY70 as a specific herbivore-induced, mitogen-activated protein kinase-regulated rice transcription factor that physically interacts with W-box motives and prioritizes defence over growth by positively regulating jasmonic acid (JA) and negatively regulating gibberellin (GA) biosynthesis upon attack by the chewing herbivore Chilo suppressalis. WRKY70-dependent JA biosynthesis is required for proteinase inhibitor activation and resistance against C. suppressalis. In contrast, WRKY70 induction increases plant susceptibility against the rice brown planthopper Nilaparvata lugens. Experiments with GA-deficient rice lines identify WRKY70-dependent GA signaling as the causal factor in N. lugens susceptibility. Our study shows that prioritizing defence over growth leads to a significant resistance trade-off with important implications for the evolution and agricultural exploitation of plant immunity.

  7. Digital map and situation surface: a team-oriented multidisplay workspace for network enabled situation analysis

    NASA Astrophysics Data System (ADS)

    Peinsipp-Byma, E.; Geisler, Jürgen; Bader, Thomas

    2009-05-01

    System concepts for network enabled image-based ISR (intelligence, surveillance, reconnaissance) is the major mission of Fraunhofer IITB's applied research in the area of defence and security solutions. For the TechDemo08 as part of the NATO CNAD POW Defence against terrorism Fraunhofer IITB advanced a new multi display concept to handle the shear amount and high complexity of ISR data acquired by networked, distributed surveillance systems with the objective to support the generation of a common situation picture. Amount and Complexity of ISR data demands an innovative man-machine interface concept for humans to deal with it. The IITB's concept is the Digital Map & Situation Surface. This concept offers to the user a coherent multi display environment combining a horizontal surface for the situation overview from the bird's eye view, an attached vertical display for collateral information and so-called foveatablets as personalized magic lenses in order to obtain high resolved and role-specific information about a focused areaof- interest and to interact with it. In the context of TechDemo08 the Digital Map & Situation Surface served as workspace for team-based situation visualization and analysis. Multiple sea- and landside surveillance components were connected to the system.

  8. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  9. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  10. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  11. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  12. DDN (Defence Data Network) Protocol Implementations and Vendors Guide

    DTIC Science & Technology

    1988-08-01

    Artificial Intelligence Laboratory Room NE43-723 545 Technology Square Cambridge, MA 02139 (617) 253-8843 S John Wroclawski, (JTW@AI.AJ.MIT.EDU...Massachusetts Institute of Technology Artificial Intelligence Laboratory Room NE43-743 545 Technology Square 0 Cambridge, MA 02139 (617) 253-7885 ORDERING...TCP/IP Network Software for PC-DOS Systems CPU: IBM-PC/XT/AT/compatible in conjunction with EXOS 205 Inteligent Ethernet Controller for PCbus 0/s

  13. Design Document for the Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2012-02-06

    Event Interface Custom ASCII JSS Client Y (Spectrum) 3.2 8 IT Infrastructure Performance Data/Vulnerability Assessment eHealth , Spectrum NSM...monitoring of infrastructure servers.) The Concord product line. Concord products ( eHealth and Spectrum) can provide both real-time and historical...Network and Systems Management (NSM) • Unicenter Asset Management • Spectrum • eHealth • Centennial Discovery Table 12 summarizes the the role of

  14. Robust Multi-Agent Sensor Network Systems

    DTIC Science & Technology

    2012-05-08

    Localization on the Sphere, International Journal of Intelligent Defence Support System, Vol. 4, no. 4, 2011, pp. 328-350. Quality of Network... Quality of Service (QoS). The following standards are included in the IEEE 1609 standard family: IEEE P1609.0, IEEE P1609.1, IEEE P1609.2, IEEE P1609.3...protocols to support safety services in ITS,” in IEEE International Conference on Emerging Technologies and Factory Au- tomation (ETFA), 2008, pp. 1189

  15. Coalition readiness management system preliminary interoperability experiment (CReaMS PIE)

    NASA Astrophysics Data System (ADS)

    Clark, Peter; Ryan, Peter; Zalcman, Lucien; Robbie, Andrew

    2003-09-01

    The United States Navy (USN) has initiated the Coalition Readiness Management System (CReaMS) Initiative to enhance coalition warfighting readiness through advancing development of a team interoperability training and combined mission rehearsal capability. It integrates evolving cognitive team learning principles and processes with advanced technology innovations to produce an effective and efficient team learning environment. The JOint Air Navy Networking Environment (JOANNE) forms the Australian component of CReaMS. The ultimate goal is to link Australian Defence simulation systems with the USN Battle Force Tactical Training (BFTT) system to demonstrate and achieve coalition level warfare training in a synthetic battlespace. This paper discusses the initial Preliminary Interoperability Experiment (PIE) involving USN and Australian Defence establishments.

  16. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD...) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Explanation of Terms, Acronyms and... Order ESCAT—Emergency Security Control of Air Traffic FAA—Federal Aviation Administration IFR—Instrument...

  17. A Scan Line Algorithm for Computer Generated Flight Visuals,

    DTIC Science & Technology

    1981-02-01

    8217--- P FIG. 3.4 POLYGON CLIPPING 13 f ace cnri ProtyPriority f ace index etrd Protyindex index 0 n -i FIG. 3.5 FACE - PRIORITY LINK 3.4 Perspecliite...along edges vr2 and 1a1.1, and then along the segment rs results in the point p being assigned colour !15 20 1 35cl +.-9C 2 + I- C3 + 3-C4 49 49 14 14...AR-002-259 0 DEPARTMENT OF DEFENCE 0DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION 7- n AERONAUTICAL RESEARCH LABORATORIES TN4 MELBOURNE, VICTORIA 1 b

  18. Cyber Defence in the Armed Forces of the Czech Republic

    DTIC Science & Technology

    2010-11-01

    undesirable action backward discovery. This solution is based on special tools using NetFlow protocol. Active network elements or specialized hardware...probes attached to the backbone network using a tap can be the sources of NetFlow data. The principal advantage of NetFlow protocol is the fact that it...provides primary data in the open form, which can be easily utilized in the subsequent operations. The FlowMon Probe 4000 is mostly used NetFlow

  19. Coalition Network Defence Common Operational Picture

    DTIC Science & Technology

    2010-11-01

    27000 .org/ iso -27005.htm [26] ISO 8601:2004, Data elements and interchange formats - Information interchange - Representation of dates and times, http://ww.iso.org, http://en.wikipedia.org/wiki/ISO_8601 ...Regular_expression [25] ISO /IEC 27005:2008, Information technology -- Security techniques -- Information security risk management, http://ww.iso.org,; http://www

  20. Prioritizing plant defence over growth through WRKY regulation facilitates infestation by non-target herbivores

    PubMed Central

    Li, Ran; Zhang, Jin; Li, Jiancai; Zhou, Guoxin; Wang, Qi; Bian, Wenbo; Erb, Matthias; Lou, Yonggen

    2015-01-01

    Plants generally respond to herbivore attack by increasing resistance and decreasing growth. This prioritization is achieved through the regulation of phytohormonal signaling networks. However, it remains unknown how this prioritization affects resistance against non-target herbivores. In this study, we identify WRKY70 as a specific herbivore-induced, mitogen-activated protein kinase-regulated rice transcription factor that physically interacts with W-box motifs and prioritizes defence over growth by positively regulating jasmonic acid (JA) and negatively regulating gibberellin (GA) biosynthesis upon attack by the chewing herbivore Chilo suppressalis. WRKY70-dependent JA biosynthesis is required for proteinase inhibitor activation and resistance against C. suppressalis. In contrast, WRKY70 induction increases plant susceptibility against the rice brown planthopper Nilaparvata lugens. Experiments with GA-deficient rice lines identify WRKY70-dependent GA signaling as the causal factor in N. lugens susceptibility. Our study shows that prioritizing defence over growth leads to a significant resistance trade-off with important implications for the evolution and agricultural exploitation of plant immunity. DOI: http://dx.doi.org/10.7554/eLife.04805.001 PMID:26083713

  1. Research into alternative network approaches for space operations

    NASA Technical Reports Server (NTRS)

    Kusmanoff, Antone L.; Barton, Timothy J.

    1990-01-01

    The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.

  2. Evolution of the Quorum network and the mobilome (plasmids and bacteriophages) in clinical strains of Acinetobacter baumannii during a decade.

    PubMed

    López, M; Rueda, A; Florido, J P; Blasco, L; Fernández-García, L; Trastoy, R; Fernández-Cuenca, F; Martínez-Martínez, L; Vila, J; Pascual, A; Bou, G; Tomas, M

    2018-02-06

    In this study, we compared eighteen clinical strains of A. baumannii belonging to the ST-2 clone and isolated from patients in the same intensive care unit (ICU) in 2000 (9 strains referred to collectively as Ab_GEIH-2000) and 2010 (9 strains referred to collectively as Ab_GEIH-2010), during the GEIH-REIPI project (Umbrella BioProject PRJNA422585). We observed two main molecular differences between the Ab_GEIH-2010 and the Ab_GEIH-2000 collections, acquired over the course of the decade long sampling interval and involving the mobilome: i) a plasmid harbouring genes for bla OXA 24/40 ß-lactamase and abKA/abkB proteins of a toxin-antitoxin system; and ii) two temperate bacteriophages, Ab105-1ϕ (63 proteins) and Ab105-2ϕ (93 proteins), containing important viral defence proteins. Moreover, all Ab_GEIH-2010 strains contained a Quorum functional network of Quorum Sensing (QS) and Quorum Quenching (QQ) mechanisms, including a new QQ enzyme, AidA, which acts as a bacterial defence mechanism against the exogenous 3-oxo-C12-HSL. Interestingly, the infective capacity of the bacteriophages isolated in this study (Ab105-1ϕ and Ab105-2ϕ) was higher in the Ab_GEIH-2010 strains (carrying a functional Quorum network) than in the Ab_GEIH-2000 strains (carrying a deficient Quorum network), in which the bacteriophages showed little or no infectivity. This is the first study about the evolution of the Quorum network and the mobilome in clinical strains of Acinetobacter baumannii during a decade.

  3. Involvement of potato (Solanum tuberosum L.) MKK6 in response to potato virus Y.

    PubMed

    Lazar, Ana; Coll, Anna; Dobnik, David; Baebler, Spela; Bedina-Zavec, Apolonija; Zel, Jana; Gruden, Kristina

    2014-01-01

    Mitogen-activated protein kinase (MAPK) cascades have crucial roles in the regulation of plant development and in plant responses to stress. Plant recognition of pathogen-associated molecular patterns or pathogen-derived effector proteins has been shown to trigger activation of several MAPKs. This then controls defence responses, including synthesis and/or signalling of defence hormones and activation of defence related genes. The MAPK cascade genes are highly complex and interconnected, and thus the precise signalling mechanisms in specific plant-pathogen interactions are still not known. Here we investigated the MAPK signalling network involved in immune responses of potato (Solanum tuberosum L.) to Potato virus Y, an important potato pathogen worldwide. Sequence analysis was performed to identify the complete MAPK kinase (MKK) family in potato, and to identify those regulated in the hypersensitive resistance response to Potato virus Y infection. Arabidopsis has 10 MKK family members, of which we identified five in potato and tomato (Solanum lycopersicum L.), and eight in Nicotiana benthamiana. Among these, StMKK6 is the most strongly regulated gene in response to Potato virus Y. The salicylic acid treatment revealed that StMKK6 is regulated by the hormone that is in agreement with the salicylic acid-regulated domains found in the StMKK6 promoter. The involvement of StMKK6 in potato defence response was confirmed by localisation studies, where StMKK6 accumulated strongly only in Potato-virus-Y-infected plants, and predominantly in the cell nucleus. Using a yeast two-hybrid method, we identified three StMKK6 targets downstream in the MAPK cascade: StMAPK4_2, StMAPK6 and StMAPK13. These data together provide further insight into the StMKK6 signalling module and its involvement in plant defence.

  4. Involvement of Potato (Solanum tuberosum L.) MKK6 in Response to Potato virus Y

    PubMed Central

    Lazar, Ana; Coll, Anna; Dobnik, David; Baebler, Špela; Bedina-Zavec, Apolonija; Žel, Jana; Gruden, Kristina

    2014-01-01

    Mitogen-activated protein kinase (MAPK) cascades have crucial roles in the regulation of plant development and in plant responses to stress. Plant recognition of pathogen-associated molecular patterns or pathogen-derived effector proteins has been shown to trigger activation of several MAPKs. This then controls defence responses, including synthesis and/or signalling of defence hormones and activation of defence related genes. The MAPK cascade genes are highly complex and interconnected, and thus the precise signalling mechanisms in specific plant–pathogen interactions are still not known. Here we investigated the MAPK signalling network involved in immune responses of potato (Solanum tuberosum L.) to Potato virus Y, an important potato pathogen worldwide. Sequence analysis was performed to identify the complete MAPK kinase (MKK) family in potato, and to identify those regulated in the hypersensitive resistance response to Potato virus Y infection. Arabidopsis has 10 MKK family members, of which we identified five in potato and tomato (Solanum lycopersicum L.), and eight in Nicotiana benthamiana. Among these, StMKK6 is the most strongly regulated gene in response to Potato virus Y. The salicylic acid treatment revealed that StMKK6 is regulated by the hormone that is in agreement with the salicylic acid-regulated domains found in the StMKK6 promoter. The involvement of StMKK6 in potato defence response was confirmed by localisation studies, where StMKK6 accumulated strongly only in Potato-virus-Y-infected plants, and predominantly in the cell nucleus. Using a yeast two-hybrid method, we identified three StMKK6 targets downstream in the MAPK cascade: StMAPK4_2, StMAPK6 and StMAPK13. These data together provide further insight into the StMKK6 signalling module and its involvement in plant defence. PMID:25111695

  5. BioSense/SR-BioSpectra demonstrations of wide area/early warning for bioaerosol threats: program description and early test and evaluation results

    NASA Astrophysics Data System (ADS)

    Simard, Jean-Robert; Buteau, Sylvie; Lahaie, Pierre; Mathieu, Pierre; Roy, Gilles; Nadeau, Denis; McFee, John; Ho, Jim; Rowsell, Susan; Ho, Nicolas; Babin, François; Cantin, Daniel; Healey, Dave; Robinson, Jennifer; Wood, Scott; Hsu, Jack

    2011-11-01

    Threats associated with bioaerosol weapons have been around for several decades and have been mostly associated with terrorist activities or rogue nations. Up to the turn of the millennium, defence concepts against such menaces relied mainly on point or in-situ detection technologies. Over the last 10 years, significant efforts have been deployed by multiple countries to supplement the limited spatial coverage of a network of one or more point bio-detectors using lidar technology. The addition of such technology makes it possible to detect within seconds suspect aerosol clouds over area of several tens of square kilometers and track their trajectories. These additional capabilities are paramount in directing presumptive ID missions, mapping hazardous areas, establishing efficient counter-measures and supporting subsequent forensic investigations. In order to develop such capabilities, Defence Research and Development Canada (DRDC) and the Chemical, Biological, Radiological-Nuclear, and Explosives Research and Technology Initiative (CRTI) have supported two major demonstrations based on spectrally resolved Laser Induced Fluorescence (LIF) lidar: BioSense, aimed at defence military missions in wide open spaces, and SR-BioSpectra, aimed at surveillance of enclosed or semienclosed wide spaces common to defence and public security missions. This article first reviews briefly the modeling behind these demonstration concepts. Second, the lidar-adapted and the benchtop bioaerosol LIF chambers (BSL1), developed to challenge the constructed detection systems and to accelerate the population of the library of spectral LIF properties of bioaerosols and interferents of interest, will be described. Next, the most recent test and evaluation (T&E) results obtained with SR-BioSpectra and BioSense are reported. Finally, a brief discussion stating the way ahead for a complete defence suite is provided.

  6. Hot spots in a wired world: WHO surveillance of emerging and re-emerging infectious diseases.

    PubMed

    Heymann, D L; Rodier, G R

    2001-12-01

    The resurgence of the microbial threat, rooted in several recent trends, has increased the vulnerability of all nations to the risk of infectious diseases, whether newly emerging, well-established, or deliberately caused. Infectious disease intelligence, gleaned through sensitive surveillance, is the best defence. The epidemiological and laboratory techniques needed to detect, investigate, and contain a deliberate outbreak are the same as those used for natural outbreaks. In April 2000, WHO formalised an infrastructure (the Global Outbreak Alert and Response Network) for responding to the heightened need for early awareness of outbreaks and preparedness to respond. The Network, which unites 110 existing networks, is supported by several new mechanisms and a computer-driven tool for real time gathering of disease intelligence. The procedure for outbreak alert and response has four phases: systematic detection, outbreak verification, real time alerts, and rapid response. For response, the framework uses different strategies for combating known risks and unexpected events, and for improving both global and national preparedness. New forces at work in an electronically interconnected world are beginning to break down the traditional reluctance of countries to report outbreaks due to fear of the negative impact on trade and tourism. About 65% of the world's first news about infectious disease events now comes from informal sources, including press reports and the internet.

  7. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    PubMed

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  8. Genetic control of an epigenetic cell degeneration syndrome in Podospora anserina.

    PubMed

    Haedens, Vicki; Malagnac, Fabienne; Silar, Philippe

    2005-06-01

    Filamentous fungi frequently present degenerative processes, whose molecular basis is very often unknown. Here, we present three mutant screens that result in the identification of 29 genes that directly or indirectly control Crippled Growth (CG), an epigenetic cell degeneration of the filamentous ascomycete Podospora anserina. Two of these genes were previously shown to encode a MAP kinase kinase kinase and an NADPH oxidase involved in a signal transduction cascade that participates in stationary phase differentiations, fruiting body development and defence against fungal competitors. The numerous genes identified can be incorporated in a model in which CG results from the sustained activation of the MAP kinase cascade. Our data also emphasize the complex regulatory network underlying three interconnected processes in P. anserina: sexual reproduction, defence against competitors, and cell degeneration.

  9. Task Report for Task Authorization 1 for: Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2009-01-30

    tool written in Java to support the automated creation of simulated subnets. It can be run giving it a subnet, the number of hosts to create, the...network and can also be used to create subnets with specific profiles. Subnet Creator command line: > java –jar SubnetCreator.jar –j [path to client...command: > java –jar jss_client.jar com.mdacorporation.jndms.JSS.Client.JSSBatchClient [file] 5. Software: This is the output file that will store the

  10. Turbulence Model Effects on Cold-Gas Lateral Jet Interaction in a Supersonic Crossflow

    DTIC Science & Technology

    2014-06-01

    performance computing time from the U.S. Department of Defense (DOD) High Performance Computing Modernization program at the U.S. Army Research Laboratory... time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the...thanks Dr. Ross Chaplin , Defence Science Technology Laboratory, United Kingdom (UK), and Dr. David MacManus and Robert Christie, Cranfield University, UK

  11. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gunasekaran, Mahalakshmi; Periakaruppan, Subathra

    2017-06-01

    Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  12. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.

    PubMed

    Coventry, Lynne; Branley, Dawn

    2018-07-01

    Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Australian DefenceScience. Volume 16, Number 1, Autumn

    DTIC Science & Technology

    2008-01-01

    are carried via VOIP technology, and multicast IP traffic for audio -visual communications is also supported. The SSATIN system overall is seen to...Artificial Intelligence and Soft Computing Palma de Mallorca, Spain http://iasted.com/conferences/home-628.html 1 - 3 Sep 2008 Visualisation , Imaging and

  14. Astrium Technological Roadmaps for the Next Generation of Launchers Challenges

    NASA Astrophysics Data System (ADS)

    Larnac, Guy

    2014-06-01

    Main requirement on Ariane 6 are robustness, overall ownership cost and environmental impacts. To be able to meet these requirements it's mandatory to modify our usual way of working and to think the development and qualification of technologies differently. Airbus Defence and Space in the domain of materials, technologies and structures proposes a vision which address these points declined at different level:- Selection of key metallic and composite technologies to reduce drastically the cost of manufacturing,- Implementation of robust and economical way of assembly, promoting adhesive bonding and innovative technologies- Introducing virtual testing approach coupled with advanced methods and process simulation- Introduction of in-line monitoring to reduce cost of control- Implementation of the design for environment methodology with life cycle analysis to support the choice of technologies and materials- Development of EADS common materials to get benefice of aeronautic supply chain and communalitiesTo be efficient it seems evident and mandatory to develop all these approaches in an integrated and coordinated way. Advanced technologies and methodologies are supported by a strong network of collaboration enabling the integration of upstream ideas and concepts. This network is not only focused on low TRL level. Within EADS divisions intensive collaboration is deployed in order to get synergies. On the other side it's also mandatory for reliability and obsolescence issues to take care and master the supply chain.Additive layer manufacturing and thermoplastic based composite are directly concerned by this problematic. We present how, in the domain of materials and structures, aeronautic materials are considered first and how the mechanism of common qualification shared within EADS is now developed.This vision is being implemented within Airbus Defence and Space, described and reported through roadmaps. These roadmaps are the core of Airbus defence and Space strategies for the incoming years.

  15. Complexity Theory and Network Centric Warfare

    DTIC Science & Technology

    2003-09-01

    realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP...0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing...instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send

  16. Information Assurance and Cyber Defence (Assurance de l’information et cyberdefense)

    DTIC Science & Technology

    2010-11-01

    project is that knowledge exchange in a timely fashion is highly significant. Authentication and Authorisation of Users and Services in Federated...Detection, Protection and Countermeasures; • Security Models and Architectures; • Security Policies, Evaluation, Authorisation and Access Control; and...Evaluation, Authorisation and Access Control • Network and Information Security Awareness The topics for the symposium had been established

  17. An Experimental Investigation Into the Feasibility of Measuring Static and Dynamic Aerodynamic Derivatives in the DSTO Water Tunnel

    DTIC Science & Technology

    2013-08-01

    The SDM was subjected to forced small (0.5) sinusoidal pitching oscillations and derivatives were computed from measured model loads, angles of... aluminium alloy when subjected to both tensile and torsional loading. He joined the Aeronautical Research Laboratories (now called the Defence...oscillations and derivatives were computed from measured model loads, angles of attack, reduced frequency of oscillation and aircraft geometrical parameters

  18. Approach jamming effectiveness evaluation for surface-type infrared decoy in network centric warship formation

    NASA Astrophysics Data System (ADS)

    Lv, Mingshan

    2015-10-01

    The passive and photoelectrical jamming to anti-ship missile in the condition of network centric warship formation is an important research issue of fleet EW operation. An approach jamming method of shipborne surface-type infrared decoy countering the infrared image guided anti-ship missile is put forward. By analyzing the countering process the jamming effectiveness evaluation model is constructed. By simulation the method is proved t reasonable and effective. This method breaks through the traditional restrict that the passive and photoelectricity jamming measure can only be used in the end self-defence and provides a new method for network centric worship formation to support each other.

  19. Multi-channel, passive, short-range anti-aircraft defence system

    NASA Astrophysics Data System (ADS)

    Gapiński, Daniel; Krzysztofik, Izabela; Koruba, Zbigniew

    2018-01-01

    The paper presents a novel method for tracking several air targets simultaneously. The developed concept concerns a multi-channel, passive, short-range anti-aircraft defence system based on the programmed selection of air targets and an algorithm of simultaneous synchronisation of several modified optical scanning seekers. The above system is supposed to facilitate simultaneous firing of several self-guided infrared rocket missiles at many different air targets. From the available information, it appears that, currently, there are no passive self-guided seekers that fulfil such tasks. This paper contains theoretical discussions and simulations of simultaneous detection and tracking of many air targets by mutually integrated seekers of several rocket missiles. The results of computer simulation research have been presented in a graphical form.

  20. Mean-Field-Game Model for Botnet Defense in Cyber-Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kolokoltsov, V. N., E-mail: v.kolokoltsov@warwick.ac.uk; Bensoussan, A.

    We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customersmore » (say, switch on or out the defence system) is much faster that the infection rates.« less

  1. Foliar aphid feeding recruits rhizosphere bacteria and primes plant immunity against pathogenic and non-pathogenic bacteria in pepper.

    PubMed

    Lee, Boyoung; Lee, Soohyun; Ryu, Choong-Min

    2012-07-01

    Plants modulate defence signalling networks in response to different biotic stresses. The present study evaluated the effect of a phloem-sucking aphid on plant defence mechanisms in pepper (Capsicum annuum) during subsequent pathogen attacks on leaves and rhizosphere bacteria on roots. Plants were pretreated with aphids and/or the chemical trigger benzothiadiazol (BTH) 7 d before being challenged with two pathogenic bacteria, Xanthomonas axonopodis pv. vesicatoria (Xav) as a compatible pathogen and X. axonopodis pv. glycines (Xag) as an incompatible (non-host) pathogen. Disease severity was noticeably lower in aphid- and BTH + aphid-treated plants than in controls. Although treatment with BTH or aphids alone did not affect the hypersensitive response (HR) against Xag strain 8ra, the combination treatment had a synergistic effect on the HR. The aphid population was reduced by BTH pretreatment and by combination treatment with BTH and bacterial pathogens in a synergistic manner. Analysis of the expression of the defence-related genes Capsicum annum pathogenesis-related gene 9 (CaPR9), chitinase 2 (CaCHI2), SAR8·2 and Lipoxygenase1 (CaLOX1) revealed that aphid infestation resulted in the priming of the systemic defence responses against compatible and incompatible pathogens. Conversely, pre-challenge with the compatible pathogen Xav on pepper leaves significantly reduced aphid numbers. Aphid infestation increased the population of the beneficial Bacillus subtilis GB03 but reduced that of the pathogenic Ralstonia solanacearum SL1931. The expression of defence-related genes in the root and leaf after aphid feeding indicated that the above-ground aphid infestation elicited salicylic acid and jasmonic acid signalling throughout the whole plant. The findings of this study show that aphid feeding elicits plant resistance responses and attracts beneficial bacterial populations to help the plant cope with subsequent pathogen attacks.

  2. Foliar aphid feeding recruits rhizosphere bacteria and primes plant immunity against pathogenic and non-pathogenic bacteria in pepper

    PubMed Central

    Lee, Boyoung; Lee, Soohyun; Ryu, Choong-Min

    2012-01-01

    Background and Aims Plants modulate defence signalling networks in response to different biotic stresses. The present study evaluated the effect of a phloem-sucking aphid on plant defence mechanisms in pepper (Capsicum annuum) during subsequent pathogen attacks on leaves and rhizosphere bacteria on roots. Methods Plants were pretreated with aphids and/or the chemical trigger benzothiadiazol (BTH) 7 d before being challenged with two pathogenic bacteria, Xanthomonas axonopodis pv. vesicatoria (Xav) as a compatible pathogen and X. axonopodis pv. glycines (Xag) as an incompatible (non-host) pathogen. Key Results Disease severity was noticeably lower in aphid- and BTH + aphid-treated plants than in controls. Although treatment with BTH or aphids alone did not affect the hypersensitive response (HR) against Xag strain 8ra, the combination treatment had a synergistic effect on the HR. The aphid population was reduced by BTH pretreatment and by combination treatment with BTH and bacterial pathogens in a synergistic manner. Analysis of the expression of the defence-related genes Capsicum annum pathogenesis-related gene 9 (CaPR9), chitinase 2 (CaCHI2), SAR8·2 and Lipoxygenase1 (CaLOX1) revealed that aphid infestation resulted in the priming of the systemic defence responses against compatible and incompatible pathogens. Conversely, pre-challenge with the compatible pathogen Xav on pepper leaves significantly reduced aphid numbers. Aphid infestation increased the population of the beneficial Bacillus subtilis GB03 but reduced that of the pathogenic Ralstonia solanacearum SL1931. The expression of defence-related genes in the root and leaf after aphid feeding indicated that the above-ground aphid infestation elicited salicylic acid and jasmonic acid signalling throughout the whole plant. Conclusions The findings of this study show that aphid feeding elicits plant resistance responses and attracts beneficial bacterial populations to help the plant cope with subsequent pathogen attacks. PMID:22437662

  3. The Mathematics of the Brain

    DTIC Science & Technology

    2009-05-27

    should not be interpreted as representing the official policies, either expressed or implied, of the Defence Advanced Research Project Agency or the... neurobiological interpretation of E-states? 36 8.5 The statistical molecular dynamics of E-states 37 8.6 The C++ program EPMM 40 9 Promising...have an intuitive link between E-machines and neural networks. Such a link provides a source of neurobiological heuristic considerations for the design

  4. Australian DefenceScience. Volume 15, Number 4, Summer

    DTIC Science & Technology

    2007-01-01

    components, the magnesium alloy gear box case and numerous connectors in the avionics systems, that are susceptible. “When considering ways to alleviate...with associated structural properties . The elements are linked to each other by mathematical equations that determine the response to ANZACS...intellectual property , secondment of industry staff to the JDSSC and ways of making network connections with industry facilities. The facility is

  5. Trade-offs between constitutive and induced defences drive geographical and climatic clines in pine chemical defences.

    PubMed

    Moreira, Xoaquín; Mooney, Kailen A; Rasmann, Sergio; Petry, William K; Carrillo-Gavilán, Amparo; Zas, Rafael; Sampedro, Luis

    2014-05-01

    There is increasing evidence that geographic and climatic clines drive the patterns of plant defence allocation and defensive strategies. We quantified early growth rate and both constitutive and inducible chemical defences of 18 Pinaceae species in a common greenhouse environment and assessed their defensive allocation with respect to each species' range across climatic gradients spanning 31° latitude and 2300 m elevation. Constitutive defences traded-off with induced defences, and these defensive strategies were associated with growth rate such that slow-growing species invested more in constitutive defence, whereas fast-growing species invested more in inducible defence. The position of each pine species along this trade-off axis was in turn associated with geography; moving poleward and to higher elevations, growth rate and inducible defences decreased, while constitutive defence increased. These geographic patterns in plant defence were most strongly associated with variation in temperature. Climatic and geographical clines thus act as drivers of defence profiles by mediating the constraints imposed by trade-offs, and this dynamic underlays global patterns of defence allocation.

  6. Applications of the IRI in Southern Africa

    NASA Astrophysics Data System (ADS)

    Coetzee, P. J.

    2004-01-01

    The IRI forms the basis of the Single Site Location Direction Finding networks of the South African Defence Force as well as theNational Intelligence Agency. It is also used in "Path Analysis" applications where the possible transmitter coverage is calculated. Another application of the IRI is in HF frequency predictions, especially for the South African Defence Force involved in peace keeping duties in Africa. The IRI is either used independently or in conjunction with vertical ionosondes. In the latter case the scaled F2 peak parameters (foF2, hmF2) are used as inputs to the IRI. The IRI thus gets "calibrated" to extend the area covered by the ionosonde(s). The IRI has proved to be a very important tool in South Africa and Africa in the fight against crime, drug trafficking, political instability and maintaining the peace in potentially unstable countries.

  7. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

    PubMed Central

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-01-01

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks. PMID:27754380

  8. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    PubMed

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  9. First Steps towards an Interactive Real-Time Hazard Management Simulation

    ERIC Educational Resources Information Center

    Gemmell, Alastair M. D.; Finlayson, Ian G.; Marston, Philip G.

    2010-01-01

    This paper reports on the construction and initial testing of a computer-based interactive flood hazard management simulation, designed for undergraduates taking an applied geomorphology course. Details of the authoring interface utilized to create the simulation are presented. Students act as the managers of civil defence utilities in a fictional…

  10. User’s Guide for SHIPINT - A Computer Program to Compute Two Ship Interaction in Waves

    DTIC Science & Technology

    1996-08-01

    P500693.PDF [Page: 1 of 84] Image Cover Sheet CLASSIFICATION SYSTEM NUMBER 500693 UNCLASSIFIED I llllll 111111111111111111111111111111111 TITLE...Halifax, Nova Scotia, Canada B3J 2X4 1 ---------· CONTRACTOR REPORT I I I I I iii;,"’: · 1 Defence Research Establishment Atlantic Canada...SUMMARY 1 Introduction 2 Coordinate Systems and Two Ship Motions 3 Flow Chart 4 Input Data File Description 4.1 shipint.in ........ . 4.2 paneLa.in

  11. Mobile Ad Hoc Networks: An Evaluation of Smartphone Technologies

    DTIC Science & Technology

    2011-10-01

    National Defence, 2011 c© Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 Abstract A...déploiement de protocoles au cours d’opérations des FC ; 4. le développement d’une implémentation de validation de principe sur un téléphone

  12. Defence Test and Evaluation Roadmap

    DTIC Science & Technology

    2008-01-01

    T&E can be employed to prove, demonstrate or assess the ability of proposed and existing capability systems, new or upgraded, to satisfy specified...t&e T&E is a process to obtain information to support the objective assessment of a Capability System with known confidence, and to confirm whether...for the ADF is a ‘balanced, networked, and deployable force, staffed by dedicated and professional people, that operates within a culture of

  13. Quantifying the Benefits of NEC

    DTIC Science & Technology

    2005-04-01

    R UNCLASSIFIED/UNLIMITED Quantifying the Benefits of NEC Georgia Court and Lynda CM Sharp Dstl/UK MoD A2 Building, Dstl Farnborough Ively...transformation of UK forces is dependent on exploiting the benefits of Network Enabled Capability (NEC). The white paper notes that NEC, through... benefit to defence; • what can be traded off to pay for it; • what changes are required to processes, structures, equipment etc, to deliver the

  14. Business continuity strategies for cyber defence: battling time and information overload.

    PubMed

    Streufert, John

    2010-11-01

    Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

  15. Intraspecific variation in a generalist herbivore accounts for differential induction and impact of host plant defences

    PubMed Central

    Kant, Merijn R; Sabelis, Maurice W; Haring, Michel A; Schuurink, Robert C

    2007-01-01

    Plants and herbivores are thought to be engaged in a coevolutionary arms race: rising frequencies of plants with anti-herbivore defences exert pressure on herbivores to resist or circumvent these defences and vice versa. Owing to its frequency-dependent character, the arms race hypothesis predicts that herbivores exhibit genetic variation for traits that determine how they deal with the defences of a given host plant phenotype. Here, we show the existence of distinct variation within a single herbivore species, the spider mite Tetranychus urticae, in traits that lead to resistance or susceptibility to jasmonate (JA)-dependent defences of a host plant but also in traits responsible for induction or repression of JA defences. We characterized three distinct lines of T. urticae that differentially induced JA-related defence genes and metabolites while feeding on tomato plants (Solanum lycopersicum). These lines were also differently affected by induced JA defences. The first line, which induced JA-dependent tomato defences, was susceptible to those defences; the second line also induced JA defences but was resistant to them; and the third, although susceptible to JA defences, repressed induction. We hypothesize that such intraspecific variation is common among herbivores living in environments with a diversity of plants that impose diverse selection pressure. PMID:18055390

  16. Electrostatically defined isolated domain wall in integer quantum Hall regime as precursor for reconfigurable Majorana network

    NASA Astrophysics Data System (ADS)

    Kazakov, Alexander; Simion, George; Kolkovsky, Valery; Adamus, Zbigniew; Karczewski, Grzegorz; Wojtowicz, Tomasz; Lyanda-Geller, Yuli; Rokhinson, Leonid

    Development of a two-dimensional systems with reconfigurable one-dimensional topological superconductor channels became primary direction in experimental branch of Majorana physics. Such system would allow to probe non-Abelian properties of Majorana quasiparticles and realize the ultimate goal of Majorana research - topological qubit for topologically protected quantum computations. In order to create and exchange Majorana quasiparticles desired system may be spin-full, but fermion doubling should be lifted. These requirements may be fulfilled in domain walls (DW) which are formed during quantum Hall ferromagnet (QHF) transition when two Landau levels with opposite spin polarization become degenerate. We developed a system based on CdMnTe quantum well with engineered placement of Mn ions where exchange interaction and, consequently, QHF transition can be controlled by electrostatic gating. Using electrostatic control of exchange we create conductive channels of DWs which, unlike conventional edge channels, are not chiral and should contain both spin polarizations. We will present results on the formation of isolated DWs of various widths and discuss their transport properties. Department of Defence Office of Naval research Award N000141410339.

  17. Electronic Transfer of Information and Its Impact on Aerospace and Defence Research and Development Held in the Technical Information Panel Specialists’ Meeting, Brussels, Belgium on 17-19 October 1989

    DTIC Science & Technology

    1990-03-01

    Electronic Storage and Dclivery: On-going Experiments and Operational Systeils S, esjon ill - Electronic Publishing and (’ ommunication : On-going...to information - patent information - tourism information - information on standards - road transport information - cooperation between libraries. By...neutral European system for tourism information - touring information system (hotels, aocommodations) - information network for fairs and congresses

  18. Design and Evaluation of the MINTACS SeeTrack Exchange (MINSTE) Concept Demonstrator

    DTIC Science & Technology

    2009-04-01

    software products . URL - http://www.esri.com/ 3 The Technical Cooperation Program (TTCP) is an international organisation that collaborates in defence...off-the-shelf (COTS) products . This provides a basis for implementing interoperability across application, vendor and organisation boundaries. XML...Network a suite of data analysis tools, such as ArcGIS products : 15 DSTO-GD-0574 “…represents a great opportunity for the bringing together of a COP

  19. RSRE (Royal Signals and Radar Establishment) 1985 Research Review,

    DTIC Science & Technology

    1985-01-01

    together with a 4-pulse canceller having signal processing allows adequate height time varied weighting . Temporal threshold accuracy and performance in...figure of 10 dB systems and is included within the Contraves achieved. Signal processing and target Seaguard defence system. It is a declaration are...6). This array is Taylor weighted by the t strip-line feed network to produce -29 dB Naval/Marine Radar first azimuthal sidelobe. The cosec2 low

  20. Life-history constraints in grassland plant species: a growth-defence trade-off is the norm

    Treesearch

    E.M. Lind; E.T. Borer; E.W. Seabloom; P.B. Adler; J.D. Bakker; D.M. Blumenthal; M. Crawley; K.F. Davies; J. Firn; D.S. Gruner; S. Harpole; Y. Hautier; H. Hillebrand; J.M.H. Knops; B.A. Melbourne; B. Mortensen; A.C. Risch; M. Schuetz; C.J. Stevens; P.D. Wragg

    2013-01-01

    Plant growth can be limited by resource acquisition and defence against consumers, leading to contrasting trade-off possibilities. The competition-defence hypothesis posits a trade-off between competitive ability and defence against enemies (e.g. herbivores and pathogens). The growth-defence hypothesis suggests that strong competitors for nutrients are also defended...

  1. Defence electro-optics: European perspective

    NASA Astrophysics Data System (ADS)

    Hartikainen, Jari

    2011-11-01

    In 2009 the United States invested in defence R&T 3,6 times and in defence research and development 6,8 times as much as all member states of the European Defence Agency (EDA) combined while the ratio in the total defence expenditure was 2,6 in the US' favour. The European lack of investments in defence research and development has a negative impact on the competitiveness of European defence industry and on the European non-dependence. In addition, the efficiency of investment is reduced due to duplication of work in different member states. The Lisbon Treaty tasks EDA to support defence technology research, and coordinate and plan joint research activities and the study of technical solutions meeting future operational needs. This paper gives an overview how EDA meets the challenge of improving the efficiency of European defence R&T investment with an emphasis on electro-optics and describes shortly the ways that governmental and industrial partners can participate in the EDA cooperation. Examples of joint R&T projects addressing electro-optics are presented.

  2. Manual of Documentation Practices Applicable to Defence-Aerospace Scientific and Technical Information. Volume 1. Section 1 - Acquisition and Sources. Section 2 - Descriptive Cataloguing. Section 3 - Abstracting and Subject Analysis

    DTIC Science & Technology

    1978-08-01

    weeding I I ORGANISATION & MANAGEMENT Aims and objectives, staffing, promotional activities, identifying u;ers 12 NETWORKS & EXTERNAL SOURCES OF...Acquisition Clerks with typing capability are required for meticulous recordkeeping. Typing capability of 50 words per minute and a working knowledge ...81 Adminhistration and Management Includes management planning and research. 64 Numerical Analysis Includes iteration, difference equations, and 82

  3. Costs and limits of dosage response to predation risk: to what extent can tadpoles invest in anti-predator morphology?

    PubMed

    Teplitsky, Céline; Plénet, Sandrine; Joly, Pierre

    2005-09-01

    Inducible defences have long been considered as a polyphenism opposing defended and undefended morphs. However, in nature, preys are exposed to various levels of predation risk and scale their investment in defence to actual predation risk. Still, among the traits that are involved in the defence, some are specific to one predator type while others act as a more generalised defence. The existence of defence costs could prevent an individual investing in all these traits simultaneously. In this study, we investigate the impact of an increasing level of predator density (stickleback, Gasterosteus aculeatus) on the expression of morphological inducible defences in tadpoles of Rana dalmatina. In this species, investment in tail length and tail muscle is a stickleback-specific response while increased tail fin depth is a more general defence. As expected, we found a relationship between investment in defence and level of risk through the responses of tail fin depth and tail length. We also found an exponential increase of defence cost, notably expressed by convex decrease of growth and developmental rates. We found a relative independence of investment in the different traits that compose the defence, revealing a high potential for fine tuning the expression of defended phenotypes with respect to local ecological conditions.

  4. Proceedings of the Ground Target Modeling and Validation Conference (13th) Held in Houghton, MI on 5-8 August 2002

    DTIC Science & Technology

    2002-08-01

    excessively high aspect ratio, the forward region of the original model was removed. The final grid (rear half) had 383104 computational cells compared...45 Session III: Thermal Signature Modeling and Validation Session...Chair: Dr. Dieter Clement, FGAN-FOM " Modeling the Thermal Signature of Natural Backgrounds" Marius Gamborg, Norwegian Defence Research Establishm

  5. The Case to Widen Defence Acquisition Research Paradigms

    DTIC Science & Technology

    2012-04-30

    achieved in the delivery of government services (Steger & Roy, 2010). In the 1980s , the United Kingdom (UK) government gave expression to...motivation to work across conceptual divides as new knowledge and ideas are often generated within the spaces between disciplines ( Hislop , 2009). The...Advances in computers (pp. 293–392), 34. Hislop , D. (2009). Knowledge management in organizations: A critical introduction. Oxford, UK: Oxford

  6. All Hazards Risk Assessment Transition Project: Report on Capability Assessment Management System (CAMS) Automation

    DTIC Science & Technology

    2014-04-01

    All Hazards Risk Assessment Transition Project : Report on Capability Assessment Management System (CAMS) Automation...Prepared by: George Giroux Computer Applications Specialist Modis155 Queen Street, Suite 1206 Ottawa, ON K1P 6L1 Contract # THS 2335474-2 Project ...Under a Canadian Safety and Security Program (CSSP) targeted investigation (TI) project (CSSP-2012-TI- 1108), Defence Research and Development

  7. Induced defences in plants reduce herbivory by increasing cannibalism.

    PubMed

    Orrock, John; Connolly, Brian; Kitchen, Anthony

    2017-08-01

    Plants are attacked by myriad herbivores, and many plants exhibit anti-herbivore defences. We tested the hypothesis that induced defences benefit tomato plants by encouraging insects to eat other members of their species. We found that defences that promote cannibalism benefit tomatoes in two ways: cannibalism directly reduces herbivore abundance, and cannibals eat significantly less plant material. This previously unknown means of defence may alter plant-herbivore dynamics, plant evolution and pathogen transmission.

  8. Testing the optimal defence hypothesis for two indirect defences: extrafloral nectar and volatile organic compounds

    PubMed Central

    Radhika, Venkatesan; Kost, Christian; Bartram, Stefan; Heil, Martin

    2008-01-01

    Many plants respond to herbivory with an increased production of extrafloral nectar (EFN) and/or volatile organic compounds (VOCs) to attract predatory arthropods as an indirect defensive strategy. In this study, we tested whether these two indirect defences fit the optimal defence hypothesis (ODH), which predicts the within-plant allocation of anti-herbivore defences according to trade-offs between growth and defence. Using jasmonic acid-induced plants of Phaseolus lunatus and Ricinus communis, we tested whether the within-plant distribution pattern of these two indirect defences reflects the fitness value of the respective plant parts. Furthermore, we quantified photosynthetic rates and followed the within-plant transport of assimilates with 13C labelling experiments. EFN secretion and VOC emission were highest in younger leaves. Moreover, the photosynthetic rate increased with leaf age, and pulse-labelling experiments suggested transport of carbon to younger leaves. Our results demonstrate that the ODH can explain the within-plant allocation pattern of both indirect defences studied. PMID:18493790

  9. V2010 Security Planning and Operations: A Social Network Study of Key Information Sharing Relationships

    DTIC Science & Technology

    2011-05-01

    la scurit. Je vous remercie de votre temps et de votre contribution. Susan G. McIntyre Knowledge Management/ Gestion du savoir...National Defence, 2011 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 DRDC CSS TR 2011...avantages du renforcement de la communication horizontale au sein du gouvernement fédéral, surtout en présence d’organismes de

  10. Mechanisms and ecological consequences of plant defence induction and suppression in herbivore communities

    PubMed Central

    Kant, M. R.; Jonckheere, W.; Knegt, B.; Lemos, F.; Liu, J.; Schimmel, B. C. J.; Villarroel, C. A.; Ataide, L. M. S.; Dermauw, W.; Glas, J. J.; Egas, M.; Janssen, A.; Van Leeuwen, T.; Schuurink, R. C.; Sabelis, M. W.; Alba, J. M.

    2015-01-01

    Background Plants are hotbeds for parasites such as arthropod herbivores, which acquire nutrients and energy from their hosts in order to grow and reproduce. Hence plants are selected to evolve resistance, which in turn selects for herbivores that can cope with this resistance. To preserve their fitness when attacked by herbivores, plants can employ complex strategies that include reallocation of resources and the production of defensive metabolites and structures. Plant defences can be either prefabricated or be produced only upon attack. Those that are ready-made are referred to as constitutive defences. Some constitutive defences are operational at any time while others require activation. Defences produced only when herbivores are present are referred to as induced defences. These can be established via de novo biosynthesis of defensive substances or via modifications of prefabricated substances and consequently these are active only when needed. Inducibility of defence may serve to save energy and to prevent self-intoxication but also implies that there is a delay in these defences becoming operational. Induced defences can be characterized by alterations in plant morphology and molecular chemistry and are associated with a decrease in herbivore performance. These alterations are set in motion by signals generated by herbivores. Finally, a subset of induced metabolites are released into the air as volatiles and function as a beacon for foraging natural enemies searching for prey, and this is referred to as induced indirect defence. Scope The objective of this review is to evaluate (1) which strategies plants have evolved to cope with herbivores and (2) which traits herbivores have evolved that enable them to counter these defences. The primary focus is on the induction and suppression of plant defences and the review outlines how the palette of traits that determine induction/suppression of, and resistance/susceptibility of herbivores to, plant defences can give rise to exploitative competition and facilitation within ecological communities “inhabiting” a plant. Conclusions Herbivores have evolved diverse strategies, which are not mutually exclusive, to decrease the negative effects of plant defences in order to maximize the conversion of plant material into offspring. Numerous adaptations have been found in herbivores, enabling them to dismantle or bypass defensive barriers, to avoid tissues with relatively high levels of defensive chemicals or to metabolize these chemicals once ingested. In addition, some herbivores interfere with the onset or completion of induced plant defences, resulting in the plant’s resistance being partly or fully suppressed. The ability to suppress induced plant defences appears to occur across plant parasites from different kingdoms, including herbivorous arthropods, and there is remarkable diversity in suppression mechanisms. Suppression may strongly affect the structure of the food web, because the ability to suppress the activation of defences of a communal host may facilitate competitors, whereas the ability of a herbivore to cope with activated plant defences will not. Further characterization of the mechanisms and traits that give rise to suppression of plant defences will enable us to determine their role in shaping direct and indirect interactions in food webs and the extent to which these determine the coexistence and persistence of species. PMID:26019168

  11. When killing isn't murder: psychiatric and psychological defences to murder when the insanity defence is not applicable.

    PubMed

    Samuels, Anthony; O'Driscoll, Colmán; Allnutt, Stephen

    2007-12-01

    This paper describes psychiatric and psychological defences to murder where the defence of insanity is not applicable. The charges of murder and manslaughter are outlined. Self-defence, sane and insane automatism, provocation, diminished responsibility, duress, necessity and novel defences are discussed. The complexities of psychological and psychiatric expert evidence are highlighted as well as the fact that legal decisions are not always consistent with medical or scientific theory. It is concluded that this is a controversial and evolving area of mental health law and mental health professionals have an educative role and a responsibility to provide testimony that is supported by the best possible evidence.

  12. Express yourself: bold individuals induce enhanced morphological defences

    PubMed Central

    Hulthén, Kaj; Chapman, Ben B.; Nilsson, P. Anders; Hollander, Johan; Brönmark, Christer

    2014-01-01

    Organisms display an impressive array of defence strategies in nature. Inducible defences (changes in morphology and/or behaviour within a prey's lifetime) allow prey to decrease vulnerability to predators and avoid unnecessary costs of expression. Many studies report considerable interindividual variation in the degree to which inducible defences are expressed, yet what underlies this variation is poorly understood. Here, we show that individuals differing in a key personality trait also differ in the magnitude of morphological defence expression. Crucian carp showing risky behaviours (bold individuals) expressed a significantly greater morphological defence response when exposed to a natural enemy when compared with shy individuals. Furthermore, we show that fish of different personality types differ in their behavioural plasticity, with shy fish exhibiting greater absolute plasticity than bold fish. Our data suggest that individuals with bold personalities may be able to compensate for their risk-prone behavioural type by expressing enhanced morphological defences. PMID:24335987

  13. A quantitative trait locus for recognition of foreign eggs in the host of a brood parasite.

    PubMed

    Martín-Gálvez, D; Soler, J J; Martínez, J G; Krupa, A P; Richard, M; Soler, M; Møller, A P; Burke, T

    2006-03-01

    Avian brood parasites reduce the reproductive output of their hosts and thereby select for defence mechanisms such as ejection of parasitic eggs. Such defence mechanisms simultaneously select for counter-defences in brood parasites, causing a coevolutionary arms race. Although coevolutionary models assume that defences and counter-defences are genetically influenced, this has never been demonstrated for brood parasites. Here, we give strong evidence for genetic differences between ejector and nonejectors, which could allow the study of such host defence at the genetic level, as well as studies of maintenance of genetic variation in defences. Briefly, we found that magpies, that are the main host of the great spotted cuckoo in Europe, have alleles of one microsatellite locus (Ase64) that segregate between accepters and rejecters of experimental parasitic eggs. Furthermore, differences in ejection rate among host populations exploited by the brood parasite covaried significantly with the genetic distance for this locus.

  14. The homeostatic astroglia emerges from evolutionary specialization of neural cells

    PubMed Central

    Verkhratsky, Alexei; Nedergaard, Maiken

    2016-01-01

    Evolution of the nervous system progressed through cellular diversification and specialization of functions. Conceptually, the nervous system is composed from electrically excitable neuronal networks connected with chemical synapses and non-excitable glial cells that provide for homeostasis and defence. Astrocytes are integrated into neural networks through multipartite synapses; astroglial perisynaptic processes closely enwrap synaptic contacts and control homeostasis of the synaptic cleft, supply neurons with glutamate and GABA obligatory precursor glutamine and contribute to synaptic plasticity, learning and memory. In neuropathology, astrocytes may undergo reactive remodelling or degeneration; to a large extent, astroglial reactions define progression of the pathology and neurological outcome. This article is part of the themed issue ‘Evolution brings Ca2+ and ATP together to control life and death’. PMID:27377722

  15. Simple growth patterns can create complex trajectories for the ontogeny of constitutive chemical defences in seaweeds.

    PubMed

    Paul, Nicholas A; Svensson, Carl Johan; de Nys, Rocky; Steinberg, Peter D

    2014-01-01

    All of the theory and most of the data on the ecology and evolution of chemical defences derive from terrestrial plants, which have considerable capacity for internal movement of resources. In contrast, most macroalgae--seaweeds--have no or very limited capacity for resource translocation, meaning that trade-offs between growth and defence, for example, should be localised rather than systemic. This may change the predictions of chemical defence theories for seaweeds. We developed a model that mimicked the simple growth pattern of the red seaweed Asparagopsis armata which is composed of repeating clusters of somatic cells and cells which contain deterrent secondary chemicals (gland cells). To do this we created a distinct growth curve for the somatic cells and another for the gland cells using empirical data. The somatic growth function was linked to the growth function for defence via differential equations modelling, which effectively generated a trade-off between growth and defence as these neighbouring cells develop. By treating growth and defence as separate functions we were also able to model a trade-off in growth of 2-3% under most circumstances. However, we found contrasting evidence for this trade-off in the empirical relationships between growth and defence, depending on the light level under which the alga was cultured. After developing a model that incorporated both branching and cell division rates, we formally demonstrated that positive correlations between growth and defence are predicted in many circumstances and also that allocation costs, if they exist, will be constrained by the intrinsic growth patterns of the seaweed. Growth patterns could therefore explain contrasting evidence for cost of constitutive chemical defence in many studies, highlighting the need to consider the fundamental biology and ontogeny of organisms when assessing the allocation theories for defence.

  16. C2 Approaches: Looking for the Sweet Spot

    DTIC Science & Technology

    2013-06-01

    more information) IMAGE (see Lizotte et al., 2008; Lizotte, Bernier, Mokhtari , & Boivin, 2013) was developed as a suite of generic representation...439–446). Fukuoka, Japan. Lizotte, M., Bernier, F., Mokhtari , M., & Boivin, E. (2013). IMAGE Final Report: An Interactive Computer-aided Cognition...Capability for C4ISR Complexity Discovery (No. TR 2013-397). Québec, Canada: Defence R&D Canada - Valcartier. Lizotte, M., Bernier, F., Mokhtari , M

  17. Mechanisms and ecological consequences of plant defence induction and suppression in herbivore communities.

    PubMed

    Kant, M R; Jonckheere, W; Knegt, B; Lemos, F; Liu, J; Schimmel, B C J; Villarroel, C A; Ataide, L M S; Dermauw, W; Glas, J J; Egas, M; Janssen, A; Van Leeuwen, T; Schuurink, R C; Sabelis, M W; Alba, J M

    2015-06-01

    Plants are hotbeds for parasites such as arthropod herbivores, which acquire nutrients and energy from their hosts in order to grow and reproduce. Hence plants are selected to evolve resistance, which in turn selects for herbivores that can cope with this resistance. To preserve their fitness when attacked by herbivores, plants can employ complex strategies that include reallocation of resources and the production of defensive metabolites and structures. Plant defences can be either prefabricated or be produced only upon attack. Those that are ready-made are referred to as constitutive defences. Some constitutive defences are operational at any time while others require activation. Defences produced only when herbivores are present are referred to as induced defences. These can be established via de novo biosynthesis of defensive substances or via modifications of prefabricated substances and consequently these are active only when needed. Inducibility of defence may serve to save energy and to prevent self-intoxication but also implies that there is a delay in these defences becoming operational. Induced defences can be characterized by alterations in plant morphology and molecular chemistry and are associated with a decrease in herbivore performance. These alterations are set in motion by signals generated by herbivores. Finally, a subset of induced metabolites are released into the air as volatiles and function as a beacon for foraging natural enemies searching for prey, and this is referred to as induced indirect defence. The objective of this review is to evaluate (1) which strategies plants have evolved to cope with herbivores and (2) which traits herbivores have evolved that enable them to counter these defences. The primary focus is on the induction and suppression of plant defences and the review outlines how the palette of traits that determine induction/suppression of, and resistance/susceptibility of herbivores to, plant defences can give rise to exploitative competition and facilitation within ecological communities "inhabiting" a plant. Herbivores have evolved diverse strategies, which are not mutually exclusive, to decrease the negative effects of plant defences in order to maximize the conversion of plant material into offspring. Numerous adaptations have been found in herbivores, enabling them to dismantle or bypass defensive barriers, to avoid tissues with relatively high levels of defensive chemicals or to metabolize these chemicals once ingested. In addition, some herbivores interfere with the onset or completion of induced plant defences, resulting in the plant's resistance being partly or fully suppressed. The ability to suppress induced plant defences appears to occur across plant parasites from different kingdoms, including herbivorous arthropods, and there is remarkable diversity in suppression mechanisms. Suppression may strongly affect the structure of the food web, because the ability to suppress the activation of defences of a communal host may facilitate competitors, whereas the ability of a herbivore to cope with activated plant defences will not. Further characterization of the mechanisms and traits that give rise to suppression of plant defences will enable us to determine their role in shaping direct and indirect interactions in food webs and the extent to which these determine the coexistence and persistence of species. © The Author 2015. Published by Oxford University Press on behalf of the Annals of Botany Company. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Performance Parameters Analysis of an XD3P Peugeot Engine Using Artificial Neural Networks (ANN) Concept in MATLAB

    NASA Astrophysics Data System (ADS)

    Rangaswamy, T.; Vidhyashankar, S.; Madhusudan, M.; Bharath Shekar, H. R.

    2015-04-01

    The current trends of engineering follow the basic rule of innovation in mechanical engineering aspects. For the engineers to be efficient, problem solving aspects need to be viewed in a multidimensional perspective. One such methodology implemented is the fusion of technologies from other disciplines in order to solve the problems. This paper mainly deals with the application of Neural Networks in order to analyze the performance parameters of an XD3P Peugeot engine (used in Ministry of Defence). The basic propaganda of the work is divided into two main working stages. In the former stage, experimentation of an IC engine is carried out in order to obtain the primary data. In the latter stage the primary database formed is used to design and implement a predictive neural network in order to analyze the output parameters variation with respect to each other. A mathematical governing equation for the neural network is obtained. The obtained polynomial equation describes the characteristic behavior of the built neural network system. Finally, a comparative study of the results is carried out.

  19. Virtual war, military revolutions, and networks: a guide through the concepts from an Australian perspective

    NASA Astrophysics Data System (ADS)

    Bowley, Dean K.; Gaertner, Paul S.

    2003-07-01

    In this paper the argument is made that the offensive fire support organisation and doctrine, born of the "indirect fire revolution" of the first world war, is the start point for distributed sensors, shooters and deciders that may be transferred to a joint force; that the culture of directive control and mission orders developed by the German Army in 1918 and then adopted by most western armies is the start point for the culture required to achieve "self synchronisation" and that the network developed for the air defence of carrier battle groups is the start point for developing a networked ground manoeuvre force. We discuss the strategic expectations of network centric warfare, a "virtual war" scenario and the inherent vulnerabilities. The current level of understanding and implementation in specific areas is analysed and lessons for general application are developed and the potential payoff identified. Three broad operational domains are investigated, networked platform versus platform warfare between states, guerrilla/counter-insurfence operations and the emerging domain of "netwars" (terror organisations and criminal gangs).

  20. Validation of WBMOD in the Southeast Asian region

    NASA Astrophysics Data System (ADS)

    Cervera, M. A.; Thomas, R. M.; Groves, K. M.; Ramli, A. G.; Effendy

    2001-01-01

    The scintillation modeling code WBMOD, developed at North West Research, provides a global description of scintillation occurrence. However, the model has had limited calibration globally. Thus its performance in localized regions such as Australia-Southeast Asia is required to be evaluated. The Defence Science and Technology Organisation, Australia, in conjunction with Indonesian National Institute of Aeronautics and Space (LAPAN), Defence Science and Technology Centre, Malaysia, Air Force Research laboratory, United States, and IPS Radio and Space Services of Australia, has commissioned a network of GPS receivers to measure scintillation from sites in the region. One of the objectives of this deployment is to carry out a validation of WBMOD in the region. This paper describes the network of GPS receivers used to record the scintillation data. The details of the procedure used to validate WBMOD are given and results of the validation are presented for data collected during 1998 and 1999 from two sites, one situated in the southern anomaly region and the other situated near the geomagnetic equator. We found good overall agreement between WBMOD and the observations for low sunspot numbers at both sites, although some differences were noted, the major one being that the scintillation activity predicted by WBMOD tended to cut off too early in the night. At higher levels of sunspot activity, while WBMOD agreed with the observations in the southern anomaly region, we found that it significantly underestimated the level of scintillation activity at the geomagnetic equator.

  1. Down-regulation of plant defence in a resident spider mite species and its effect upon con- and heterospecifics.

    PubMed

    Godinho, Diogo P; Janssen, Arne; Dias, Teresa; Cruz, Cristina; Magalhães, Sara

    2016-01-01

    Herbivorous spider mites occurring on tomato plants (Solanum lycopersicum L.) cope with plant defences in various manners: the invasive Tetranychus evansi reduces defences below constitutive levels, whereas several strains of T. urticae induce such defences and others suppress them. In the Mediterranean region, these two species co-occur on tomato plants with T. ludeni, another closely related spider mite species. Unravelling how this third mite species affects plant defences is thus fundamental to understanding the outcome of herbivore interactions in this system. To test the effect of T. ludeni on tomato plant defences, we measured (1) the activity of proteinase inhibitors, indicating the induction of plant defences, in those plants, and (2) mite performance on plants previously infested with each mite species. We show that the performance of T. evansi and T. ludeni on plants previously infested with T. ludeni or T. evansi was better than on clean plants, indicating that these two mite species down-regulate plant defences. We also show that plants attacked by these mite species had lower activity of proteinase inhibitors than clean plants, whereas herbivory by T. urticae increased the activity of these proteins and resulted in reduced spider mite performance. This study thus shows that the property of down-regulation of plant defences below constitutive levels also occurs in T. ludeni.

  2. Fighting parasites and predators: how to deal with multiple threats?

    PubMed

    Hesse, Olivia; Engelbrecht, Wolfgang; Laforsch, Christian; Wolinska, Justyna

    2012-07-24

    Although inducible defences have been studied extensively, only little is known about how the presence of parasites might interfere with these anti-predator adaptations. Both parasites and predators are important factors shaping community structure and species composition of ecosystems. Here, we simultaneously exposed Daphnia magna to predator cues (released by the tadpole shrimp, Triops, or by a fish) and spores of the yeast parasite Metschnikowia sp. to determine how life history and morphological inducible defences against these two contrasting types of predators are affected by infection. The parasite suppressed some Triops-induced defences: Daphnia lost the ability to produce a greater number of larger offspring, a life-history adaptation to Triops predation. In contrast, the parasite did not suppress inducible defences against fish: induction (resulting in smaller body length of the mothers as well as of their offspring) and infection acted additively on the measured traits. Thus, fish-induced defences may be less costly than inducible defences against small invertebrate predators like Triops; the latter defences could no longer be expressed when the host had already invested in fighting off the parasite. In summary, our study suggests that as specific inducible defences differ in their costs, some might be suppressed if a target prey is additionally infected. Therefore, adding parasite pressure to predator-prey systems can help to elucidate the costs of inducible defences.

  3. Defence White Paper 2013

    DTIC Science & Technology

    2013-01-01

    government or private citizens’ information would undermine public and international confidence in Australia as a secure digital environment. 2.86... international defence engagement. This will include the development of a skills-based cadre of ADF and Australian Public Service officers focused on...defence industry. The shortfall in students with these skills is also problematic for the ADF and Australian Public Service, as Defence personnel

  4. Independent Effects of a Herbivore's Bacterial Symbionts on Its Performance and Induced Plant Defences.

    PubMed

    Staudacher, Heike; Schimmel, Bernardus C J; Lamers, Mart M; Wybouw, Nicky; Groot, Astrid T; Kant, Merijn R

    2017-01-18

    It is well known that microbial pathogens and herbivores elicit defence responses in plants. Moreover, microorganisms associated with herbivores, such as bacteria or viruses, can modulate the plant's response to herbivores. Herbivorous spider mites can harbour different species of bacterial symbionts and exert a broad range of effects on host-plant defences. Hence, we tested the extent to which such symbionts affect the plant's defences induced by their mite host and assessed if this translates into changes in plant resistance. We assessed the bacterial communities of two strains of the common mite pest Tetranychus urticae . We found that these strains harboured distinct symbiotic bacteria and removed these using antibiotics. Subsequently, we tested to which extent mites with and without symbiotic bacteria induce plant defences in terms of phytohormone accumulation and defence gene expression, and assessed mite oviposition and survival as a measure for plant resistance. We observed that the absence/presence of these bacteria altered distinct plant defence parameters and affected mite performance but we did not find indications for a causal link between the two. We argue that although bacteria-related effects on host-induced plant defences may occur, these do not necessarily affect plant resistance concomitantly.

  5. Collective defence portfolios of ant hosts shift with social parasite pressure

    PubMed Central

    Jongepier, Evelien; Kleeberg, Isabelle; Job, Sylwester; Foitzik, Susanne

    2014-01-01

    Host defences become increasingly costly as parasites breach successive lines of defence. Because selection favours hosts that successfully resist parasitism at the lowest possible cost, escalating coevolutionary arms races are likely to drive host defence portfolios towards ever more expensive strategies. We investigated the interplay between host defence portfolios and social parasite pressure by comparing 17 populations of two Temnothorax ant species. When successful, collective aggression not only prevents parasitation but also spares host colonies the cost of searching for and moving to a new nest site. However, once parasites breach the host's nest defence, host colonies should resort to flight as the more beneficial resistance strategy. We show that under low parasite pressure, host colonies more likely responded to an intruding Protomognathus americanus slavemaker with collective aggression, which prevented the slavemaker from escaping and potentially recruiting nest-mates. However, as parasite pressure increased, ant colonies of both host species became more likely to flee rather than to fight. We conclude that host defence portfolios shift consistently with social parasite pressure, which is in accordance with the degeneration of frontline defences and the evolution of subsequent anti-parasite strategies often invoked in hosts of brood parasites. PMID:25100690

  6. Uncertainties and constraints on breaching and their implications for flood loss estimation.

    PubMed

    Muir Wood, Robert; Bateman, William

    2005-06-15

    Around the coasts of the southern North Sea, flood risk is mediated everywhere by the performance of natural and man-made flood defences. Under the conditions of extreme surge with tide water levels, the performance of the defences determines the extent of inland flooding. Sensitivity tests reveal the enormous increase in the volume of water that can pass through a defence once breaching is initiated, with a 1m reduction in sill elevation doubling the loss. Empirical observations of defence performance in major storm surges around the North Sea reveal some of the principal controls on breaching. For the same defence type, the maximum size and depth of a breach is a function of the integral of the hydraulic gradient across the defence, which is in turn determined by the elevation of the floodplain and the degree to which water can continue to flow inland away from the breach. The most extensive and lowest floodplains thereby "generate" the largest breaches. For surges that approach the crest height, the weaker the protection of the defence, the greater the number of breaches. Defence reinforcement reduces both the number and size of the breaches.

  7. The psychiatric defence and international criminal law.

    PubMed

    Tobin, John

    2007-01-01

    Following the development of the International Criminal Court (ICC) the mental state of the perpetrators of genocide, crimes against humanity and war crimes will become a more important issue in regard to defence and mitigating factors. This article examines how the International Criminal Tribunal for the Former Yugoslavia (ICTY) in particular has dealt with the mental illness defence to date, and how its judgements can serve as guidance for the ICC as it becomes the major international court of the future. The absence of a mental health defence in the Statutes of the ICTY and the International Criminal Tribunal for Rwanda has led to a reliance on the Rules of Procedure and Evidence of the two tribunals. There are major difficulties in using the mental health defence as it is defined in the Statutes of the ICC because of a requirement for the destruction of mental capacity as a valid defence. Fitness to plead and the defence of intoxication are also examined.

  8. ROBIN: a platform for evaluating automatic target recognition algorithms: I. Overview of the project and presentation of the SAGEM DS competition

    NASA Astrophysics Data System (ADS)

    Duclos, D.; Lonnoy, J.; Guillerm, Q.; Jurie, F.; Herbin, S.; D'Angelo, E.

    2008-04-01

    The last five years have seen a renewal of Automatic Target Recognition applications, mainly because of the latest advances in machine learning techniques. In this context, large collections of image datasets are essential for training algorithms as well as for their evaluation. Indeed, the recent proliferation of recognition algorithms, generally applied to slightly different problems, make their comparisons through clean evaluation campaigns necessary. The ROBIN project tries to fulfil these two needs by putting unclassified datasets, ground truths, competitions and metrics for the evaluation of ATR algorithms at the disposition of the scientific community. The scope of this project includes single and multi-class generic target detection and generic target recognition, in military and security contexts. From our knowledge, it is the first time that a database of this importance (several hundred thousands of visible and infrared hand annotated images) has been publicly released. Funded by the French Ministry of Defence (DGA) and by the French Ministry of Research, ROBIN is one of the ten Techno-vision projects. Techno-vision is a large and ambitious government initiative for building evaluation means for computer vision technologies, for various application contexts. ROBIN's consortium includes major companies and research centres involved in Computer Vision R&D in the field of defence: Bertin Technologies, CNES, ECA, DGA, EADS, INRIA, ONERA, MBDA, SAGEM, THALES. This paper, which first gives an overview of the whole project, is focused on one of ROBIN's key competitions, the SAGEM Defence Security database. This dataset contains more than eight hundred ground and aerial infrared images of six different vehicles in cluttered scenes including distracters. Two different sets of data are available for each target. The first set includes different views of each vehicle at close range in a "simple" background, and can be used to train algorithms. The second set contains many views of the same vehicle in different contexts and situations simulating operational scenarios.

  9. Salicylic acid beyond defence: its role in plant growth and development.

    PubMed

    Rivas-San Vicente, Mariana; Plasencia, Javier

    2011-06-01

    In recent years salicylic acid (SA) has been the focus of intensive research due to its function as an endogenous signal mediating local and systemic plant defence responses against pathogens. It has also been found that SA plays a role during the plant response to abiotic stresses such as drought, chilling, heavy metal toxicity, heat, and osmotic stress. In this sense, SA appears to be, just like in mammals, an 'effective therapeutic agent' for plants. Besides this function during biotic and abiotic stress, SA plays a crucial role in the regulation of physiological and biochemical processes during the entire lifespan of the plant. The discovery of its targets and the understanding of its molecular modes of action in physiological processes could help in the dissection of the complex SA signalling network, confirming its important role in both plant health and disease. Here, the evidence that supports the role of SA during plant growth and development is reviewed by comparing experiments performed by exogenous application of SA with analysis of genotypes affected by SA levels and/or perception.

  10. Plant Insecticidal Toxins in Ecological Networks

    PubMed Central

    Ibanez, Sébastien; Gallet, Christiane; Després, Laurence

    2012-01-01

    Plant secondary metabolites play a key role in plant-insect interactions, whether constitutive or induced, C- or N-based. Anti-herbivore defences against insects can act as repellents, deterrents, growth inhibitors or cause direct mortality. In turn, insects have evolved a variety of strategies to act against plant toxins, e.g., avoidance, excretion, sequestration and degradation of the toxin, eventually leading to a co-evolutionary arms race between insects and plants and to co-diversification. Anti-herbivore defences also negatively impact mutualistic partners, possibly leading to an ecological cost of toxin production. However, in other cases toxins can also be used by plants involved in mutualistic interactions to exclude inadequate partners and to modify the cost/benefit ratio of mutualism to their advantage. When considering the whole community, toxins have an effect at many trophic levels. Aposematic insects sequester toxins to defend themselves against predators. Depending on the ecological context, toxins can either increase insects’ vulnerability to parasitoids and entomopathogens or protect them, eventually leading to self-medication. We conclude that studying the community-level impacts of plant toxins can provide new insights into the synthesis between community and evolutionary ecology. PMID:22606374

  11. A saponin-detoxifying enzyme mediates suppression of plant defences

    NASA Astrophysics Data System (ADS)

    Bouarab, K.; Melton, R.; Peart, J.; Baulcombe, D.; Osbourn, A.

    2002-08-01

    Plant disease resistance can be conferred by constitutive features such as structural barriers or preformed antimicrobial secondary metabolites. Additional defence mechanisms are activated in response to pathogen attack and include localized cell death (the hypersensitive response). Pathogens use different strategies to counter constitutive and induced plant defences, including degradation of preformed antimicrobial compounds and the production of molecules that suppress induced plant defences. Here we present evidence for a two-component process in which a fungal pathogen subverts the preformed antimicrobial compounds of its host and uses them to interfere with induced defence responses. Antimicrobial saponins are first hydrolysed by a fungal saponin-detoxifying enzyme. The degradation product of this hydrolysis then suppresses induced defence responses by interfering with fundamental signal transduction processes leading to disease resistance.

  12. Practical use of a framework for network science experimentation

    NASA Astrophysics Data System (ADS)

    Toth, Andrew; Bergamaschi, Flavio

    2014-06-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA)1 In Network and Information Sciences, to address fundamental issues concerning Network and Information Sciences that will enhance decision making for coalition operations and enable rapid, secure formation of ad hoc teams in coalition environments and enhance US and UK capabilities to conduct coalition warfare. Research conducted under the ITA was extended through collaboration between ARL and IBM UK to characterize and dene a software stack and tooling that has become the reference framework for network science experimentation in support for validation of theoretical research. This paper discusses the composition of the reference framework for experimentation resulting from the ARL/IBM UK collaboration and its use, by the Network Science Collaborative Technology Alliance (NS CTA)2 , in a recent network science experiment conducted at ARL. It also discusses how the experiment was modeled using the reference framework, the integration of two new components, the Apollo Fact-Finder3 tool and the Medusa Crowd Sensing4 application, the limitations identified and how they shall be addressed in future work.

  13. Assessing the influence of biogeographical region and phylogenetic history on chemical defences and herbivory in Quercus species.

    PubMed

    Moreira, Xoaquín; Abdala-Roberts, Luis; Galmán, Andrea; Francisco, Marta; Fuente, María de la; Butrón, Ana; Rasmann, Sergio

    2018-06-07

    Biogeographical factors and phylogenetic history are key determinants of inter-specific variation in plant defences. However, few studies have conducted broad-scale geographical comparisons of plant defences while controlling for phylogenetic relationships, and, in doing so, none have separated constitutive from induced defences. This gap has limited our understanding of how historical or large-scale processes mediate biogeographical patterns in plant defences since these may be contingent upon shared evolutionary history and phylogenetic constraints. We conducted a phylogenetically-controlled experiment testing for differences in constitutive leaf chemical defences and their inducibility between Palearctic and Nearctic oak species (Quercus, total 18 species). We induced defences in one-year old plants by inflicting damage by gypsy moth larvae (Lymantria dispar), estimated the amount of leaf area consumed, and quantified various groups of phenolic compounds. There was no detectable phylogenetic signal for constitutive or induced levels of most defensive traits except for constitutive condensed tannins, as well as no phylogenetic signal in leaf herbivory. We did, however, find marked differences in defence levels between oak species from each region: Palearctic species had higher levels of constitutive condensed tannins, but less constitutive lignins and less constitutive and induced hydrolysable tannins compared with Nearctic species. Additionally, Palearctic species had lower levels of leaf damage compared with Nearctic species. These differences in leaf damage, lignins and hydrolysable (but not condensed) tannins were lost after accounting for phylogeny, suggesting that geographical structuring of phylogenetic relationships mediated biogeographical differences in defences and herbivore resistance. Together, these findings suggest that historical processes and large-scale drivers have shaped differences in allocation to constitutive defences (and in turn resistance) between Palearctic and Nearctic oaks. Moreover, although evidence of phylogenetic conservatism in the studied traits is rather weak, shared evolutionary history appears to mediate some of these biogeographical patterns in allocation to chemical defences. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Effects of light on direct and indirect defences against herbivores of young plants of Mallotus japonicus demonstrate a trade-off between two indirect defence traits

    PubMed Central

    Yamawo, Akira; Hada, Yoshio

    2010-01-01

    Background and Aims Although most studies on plant defence strategies have focused on a particular defence trait, some plant species develop multiple defence traits. To clarify the effects of light on the development of multiple defence traits, the production of direct and indirect defence traits of young plants of Mallotus japonicus were examined experimentally under different light conditions. Methods The young plants were cultivated under three light conditions in the experimental field for 3 months from May to July. Numbers of ants and pearl bodies on leaves in July were examined. After cultivation, the plants were collected and the developments of trichomes and pellucid dots, and extrafloral nectaries (EFNs) on the leaves were examined. On plants without nectar-collecting insects, the size of EFNs and the volume of extrafloral nectar secreted from the EFNs were examined. Key results Densities of trichomes and pellucid dots did not differ significantly among the plants under the different light conditions, suggesting that the chemical and physical defences function under both high and low light availability. The number of EFNs on the leaves did not differ significantly among the plants under the different light conditions, but there appeared to be a trade-off between the size of EFNs and the number of pearl bodies; the largest EFNs and the smallest number of pearl bodies were found under high light availability. EFN size was significantly correlated with the volume of extrafloral nectar secreted for 24 h. The number of ants on the plants was smaller under low light availability than under high and moderate light availability. Conclusions These results suggest that direct defence traits function regardless of light conditions, but light conditions affected the development of indirect defence traits. PMID:20472698

  15. The evolution of inducible defence.

    PubMed

    Harvell, C D

    1990-01-01

    Defences against parasites are characterized by inducible, amplifiable responses, often with a memory component. Inducible defences with similar properties are common in a variety of other types of interactions, for example many aquatic invertebrates produce inducible structural defences against their predators and competitors. Most inducible defences have the following properties: (1) a threshold of activation; (2) an amplification of response with increasing stimulus; (3) a memory component. Specificity, amplification and memory are the basis for defining a defence as 'immune' (Klein, 1982), and these properties are present in both the vertebrate and invertebrate internal defence responses to pathogens. Invertebrates differ in the absence of immunoglobulins and therefore in reduced specificity. Although the reduced specificity of invertebrate internal defence systems is often viewed as proof of their 'primitiveness', the differences in defence systems of vertebrates and invertebrates may be more related to their respective selection regimes than to phylogeny. The syngeneic recognition system of vertebrates functions to recognize small departures from self, such as would arise from neoplasia. Are vertebrates under more intense selection from neoplasia, perhaps due to a greater incidence of hormonal imbalance or hypersensitivity reactions? The invertebrate internal defence systems are all less discriminating than the vertebrate, but there are marked differences in degree of discrimination depending on whether the group is colonial or not. Even the phyla of colonial animals with quite simple body plans, the sponges and cnidarians, have a more discriminating recognition system than the phyla of solitary animals with more complex body plans, such as the molluscs and arthropods. The primary effectors of all invertebrate responses to parasites are encapsulation and phagocytosis, although in some phyla there are specific antibacterial proteins than can also be induced.(ABSTRACT TRUNCATED AT 250 WORDS)

  16. Assessment of a visually guided autonomous exploration robot

    NASA Astrophysics Data System (ADS)

    Harris, C.; Evans, R.; Tidey, E.

    2008-10-01

    A system has been developed to enable a robot vehicle to autonomously explore and map an indoor environment using only visual sensors. The vehicle is equipped with a single camera, whose output is wirelessly transmitted to an off-board standard PC for processing. Visual features within the camera imagery are extracted and tracked, and their 3D positions are calculated using a Structure from Motion algorithm. As the vehicle travels, obstacles in its surroundings are identified and a map of the explored region is generated. This paper discusses suitable criteria for assessing the performance of the system by computer-based simulation and practical experiments with a real vehicle. Performance measures identified include the positional accuracy of the 3D map and the vehicle's location, the efficiency and completeness of the exploration and the system reliability. Selected results are presented and the effect of key system parameters and algorithms on performance is assessed. This work was funded by the Systems Engineering for Autonomous Systems (SEAS) Defence Technology Centre established by the UK Ministry of Defence.

  17. Gun Control for VBE-E: User Guide and Technical Description

    DTIC Science & Technology

    2006-11-01

    Defence R& D Canada – Atlantic DEFENCE DÉFENSE & Gun Control for VBE-E User Guide and Technical Description Tania E. Wentzell Technical Memorandum...Defence R& D Canada – Atlantic Technical Memorandum DRDC Atlantic TM 2006-245 November 2006 DRDC Atlantic TM 2006-245...component of the distributed experimentation environment used by the Virtual Combat System (VCS) Group at Defence R& D Canada – Atlantic (DRDC Atlantic

  18. Canadian Decisions in a Shifting North American Security Landscape

    DTIC Science & Technology

    2003-04-15

    operations. But the biggest bugaboo , National Missile Defense, could change public perceptions, when USSTRATCOM has both the offensive and defensive...Canada and the United States receive a number of benefits out of the close defense relationship. According to the Defense Portfolio 2002, Canadian...Defence, The Defence Portfolio , 2002, 2002. 11, available at http://www.forces.gc.ca. 21 Department of National Defence, 1994 Defence White Paper, 1994

  19. Interactive Visualization of Network Dynamics (Visualisation interactive de la dynamique des reseaux)

    DTIC Science & Technology

    2014-06-01

    la prise de décision du commandement militaire, aux opérations de santé et de sûreté publique...comporter la dénomination « STO », « RTO » ou « AGARD » selon le cas, suivi du numéro de série. Des informations analogues, telles que le titre est la date...Bibliothécaire des ressources du savoir Secretariat General of Defence 061353 Bucharest R et D pour la défense Canada National Armaments

  20. Mitochondrial filaments and clusters as intracellular power-transmitting cables.

    PubMed

    Skulachev, V P

    2001-01-01

    Mitochondria exist in two interconverting forms; as small isolated particles, and as extended filaments, networks or clusters connected with intermitochondrial junctions. Extended mitochondria can represent electrically united systems, which can facilitate energy delivery from the cell periphery to the cell core and organize antioxidant defence of the cell interior when O2 is consumed by mitochondrial clusters near the the outer cell membrane, and protonic potential is transmitted to the cell core mitochondria to form ATP. As to small mitochondria, they might represent a transportable form of these organelles.

  1. Biophoton distress flares signal the onset of the hypersensitive reaction.

    PubMed

    Mansfield, John W

    2005-07-01

    Detection of biophoton emission, a natural bioluminescence, has emerged as a non-destructive method to mark the onset of the hypersensitive resistance reaction in Arabidopsis, bean and tomato. Rapid biophoton emission in Arabidopsis requires an intact R-gene signalling network and increased levels of cytosolic calcium and nitric oxide. The burst of biophotons precedes macroscopic symptoms by several hours and its timing is characteristic for specific gene-for-gene interactions. The ability to monitor biophoton emission from whole plants in real time should allow detailed dissection of plant defence responses.

  2. Independent Effects of a Herbivore’s Bacterial Symbionts on Its Performance and Induced Plant Defences

    PubMed Central

    Staudacher, Heike; Schimmel, Bernardus C. J.; Lamers, Mart M.; Wybouw, Nicky; Groot, Astrid T.; Kant, Merijn R.

    2017-01-01

    It is well known that microbial pathogens and herbivores elicit defence responses in plants. Moreover, microorganisms associated with herbivores, such as bacteria or viruses, can modulate the plant’s response to herbivores. Herbivorous spider mites can harbour different species of bacterial symbionts and exert a broad range of effects on host-plant defences. Hence, we tested the extent to which such symbionts affect the plant’s defences induced by their mite host and assessed if this translates into changes in plant resistance. We assessed the bacterial communities of two strains of the common mite pest Tetranychus urticae. We found that these strains harboured distinct symbiotic bacteria and removed these using antibiotics. Subsequently, we tested to which extent mites with and without symbiotic bacteria induce plant defences in terms of phytohormone accumulation and defence gene expression, and assessed mite oviposition and survival as a measure for plant resistance. We observed that the absence/presence of these bacteria altered distinct plant defence parameters and affected mite performance but we did not find indications for a causal link between the two. We argue that although bacteria-related effects on host-induced plant defences may occur, these do not necessarily affect plant resistance concomitantly. PMID:28106771

  3. Collective defence portfolios of ant hosts shift with social parasite pressure.

    PubMed

    Jongepier, Evelien; Kleeberg, Isabelle; Job, Sylwester; Foitzik, Susanne

    2014-09-22

    Host defences become increasingly costly as parasites breach successive lines of defence. Because selection favours hosts that successfully resist parasitism at the lowest possible cost, escalating coevolutionary arms races are likely to drive host defence portfolios towards ever more expensive strategies. We investigated the interplay between host defence portfolios and social parasite pressure by comparing 17 populations of two Temnothorax ant species. When successful, collective aggression not only prevents parasitation but also spares host colonies the cost of searching for and moving to a new nest site. However, once parasites breach the host's nest defence, host colonies should resort to flight as the more beneficial resistance strategy. We show that under low parasite pressure, host colonies more likely responded to an intruding Protomognathus americanus slavemaker with collective aggression, which prevented the slavemaker from escaping and potentially recruiting nest-mates. However, as parasite pressure increased, ant colonies of both host species became more likely to flee rather than to fight. We conclude that host defence portfolios shift consistently with social parasite pressure, which is in accordance with the degeneration of frontline defences and the evolution of subsequent anti-parasite strategies often invoked in hosts of brood parasites. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  4. Novel perspectives for the engineering of abiotic stress tolerance in plants.

    PubMed

    Cabello, Julieta V; Lodeyro, Anabella F; Zurbriggen, Matias D

    2014-04-01

    Adverse environmental conditions pose serious limitations to agricultural production. Classical biotechnological approaches towards increasing abiotic stress tolerance focus on boosting plant endogenous defence mechanisms. However, overexpression of regulatory elements or effectors is usually accompanied by growth handicap and yield penalties due to crosstalk between developmental and stress-response networks. Herein we offer an overview on novel strategies with the potential to overcome these limitations based on the engineering of regulatory systems involved in the fine-tuning of the plant response to environmental hardships, including post-translational modifications, small RNAs, epigenetic control of gene expression and hormonal networks. The development and application of plant synthetic biology tools and approaches will add new functionalities and perspectives to genetic engineering programs for enhancing abiotic stress tolerance. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  6. The correlated evolution of antipredator defences and brain size in mammals

    PubMed Central

    Romero, Ashly N.

    2017-01-01

    Mammals that possess elaborate antipredator defences such as body armour, spines and quills are usually well protected, intermediate in size, primarily insectivorous and live in simple open environments. The benefits of such defences seem clear and may relax selection on maintaining cognitive abilities that aid in vigilance and predator recognition, and their bearers may accrue extensive production and maintenance costs. Here, in this comparative phylogenetic analysis of measurements of encephalization quotient and morphological defence scores of 647 mammal species representing nearly every order, we found that as lineages evolve stronger defences, they suffer a correlated reduction in encephalization. The only exceptions were those that live in trees—a complex three-dimensional world probably requiring greater cognitive abilities. At the proximate level, because brain tissue is extremely energetically expensive to build, mammals may be trading off spending more on elaborate defences and saving by building less powerful brains. At the ultimate level, having greater defences may also reduce the need for advanced cognitive abilities for constant assessment of environmental predation risk, especially in simple open environments. PMID:28077771

  7. The correlated evolution of antipredator defences and brain size in mammals.

    PubMed

    Stankowich, Theodore; Romero, Ashly N

    2017-01-11

    Mammals that possess elaborate antipredator defences such as body armour, spines and quills are usually well protected, intermediate in size, primarily insectivorous and live in simple open environments. The benefits of such defences seem clear and may relax selection on maintaining cognitive abilities that aid in vigilance and predator recognition, and their bearers may accrue extensive production and maintenance costs. Here, in this comparative phylogenetic analysis of measurements of encephalization quotient and morphological defence scores of 647 mammal species representing nearly every order, we found that as lineages evolve stronger defences, they suffer a correlated reduction in encephalization. The only exceptions were those that live in trees-a complex three-dimensional world probably requiring greater cognitive abilities. At the proximate level, because brain tissue is extremely energetically expensive to build, mammals may be trading off spending more on elaborate defences and saving by building less powerful brains. At the ultimate level, having greater defences may also reduce the need for advanced cognitive abilities for constant assessment of environmental predation risk, especially in simple open environments. © 2017 The Author(s).

  8. Competition induces allelopathy but suppresses growth and anti-herbivore defence in a chemically rich seaweed

    PubMed Central

    Rasher, Douglas B.; Hay, Mark E.

    2014-01-01

    Many seaweeds and terrestrial plants induce chemical defences in response to herbivory, but whether they induce chemical defences against competitors (allelopathy) remains poorly understood. We evaluated whether two tropical seaweeds induce allelopathy in response to competition with a reef-building coral. We also assessed the effects of competition on seaweed growth and seaweed chemical defence against herbivores. Following 8 days of competition with the coral Porites cylindrica, the chemically rich seaweed Galaxaura filamentosa induced increased allelochemicals and became nearly twice as damaging to the coral. However, it also experienced significantly reduced growth and increased palatability to herbivores (because of reduced chemical defences). Under the same conditions, the seaweed Sargassum polycystum did not induce allelopathy and did not experience a change in growth or palatability. This is the first demonstration of induced allelopathy in a seaweed, or of competitors reducing seaweed chemical defences against herbivores. Our results suggest that the chemical ecology of coral–seaweed–herbivore interactions can be complex and nuanced, highlighting the need to incorporate greater ecological complexity into the study of chemical defence. PMID:24403332

  9. The mirror has two faces: dissociative identity disorder and the defence of pathological criminal incapacity--a South African criminal law perspective.

    PubMed

    Stevens, Philip

    2013-03-01

    Dissociative identity disorder poses numerous medico legal issues whenever the insanity defence emerges. Within the context of the South African criminal law, the impact of dissociative identity disorder on criminal responsibility has only been addressed very briefly in one decided case. Various questions arise as to the impact that the distinctive diagnostic features of dissociative identity disorder could possibly have on the defence of pathological criminal incapacity, or better known as the insanity defence, within the ambit of the South African criminal law. In this contribution the author reflects on the mental disorder known as dissociative identity disorder or multiple personality disorder, against the backdrop of the defence of pathological criminal incapacity. Reflections are also provided pertaining to the various medico legal issues at stake whenever this defence has to be adjudicated upon.

  10. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Archer, Charles J.; Faraj, Daniel A.; Inglett, Todd A.

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selectedmore » link to the adjacent compute node connected to the compute node through the selected link.« less

  11. Role of Host-Defence Peptides in Eye Diseases

    PubMed Central

    Kolar, Satya S.; McDermott, Alison M.

    2013-01-01

    The eye and its associated tissues including the lacrimal system and lids have evolved several defence mechanisms to prevent microbial invasion. Included among this armory are several host-defence peptides. These multifunctional molecules are being studied not only for their endogenous antimicrobial properties but also for their potential therapeutic effects. Here the current knowledge of host-defence peptide expression in the eye will be summarized. The role of these peptides in eye disease will be discussed with the primary focus being on infectious keratitis, inflammatory conditions including dry eye and wound healing. Finally the potential of using host-defence peptides and their mimetics/derivatives for the treatment and prevention of eye diseases is addressed. PMID:21584809

  12. UK Defence Acquisition Process for NEC: Transaction Governance within an Integrated Project Team

    DTIC Science & Technology

    2009-04-22

    3-tier framework for a study of the acquisition of an Advance Military Vehicle (AMV), we explore the shaping of the buyer -supplier relationship in...of an Advance Military Vehicle (AMV), we explore the shaping of the buyer -supplier relationship in the context of the UK defence acquisition process...of the buyer , the MoD, and how this impacts its suppliers in the defence industrial base. An historical review of defence industrial relations is

  13. Aerodynamic Test Facility Requirements for Defence R&D to 2000 and Beyond.

    DTIC Science & Technology

    1982-09-01

    Defence Force. Following its review of science and technology, the Australian Science and Technology Council ( ASTEC ) reported I that the present pattern...Organisation (DSTO) within the Department of Defence. Accordingly, ASTEC recommended to the Prime Minister that the Department of Defence be asked to develop...DSTO2 as well as by ASTEC 1 . An additional reason for choosing aerodynamics for early consideration in response to ASTEC’s recommendation is that wind

  14. Placing Tactical Data into the MIST and LC2IEDM Systems

    DTIC Science & Technology

    2003-10-01

    Defence R& D Canada DEFENCE DÉFENSE & Placing Tactical Data into the MIST and LC2IEDM Systems Anthony W. Isenor Technical Memorandum DRDC Atlantic TM...intentionally left blank. Copy No: Placing Tactical Data into the MIST and LC2IEDM Systems Anthony W. Isenor Defence R& D Canada – Atlantic Technical...currently underway at Defence R& D Canada – Atlantic, as well as international efforts with The Technical Cooperation Program (TTCP). Both groups

  15. Phytoplankton defence mechanisms: traits and trade-offs.

    PubMed

    Pančić, Marina; Kiørboe, Thomas

    2018-05-01

    In aquatic ecosystems, unicellular algae form the basis of the food webs. Theoretical and experimental studies have demonstrated that one of the mechanisms that maintain high diversity of phytoplankton is through predation and the consequent evolution of defence mechanisms. Proposed defence mechanisms in phytoplankton are diverse and include physiological (e.g. toxicity, bioluminescence), morphological (e.g. silica shell, colony formation), and behavioural (e.g. escape response) traits. However, the function of many of the proposed defence mechanisms remains elusive, and the costs and benefits (trade-offs) are often unquantified or undocumented. Here, we provide an overview of suggested phytoplankton defensive traits and review their experimental support. Wherever possible we quantify the trade-offs from experimental evidence and theoretical considerations. In many instances, experimental evidence suggests that defences are costless. However, we argue that (i) some costs materialize only under natural conditions, for example, sinking losses, or dependency on the availability of specific nutrients, and (ii) other costs become evident only under resource-deficient conditions where a rivalry for limiting resources between growth and defence occurs. Based on these findings, we suggest two strategies for quantifying the costs of defence mechanisms in phytoplankton: (i) for the evaluation of defence costs that are realized under natural conditions, a mechanistic understanding of the hypothesized component processes is required; and (ii) the magnitude of the costs (i.e. growth reduction) must be assessed under conditions of resource limitation. © 2018 Cambridge Philosophical Society.

  16. Tasting the difference: do multiple defence chemicals interact in Müllerian mimicry?

    PubMed

    Skelhorn, John; Rowe, Candy

    2005-02-07

    Müllerian mimicry, where two unpalatable species share a warning pattern, is classically believed to be a form of mutualism, where the species involved share the cost of predator education. The evolutionary dynamics of Müllerian mimicry have recently become a controversial subject, after mathematical models have shown that if minor alterations are made to assumptions about the way in which predators learn and forget about unpalatable prey, this textbook case of mutualism may not be mutualistic at all. An underlying assumption of these models is that Müllerian mimics possess the same defence chemical. However, some Müllerian mimics are known to possess different defence chemicals. Using domestic chicks as predators and coloured crumbs flavoured with either the same or different unpalatable chemicals as prey, we provide evidence that two defence chemicals can interact to enhance predator learning and memory. This indicates that Müllerian mimics that possess different defence chemicals are better protected than those that share a single defence chemical. These data provide insight into how multiple defence chemicals are perceived by birds,and how they influence the way birds learn and remember warningly coloured prey. They highlight the importance of considering how different toxins in mimicry rings can interact in the evolution and maintenance of Müllerian mimicry and could help to explain the remarkable variation in chemical defences found within and between species.

  17. Instrumentation for Airwake Measurements on the Flight Deck of a FFG-7

    DTIC Science & Technology

    1991-11-01

    volatile RAM to the computer hard disk with a unique file name based on time and date. At an opportune time the data file(s) are manually transferred...1967 6 Royal Air Force Manual (Volume D) AP3456D Al-i APPENDIX 1 GENERAL SPECIFICATION FOR VADAR VADAR was developed by the Instrumentation and Trials...TTCP HTP -6) N. Matheson N. Pollock DJ. Sherman Materials Research Laboratory Director/Library Defence Science & Technology Organisation Salisbury

  18. Usability and Utility of a Mobile Application for Marksmanship Training

    DTIC Science & Technology

    2015-01-01

    Right of Canada, as represented by the Minister of National Defence, 2015 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le...Empirical Evaluation of the System Usability Scale. International Journal of Human-Computer Interaction, 24(6), 574-594. BenMoussa, C. (2003). Workers on...Behavioral and Social Sciences. Jumisko-Pyykko, S., & Vainio, T. (2011). Framing the Context of Use for Mobile HCI. International Journal of Mobile

  19. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  20. Bistatic Synthetic Aperture Radar, TIF - Report (Phase 1)

    DTIC Science & Technology

    2004-11-01

    Cette recherche permet d’obtenir une compr6hension en profondeur des capacit6s et des difficult6s associ6es aux concepts du ROS bistatique et...Radar (SAR) Bistatic SAR Performance Analysis Defence R&D Canada R & D pour la defense Canada Canada’s Leader in Defence Chef de file au Canada en ...I 1f1 Defence Research and Recherche et developpement Development Canada pour la defense Canada DEFENCE DEFENSE Bistatic Synthetic Aperture Radar TIF

  1. Chemicals on plant surfaces as a heretofore unrecognized, but ecologically informative, class for investigations into plant defence.

    PubMed

    LoPresti, Eric F

    2016-11-01

    Plants produce and utilize a great diversity of chemicals for a variety of physiological and ecological purposes. Many of these chemicals defend plants against herbivores, pathogens and competitors. The location of these chemicals varies within the plant, some are located entirely within plant tissues, others exist in the air- (or water-) space around plants, and still others are secreted onto plant surfaces as exudates. I argue herein that the location of a given defensive chemical has profound implications for its ecological function; specifically, I focus on the characteristics of chemical defences secreted onto plant surfaces. Drawing from a broad literature encompassing ecology, evolution, taxonomy and physiology, I found that these external chemical defences (ECDs) are common and widespread in plants and algae; hundreds of examples have been detailed, yet they are not delineated as a separate class from internal chemical defences (ICDs). I propose a novel typology for ECDs and, using existing literature, explore the ecological consequences of the hypothesized unique characteristics of ECDs. The axis of total or proportional investment in ECDs versus ICDs should be considered as one axis of investment by a plant, in the same way as quantitative versus qualitative chemical defences or induced versus constitutive defences is considered. The ease of manipulating ECDs in many plant systems presents a powerful tool to help test plant defence theory (e.g. optimal defence). The framework outlined here integrates various disciplines of botany and ecology and suggests a need for further examinations of exudates in a variety of contexts, as well as recognition of the effects of within-plant localization of defences. © 2015 Cambridge Philosophical Society.

  2. Trade-off among different anti-herbivore defence strategies along an altitudinal gradient

    PubMed Central

    Dostálek, Tomáš; Rokaya, Maan Bahadur; Maršík, Petr; Rezek, Jan; Skuhrovec, Jiří; Pavela, Roman; Münzbergová, Zuzana

    2016-01-01

    The type and intensity of plant–herbivore interactions are likely to be altered under climate change as a consequence of differential dispersal rates of plants and their herbivores. Here, we studied variation in herbivore damage on Salvia nubicola in the field and compared its growth and defence strategies against herbivores in controlled conditions using seeds from populations along a broad altitudinal gradient. Our work is one of the first studies to simultaneously measure complex intraspecific variation in plant growth, direct and indirect defences as well as plant tolerance (ability to regrow) as a consequence of herbivore attack simulated by clipping. In the field, we found that plants experienced higher herbivore pressure in lower altitudes. In the greenhouse, plants grown from seeds collected in lower-altitude populations grew better and produced a higher content of phenolic compounds (direct defence) and volatile organic compounds (indirect defence) in response to simulated herbivory. However, there were no differences in tolerance and effect of S. nubicola extracts on the model generalist herbivore Spodoptera littoralis (direct defence) along the altitudinal gradient. Although we found that S. nubicola developed a range of defence strategies, the strategies do not seem to be used simultaneously in all populations even though most of them are correlated with altitudinal gradient. Our finding is in agreement with the current knowledge that co-expression of multiple defences might be costly for a plant, since investment in defensive traits is assumed to reduce the resource availability for growth and reproduction. Our study thus shows the importance of simultaneous study of different defence strategies since understanding these trade-offs could be necessary for detecting the mechanisms by which plants are able to cope with future climate change. PMID:27169609

  3. Sexual misbehaviour in the Australian Defence Force.

    PubMed

    Williams, Angela; Ranson, David

    2013-12-01

    It is clear from recent media reporting that serious issues have come to light regarding sexual misbehaviour matters within the Australian Defence Force. Subsequent reviews have indicated that these behaviours appear to have been more widespread than the initial media reports suggested and a number of reviews have been undertaken to better understand the problem and address the concerns of victims, Defence command, government and the community. If these problems are not addressed, there is a risk that recruitment to the Defence Forces may become problematic. The strong command structures within the Defence Forces can both exacerbate these misbehaviours through entrenching secrecy and at the same time have the capacity to provide a powerful leadership message that can change attitudes and reduce such misbehaviours.

  4. Virtual Crack Extension Technique

    DTIC Science & Technology

    2008-12-01

    the Contractor and the contents do not necessarily have the approval or endorsement of Defence R& D Canada. Contract Report DRDC Atlantic CR 2008-274...the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of Defence R& D Canada. Defence R& D

  5. "New Sport" in the street: self-defence, security and space in belle epoque Paris.

    PubMed

    Freundschuh, Aaron

    2006-01-01

    Near the turn of the twentieth century, traditional self-defence methods (for example, jiu-jitsu) were revamped into a more accessible and practical set of techniques and tactics for everyday use in urban public space. Framed as a "new sport" with broad public utility, early urban self-defence developed against the backdrop of heightening fears of violent crime and a burgeoning politics of security, as well as tensions provoked by the increasingly common appearance of unchaperoned, middle-class women in public. Self-defence masters pitched their innovations in an inclusive rhetoric, always with separate lessons for men and women and their respective spaces of risk. This article places modern self-defence practices in tension with historical transformations in the urban landscape, arguing that urban self-defence posited a certain subjective relation to the city that tapped simultaneously into the desire for empowerment, fantasies of criminal danger and a law-and-order tone that shaded into urban vigilantism.

  6. Organization of the secure distributed computing based on multi-agent system

    NASA Astrophysics Data System (ADS)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  7. The impact of potentially traumatic events on the mental health of males who have served in the military: Findings from the Australian National Survey of Mental Health and Wellbeing.

    PubMed

    Wade, Darryl; Mewton, Louise; Varker, Tracey; Phelps, Andrea; Forbes, David

    2017-07-01

    The study investigated the impact of potentially traumatic events on mental health outcomes among males who had ever served in the Australian Defence Force. Data from a nationally representative household survey of Australian residents, the 2007 National Survey of Mental Health and Wellbeing, were used for this study. Compared with community members, Australian Defence Force males were significantly more likely to have experienced not only deployment and other war-like events but also accidents or other unexpected events, and trauma to someone close. For non-deployed males, Australian Defence Force members were at increased risk of accidents or other unexpected events compared to community members. After controlling for the effect of potentially traumatic events that were more prevalent among all Australian Defence Force members, the increased risk of mental disorders among Australian Defence Force members was no longer evident. For non-deployed males, Australian Defence Force and community members were at comparable risk of poor mental health outcomes. A significant minority of Australian Defence Force members had onset of a mental disorder prior to their first deployment. Deployment and other potentially traumatic events among Australian Defence Force members can help to explain their increased vulnerability to mental disorders compared with community members. Providers should routinely enquire about a range of potentially traumatic events among serving and ex-serving military personnel.

  8. Australian DefenceScience. Volume 14, Number 1, Winter

    DTIC Science & Technology

    2006-01-01

    with the advent of each new generation of aircraft. Advanced airframe repair technology Nearly all the surface of the JSF is to be constructed from...In December 2004, Defence signed a $1.4 billion contract with Spanish company, European Aeronautic Defence and Space Construcciones Aeronauticas SA

  9. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  10. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  11. Transcriptional analysis and histochemistry reveal that hypersensitive cell death and H2O2 have crucial roles in the resistance of tea plant (Camellia sinensis (L.) O. Kuntze) to anthracnose.

    PubMed

    Wang, Yuchun; Hao, Xinyuan; Lu, Qinhua; Wang, Lu; Qian, Wenjun; Li, Nana; Ding, Changqing; Wang, Xinchao; Yang, Yajun

    2018-01-01

    Anthracnose causes severe losses of tea production in China. Although genes and biological processes involved in anthracnose resistance have been reported in other plants, the molecular response to anthracnose in tea plant is unknown. We used the susceptible tea cultivar Longjing 43 and the resistant cultivar Zhongcha 108 as materials and compared transcriptome changes in the leaves of both cultivars following Colletotrichum fructicola inoculation. In all, 9015 and 8624 genes were differentially expressed between the resistant and susceptible cultivars and their controls (0 h), respectively. In both cultivars, the differentially expressed genes (DEGs) were enriched in 215 pathways, including responses to sugar metabolism, phytohormones, reactive oxygen species (ROS), biotic stimuli and signalling, transmembrane transporter activity, protease activity and signalling receptor activity, but DEG expression levels were higher in Zhongcha 108 than in Longjing 43. Moreover, functional enrichment analysis of the DEGs showed that hydrogen peroxide (H 2 O 2 ) metabolism, cell death, secondary metabolism, and carbohydrate metabolism are involved in the defence of Zhongcha 108, and 88 key genes were identified. Protein-protein interaction (PPI) network demonstrated that putative mitogen-activated protein kinase (MAPK) cascades are activated by resistance (R) genes and mediate downstream defence responses. Histochemical analysis subsequently validated the strong hypersensitive response (HR) and H 2 O 2 accumulation that occurred around the hyphal infection sites in Zhongcha 108. Overall, our results indicate that the HR and H 2 O 2 are critical mechanisms in tea plant defence against anthracnose and may be activated by R genes via MAPK cascades.

  12. Simulation of the CRIPT Detector

    DTIC Science & Technology

    2015-03-01

    National Defence, 2015 c© Sa Majesté la Reine (en droit du Canada), telle que réprésentée par le ministre de la Défense nationale, 2015 Abstract The...iron slabs of the spectrometer. The red plates are the panels containing the scintillator bars. 3 3 Monte Carlo Geometry The geometry of the detector is...instead of hollow), • parts were in wrong location (eg. spectrometer iron plates). To fix this, Computer Aided Design ( CAD ) drawings were provided for

  13. Use of the Maximum Likelihood Method in the Analysis of Chamber Air Dives

    DTIC Science & Technology

    1988-01-01

    the total gas pressure in compartment i, P0 is the current ambient pressure, 0 [ and A and B are constants (0.0026 min-’ -ATA- and 8.31 ATA...computer model (4), the Kidd- Stubbs 1971 decompression tables (11), and the current Defence and Civil Institute 20 of Environmental Medicine (DCIEM...it could be applied. Since the models are not suitable for this test, then within T ese no-deco current limits of statistical theory, the results can

  14. Swedish Defence Research Abstracts 1980/81-3 (Froe Forsvars Forsknings Referat 1980/81-3).

    DTIC Science & Technology

    1981-11-01

    computes the refractive index or the thickness of thin mono- or multi -layer films. The program is written in Fortran and is adapted to the ellipsometer at...Unmnnounced EtN8PECT: Justlflotl Distribution/ Availability Codes Avail and/or Dist Special 2 Index to FRO 80/81-3 A PROTECTION - ATOMIC Al The nuclear...aberrations in PHA-stimulated human lymphocytes in the GI stage (in English) B PROTECTION - BIOLOGICAL BI Threat scenario (119) Epidemiological aspects

  15. A Combined Multi-Material Euler/LaGrange Computational Analysis of Blast Loading Resulting from Detonation of Buried Landmines

    DTIC Science & Technology

    2008-01-01

    phenomena. The work of Bergeron et al. [7] was subsequently extended by Braid [8] to incorporate different charge sizes, soil types and improved...place, a series of water hoses is placed in pit bottom to allow the introduction of water into the pit from the bottom. Next, approximately 14.2m3 of... Braid , 17th International MABS Symposium, Las Vegas, USA, June 2002. [8]. M. P. Braid , Defence R&D Canada, Suffield Special Publication, DRES SSSP

  16. Modern Antenna Design Using Computers and Measurement: Application to Antenna Problems of Military Interest

    DTIC Science & Technology

    1989-01-01

    admittance of a dipole antenna co’puted Fig. 2. Input admittance of a A/2 dipole antenna corn - by NEC-3S, NEC-3D and NEC3VLF. The dipole was puted by...The upper half space is air, the corn - results are incorrect as a result of using the reflection plex relative permittivity of the medium surrounding...UNCLASSIFIED UNLIMITED (U) ANAFTIM AIUI 87-03964 UNCLASSIFIED UNLIMITED STC Defence Systems, Paigonton (England) (U) AIRIAFT IJ= ANITEIAS AGAR -LS-151

  17. Functional Modelling, Scenario Development, and Options Analysis to Support Optimized Crewing for Damage Control. Phase 2: Scenario Development

    DTIC Science & Technology

    2007-03-31

    of task analysis for human-computer interaction. Mahwah, NJ: Lawrence Erlbaum Associates. Haupt, T . A., Henley, G ., Sura, B., Kirkland, R., Floyd...foulée de sa récente activité de planification stratégique, la Marine canadienne planifie actuellement une restructuration importante de ses...of a new warship) require that planning must begin now. Defence Research and Development Canada – Toronto (DRDC- T ) has recognized the important role

  18. Functional Modeling, Scenario Development, and Options Analysis to Support Optimized Crewing for Damage Control. Phase 2: Scenario Development

    DTIC Science & Technology

    2007-03-31

    of task analysis for human-computer interaction. Mahwah, NJ: Lawrence Erlbaum Associates. Haupt, T . A., Henley, G ., Sura, B., Kirkland, R., Floyd...foulée de sa récente activité de planification stratégique, la Marine canadienne planifie actuellement une restructuration importante de ses...of a new warship) require that planning must begin now. Defence Research and Development Canada – Toronto (DRDC- T ) has recognized the important role

  19. Assessment of Nuclear Medicine Capabilities in Responding to a Radiological Terrorism Event

    DTIC Science & Technology

    2006-09-01

    Defence, 2006 © Sa Majesté la Reine , représentée par le ministre de la Défense nationale, 2006 DRDC Ottawa TM 2006-237 i Abstract...important suite à un tel incident. Il serait donc avantageux d’établir des points de contact officiels avec cette communauté, de développer du matériel...both didactic and clinical training. Didactic course work includes: mathematics, chemistry, physics, computer science, radiation protection, anatomy

  20. Computational Aerodynamics Based on the Euler Equations (L’aerodynamique Numerique a Partir des Equations d’Euler)

    DTIC Science & Technology

    1994-01-01

    0 The Mission of AGARD 0 According to its Charter, the mission of AGARD is to bring together the leading personalities of the NATO nations in the...advances in the aerospace sciences relevant to strengthening the common defence posture; • - Improving the co-operation among member nations in aerospace...for the physical principles. To construct the relevant equations for fluid gas consisting of pseudo particles, 10 is the internal energy due motion it

  1. The pharmacological properties of the novel peptide BPC 157 (PL-10).

    PubMed

    Sikiric, P

    1999-01-01

    The reported beneficial effects of the gastric mucosal derived pentadecapeptide BPC 157 (Gly Glu Pro Pro Pro Gly Lys Pro Ala Asp Asp Ala Gly Leu Val, M.W. 1419) on different organ lesions are reviewed. Apart from the effects on various gastrointestinal lesions, the potentially beneficial effect on pancreas, liver injuries, endothelium and heart damage, i.e. dysrhythmias following reoxygenation, and blood pressure, along with effect on experimental acute/chronic inflammation, wound and fracture (pseudoarthrosis) healing are described. It appears that these beneficial effects all together provide a particular network reflecting activity of a special peptidergic defence system. In support of this concept, it appears that there are interactions of this pentadecapeptide with many important systems (namely, dopamine-, NO-, prostaglandin-, somatosensory neurone-systems), that could provide a basis for the observed protective effects. Moreover, since disturbance of these systems' functions (i.e. dopamine-, NO-, somatosensory neuronal-system) which manifest either over-activity or as inhibition, may contribute to the multiple lesions in different organs. The reported evidence that this pentadecapeptide is able to counteract both their over-action, and their inhibition, may suggest this pentadecapeptide as a new, but most probably essential physiological defence system and that should be further investigated.

  2. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    DTIC Science & Technology

    2016-01-01

    Hutchinson Joint & Operations Analysis Division Defence Science and Technology Group DST- Group -GD-0909 ABSTRACT This literature...LIMITATION UNCLASSIFIED UNCLASSIFIED Published by Joint & Operations Analysis Division Defence Science and Technology Group 506 Lorimer St...This page intentionally blank UNCLASSIFIED DST- Group -GD-0909 UNCLASSIFIED Contents 1. INTRODUCTION

  3. Separation of Target Rigid Body and Micro-Doppler Effects in ISAR/SAR Imaging

    DTIC Science & Technology

    2006-09-01

    tour- nantes et vibrantes de la cible. De nouveaux algorithmes et m~thodes devront donc DRDC Ottawa TM 2006-187 v &tre 6tudi6s plus en profondeur afin...UNCLASSIFIED SECURITY CLASSIFICATION OF FORM Defence R&D Canada R & D pour la defense Canada Canada’s Leader in Defence Chef de file au Canada en mati~re and...I 1f1 Defence Research and Recherche et developpement Development Canada pour la defense Canada DEFENCE ril DEFENSE Separation of target rigid body

  4. The Galbraith judgment and the defence of diminished responsibility in Scotland.

    PubMed

    Hodelet, Nicola; Darjee, Rajan

    2005-10-01

    New case law on diminished responsibility in Scotland (Galbraith v. HM Advocate 2001) re-defined the defence and clarified the role of expert witnesses. We examined how this judgment affected the use of the defence, provision of expert evidence and the outcome of trials. We studied homicide cases in one area of Scotland in the year before and the year after the new judgment. Results indicated little change in the number of cases where the defence was used, but a difference in how psychiatrists set out their opinions.

  5. Long-distance signalling in plant defence.

    PubMed

    Heil, Martin; Ton, Jurriaan

    2008-06-01

    Plants use inducible defence mechanisms to fend off harmful organisms. Resistance that is induced in response to local attack is often expressed systemically, that is, in organs that are not yet damaged. In the search for translocated defence signals, biochemical studies follow the physical movement of putative signals, and grafting experiments use mutants that are impaired in the production or perception of these signals. Long-distance signals can directly activate defence or can prime for the stronger and faster induction of defence. Historically, research has focused on the vascular transport of signalling metabolites, but volatiles can play a crucial role as well. We compare the advantages and constraints of vascular and airborne signals for the plant, and discuss how they can act in synergy to achieve optimised resistance in distal plant parts.

  6. Ecological trade-offs between jasmonic acid-dependent direct and indirect plant defences in tritrophic interactions

    PubMed Central

    Wei, Jianing; Wang, Lizhong; Zhao, Jiuhai; Li, Chuanyou; Ge, Feng; Kang, Le

    2011-01-01

    Recent studies on plants genetically modified in jasmonic acid (JA) signalling support the hypothesis that the jasmonate family of oxylipins plays an important role in mediating direct and indirect plant defences. However, the interaction of two modes of defence in tritrophic systems is largely unknown. In this study, we examined the preference and performance of a herbivorous leafminer (Liriomyza huidobrensis) and its parasitic wasp (Opius dissitus) on three tomato genotypes: a wild-type (WT) plant, a JA biosynthesis (spr2) mutant, and a JA-overexpression 35S::prosys plant. Their proteinase inhibitor production and volatile emission were used as direct and indirect defence factors to evaluate the responses of leafminers and parasitoids. Here, we show that although spr2 mutant plants are compromised in direct defence against the larval leafminers and in attracting parasitoids, they are less attractive to adult flies compared with WT plants. Moreover, in comparison to other genotypes, the 35S::prosys plant displays greater direct and constitutive indirect defences, but reduced success of parasitism by parasitoids. Taken together, these results suggest that there are distinguished ecological trade-offs between JA-dependent direct and indirect defences in genetically modified plants whose fitness should be assessed in tritrophic systems and under natural conditions. PMID:21039561

  7. Test Design Document for the Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2006-10-25

    at this site: Timestamp IP Address Description Severity 2003 Sep 03 14:52:28 150.24.11.1 Security-Trojan- Sub7 18 2003 Sep 03 14:52:33...150.24.11.2 Security-Trojan- Sub7 18 2003 Sep 03 14:52:38 150.24.11.3 Security-Trojan- Sub7 18 4. The Security Analyst clicks on one of the lines in this...table: Severity Parameter Name Value Descriptive Details Location 3 HMCS Iroquois Type of Incident 2 Security-Trojan- Sub7 Asset Type 1 Workstation

  8. Manual of Documentation Practices Applicable to Defence-Aerospace Scientific and Technical Information. Volume 4. Section 10 - Security Storage and Control. Section 11 - Organisation and Management. Section 12 - Networks and External Sources of Information

    DTIC Science & Technology

    1981-03-01

    information centre will either be a comple’ety new .reation or an improvement to an existing system. It may replace a group of smaller, dispersed systems whei ...staff in providing these services. The servi.es and funtions )f the centre .ave to be analysed and in the average organization this will reveal three...79,000 1971 113 No. of Dating Namne f’Dato Base (continued) items online from FSTA ( Food Science

  9. Environmental Effects on Constitutive and Inducible Resin Defences of Pinus taeda

    Treesearch

    Maria L. Lombardero; Matthew P. Ayres; Peter L. Lorio; Jonathan J. Ruel

    2000-01-01

    The ecological literature abounds with studies of environmental effects on plant antiherbivore defences. While various models have been proposed (e.g. plant stress, optimal allocation, growth-differentiation balance), each has met with mixed support. One possible explanation for the mixed results is that constitutive and induced defences are differentialiy affected by...

  10. Crowd-out of defence and health spending: is Israel different from other industrialised nations?

    PubMed

    Reeves, Aaron; Stuckler, David

    2013-04-22

    Does high defence spending limit the growth of public health investment? Using comparative data from 31 OECD countries between 1980 and 2010, we find little evidence that defence crowds out public health spending. Whether measured in terms of long-term levels or short-term changes, per capita defence and health spending positively and significantly correlate. To investigate the possibility that countries with high security needs such as Israel exhibit differing patterns, we also compare crowd-out among countries experiencing violent conflicts as well as current high military-spending countries. We observed a greater positive correlation between changes in health and defence spending among conflict-countries (r = 0.65, p < 0.01) than in non-conflict countries (r = 0.12, p = 0.01). However, similar to other high-military spending countries, Israel's politicians reduced defence spending while increasing health expenditure during its recent recession. These analyses reveal that while Israel's politicians have chronically underinvested in public health, there are modest steps being taken to rectify the country's unique and avoidable crowding out of public health from its high military spending.

  11. Induced defences alter the strength and direction of natural selection on reproductive traits in common milkweed.

    PubMed

    Thompson, K A; Cory, K A; Johnson, M T J

    2017-06-01

    Evolutionary biologists have long sought to understand the ecological processes that generate plant reproductive diversity. Recent evidence indicates that constitutive antiherbivore defences can alter natural selection on reproductive traits, but it is unclear whether induced defences will have the same effect and whether reduced foliar damage in defended plants is the cause of this pattern. In a factorial field experiment using common milkweed, Asclepias syriaca L., we induced plant defences using jasmonic acid (JA) and imposed foliar damage using scissors. We found that JA-induced plants experienced selection for more inflorescences that were smaller in size (fewer flowers), whereas control plants only experienced a trend towards selection for larger inflorescences (more flowers); all effects were independent of foliar damage. Our results demonstrate that induced defences can alter both the strength and direction of selection on reproductive traits, and suggest that antiherbivore defences may promote the evolution of plant reproductive diversity. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  12. Can genetic algorithms help virus writers reshape their creations and avoid detection?

    NASA Astrophysics Data System (ADS)

    Abu Doush, Iyad; Al-Saleh, Mohammed I.

    2017-11-01

    Different attack and defence techniques have been evolved over time as actions and reactions between black-hat and white-hat communities. Encryption, polymorphism, metamorphism and obfuscation are among the techniques used by the attackers to bypass security controls. On the other hand, pattern matching, algorithmic scanning, emulation and heuristic are used by the defence team. The Antivirus (AV) is a vital security control that is used against a variety of threats. The AV mainly scans data against its database of virus signatures. Basically, it claims a virus if a match is found. This paper seeks to find the minimal possible changes that can be made on the virus so that it will appear normal when scanned by the AV. Brute-force search through all possible changes can be a computationally expensive task. Alternatively, this paper tries to apply a Genetic Algorithm in solving such a problem. Our proposed algorithm is tested on seven different malware instances. The results show that in all the tested malware instances only a small change in each instance was good enough to bypass the AV.

  13. Dynamic Plant-Plant-Herbivore Interactions Govern Plant Growth-Defence Integration.

    PubMed

    de Vries, Jorad; Evers, Jochem B; Poelman, Erik H

    2017-04-01

    Plants downregulate their defences against insect herbivores upon impending competition for light. This has long been considered a resource trade-off, but recent advances in plant physiology and ecology suggest this mechanism is more complex. Here we propose that to understand why plants regulate and balance growth and defence, the complex dynamics in plant-plant competition and plant-herbivore interactions needs to be considered. Induced growth-defence responses affect plant competition and herbivore colonisation in space and time, which has consequences for the adaptive value of these responses. Assessing these complex interactions strongly benefits from advanced modelling tools that can model multitrophic interactions in space and time. Such an exercise will allow a critical re-evaluation why and how plants integrate defence and competition for light. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. The role of thionins in rice defence against root pathogens.

    PubMed

    Ji, Hongli; Gheysen, Godelieve; Ullah, Chhana; Verbeek, Ruben; Shang, Chenjing; De Vleesschauwer, David; Höfte, Monica; Kyndt, Tina

    2015-10-01

    Thionins are antimicrobial peptides that are involved in plant defence. Here, we present an in-depth analysis of the role of rice thionin genes in defence responses against two root pathogens: the root-knot nematode Meloidogyne graminicola and the oomycete Pythium graminicola. The expression of rice thionin genes was observed to be differentially regulated by defence-related hormones, whereas all analysed genes were consistently down-regulated in M. graminicola-induced galls, at least until 7 days post-inoculation (dpi). Transgenic lines of Oryza sativa cv. Nipponbare overproducing OsTHI7 revealed decreased susceptibility to M. graminicola infection and P. graminicola colonization. Taken together, these results demonstrate the role of rice thionin genes in defence against two of the most damaging root pathogens attacking rice. © 2015 BSPP AND JOHN WILEY & SONS LTD.

  15. Fault tolerant hypercube computer system architecture

    NASA Technical Reports Server (NTRS)

    Madan, Herb S. (Inventor); Chow, Edward (Inventor)

    1989-01-01

    A fault-tolerant multiprocessor computer system of the hypercube type comprising a hierarchy of computers of like kind which can be functionally substituted for one another as necessary is disclosed. Communication between the working nodes is via one communications network while communications between the working nodes and watch dog nodes and load balancing nodes higher in the structure is via another communications network separate from the first. A typical branch of the hierarchy reporting to a master node or host computer comprises, a plurality of first computing nodes; a first network of message conducting paths for interconnecting the first computing nodes as a hypercube. The first network provides a path for message transfer between the first computing nodes; a first watch dog node; and a second network of message connecting paths for connecting the first computing nodes to the first watch dog node independent from the first network, the second network provides an independent path for test message and reconfiguration affecting transfers between the first computing nodes and the first switch watch dog node. There is additionally, a plurality of second computing nodes; a third network of message conducting paths for interconnecting the second computing nodes as a hypercube. The third network provides a path for message transfer between the second computing nodes; a fourth network of message conducting paths for connecting the second computing nodes to the first watch dog node independent from the third network. The fourth network provides an independent path for test message and reconfiguration affecting transfers between the second computing nodes and the first watch dog node; and a first multiplexer disposed between the first watch dog node and the second and fourth networks for allowing the first watch dog node to selectively communicate with individual ones of the computing nodes through the second and fourth networks; as well as, a second watch dog node operably connected to the first multiplexer whereby the second watch dog node can selectively communicate with individual ones of the computing nodes through the second and fourth networks. The branch is completed by a first load balancing node; and a second multiplexer connected between the first load balancing node and the first and second watch dog nodes, allowing the first load balancing node to selectively communicate with the first and second watch dog nodes.

  16. The influence of space and time on the evolution of altruistic defence: the case of ant slave rebellion.

    PubMed

    Metzler, D; Jordan, F; Pamminger, T; Foitzik, S

    2016-05-01

    How can antiparasite defence traits evolve even if they do not directly benefit their carriers? An example of such an indirect defence is rebellion of enslaved Temnothorax longispinosus ant workers against their social parasite Temnothorax americanus, a slavemaking ant. Ant slaves have been observed to kill their oppressors' offspring, a behaviour from which the sterile slaves cannot profit directly. Parasite brood killing could, however, reduce raiding pressure on related host colonies nearby. We analyse with extensive computer simulations for the Temnothorax slavemaker system under what conditions a hypothetical rebel allele could invade a host population, and in particular, how host-parasite dynamics and population structure influence the rebel allele's success. Exploring a wide range of model parameters, we only found a small number of parameter combinations for which kin selection or multilevel selection could allow a slave rebellion allele to spread in the host population. Furthermore, we did not detect any cases in which the reduction of raiding pressure in the close vicinity of the slavemaker nest would substantially contribute to the inclusive fitness of rebels. This suggests that slave rebellion is not costly and perhaps a side-effect of some other beneficial trait. In some of our simulations, however, even a costly rebellion allele could spread in the population. This was possible when host-parasite interactions led to a metapopulation dynamic with frequent local extinctions and recolonizations of demes by the offspring of few immigrants. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  17. Modelling the blast environment and relating this to clinical injury: experience from the 7/7 inquest.

    PubMed

    Hepper, Alan E; Pope, D J; Bishop, M; Kirkman, E; Sedman, A; Russell, R; Mahoney, P F; Clasper, J

    2014-06-01

    This paper addresses the computational modelling of a series of specific blast-related incidents and the relationships of clinical and engineering interpretations. The Royal Centre for Defence Medicine and the Defence Science and Technology Laboratory were tasked in 2010 by the UK Ministry of Defence to assist the Coroner's inquests into the 7 July 2005 London bombings. A three phase approach was taken. The first phase included an engineering expert in blast effects on structures reviewing photographs of the damaged carriages and bus to give a view on the likely physical effects on people close to the explosions. The second phase was a clinical review of the evidence by military clinicians to assess blast injury in the casualties. The third phase was to model the blast environment by structural dynamics experts to assess likely blast loading on victims to evaluate the potential blast loading on individuals. This loading information was then assessed by physiology experts. Once all teams (engineering, clinical and modelling/physiological) had separately arrived at their conclusions, the information streams were integrated to arrive at a consensus. The aim of this paper is to describe the methodology used as a potential model for others to consider if faced with a similar investigation, and to show the benefit of the transition of military knowledge to a civilian environment. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  18. Parental risk management in relation to offspring defence: bad news for kids.

    PubMed

    Mahr, Katharina; Riegler, Georg; Hoi, Herbert

    2015-01-07

    Do parents defend their offspring whenever necessary, and do self-sacrificing parents really exist? Studies recognized that parent defence is dynamic, mainly depending on the threat predators pose. In this context, parental risk management should consider the threat to themselves and to their offspring. Consequently, the observed defence should be a composite of both risk components. Surprisingly, no study so far has determined the influence of these two threat components on parental decision rules. In a field experiment, we investigated parental risk taking in relation to the threat posed to themselves and their offspring. To disentangle the two threat components, we examined defence behaviours of parent blue tits Cyanistes caeruleus towards three different predators and during different nestling developmental stages. Nest defence strategies in terms of alarm call intensity and nearest predator approach differed between the three predators. Defence intensity was only partly explained by threat level. Most importantly, parental risk management varied in relation to their own, but not offspring risk. Parent defence investment was independent of nestling risk when parents followed a high-risk strategy. However, parents considered nestling as well as parental risk when following a low-risk strategy. Our findings could have general implications for the economy of risk management and decision-making strategies in living beings, including humans. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  19. The research of computer network security and protection strategy

    NASA Astrophysics Data System (ADS)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  20. Computer hardware fault administration

    DOEpatents

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-09-14

    Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.

  1. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  2. Hacking Social Networks: Examining the Viability of Using Computer Network Attack Against Social Networks

    DTIC Science & Technology

    2007-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR

  3. To Gain the Academic Capital: The Conflict and Solution in the Dissertation Proposal Defence

    ERIC Educational Resources Information Center

    Ningning, Zhao

    2006-01-01

    Doctor candidates get the academic identity and academic capital in his field by the thesis writing. The dissertation proposal defence hold on the public field promotes the state of academic and legalizes the discipline of the academic community. During the dissertation proposal defence, doctor candidates may face three conflicts. The first is…

  4. Constructing Precisely Computing Networks with Biophysical Spiking Neurons.

    PubMed

    Schwemmer, Michael A; Fairhall, Adrienne L; Denéve, Sophie; Shea-Brown, Eric T

    2015-07-15

    While spike timing has been shown to carry detailed stimulus information at the sensory periphery, its possible role in network computation is less clear. Most models of computation by neural networks are based on population firing rates. In equivalent spiking implementations, firing is assumed to be random such that averaging across populations of neurons recovers the rate-based approach. Recently, however, Denéve and colleagues have suggested that the spiking behavior of neurons may be fundamental to how neuronal networks compute, with precise spike timing determined by each neuron's contribution to producing the desired output (Boerlin and Denéve, 2011; Boerlin et al., 2013). By postulating that each neuron fires to reduce the error in the network's output, it was demonstrated that linear computations can be performed by networks of integrate-and-fire neurons that communicate through instantaneous synapses. This left open, however, the possibility that realistic networks, with conductance-based neurons with subthreshold nonlinearity and the slower timescales of biophysical synapses, may not fit into this framework. Here, we show how the spike-based approach can be extended to biophysically plausible networks. We then show that our network reproduces a number of key features of cortical networks including irregular and Poisson-like spike times and a tight balance between excitation and inhibition. Lastly, we discuss how the behavior of our model scales with network size or with the number of neurons "recorded" from a larger computing network. These results significantly increase the biological plausibility of the spike-based approach to network computation. We derive a network of neurons with standard spike-generating currents and synapses with realistic timescales that computes based upon the principle that the precise timing of each spike is important for the computation. We then show that our network reproduces a number of key features of cortical networks including irregular, Poisson-like spike times, and a tight balance between excitation and inhibition. These results significantly increase the biological plausibility of the spike-based approach to network computation, and uncover how several components of biological networks may work together to efficiently carry out computation. Copyright © 2015 the authors 0270-6474/15/3510112-23$15.00/0.

  5. Computer Networks as a New Data Base.

    ERIC Educational Resources Information Center

    Beals, Diane E.

    1992-01-01

    Discusses the use of communication on computer networks as a data source for psychological, social, and linguistic research. Differences between computer-mediated communication and face-to-face communication are described, the Beginning Teacher Computer Network is discussed, and examples of network conversations are appended. (28 references) (LRW)

  6. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  7. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  8. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  9. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  10. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  11. The North Warning System: A Canadian military SATCOM success

    NASA Astrophysics Data System (ADS)

    Wawryk, Ivan J.

    The strategic threat to North America presented by modern, supersonic bombers and long range cruise missiles has stimulated a modernization of atmospheric defence capability. The North Warning System (NWS), employs a chain of microwave radars across the Arctic and down the east coast of Canada to provide tactical warning and attack assessment information to NORAD and its forces. The responsibility for NWS facilities construction and communications is allocated to Canada. Earlier investigations in Canada and the U.S. had confirmed that an all satellite communications system to link the 47 Canadian NWS radars to command and control centers was more economical than any terrestrial alternative. A project was undertaken by the Canadian Department of National Defence (DND) to acquire and install an integrated, digital satellite communications system for the NWS. This paper outlines the project background and procurement process. System requirements and specifications are discussed and the communications system is described in some detail. The communications equipment will be required to function unmanned in extreme Arctic conditions for extended periods. Specifications called for a long haul communications network (LHCN), a maintenance control system to monitor and control the equipment, and a suite of on-site communications for each location. The LHCN is a fully integrated, redundant satellite system which employs a transponder on each of the Anik D satellites. Either transponder can carry the full communications load. The system is configured as a star network with the hub at North Bay. Five remote stations and the North Bay facility have been built in phase one of the project; the second phase will see the construction of 36 unattended stations across the Arctic and down the Baffin Island and Labrador coasts.

  12. Chemical antipredator defence is linked to higher extinction risk

    PubMed Central

    2016-01-01

    Many attributes of species may be linked to contemporary extinction risk, though some such traits remain untested despite suggestions that they may be important. Here, I test whether a trait associated with higher background extinction rates, chemical antipredator defence, is also associated with current extinction risk, using amphibians as a model system—a group facing global population declines. I find that chemically defended species are approximately 60% more likely to be threatened than species without chemical defence, although the severity of the contemporary extinction risk may not relate to chemical defence. The results confirm that background and contemporary extinction rates can be predicted from the same traits, at least in certain cases. This suggests that associations between extinction risk and phenotypic traits can be temporally stable over long periods. The results also provide novel insights into the relevance of antipredator defences for species subject to conservation concerns. PMID:28018657

  13. Post-translational modification of host proteins in pathogen-triggered defence signalling in plants.

    PubMed

    Stulemeijer, Iris J E; Joosten, Matthieu H A J

    2008-07-01

    Microbial plant pathogens impose a continuous threat to global food production. Similar to animals, an innate immune system allows plants to recognize pathogens and swiftly activate defence. To activate a rapid response, receptor-mediated pathogen perception and subsequent downstream signalling depends on post-translational modification (PTM) of components essential for defence signalling. We discuss different types of PTMs that play a role in mounting plant immunity, which include phosphorylation, glycosylation, ubiquitination, sumoylation, nitrosylation, myristoylation, palmitoylation and glycosylphosphatidylinositol (GPI)-anchoring. PTMs are rapid, reversible, controlled and highly specific, and provide a tool to regulate protein stability, activity and localization. Here, we give an overview of PTMs that modify components essential for defence signalling at the site of signal perception, during secondary messenger production and during signalling in the cytoplasm. In addition, we discuss effectors from pathogens that suppress plant defence responses by interfering with host PTMs.

  14. The tethering of chromatin to the nuclear envelope supports nuclear mechanics

    PubMed Central

    Schreiner, Sarah M.; Koo, Peter K.; Zhao, Yao; Mochrie, Simon G. J.; King, Megan C.

    2015-01-01

    The nuclear lamina is thought to be the primary mechanical defence of the nucleus. However, the lamina is integrated within a network of lipids, proteins and chromatin; the interdependence of this network poses a challenge to defining the individual mechanical contributions of these components. Here, we isolate the role of chromatin in nuclear mechanics by using a system lacking lamins. Using novel imaging analyses, we observe that untethering chromatin from the inner nuclear membrane results in highly deformable nuclei in vivo, particularly in response to cytoskeletal forces. Using optical tweezers, we find that isolated nuclei lacking inner nuclear membrane tethers are less stiff than wild-type nuclei and exhibit increased chromatin flow, particularly in frequency ranges that recapitulate the kinetics of cytoskeletal dynamics. We suggest that modulating chromatin flow can define both transient and long-lived changes in nuclear shape that are biologically important and may be altered in disease. PMID:26074052

  15. Get the Whole Story before You Plug into a Computer Network.

    ERIC Educational Resources Information Center

    Vernot, David

    1989-01-01

    Explains the myths and marvels of computer networks; cites how several schools are utilizing networking; and summarizes where the major computer companies stand today when it comes to networking. (MLF)

  16. Network Coding for Function Computation

    ERIC Educational Resources Information Center

    Appuswamy, Rathinakumar

    2011-01-01

    In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…

  17. LaRC local area networks to support distributed computing

    NASA Technical Reports Server (NTRS)

    Riddle, E. P.

    1984-01-01

    The Langley Research Center's (LaRC) Local Area Network (LAN) effort is discussed. LaRC initiated the development of a LAN to support a growing distributed computing environment at the Center. The purpose of the network is to provide an improved capability (over inteactive and RJE terminal access) for sharing multivendor computer resources. Specifically, the network will provide a data highway for the transfer of files between mainframe computers, minicomputers, work stations, and personal computers. An important influence on the overall network design was the vital need of LaRC researchers to efficiently utilize the large CDC mainframe computers in the central scientific computing facility. Although there was a steady migration from a centralized to a distributed computing environment at LaRC in recent years, the work load on the central resources increased. Major emphasis in the network design was on communication with the central resources within the distributed environment. The network to be implemented will allow researchers to utilize the central resources, distributed minicomputers, work stations, and personal computers to obtain the proper level of computing power to efficiently perform their jobs.

  18. Correcting Blindness In the Nerve Center: How To Improve Situational Awareness

    DTIC Science & Technology

    2015-12-01

    Civil Defence Emergency Management released the Response Management, Director’s Guideline for CDEM Group and Local Controllers document in October...Defence & Emergency Management, Response Management: Director’s Guideline for CDEM Group and Local Controllers (Wellington, New Zealand: Ministry of...Response Management: Director’s Guideline for CDEM Group and Local Controllers . Wellington, New Zealand: Ministry of Civil Defence & Emergency

  19. An Exploratory Study of the Defence Mechanisms Used in Psychotherapy by Adults Who Have Intellectual Disabilities

    ERIC Educational Resources Information Center

    Newman, D. W.; Beail, N.

    2010-01-01

    Problem: A significant concept in psychodynamic theory and practice is that of defence mechanisms. The identifications of defences is a key task of the therapist and these are then used in the formulation and form part of the therapist's interventions. Case studies of psychotherapy with adults who have intellectual disabilities (IDs) suggest that…

  20. An Investigation into the Effects of Roll Gyradius on Experimental Testing and Numerical Simulation: Troubleshooting Emergent Issues

    DTIC Science & Technology

    2015-01-01

    Troubleshooting Emergent Issues Edward Dawson Maritime Division Defence Science and Technology Organisation DSTO-TN-1402 ABSTRACT This...UNCLASSIFIED UNCLASSIFIED Published by Maritime Division DSTO Defence Science and Technology Organisation 506...tools used by the Defence Science and Technology Organisation (DSTO) are an efficient and effective means to determine and evaluate the motion

  1. Lethal and Legal The Ethics of Drone Strikes

    DTIC Science & Technology

    2015-12-01

    analysis, evaluation, and refinement of professional expertise in war, strategy, operations, national security, resource management , and responsible...in business studies and holds an M.Phil. in defence and security studies from the Defence College of Management and Technol- ogy, Defence Academy...in unsafe buildings, search and rescue missions in treacherous conditions, police searches for missing or wanted persons, traffic management , public

  2. The cytoskeleton in cell-autonomous immunity: structural determinants of host defence

    PubMed Central

    Mostowy, Serge; Shenoy, Avinash R.

    2016-01-01

    Host cells use antimicrobial proteins, pathogen-restrictive compartmentalization and cell death in their defence against intracellular pathogens. Recent work has revealed that four components of the cytoskeleton — actin, microtubules, intermediate filaments and septins, which are well known for their roles in cell division, shape and movement — have important functions in innate immunity and cellular self-defence. Investigations using cellular and animal models have shown that these cytoskeletal proteins are crucial for sensing bacteria and for mobilizing effector mechanisms to eliminate them. In this Review, we highlight the emerging roles of the cytoskeleton as a structural determinant of cell-autonomous host defence. PMID:26292640

  3. The Defence Medical Library Service and military medicine.

    PubMed

    Walker, S B

    2005-01-01

    The Defence Medical Library Service (DMLS) supports the clinical practice and career development of military health professionals across the world. Clinical governance and the need for medical knowledge to be evidence-based means the DMLS has a central role to play in support of defence medicine. The DMLS is important for enabling health professionals to make sense of the evidence-based pyramid and the hierarchy of medical knowledge. The Royal Centre for Defence Medicine (RCDM) in Birmingham is recognised as an international centre of excellence. The information, knowledge and research requirements of the RCDM will provide opportunities for the DMLS to support and engage with the academic community.

  4. Proceedings of the DRG Seminar on The Defence of Small Ships against Missile Attacks (30th) Held in Ottawa, Canada on 12-14 September 1990. Volume 1 (Actes de 30ieme Seminaire sur la Defense de Petits Navires Contre les Attaques de Missiles)

    DTIC Science & Technology

    1991-04-12

    LONG TERM 14. Abstract: The paper gives an overview of US Navy programme and objectives of anti-ship missile defence. Both evolutionary near term ...Integration of ESM with radar and IR sensors has Impli- cations with respect to ESM performance in terms of bearing accuracy, sensitivity and robustness in...defence budgets. The Terms of Reference of the Defence Research Group call for exchange of information, and the development of co-operative research

  5. An Overview of Seasonal Changes in Oxidative Stress and Antioxidant Defence Parameters in Some Invertebrate and Vertebrate Species.

    PubMed

    Chainy, Gagan Bihari Nityananda; Paital, Biswaranjan; Dandapat, Jagneswar

    2016-01-01

    Antioxidant defence system, a highly conserved biochemical mechanism, protects organisms from harmful effects of reactive oxygen species (ROS), a by-product of metabolism. Both invertebrates and vertebrates are unable to modify environmental physical factors such as photoperiod, temperature, salinity, humidity, oxygen content, and food availability as per their requirement. Therefore, they have evolved mechanisms to modulate their metabolic pathways to cope their physiology with changing environmental challenges for survival. Antioxidant defences are one of such biochemical mechanisms. At low concentration, ROS regulates several physiological processes, whereas at higher concentration they are toxic to organisms because they impair cellular functions by oxidizing biomolecules. Seasonal changes in antioxidant defences make species able to maintain their correct ROS titre to take various physiological functions such as hibernation, aestivation, migration, and reproduction against changing environmental physical parameters. In this paper, we have compiled information available in the literature on seasonal variation in antioxidant defence system in various species of invertebrates and vertebrates. The primary objective was to understand the relationship between varied biological phenomena seen in different animal species and conserved antioxidant defence system with respect to seasons.

  6. An Overview of Seasonal Changes in Oxidative Stress and Antioxidant Defence Parameters in Some Invertebrate and Vertebrate Species

    PubMed Central

    Chainy, Gagan Bihari Nityananda; Paital, Biswaranjan; Dandapat, Jagneswar

    2016-01-01

    Antioxidant defence system, a highly conserved biochemical mechanism, protects organisms from harmful effects of reactive oxygen species (ROS), a by-product of metabolism. Both invertebrates and vertebrates are unable to modify environmental physical factors such as photoperiod, temperature, salinity, humidity, oxygen content, and food availability as per their requirement. Therefore, they have evolved mechanisms to modulate their metabolic pathways to cope their physiology with changing environmental challenges for survival. Antioxidant defences are one of such biochemical mechanisms. At low concentration, ROS regulates several physiological processes, whereas at higher concentration they are toxic to organisms because they impair cellular functions by oxidizing biomolecules. Seasonal changes in antioxidant defences make species able to maintain their correct ROS titre to take various physiological functions such as hibernation, aestivation, migration, and reproduction against changing environmental physical parameters. In this paper, we have compiled information available in the literature on seasonal variation in antioxidant defence system in various species of invertebrates and vertebrates. The primary objective was to understand the relationship between varied biological phenomena seen in different animal species and conserved antioxidant defence system with respect to seasons. PMID:27127682

  7. Synergistic effects of direct and indirect defences on herbivore egg survival in a wild crucifer

    PubMed Central

    Fatouros, Nina E.; Pineda, Ana; Huigens, Martinus E.; Broekgaarden, Colette; Shimwela, Methew M.; Figueroa Candia, Ilich A.; Verbaarschot, Patrick; Bukovinszky, Tibor

    2014-01-01

    Evolutionary theory of plant defences against herbivores predicts a trade-off between direct (anti-herbivore traits) and indirect defences (attraction of carnivores) when carnivore fitness is reduced. Such a trade-off is expected in plant species that kill herbivore eggs by exhibiting a hypersensitive response (HR)-like necrosis, which should then negatively affect carnivores. We used the black mustard (Brassica nigra) to investigate how this potentially lethal direct trait affects preferences and/or performances of specialist cabbage white butterflies (Pieris spp.), and their natural enemies, tiny egg parasitoid wasps (Trichogramma spp.). Both within and between black mustard populations, we observed variation in the expression of Pieris egg-induced HR. Butterfly eggs on plants with HR-like necrosis suffered lower hatching rates and higher parasitism than eggs that did not induce the trait. In addition, Trichogramma wasps were attracted to volatiles of egg-induced plants that also expressed HR, and this attraction depended on the Trichogramma strain used. Consequently, HR did not have a negative effect on egg parasitoid survival. We conclude that even within a system where plants deploy lethal direct defences, such defences may still act with indirect defences in a synergistic manner to reduce herbivore pressure. PMID:25009068

  8. Cyber-Ed.

    ERIC Educational Resources Information Center

    Ruben, Barbara

    1994-01-01

    Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…

  9. Terminal-oriented computer-communication networks.

    NASA Technical Reports Server (NTRS)

    Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.

    1972-01-01

    Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.

  10. Investigation of different modeling approaches for computational fluid dynamics simulation of high-pressure rocket combustors

    NASA Astrophysics Data System (ADS)

    Ivancic, B.; Riedmann, H.; Frey, M.; Knab, O.; Karl, S.; Hannemann, K.

    2016-07-01

    The paper summarizes technical results and first highlights of the cooperation between DLR and Airbus Defence and Space (DS) within the work package "CFD Modeling of Combustion Chamber Processes" conducted in the frame of the Propulsion 2020 Project. Within the addressed work package, DLR Göttingen and Airbus DS Ottobrunn have identified several test cases where adequate test data are available and which can be used for proper validation of the computational fluid dynamics (CFD) tools. In this paper, the first test case, the Penn State chamber (RCM1), is discussed. Presenting the simulation results from three different tools, it is shown that the test case can be computed properly with steady-state Reynolds-averaged Navier-Stokes (RANS) approaches. The achieved simulation results reproduce the measured wall heat flux as an important validation parameter very well but also reveal some inconsistencies in the test data which are addressed in this paper.

  11. The European computer model for optronic system performance prediction (ECOMOS)

    NASA Astrophysics Data System (ADS)

    Repasi, Endre; Bijl, Piet; Labarre, Luc; Wittenstein, Wolfgang; Bürsing, Helge

    2017-05-01

    ECOMOS is a multinational effort within the framework of an EDA Project Arrangement. Its aim is to provide a generally accepted and harmonized European computer model for computing nominal Target Acquisition (TA) ranges of optronic imagers operating in the Visible or thermal Infrared (IR). The project involves close co-operation of defence and security industry and public research institutes from France, Germany, Italy, The Netherlands and Sweden. ECOMOS uses and combines well-accepted existing European tools to build up a strong competitive position. This includes two TA models: the analytical TRM4 model and the image-based TOD model. In addition, it uses the atmosphere model MATISSE. In this paper, the central idea of ECOMOS is exposed. The overall software structure and the underlying models are shown and elucidated. The status of the project development is given as well as a short outlook on validation tests and the future potential of simulation for sensor assessment.

  12. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  13. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  14. How insects overcome two-component plant chemical defence: plant β-glucosidases as the main target for herbivore adaptation.

    PubMed

    Pentzold, Stefan; Zagrobelny, Mika; Rook, Fred; Bak, Søren

    2014-08-01

    Insect herbivory is often restricted by glucosylated plant chemical defence compounds that are activated by plant β-glucosidases to release toxic aglucones upon plant tissue damage. Such two-component plant defences are widespread in the plant kingdom and examples of these classes of compounds are alkaloid, benzoxazinoid, cyanogenic and iridoid glucosides as well as glucosinolates and salicinoids. Conversely, many insects have evolved a diversity of counteradaptations to overcome this type of constitutive chemical defence. Here we discuss that such counter-adaptations occur at different time points, before and during feeding as well as during digestion, and at several levels such as the insects’ feeding behaviour, physiology and metabolism. Insect adaptations frequently circumvent or counteract the activity of the plant β-glucosidases, bioactivating enzymes that are a key element in the plant’s two-component chemical defence. These adaptations include host plant choice, non-disruptive feeding guilds and various physiological adaptations as well as metabolic enzymatic strategies of the insect’s digestive system. Furthermore, insect adaptations often act in combination, may exist in both generalists and specialists, and can act on different classes of defence compounds. We discuss how generalist and specialist insects appear to differ in their ability to use these different types of adaptations: in generalists, adaptations are often inducible, whereas in specialists they are often constitutive. Future studies are suggested to investigate in detail how insect adaptations act in combination to overcome plant chemical defences and to allow ecologically relevant conclusions.

  15. [Psychotraumatological Defence Mechanisms in the Print Media Coverage of 'September 11'].

    PubMed

    Huss, Jessica Helen; Eichenberg, Christiane

    2016-02-01

    Media have a significant influence on the perception of mental disorders in society. Especially in the case of traumatizations, the indirect confrontation with a traumatic event will lead to the application of psychotraumatological defence mechanisms aiming at retaining an illusory sense of security. Experts assume that journalists are also making use of psychotraumatological defence when reporting on disasters in print media. This, in turn, will influence the reception of traumatic events in the public in general and in the construction of victim and perpetrator in particular. Is there evidence of the employment of psychotraumatological defence mechanisms on the part of the journalists to be found in the German and American print media coverage of 'September 11'? All the articles (N=260) published about the 'September 11' (11 Sep-11 Oct 2001) in 3 German and American newspapers were evaluated by content analyses. In 195 of the N=260 articles analysed, the occurrence of psychotraumatological defence mechanisms could be confirmed (in 74% of the German and 76% of the American articles). The comparison between tabloid and quality print media showed that tabloid journalism tends to make more use of defence strategies (evident in 84% of the German and 86% of the American tabloid press articles). On the basis of these findings a guideline for the compilation of an "optimal article" has been developed with the purpose of preventing the use of psychotraumatological defence. © Georg Thieme Verlag KG Stuttgart · New York.

  16. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    NASA Technical Reports Server (NTRS)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  17. Directly executable formal models of middleware for MANET and Cloud Networking and Computing

    NASA Astrophysics Data System (ADS)

    Pashchenko, D. V.; Sadeq Jaafar, Mustafa; Zinkin, S. A.; Trokoz, D. A.; Pashchenko, T. U.; Sinev, M. P.

    2016-04-01

    The article considers some “directly executable” formal models that are suitable for the specification of computing and networking in the cloud environment and other networks which are similar to wireless networks MANET. These models can be easily programmed and implemented on computer networks.

  18. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT †

    PubMed Central

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-01

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy. PMID:26797620

  19. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.

    PubMed

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-19

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  20. Toxic Diatom Aldehydes Affect Defence Gene Networks in Sea Urchins

    PubMed Central

    Varrella, Stefano; Ruocco, Nadia; Ianora, Adrianna; Bentley, Matt G.; Costantini, Maria

    2016-01-01

    Marine organisms possess a series of cellular strategies to counteract the negative effects of toxic compounds, including the massive reorganization of gene expression networks. Here we report the modulated dose-dependent response of activated genes by diatom polyunsaturated aldehydes (PUAs) in the sea urchin Paracentrotus lividus. PUAs are secondary metabolites deriving from the oxidation of fatty acids, inducing deleterious effects on the reproduction and development of planktonic and benthic organisms that feed on these unicellular algae and with anti-cancer activity. Our previous results showed that PUAs target several genes, implicated in different functional processes in this sea urchin. Using interactomic Ingenuity Pathway Analysis we now show that the genes targeted by PUAs are correlated with four HUB genes, NF-κB, p53, δ-2-catenin and HIF1A, which have not been previously reported for P. lividus. We propose a working model describing hypothetical pathways potentially involved in toxic aldehyde stress response in sea urchins. This represents the first report on gene networks affected by PUAs, opening new perspectives in understanding the cellular mechanisms underlying the response of benthic organisms to diatom exposure. PMID:26914213

  1. Advantages of Parallel Processing and the Effects of Communications Time

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Allman, Mark

    2000-01-01

    Many computing tasks involve heavy mathematical calculations, or analyzing large amounts of data. These operations can take a long time to complete using only one computer. Networks such as the Internet provide many computers with the ability to communicate with each other. Parallel or distributed computing takes advantage of these networked computers by arranging them to work together on a problem, thereby reducing the time needed to obtain the solution. The drawback to using a network of computers to solve a problem is the time wasted in communicating between the various hosts. The application of distributed computing techniques to a space environment or to use over a satellite network would therefore be limited by the amount of time needed to send data across the network, which would typically take much longer than on a terrestrial network. This experiment shows how much faster a large job can be performed by adding more computers to the task, what role communications time plays in the total execution time, and the impact a long-delay network has on a distributed computing system.

  2. Propagation-Loss Measurements and Modelling for Topographically Smooth and Rough Seabeds

    DTIC Science & Technology

    1989-06-01

    34 - UNLIMITED DISTRIBUTION I * National Defence Defense nationale Research and -urcau de recherche Development Branch et developpoment TECHNICAL...Desharnais DTI SEP 1419899 Defence - - Centre de Research 4 Recherches pour la Establishment Defense Atlantic Atlantique Canada8 89 9 14 018 r5Tn f" S...Defence Defense nationale Research and Bureau de recherche Development Branch et developpement PROPAGATION-LOSS MEASUREMENTS AND MODELLING FOR

  3. The Human-Electronic Crew: The Right Stuff? Proceedings of the 4th Joint GAF/RAF/USAF Workshop on Human-Computer Teamwork

    DTIC Science & Technology

    1999-12-01

    the technological and psychological issues but to try and bring to bear some of my operational experience. It is this kind of input that I believe... psychological stress. This is more evident in combat missions, during critical phases of flight, and may become more prevalent with ongoing efforts...Defence’ at St Hugh’s, Oxford Mar 1995. 2 MERRIMAN,S. edit . "Applications of System Ergonomics to Weapon System Development", NATO-DRG Panel 8 Workshop

  4. Near real-time traffic routing

    NASA Technical Reports Server (NTRS)

    Yang, Chaowei (Inventor); Xie, Jibo (Inventor); Zhou, Bin (Inventor); Cao, Ying (Inventor)

    2012-01-01

    A near real-time physical transportation network routing system comprising: a traffic simulation computing grid and a dynamic traffic routing service computing grid. The traffic simulator produces traffic network travel time predictions for a physical transportation network using a traffic simulation model and common input data. The physical transportation network is divided into a multiple sections. Each section has a primary zone and a buffer zone. The traffic simulation computing grid includes multiple of traffic simulation computing nodes. The common input data includes static network characteristics, an origin-destination data table, dynamic traffic information data and historical traffic data. The dynamic traffic routing service computing grid includes multiple dynamic traffic routing computing nodes and generates traffic route(s) using the traffic network travel time predictions.

  5. Discussion on the Technology and Method of Computer Network Security Management

    NASA Astrophysics Data System (ADS)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  6. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 47: The value of computer networks in aerospace

    NASA Technical Reports Server (NTRS)

    Bishop, Ann Peterson; Pinelli, Thomas E.

    1995-01-01

    This paper presents data on the value of computer networks that were obtained from a national survey of 2000 aerospace engineers that was conducted in 1993. Survey respondents reported the extent to which they used computer networks in their work and communication and offered their assessments of the value of various network types and applications. They also provided information about the positive impacts of networks on their work, which presents another perspective on value. Finally, aerospace engineers' recommendations on network implementation present suggestions for increasing the value of computer networks within aerospace organizations.

  7. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  8. How to address patients' defences: a pilot study of the accuracy of defence interpretations and alliance.

    PubMed

    Junod, Olivier; de Roten, Yves; Martinez, Elena; Drapeau, Martin; Despland, Jean-Nicolas

    2005-12-01

    This pilot study examined the accuracy of therapist defence interpretations (TAD) in high-alliance patients (N = 7) and low-alliance patients (N = 8). TAD accuracy was assessed in the two subgroups by comparing for each case the patient's most frequent defensive level with the most frequent defensive level addressed by the therapist when making defence interpretations. Results show that in high-alliance patient-therapist dyads, the therapists tend to address accurate or higher (more mature) defensive level than patients most frequent level. On the other hand, the therapists address lower (more immature) defensive level in low-alliance dyads. These results are discussed along with possible ways to better assess TAD accuracy.

  9. A Low Cost Micro-Computer Based Local Area Network for Medical Office and Medical Center Automation

    PubMed Central

    Epstein, Mel H.; Epstein, Lynn H.; Emerson, Ron G.

    1984-01-01

    A Low Cost Micro-computer based Local Area Network for medical office automation is described which makes use of an array of multiple and different personal computers interconnected by a local area network. Each computer on the network functions as fully potent workstations for data entry and report generation. The network allows each workstation complete access to the entire database. Additionally, designated computers may serve as access ports for remote terminals. Through “Gateways” the network may serve as a front end for a large mainframe, or may interface with another network. The system provides for the medical office environment the expandability and flexibility of a multi-terminal mainframe system at a far lower cost without sacrifice of performance.

  10. HIFiRE-1 Turbulent Shock Boundary Layer Interaction - Flight Data and Computations

    NASA Technical Reports Server (NTRS)

    Kimmel, Roger L.; Prabhu, Dinesh

    2015-01-01

    The Hypersonic International Flight Research Experimentation (HIFiRE) program is a hypersonic flight test program executed by the Air Force Research Laboratory (AFRL) and Australian Defence Science and Technology Organisation (DSTO). This flight contained a cylinder-flare induced shock boundary layer interaction (SBLI). Computations of the interaction were conducted for a number of times during the ascent. The DPLR code used for predictions was calibrated against ground test data prior to exercising the code at flight conditions. Generally, the computations predicted the upstream influence and interaction pressures very well. Plateau pressures on the cylinder were predicted well at all conditions. Although the experimental heat transfer showed a large amount of scatter, especially at low heating levels, the measured heat transfer agreed well with computations. The primary discrepancy between the experiment and computation occurred in the pressures measured on the flare during second stage burn. Measured pressures exhibited large overshoots late in the second stage burn, the mechanism of which is unknown. The good agreement between flight measurements and CFD helps validate the philosophy of calibrating CFD against ground test, prior to exercising it at flight conditions.

  11. Class network routing

    DOEpatents

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  12. Evicting cuckoo nestlings from the nest: a new anti-parasitism behaviour

    PubMed Central

    Sato, Nozomu J.; Tokue, Kihoko; Noske, Richard A.; Mikami, Osamu K.; Ueda, Keisuke

    2010-01-01

    As avian brood parasitism usually reduces hosts' reproductive success, hosts often exhibit strong defence mechanisms. While such host defences at the egg stage (especially egg rejection) have been extensively studied, defence mechanisms at the nestling stage have been reported only recently. We found a previously unknown anti-parasitism behaviour in the large-billed Gerygone, which is a host species of the little bronze-cuckoo, a host-evicting brood parasite. The hosts forcibly pulled resisting nestlings out of their nests and dumped them. Although it has been suggested that defence mechanisms at the nestling stage may evolve when host defence at the egg stage is evaded by the parasite, the studied host seems to lack an anti-parasitism strategy at the egg stage. This suggests that the evolutionary pathway may be quite different from those of previously studied cuckoo–host systems. Future research on this unique system may give us new insights into the evolution of avian brood parasitism. PMID:19776068

  13. Arabidopsis myrosinases link the glucosinolate-myrosinase system and the cuticle

    PubMed Central

    Ahuja, Ishita; de Vos, Ric C. H.; Rohloff, Jens; Stoopen, Geert M.; Halle, Kari K.; Ahmad, Samina Jam Nazeer; Hoang, Linh; Hall, Robert D.; Bones, Atle M.

    2016-01-01

    Both physical barriers and reactive phytochemicals represent two important components of a plant’s defence system against environmental stress. However, these two defence systems have generally been studied independently. Here, we have taken an exclusive opportunity to investigate the connection between a chemical-based plant defence system, represented by the glucosinolate-myrosinase system, and a physical barrier, represented by the cuticle, using Arabidopsis myrosinase (thioglucosidase; TGG) mutants. The tgg1, single and tgg1 tgg2 double mutants showed morphological changes compared to wild-type plants visible as changes in pavement cells, stomatal cells and the ultrastructure of the cuticle. Extensive metabolite analyses of leaves from tgg mutants and wild-type Arabidopsis plants showed altered levels of cuticular fatty acids, fatty acid phytyl esters, glucosinolates, and indole compounds in tgg single and double mutants as compared to wild-type plants. These results point to a close and novel association between chemical defence systems and physical defence barriers. PMID:27976683

  14. Defence 2000: Our Future Defence Force

    DTIC Science & Technology

    2000-01-01

    People are Capability 61 The Dimensions of the Challenge 62 Leadership 63 Retention 63 Recruitment 66 Education and Training 68 Reserves 69 Cadets 72...As part of its strategy to attract and retain high quality people, Defence is investing in modern, effective and efficient education and training...areas like education and health has been limited, and law and order have deteriorated. Many of these problems can be traced to weaknesses in its

  15. New Zealand Defense into 2035 -- Future 35 Strategy

    DTIC Science & Technology

    2012-12-14

    language and grammar used is therefore designed to meet United States requirements, rather than those expected in New Zealand. The change of spelling...accessed 15 March 2012). 3New Zealand Government, Ministry of Defence, Defence White Paper 2010, November 2010, http://nzdf.mil.nz/downloads/ pdf ...public-docs/2010/ defence_white_paper_2010. pdf (accessed 15 March 2012), 16. 2 world, and the wider Search and Rescue Zone exponentially increases

  16. Targeted predation of extrafloral nectaries by insects despite localized chemical defences

    PubMed Central

    Gish, Moshe; Mescher, Mark C.; De Moraes, Consuelo M.

    2015-01-01

    Extrafloral (EF) nectaries recruit carnivorous arthropods that protect plants from herbivory, but they can also be exploited by nectar thieves. We studied the opportunistic, targeted predation (and destruction) of EF nectaries by insects, and the localized chemical defences that plants presumably use to minimize this effect. In field and laboratory experiments, we identified insects that were possibly responsible for EF nectary predation in Vicia faba (fava bean) and determined the extent and accuracy of the feeding damage done to the EF nectaries by these insects. We also performed biochemical analyses of plant tissue samples in order to detect microscale distribution patterns of chemical defences in the area of the EF nectary. We observed selective, targeted feeding on EF nectaries by several insect species, including some that are otherwise not primarily herbivorous. Biochemical analyses revealed high concentrations of l-3,4-dihydroxyphenylalanine, a non-protein amino acid that is toxic to insects, near and within the EF nectaries. These results suggest that plants allocate defences to the protection of EF nectaries from predation, consistent with expectations of optimal defence theory, and that this may not be entirely effective, as insects limit their exposure to these defences by consuming only the secreting tissue of the nectary. PMID:26446809

  17. On the study of plant defence and herbivory using comparative approaches: how important are secondary plant compounds.

    PubMed

    Agrawal, Anurag A; Weber, Marjorie G

    2015-10-01

    Species comparisons are a cornerstone of biology and there is a long tradition of using the comparative framework to study the ecology and evolution of plant defensive traits. Early comparative studies led to the hypothesis that plant chemistry plays a central role in plant defence, and the evolution of plant secondary chemistry in response to insect herbivory remains a classic example of coevolution. However, recent comparative work has disagreed with this paradigm, reporting little connection between plant secondary chemicals and herbivory across distantly related plant taxa. One conclusion of this new work is that the importance of secondary chemistry in plant defence may have been generally overstated in earlier research. Here, we attempt to reconcile these contradicting viewpoints on the role of plant chemistry in defence by critically evaluating the use and interpretation of species correlations as a means to study defence-herbivory relationships. We conclude that the notion that plant primary metabolites (e.g. leaf nitrogen content) are the principal determinants of herbivory (or the target of natural selection by herbivores) is not likely to be correct. Despite the inference of recent community-wide studies of herbivory, strong evidence remains for a prime role of secondary compounds in plant defence against herbivores. © 2015 John Wiley & Sons Ltd/CNRS.

  18. Computer network security for the radiology enterprise.

    PubMed

    Eng, J

    2001-08-01

    As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.

  19. Efficiently modeling neural networks on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  20. Variation in defence strategies in two species of the genus Beilschmiedia under differing soil nutrient and rainfall conditions.

    PubMed

    Simon, J; Miller, R E; Woodrow, I E

    2007-01-01

    The relationships between various leaf functional traits that are important in plant growth (e.g., specific leaf area) have been investigated in recent studies; however, research in this context on plants that are highly protected by chemical defences, particularly resource-demanding nitrogen-based defence, is lacking. We collected leaves from cyanogenic (N-defended) Beilschmiedia collina B. Hyland and acyanogenic (C-defended) Beilschmiedia tooram (F. M. Bailey) B. Hyland at high- and low-soil nutrient sites in two consecutive years that varied significantly in rainfall. We then measured the relationships between chemical defence and morphological and functional leaf traits under the different environmental conditions. We found that the two species differed significantly in their resource allocation to defence as well as leaf morphology and function. The N defended species had a higher leaf nitrogen concentration, whereas the C-defended species had higher amounts of C-based chemical defences (i.e., total phenolics and condensed tannins). The C-defended species also tended to have higher force to fracture and increased leaf toughness. In B. collina, cyanogenic glycoside concentration was higher with higher rainfall, but not with higher soil nutrients. Total phenolic concentration was higher at the high soil nutrient site in B. tooram, but lower in B. collina; however, with higher rainfall an increase was found in B. tooram, while phenolics decreased in B. collina. Condensed tannin concentration decreased in both species with rainfall and nutrient availability. We conclude that chemical defence is correlated with leaf functional traits and that variation in environmental resources affects this correlation.

  1. Hyperswitch Communication Network Computer

    NASA Technical Reports Server (NTRS)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  2. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    ERIC Educational Resources Information Center

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

  3. The Effectiveness, Costs and Coastal Protection Benefits of Natural and Nature-Based Defences.

    PubMed

    Narayan, Siddharth; Beck, Michael W; Reguero, Borja G; Losada, Iñigo J; van Wesenbeeck, Bregje; Pontee, Nigel; Sanchirico, James N; Ingram, Jane Carter; Lange, Glenn-Marie; Burks-Copes, Kelly A

    2016-01-01

    There is great interest in the restoration and conservation of coastal habitats for protection from flooding and erosion. This is evidenced by the growing number of analyses and reviews of the effectiveness of habitats as natural defences and increasing funding world-wide for nature-based defences-i.e. restoration projects aimed at coastal protection; yet, there is no synthetic information on what kinds of projects are effective and cost effective for this purpose. This paper addresses two issues critical for designing restoration projects for coastal protection: (i) a synthesis of the costs and benefits of projects designed for coastal protection (nature-based defences) and (ii) analyses of the effectiveness of coastal habitats (natural defences) in reducing wave heights and the biophysical parameters that influence this effectiveness. We (i) analyse data from sixty-nine field measurements in coastal habitats globally and examine measures of effectiveness of mangroves, salt-marshes, coral reefs and seagrass/kelp beds for wave height reduction; (ii) synthesise the costs and coastal protection benefits of fifty-two nature-based defence projects and; (iii) estimate the benefits of each restoration project by combining information on restoration costs with data from nearby field measurements. The analyses of field measurements show that coastal habitats have significant potential for reducing wave heights that varies by habitat and site. In general, coral reefs and salt-marshes have the highest overall potential. Habitat effectiveness is influenced by: a) the ratios of wave height-to-water depth and habitat width-to-wavelength in coral reefs; and b) the ratio of vegetation height-to-water depth in salt-marshes. The comparison of costs of nature-based defence projects and engineering structures show that salt-marshes and mangroves can be two to five times cheaper than a submerged breakwater for wave heights up to half a metre and, within their limits, become more cost effective at greater depths. Nature-based defence projects also report benefits ranging from reductions in storm damage to reductions in coastal structure costs.

  4. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective

    PubMed Central

    Gu, Shuo

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed. PMID:28690664

  5. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective.

    PubMed

    Gu, Shuo; Pei, Jianfeng

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed.

  6. HeNCE: A Heterogeneous Network Computing Environment

    DOE PAGES

    Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; ...

    1994-01-01

    Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more » The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less

  7. Experimental and computational investigation of lateral gauge response in polycarbonate

    NASA Astrophysics Data System (ADS)

    Eliot, Jim; Harris, Ernest Joseph; Hazell, Paul; Appleby-Thomas, Gareth James; Winter, Ron; Wood, David Christopher

    2012-03-01

    The shock behaviour of polycarbonate is of interest due to its extensive use in defence applications. Interestingly, embedded lateral manganin stress gauges in polycarbonate have shown gradients behind incident shocks, suggestive of increasing shear strength. However, such gauges are commonly embedded in a central epoxy interlayer. This is an inherently invasive approach. Recently, research has suggested that in such systems interlayer/target impedance may contribute to observed gradients in lateral stress. Here, experimental T-gauge (Vishay Micro-Measurements® type J2M-SS-580SF-025) traces from polycarbonate targets are compared to computational simulations. The effects of gauge environment are investigated by looking at the response of lateral gauges with both standard "glued-joint" and a "dry joint" encapsulation, where no encapsulating medium is employed.

  8. Analysis of Computer Network Information Based on "Big Data"

    NASA Astrophysics Data System (ADS)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  9. Pacific Educational Computer Network Study. Final Report.

    ERIC Educational Resources Information Center

    Hawaii Univ., Honolulu. ALOHA System.

    The Pacific Educational Computer Network Feasibility Study examined technical and non-technical aspects of the formation of an international Pacific Area computer network for higher education. The technical study covered the assessment of the feasibility of a packet-switched satellite and radio ground distribution network for data transmission…

  10. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    ERIC Educational Resources Information Center

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  11. The Case for the Development of a Theoretical Framework for Defence Acquisition

    DTIC Science & Technology

    2014-04-30

    the preliminary results of a pan-European working party of defence academics based in Sweden, Germany , and the UK. This group sought to surface the...preliminary results of a pan-European working party of defence academics based in Sweden, Germany , and the UK. This group sought to surface the...it involved a series of on-going discussions over a six month period between European academics and practitioners (drawn from France, Germany

  12. Definition of a Process for Determining an Appropriate Force Structure for the Air Element of the Australian Defence Force

    DTIC Science & Technology

    1989-05-01

    in covering the declared area of interest . Radii of action for naval vessels, a prime determinant of size and thus cost, are even more difficult to...Area of Defence Interest .......... 3 Scope of this paper ........................... 3 Ain ........................................... 5 Outline...discussing briefly the size of the area declared by the Australian government to be its area of military interest . 2 Australla*s Area of Defence

  13. Molecular aspects of defence priming.

    PubMed

    Conrath, Uwe

    2011-10-01

    Plants can be primed for more rapid and robust activation of defence to biotic or abiotic stress. Priming follows perception of molecular patterns of microbes or plants, recognition of pathogen-derived effectors or colonisation by beneficial microbes. However the process can also be induced by treatment with some natural or synthetic compounds and wounding. The primed mobilization of defence is often associated with development of immunity and stress tolerance. Although the phenomenon has been known for decades, the molecular basis of priming is poorly understood. Here, I summarize recent progress made in unravelling molecular aspects of defence priming that is the accumulation of dormant mitogen-activated protein kinases, chromatin modifications and alterations of primary metabolism. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Distributed Computer Networks in Support of Complex Group Practices

    PubMed Central

    Wess, Bernard P.

    1978-01-01

    The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.

  15. Military clouds: utilization of cloud computing systems at the battlefield

    NASA Astrophysics Data System (ADS)

    Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai

    2012-05-01

    Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.

  16. Enhancing Chemical Inventory Management in Laboratory through a Mobile-Based QR Code Tag

    NASA Astrophysics Data System (ADS)

    Shukran, M. A. M.; Ishak, M. S.; Abdullah, M. N.

    2017-08-01

    The demand for a greater inventory management system which can provide a lot of useful information from a single scan has made laboratory inventory management using barcode technology more difficult. Since the barcode technology lacks the ability to overcome the problem and is not capable of providing information needed to manage the chemicals in the laboratory, thus employing a QR code technology is the best solution. In this research, the main idea is to develop a standalone application running with its own database that is periodically synchronized with the inventory software hosted by the computer and connected to a specialized network as well. The first process required to establish this centralized system is to determine all inventory available in the chemical laboratory by referring to the documented data in order to develop the database. Several customization and enhancement were made to the open source QR code technology to ensure the developed application is dedicated for its main purposes. As the end of the research, it was proven that the system is able to track the position of all inventory and showing real time information about the scanned chemical labels. This paper intends to give an overview about the QR tag inventory system that was developed and its implementation at the National Defence University of Malaysia’s (NDUM) chemical laboratory.

  17. Automated Generation of 3D Volcanic Gas Plume Models for Geobrowsers

    NASA Astrophysics Data System (ADS)

    Wright, T. E.; Burton, M.; Pyle, D. M.

    2007-12-01

    A network of five UV spectrometers on Etna automatically gathers column amounts of SO2 during daylight hours. Near-simultaneous scans from adjacent spectrometers, comprising 210 column amounts in total, are then converted to 2D slices showing the spatial distribution of the gas by tomographic reconstruction. The trajectory of the plume is computed using an automatically-submitted query to NOAA's HYSPLIT Trajectory Model. This also provides local estimates of air temperature, which are used to determine the atmospheric stability and therefore the degree to which the plume is dispersed by turbulence. This information is sufficient to construct an animated sequence of models which show how the plume is advected and diffused over time. These models are automatically generated in the Collada Digital Asset Exchange format and combined into a single file which displays the evolution of the plume in Google Earth. These models are useful for visualising and predicting the shape and distribution of the plume for civil defence, to assist field campaigns and as a means of communicating some of the work of volcano observatories to the public. The Simultaneous Algebraic Reconstruction Technique is used to create the 2D slices. This is a well-known method, based on iteratively updating a forward model (from 2D distribution to column amounts). Because it is based on a forward model, it also provides a simple way to quantify errors.

  18. Configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks

    DOEpatents

    Archer, Charles J.; Inglett, Todd A.; Ratterman, Joseph D.; Smith, Brian E.

    2010-03-02

    Methods, apparatus, and products are disclosed for configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks, the compute nodes in the operational group connected together for data communications through a global combining network, that include: partitioning the compute nodes in the operational group into a plurality of non-overlapping subgroups; designating one compute node from each of the non-overlapping subgroups as a master node; and assigning, to the compute nodes in each of the non-overlapping subgroups, class routing instructions that organize the compute nodes in that non-overlapping subgroup as a collective network such that the master node is a physical root.

  19. EOSPEC: a complementary toolbox for MODTRAN calculations

    NASA Astrophysics Data System (ADS)

    Dion, Denis

    2016-09-01

    For more than a decade, Defence Research and Development Canada (DRDC) has been developing a Library of computer models for the calculations of atmospheric effects on EO-IR sensor performances. The Library, called EOSPEC-LIB (EO-IR Sensor PErformance Computation LIBrary) has been designed as a complement to MODTRAN, the radiative transfer code developed by the Air Force Research Laboratory and Spectral Science Inc. in the USA. The Library comprises modules for the definition of the atmospheric conditions, including aerosols, and provides modules for the calculation of turbulence and fine refraction effects. SMART (Suite for Multi-resolution Atmospheric Radiative Transfer), a key component of EOSPEC, allows one to perform fast computations of transmittances and radiances using MODTRAN through a wide-band correlated-k computational approach. In its most recent version, EOSPEC includes a MODTRAN toolbox whose functions help generate in a format compatible to MODTRAN 5 and 6 atmospheric and aerosol profiles, user-defined refracted optical paths and inputs for configuring the MODTRAN sea radiance (BRDF) model. The paper gives an overall description of the EOSPEC features and capacities. EOSPEC provides augmented capabilities for computations in the lower atmosphere, and for computations in maritime environments.

  20. The Merit Computer Network

    ERIC Educational Resources Information Center

    Aupperle, Eric M.; Davis, Donna L.

    1978-01-01

    The successful Merit Computer Network is examined in terms of both technology and operational management. The network is fully operational and has a significant and rapidly increasing usage, with three major institutions currently sharing computer resources. (Author/CMV)

  1. Uncovering Ultrastructural Defences in Daphnia magna – An Interdisciplinary Approach to Assess the Predator-Induced Fortification of the Carapace

    PubMed Central

    Rabus, Max; Söllradl, Thomas; Clausen-Schaumann, Hauke; Laforsch, Christian

    2013-01-01

    The development of structural defences, such as the fortification of shells or exoskeletons, is a widespread strategy to reduce predator attack efficiency. In unpredictable environments these defences may be more pronounced in the presence of a predator. The cladoceran Daphnia magna (Crustacea: Branchiopoda: Cladocera) has been shown to develop a bulky morphotype as an effective inducible morphological defence against the predatory tadpole shrimp Triopscancriformis (Crustacea: Branchiopoda: Notostraca). Mediated by kairomones, the daphnids express an increased body length, width and an elongated tail spine. Here we examined whether these large scale morphological defences are accompanied by additional ultrastructural defences, i.e. a fortification of the exoskeleton. We employed atomic force microscopy (AFM) based nanoindentation experiments to assess the cuticle hardness along with tapping mode AFM imaging to visualise the surface morphology for predator exposed and non-predator exposed daphnids. We used semi-thin sections of the carapace to measure the cuticle thickness, and finally, we used fluorescence microscopy to analyse the diameter of the pillars connecting the two carapace layers. We found that D . magna indeed expresses ultrastructural defences against Triops predation. The cuticle in predator exposed individuals is approximately five times harder and two times thicker than in control daphnids. Moreover, the pillar diameter is significantly increased in predator exposed daphnids. These predator-cue induced changes in the carapace architecture should provide effective protection against being crushed by the predator’s mouthparts and may add to the protective effect of bulkiness. This study highlights the potential of interdisciplinary studies to uncover new and relevant aspects even in extensively studied fields of research. PMID:23776711

  2. Both heavy metal-amendment of soil and aphid-infestation increase Cd and Zn concentrations in phloem exudates of a metal-hyperaccumulating plant.

    PubMed

    Stolpe, Clemens; Giehren, Franziska; Krämer, Ute; Müller, Caroline

    2017-07-01

    Plants that are able to hyperaccumulate heavy metals show increased concentrations of these metals in their leaf tissue. However, little is known about the concentrations of heavy metals and of organic defence metabolites in the phloem sap of these plants in response to either heavy metal-amendment of the soil or biotic challenges such as aphid-infestation. In this study, we investigated the effects of heavy metal-exposure and of aphid-infestation on phloem exudate composition of the metal hyperaccumulator species Arabidopsis halleri L. O'Kane & Al-Shehbaz (Brassicaceae). The concentrations of elements and of organic defence compounds, namely glucosinolates, were measured in phloem exudates of young and old (mature) leaves of plants challenged either by amendment of the soil with cadmium and zinc and/or by an infestation with the generalist aphid Myzus persicae. Metal-amendment of the soil led to increased concentrations of Cd and Zn, but also of two other elements and one indole glucosinolate, in phloem exudates. This enhanced defence in the phloem sap of heavy metal-hyperaccumulating plants can thus potentially act as effective protection against aphids, as predicted by the elemental defence hypothesis. Aphid-infestation also caused enhanced Cd and Zn concentrations in phloem exudates. This result provides first evidence that metal-hyperaccumulating plants can increase heavy metal concentrations tissue-specifically in response to an attack by phloem-sucking herbivores. Overall, the concentrations of most elements, including the heavy metals, and glucosinolates were higher in phloem exudates of young leaves than in those of old leaves. This defence distribution highlights that the optimal defence theory, which predicts more valuable tissue to be better defended, is applicable for both inorganic and organic defences. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. The effects of age and social interactions on innate immunity in a leaf-cutting ant.

    PubMed

    Armitage, Sophie A O; Boomsma, Jacobus J

    2010-07-01

    Both developmental and environmental factors shape investment in costly immune defences. Social insect workers have different selection pressures on their innate immune system compared to non-social insects because workers do not reproduce and their longevity affects the fitness of relatives. Furthermore, hygienic behavioural defences found in social insects can result in increased survival after fungal infection, although it is not known if there is modulation in physiological immune defence associated with group living vs. solitary living. Here we investigated whether physiological immune defence is affected by both age and the short-term presence or absence of nestmates in the leaf-cutting ant Acromyrmex octospinosus. We predicted that older ants would show immune senescence and that group living may result in prophylactic differences in immune defence compared to solitarily kept ants. We kept old and young workers alone or in nestmate groups for 48h and assayed a key innate immune system enzyme, expressing phenoloxidase (PO) and its stored precursor (proPO), a defence that acts immediately, i.e. it is constitutive. Short-term solitary living did not affect PO or proPO levels relative to group living controls and we found no evidence for immunosenescence in proPO. However, we found a significant increase in active PO in older workers, which is consistent with two non-mutually exclusive explanations: it could be an adaptive response or indicative of immunosenescence. Our results suggest that future studies of immunosenescence should consider both active immune effectors in the body, such as PO, and the stored potential to express immune defences, such as proPO. Copyright 2010 Elsevier Ltd. All rights reserved.

  4. Plant defence as a complex and changing phenotype throughout ontogeny

    PubMed Central

    Ochoa-López, Sofía; Villamil, Nora; Zedillo-Avelleyra, Paulina; Boege, Karina

    2015-01-01

    Background and Aims Ontogenetic changes in anti-herbivore defences are common and result from variation in resource availability and herbivore damage throughout plant development. However, little is known about the simultaneous changes of multiple defences across the entire development of plants, and how such changes affect plant damage in the field. The aim of this study was to assess if changes in the major types of plant resistance and tolerance can explain natural herbivore damage throughout plant ontogeny. Methods An assessment was made of how six defensive traits, including physical, chemical and biotic resistance, simultaneously change across the major transitions of plant development, from seedlings to reproductive stages of Turnera velutina growing in the greenhouse. In addition, an experiment was performed to assess how plant tolerance to artificial damage to leaves changed throughout ontogeny. Finally, leaf damage by herbivores was evaluated in a natural population. Key Results The observed ontogenetic trajectories of all defences were significantly different, sometimes showing opposite directions of change. Whereas trichome density, leaf toughness, extrafloral nectary abundance and nectar production increased, hydrogen cyanide and compensatory responses decreased throughout plant development, from seedlings to reproductive plants. Only water content was higher at the intermediate juvenile ontogenetic stages. Surveys in a natural population over 3 years showed that herbivores consumed more tissue from juvenile plants than from younger seedlings or older reproductive plants. This is consistent with the fact that juvenile plants were the least defended stage. Conclusions The results suggest that defensive trajectories are a mixed result of predictions by the Optimal Defence Theory and the Growth–Differentiation Balance Hypothesis. The study emphasizes the importance of incorporating multiple defences and plant ontogeny into further studies for a more comprehensive understanding of plant defence evolution. PMID:26220657

  5. Imposed glutathione-mediated redox switch modulates the tobacco wound-induced protein kinase and salicylic acid-induced protein kinase activation state and impacts on defence against Pseudomonas syringae

    PubMed Central

    Matern, Sanja; Peskan-Berghoefer, Tatjana; Gromes, Roland; Kiesel, Rebecca Vazquez; Rausch, Thomas

    2015-01-01

    The role of the redox-active tripeptide glutathione in plant defence against pathogens has been studied extensively; however, the impact of changes in cellular glutathione redox potential on signalling processes during defence reactions has remained elusive. This study explored the impact of elevated glutathione content on the cytosolic redox potential and on early defence signalling at the level of mitogen-activated protein kinases (MAPKs), as well as on subsequent defence reactions, including changes in salicylic acid (SA) content, pathogenesis-related gene expression, callose depositions, and the hypersensitive response. Wild-type (WT) Nicotiana tabacum L. and transgenic high-glutathione lines (HGL) were transformed with the cytosol-targeted sensor GRX1-roGFP2 to monitor the cytosolic redox state. Surprisingly, HGLs displayed an oxidative shift in their cytosolic redox potential and an activation of the tobacco MAPKs wound-induced protein kinase (WIPK) and SA-induced protein kinase (SIPK). This activation occurred in the absence of any change in free SA content, but was accompanied by constitutively increased expression of several defence genes. Similarly, rapid activation of MAPKs could be induced in WT tobacco by exposure to either reduced or oxidized glutathione. When HGL plants were challenged with adapted or non-adapted Pseudomonas syringae pathovars, the cytosolic redox shift was further amplified and the defence response was markedly increased, showing a priming effect for SA and callose; however, the initial and transient hyperactivation of MAPK signalling was attenuated in HGLs. The results suggest that, in tobacco, MAPK and SA signalling may operate independently, both possibly being modulated by the glutathione redox potential. Possible mechanisms for redox-mediated MAPK activation are discussed. PMID:25628332

  6. Silicon-mediated resistance of Arabidopsis against powdery mildew involves mechanisms other than the salicylic acid (SA)-dependent defence pathway.

    PubMed

    Vivancos, Julien; Labbé, Caroline; Menzies, James G; Bélanger, Richard R

    2015-08-01

    On absorption by plants, silicon (Si) offers protection against many fungal pathogens, including powdery mildews. The mechanisms by which Si exerts its prophylactic role remain enigmatic, although a prevailing hypothesis suggests that Si positively influences priming. Attempts to decipher Si properties have been limited to plants able to absorb Si, which excludes the model plant Arabidopsis because it lacks Si influx transporters. In this work, we were able to engineer Arabidopsis plants with an Si transporter from wheat (TaLsi1) and to exploit mutants (pad4 and sid2) deficient in salicylic acid (SA)-dependent defence responses to study their phenotypic response and changes in defence expression against Golovinomyces cichoracearum (Gc) following Si treatment. Our results showed that TaLsi1 plants contained significantly more Si and were significantly more resistant to Gc infection than control plants when treated with Si, the first such demonstration in a plant transformed with a heterologous Si transporter. The resistant plants accumulated higher levels of SA and expressed higher levels of transcripts encoding defence genes, thus suggesting a role for Si in the process. However, TaLsi1 pad4 and TaLsi1 sid2 plants were also more resistant to Gc than were pad4 and sid2 plants following Si treatment. Analysis of the resistant phenotypes revealed a significantly reduced production of SA and expression of defence genes comparable with susceptible controls. These results indicate that Si contributes to Arabidopsis defence priming following pathogen infection, but highlight that Si will confer protection even when priming is altered. We conclude that Si-mediated protection involves mechanisms other than SA-dependent defence responses. © 2014 BSPP AND JOHN WILEY & SONS LTD.

  7. Physcomitrella patens activates reinforcement of the cell wall, programmed cell death and accumulation of evolutionary conserved defence signals, such as salicylic acid and 12-oxo-phytodienoic acid, but not jasmonic acid, upon Botrytis cinerea infection.

    PubMed

    Ponce De León, Inés; Schmelz, Eric A; Gaggero, Carina; Castro, Alexandra; Álvarez, Alfonso; Montesano, Marcos

    2012-10-01

    The moss Physcomitrella patens is an evolutionarily basal model system suitable for the analysis of plant defence responses activated after pathogen assault. Upon infection with the necrotroph Botrytis cinerea, several defence mechanisms are induced in P. patens, including the fortification of the plant cell wall by the incorporation of phenolic compounds and the induced expression of related genes. Botrytis cinerea infection also activates the accumulation of reactive oxygen species and cell death with hallmarks of programmed cell death in moss tissues. Salicylic acid (SA) levels also increase after fungal infection, and treatment with SA enhances transcript accumulation of the defence gene phenylalanine ammonia-lyase (PAL) in P. patens colonies. The expression levels of the genes involved in 12-oxo-phytodienoic acid (OPDA) synthesis, including lipoxygenase (LOX) and allene oxide synthase (AOS), increase in P. patens gametophytes after pathogen assault, together with a rise in free linolenic acid and OPDA concentrations. However, jasmonic acid (JA) could not be detected in healthy or infected tissues of this plant. Our results suggest that, although conserved defence signals, such as SA and OPDA, are synthesized and are probably involved in the defence response of P. patens against B. cinerea infection, JA production appears to be missing. Interestingly, P. patens responds to OPDA and methyl jasmonate by reducing moss colony growth and rhizoid length, suggesting that jasmonate perception is present in mosses. Thus, P. patens can provide clues with regard to the evolution of different defence pathways in plants, including signalling and perception of OPDA and jasmonates in nonflowering and flowering plants. © 2012 THE AUTHORS. MOLECULAR PLANT PATHOLOGY © 2012 BSPP AND BLACKWELL PUBLISHING LTD.

  8. Research and realization implementation of monitor technology on illegal external link of classified computer

    NASA Astrophysics Data System (ADS)

    Zhang, Hong

    2017-06-01

    In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.

  9. American Military History: A Selected Bibliography

    DTIC Science & Technology

    2013-04-01

    34 Defence Studies 5, no. 1 (March 2005): 151-164. Taylor & Francis Haycock, R. G. "The Relevance and Role of the Battlefield Tour and the Staff Ride...for Armed Forces in the 21st Century Introduction." Defence Studies 5, no. 1 (March 2005): 5-14. Taylor & Francis 2 Howard, Michael. "The Use and...Staff Rides: History and Historiography." Defence Studies 5, no. 1 (March 2005): 48-58. Taylor & Francis Lee, Wayne E. "Mind and Matter—Cultural

  10. The Audit of Explosives Storage and Transport Within the Australian Defence Force

    DTIC Science & Technology

    1994-08-01

    Headquarters Australian Defence Force Australian Ordnance Council THE AUDIT OF EXPLOSIVES STORAGE AND TRANSPORT WITHIN THE AUSTRALIAN DEFENCE FORCE...control number. 1. REPORT DATE AUG 1994 2. REPORT TYPE 3. DATES COVERED 00-00-1994 to 00-00-1994 4. TITLE AND SUBTITLE The Audit of Explosives...8-98) Prescribed by ANSI Std Z39-18 THE AUDIT OF EXPLOSIVES STORAGE AND TRANSPORT WITHIN THE AUSTRALIAN DFFENCE FORCE - by R.W. Johnson and M.J

  11. Expression profiles of defence related cDNAs in oil palm (Elaeis guineensis Jacq.) inoculated with mycorrhizae and Trichoderma harzianum Rifai T32.

    PubMed

    Tan, Yung-Chie; Wong, Mui-Yun; Ho, Chai-Ling

    2015-11-01

    Basal stem rot is one of the major diseases of oil palm (Elaies guineensis Jacq.) caused by pathogenic Ganoderma species. Trichoderma and mycorrhizae were proposed to be able to reduce the disease severity. However, their roles in improving oil palm defence system by possibly inducing defence-related genes in the host are not well characterized. To better understand that, transcript profiles of eleven putative defence-related cDNAs in the roots of oil palm inoculated with Trichoderma harzianum T32 and mycorrhizae at different time points were studied. Transcripts encoding putative Bowman-Birk protease inhibitor (EgBBI2) and defensin (EgDFS) increased more than 2 fold in mycorrhizae-treated roots at 6 weeks post inoculation (wpi) compared to those in controls. Transcripts encoding putative dehydrin (EgDHN), glycine-rich RNA binding protein (EgGRRBP), isoflavone reductase (EgIFR), type 2 ribosome inactivating protein (EgT2RIP), and EgDFS increased in the oil palm roots treated with T. harzianum at 6 and/or 12 wpi compared to those in the controls. Some of these genes were also expressed in oil palm roots treated with Ganoderma boninense. This study provides an insight of some defence-related genes induced by Trichoderma and mycorrhizae, and their roles as potential agents to boost the plant defence system. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  12. Role of stress-related hormones in plant defence during early infection of the cyst nematode Heterodera schachtii in Arabidopsis

    PubMed Central

    Kammerhofer, Nina; Radakovic, Zoran; Regis, Jully M A; Dobrev, Petre; Vankova, Radomira; Grundler, Florian M W; Siddique, Shahid; Hofmann, Julia; Wieczorek, Krzysztof

    2015-01-01

    Heterodera schachtii, a plant-parasitic cyst nematode, invades host roots and induces a specific syncytial feeding structure, from which it withdraws all required nutrients, causing severe yield losses. The system H. schachtii–Arabidopsis is an excellent research model for investigating plant defence mechanisms. Such responses are suppressed in well-established syncytia, whereas they are induced during early parasitism. However, the mechanisms by which the defence responses are modulated and the role of phytohormones are largely unknown. The aim of this study was to elucidate the role of hormone-based defence responses at the onset of nematode infection. First, concentrations of main phytohormones were quantified and the expression of several hormone-related genes was analysed using quantitative real-time (qRT)-PCR or GeneChip. Further, the effects of individual hormones were evaluated via nematode attraction and infection assays using plants with altered endogenous hormone concentrations. Our results suggest a pivotal and positive role for ethylene during nematode attraction, whereas jasmonic acid triggers early defence responses against H. schachtii. Salicylic acid seems to be a negative regulator during later syncytium and female development. We conclude that nematodes are able to impose specific changes in hormone pools, thus modulating hormone-based defence and signal transduction in strict dependence on their parasitism stage. PMID:25825039

  13. Aberrant epithelial differentiation by cigarette smoke dysregulates respiratory host defence.

    PubMed

    Amatngalim, Gimano D; Schrumpf, Jasmijn A; Dishchekenian, Fernanda; Mertens, Tinne C J; Ninaber, Dennis K; van der Linden, Abraham C; Pilette, Charles; Taube, Christian; Hiemstra, Pieter S; van der Does, Anne M

    2018-04-01

    It is currently unknown how cigarette smoke-induced airway remodelling affects highly expressed respiratory epithelial defence proteins and thereby mucosal host defence.Localisation of a selected set of highly expressed respiratory epithelial host defence proteins was assessed in well-differentiated primary bronchial epithelial cell (PBEC) cultures. Next, PBEC were cultured at the air-liquid interface, and during differentiation for 2-3 weeks exposed daily to whole cigarette smoke. Gene expression, protein levels and epithelial cell markers were subsequently assessed. In addition, functional activities and persistence of the cigarette smoke-induced effects upon cessation were determined.Expression of the polymeric immunoglobulin receptor, secretory leukocyte protease inhibitor and long and short PLUNC (palate, lung and nasal epithelium clone protein) was restricted to luminal cells and exposure of differentiating PBECs to cigarette smoke resulted in a selective reduction of the expression of these luminal cell-restricted respiratory host defence proteins compared to controls. This reduced expression was a consequence of cigarette smoke-impaired end-stage differentiation of epithelial cells, and accompanied by a significant decreased transepithelial transport of IgA and bacterial killing.These findings shed new light on the importance of airway epithelial cell differentiation in respiratory host defence and could provide an additional explanation for the increased susceptibility of smokers and patients with chronic obstructive pulmonary disease to respiratory infections. Copyright ©ERS 2018.

  14. Role of stress-related hormones in plant defence during early infection of the cyst nematode Heterodera schachtii in Arabidopsis.

    PubMed

    Kammerhofer, Nina; Radakovic, Zoran; Regis, Jully M A; Dobrev, Petre; Vankova, Radomira; Grundler, Florian M W; Siddique, Shahid; Hofmann, Julia; Wieczorek, Krzysztof

    2015-08-01

    Heterodera schachtii, a plant-parasitic cyst nematode, invades host roots and induces a specific syncytial feeding structure, from which it withdraws all required nutrients, causing severe yield losses. The system H. schachtii-Arabidopsis is an excellent research model for investigating plant defence mechanisms. Such responses are suppressed in well-established syncytia, whereas they are induced during early parasitism. However, the mechanisms by which the defence responses are modulated and the role of phytohormones are largely unknown. The aim of this study was to elucidate the role of hormone-based defence responses at the onset of nematode infection. First, concentrations of main phytohormones were quantified and the expression of several hormone-related genes was analysed using quantitative real-time (qRT)-PCR or GeneChip. Further, the effects of individual hormones were evaluated via nematode attraction and infection assays using plants with altered endogenous hormone concentrations. Our results suggest a pivotal and positive role for ethylene during nematode attraction, whereas jasmonic acid triggers early defence responses against H. schachtii. Salicylic acid seems to be a negative regulator during later syncytium and female development. We conclude that nematodes are able to impose specific changes in hormone pools, thus modulating hormone-based defence and signal transduction in strict dependence on their parasitism stage. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  15. Evaluating arguments during instigations of defence motivation and accuracy motivation.

    PubMed

    Liu, Cheng-Hong

    2017-05-01

    When people evaluate the strength of an argument, their motivations are likely to influence the evaluation. However, few studies have specifically investigated the influences of motivational factors on argument evaluation. This study examined the effects of defence and accuracy motivations on argument evaluation. According to the compatibility between the advocated positions of arguments and participants' prior beliefs and the objective strength of arguments, participants evaluated four types of arguments: compatible-strong, compatible-weak, incompatible-strong, and incompatible-weak arguments. Experiment 1 revealed that participants possessing a high defence motivation rated compatible-weak arguments as stronger and incompatible-strong ones as weaker than participants possessing a low defence motivation. However, the strength ratings between the high and low defence groups regarding both compatible-strong and incompatible-weak arguments were similar. Experiment 2 revealed that when participants possessed a high accuracy motivation, they rated compatible-weak arguments as weaker and incompatible-strong ones as stronger than when they possessed a low accuracy motivation. However, participants' ratings on both compatible-strong and incompatible-weak arguments were similar when comparing high and low accuracy conditions. The results suggest that defence and accuracy motivations are two major motives influencing argument evaluation. However, they primarily influence the evaluation results for compatible-weak and incompatible-strong arguments, but not for compatible-strong and incompatible-weak arguments. © 2016 The British Psychological Society.

  16. Light acclimation, retrograde signalling, cell death and immune defences in plants.

    PubMed

    Karpiński, Stanisław; Szechyńska-Hebda, Magdalena; Wituszyńska, Weronika; Burdiak, Paweł

    2013-04-01

    This review confronts the classical view of plant immune defence and light acclimation with recently published data. Earlier findings have linked plant immune defences to nucleotide-binding site leucine-rich repeat (NBS-LRR)-dependent recognition of pathogen effectors and to the role of plasma membrane-localized NADPH-dependent oxidoreductase (AtRbohD), reactive oxygen species (ROS) and salicylic acid (SA). However, recent results suggest that plant immune defence also depends on the absorption of excessive light energy and photorespiration. Rapid changes in light intensity and quality often cause the absorption of energy, which is in excess of that required for photosynthesis. Such excessive light energy is considered to be a factor triggering photoinhibition and disturbance in ROS/hormonal homeostasis, which leads to cell death in foliar tissues. We highlight here the tight crosstalk between ROS- and SA-dependent pathways leading to light acclimation, and defence responses leading to pathogen resistance. We also show that LESION SIMULATING DISEASE 1 (LSD1) regulates and integrates these processes. Moreover, we discuss the role of plastid-nucleus signal transduction, photorespiration, photoelectrochemical signalling and 'light memory' in the regulation of acclimation and immune defence responses. All of these results suggest that plants have evolved a genetic system that simultaneously regulates systemic acquired resistance (SAR), cell death and systemic acquired acclimation (SAA). © 2012 Blackwell Publishing Ltd.

  17. Cigarette smoke–induced induction of antioxidant enzyme activities in airway leukocytes is absent in active smokers with COPD

    PubMed Central

    Dove, Rosamund E.; Leong-Smith, Pheneatia; Roos-Engstrand, Ester; Pourazar, Jamshid; Shah, Mittal; Behndig, Annelie F.; Mudway, Ian S.; Blomberg, Anders

    2015-01-01

    Background Oxidative injury to the airway has been proposed as an important underlying mechanism in the pathogenesis of chronic obstructive pulmonary disease (COPD). As the extent of oxidant-mediated damage is dependent on the endogenous antioxidant defences within the airways, we examined whether COPD was associated with deficiencies in the antioxidant network within the respiratory tract lining fluids (RTLFs) and resident airway leukocytes. We hypothesised that COPD would be associated with both basal depression of antioxidant defences and impaired adaptive antioxidant responses to cigarette smoke. Methods Low molecular weight and enzymatic antioxidants together with metal-handling proteins were quantified in bronchoalveolar lavage fluid and airway leukocytes, derived from current (n=9) and ex-smoking COPD patients (n=15), as well as from smokers with normal lung function (n=16) and healthy never smokers (n=13). Results Current cigarette smoking was associated with an increase in ascorbate and glutathione within peripheral RTLFs in both smokers with normal lung function compared with healthy never smokers and in COPD smokers compared with COPD ex-smokers. In contrast, intra-cellular antioxidant enzyme activities (glutathione peroxidase, glutathione reductase, and catalase) were only up-regulated in smokers with normal lung function compared with healthy never smokers and not in actively smoking COPD patients relative to COPD ex-smokers. Conclusions We found no evidence of impaired basal antioxidant defences, within either the RTLFs or airway leukocytes in stable ex-smoking COPD patients compared with healthy never smoking controls. Current cigarette smoking induced an up-regulation of low molecular weight antioxidants in the RTLFs of both control subjects with normal lung function and patients with COPD. Importantly, the present data demonstrated a cigarette smoke–induced increase in intra-cellular antioxidant enzyme activities only within the smokers with normal lung function, implying that patients with COPD who continue to smoke will experience enhanced oxidative stress, prompting disease progression. PMID:26557249

  18. A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

    NASA Technical Reports Server (NTRS)

    Cui, Zhenqian

    1999-01-01

    With the development of high-speed networking technology, computer networks, including local-area networks (LANs), wide-area networks (WANs) and the Internet, are extending their traditional roles of carrying computer data. They are being used for Internet telephony, multimedia applications such as conferencing and video on demand, distributed simulations, and other real-time applications. LANs are even used for distributed real-time process control and computing as a cost-effective approach. Differing from traditional data transfer, these new classes of high-speed network applications (video, audio, real-time process control, and others) are delay sensitive. The usefulness of data depends not only on the correctness of received data, but also the time that data are received. In other words, these new classes of applications require networks to provide guaranteed services or quality of service (QoS). Quality of service can be defined by a set of parameters and reflects a user's expectation about the underlying network's behavior. Traditionally, distinct services are provided by different kinds of networks. Voice services are provided by telephone networks, video services are provided by cable networks, and data transfer services are provided by computer networks. A single network providing different services is called an integrated-services network.

  19. A Study of Complex Deep Learning Networks on High Performance, Neuromorphic, and Quantum Computers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Potok, Thomas E; Schuman, Catherine D; Young, Steven R

    Current Deep Learning models use highly optimized convolutional neural networks (CNN) trained on large graphical processing units (GPU)-based computers with a fairly simple layered network topology, i.e., highly connected layers, without intra-layer connections. Complex topologies have been proposed, but are intractable to train on current systems. Building the topologies of the deep learning network requires hand tuning, and implementing the network in hardware is expensive in both cost and power. In this paper, we evaluate deep learning models using three different computing architectures to address these problems: quantum computing to train complex topologies, high performance computing (HPC) to automatically determinemore » network topology, and neuromorphic computing for a low-power hardware implementation. Due to input size limitations of current quantum computers we use the MNIST dataset for our evaluation. The results show the possibility of using the three architectures in tandem to explore complex deep learning networks that are untrainable using a von Neumann architecture. We show that a quantum computer can find high quality values of intra-layer connections and weights, while yielding a tractable time result as the complexity of the network increases; a high performance computer can find optimal layer-based topologies; and a neuromorphic computer can represent the complex topology and weights derived from the other architectures in low power memristive hardware. This represents a new capability that is not feasible with current von Neumann architecture. It potentially enables the ability to solve very complicated problems unsolvable with current computing technologies.« less

  20. Computer Mediated Social Network Approach to Software Support and Maintenance

    DTIC Science & Technology

    2010-06-01

    Page 1        Computer Mediated  Social   Network  Approach to  Software Support and Maintenance     LTC J. Carlos Vega  *Student Paper*    Point...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Computer Mediated Social Network Approach to Software Support and Maintenance...This research highlights the preliminary findings on the potential of computer mediated social networks . This research focused on social networks as

  1. Probabilistic Inference in General Graphical Models through Sampling in Stochastic Networks of Spiking Neurons

    PubMed Central

    Pecevski, Dejan; Buesing, Lars; Maass, Wolfgang

    2011-01-01

    An important open problem of computational neuroscience is the generic organization of computations in networks of neurons in the brain. We show here through rigorous theoretical analysis that inherent stochastic features of spiking neurons, in combination with simple nonlinear computational operations in specific network motifs and dendritic arbors, enable networks of spiking neurons to carry out probabilistic inference through sampling in general graphical models. In particular, it enables them to carry out probabilistic inference in Bayesian networks with converging arrows (“explaining away”) and with undirected loops, that occur in many real-world tasks. Ubiquitous stochastic features of networks of spiking neurons, such as trial-to-trial variability and spontaneous activity, are necessary ingredients of the underlying computational organization. We demonstrate through computer simulations that this approach can be scaled up to neural emulations of probabilistic inference in fairly large graphical models, yielding some of the most complex computations that have been carried out so far in networks of spiking neurons. PMID:22219717

  2. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  3. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  4. Getting Online: A Friendly Guide for Teachers, Students, and Parents.

    ERIC Educational Resources Information Center

    Educational Resources Information Center (ED), Washington, DC.

    This brochure provides teachers, students, and parents with information on how to connect to a computer network; describes some of the education offerings available to network users; and offers hints to help make exploration of computer networks easy and successful. The brochure explains the equipment needed to connect to a computer network; ways…

  5. Transition from intelligence cycle to intelligence process: the network-centric intelligence in narrow seas

    NASA Astrophysics Data System (ADS)

    Büker, Engin

    2015-05-01

    The defence technologies which have been developing and changing rapidly, today make it difficult to be able to foresee the next environment and spectrum of warfare. When said change and development is looked in specific to the naval operations, it can be said that the possible battlefield and scenarios to be developed in the near and middle terms (5-20 years) are more clarified with compare to other force components. Network Centric Naval Warfare Concept that was developed for the floating, diving and flying fleet platforms which serves away from its own mainland for miles, will keep its significance in the future. Accordingly, Network Centric Intelligence structure completely integrating with the command and control systems will have relatively more importance. This study will firstly try to figure out the transition from the traditional intelligence cycle that is still used in conventional war to Network Centric Intelligence Production Process. In the last part, the use of this new approach on the base of UAV that is alternative to satellite based command control and data transfer systems in the joint operations in narrow seas will be examined, a model suggestion for the use of operative and strategic UAVs which are assured within the scope of the NATO AGS2 for this aim will be brought.

  6. 50 kW laser weapon demonstrator of Rheinmetall Waffe munition

    NASA Astrophysics Data System (ADS)

    Ludewigt, K.; Riesbeck, Th.; Graf, A.; Jung, M.

    2013-10-01

    We will present the setup of a 50 kW Laser Weapon Demonstrator (LWD) and results achieved with this system. The LWD is a ground based Air Defence system consisting of a Skyguard sensor unit for target acquisition and two laser equipped weapon turrets. The weapon turrets used are standard air defence turrets of Rheinmetall Air Defence which were equipped with several 10 kW Laser Weapon Modules (LWM). Each LWM consists of one 10 kW fiber laser and a beam forming unit (BFU). Commercial of the shelf fiber laser were modified for our defence applications. The BFU providing diffraction limited beam focusing, target imaging and fine tracking of the target was developed. The LWD was tested in a firing campaign at Rheinmetall test ground in Switzerland. All laser beams of both weapon turrets were superimposed on stationary and dynamic targets. Test results of the LWD for the scenarios Air Defence and C-RAMM (counter rockets, artillery, mortar and missiles) will be presented. An outlook for the next development stage towards a 100 kW class laser weapon on RWM will be given.

  7. Host defence peptides in human burns.

    PubMed

    Kaus, Aljoscha; Jacobsen, Frank; Sorkin, Michael; Rittig, Andrea; Voss, Bruno; Daigeler, Adrien; Sudhoff, Holger; Steinau, Hans-Ulrich; Steinstraesser, Lars

    2008-02-01

    The goal of this study was to analyse expression profiles of human epithelial host defence peptides in burned and unburned skin tissue, samples of which were obtained during debridements and snap-frozen in liquid nitrogen. Total RNA was isolated, and cDNA of epithelial host defence peptides and proteins (hCAP-18/LL-37, hBD1-hBD4, dermcidin, S100A7/psoriasin and RNAse7) was quantified by qRT-PCR. In situ hybridisation and immunohistochemical staining localised gene expression of hCAP-18/LL-37, hBD2 and hBD3 in histological sections. Most of the analysed host defence peptides and proteins showed higher mRNA levels in partial-thickness burns than in unburned tissue. In situ hybridisation revealed expression of hCAP-18/LL-37, hBD2 and hBD3 at the surface of burns that was independent of burn depth. However, the finding of higher host defence peptide gene expression rates does not correlate with the incidence of wound infection in burns. We hypothesise that the epithelial innate immune response in burns is complex.

  8. Partial demethylation of oligogalacturonides by pectin methyl esterase 1 is required for eliciting defence responses in wild strawberry (Fragaria vesca).

    PubMed

    Osorio, Sonia; Castillejo, Cristina; Quesada, Miguel A; Medina-Escobar, Nieves; Brownsey, Geoff J; Suau, Rafael; Heredia, Antonio; Botella, Miguel A; Valpuesta, Victoriano

    2008-04-01

    In addition to the role of the cell wall as a physical barrier against pathogens, some of its constituents, such as pectin-derived oligogalacturonides (OGA), are essential components for elicitation of defence responses. To investigate how modifications of pectin alter defence responses, we expressed the fruit-specific Fragaria x ananassa pectin methyl esterase FaPE1 in the wild strawberry Fragaria vesca. Pectin from transgenic ripe fruits differed from the wild-type with regard to the degree and pattern of methyl esterification, as well as the average size of pectin polymers. Purified oligogalacturonides from the transgenic fruits showed a reduced degree of esterification compared to oligogalacturonides from wild-type fruits. This reduced esterification is necessary to elicit defence responses in strawberry. The transgenic F. vesca lines had constitutively activated pathogen defence responses, resulting in higher resistance to the necrotropic fungus Botrytis cinerea. Further studies in F. vesca and Nicotiana benthamiana leaves showed that the elicitation capacity of the oligogalacturonides is more specific than previously envisaged.

  9. Probiotics: beneficial factors of the defence system.

    PubMed

    Antoine, Jean Michel

    2010-08-01

    Probiotics, defined as living micro-organisms that provide a health benefit to the host when ingested in adequate amounts, have been used traditionally as food components to help the body to recover from diarrhoea. They are commonly ingested as part of fermented foods, mostly in fresh fermented dairy products. They can interact with the host through different components of the gut defence systems. There is mounting clinical evidence that some probiotics, but not all, help the defence of the host as demonstrated by either a shorter duration of infections or a decrease in the host's susceptibility to pathogens. Different components of the gut barrier can be involved in the strengthening of the body's defences: the gut microbiota, the gut epithelial barrier and the immune system. Many studies have been conducted in normal free-living subjects or in subjects during common infections like the common cold and show that some probiotic-containing foods can improve the functioning of or strengthen the body's defence. Specific probiotic foods can be included in the usual balanced diet of consumers to help them to better cope with the daily challenges of their environment.

  10. Predicting the impact of lava flows at Mount Etna by an innovative method based on Cellular Automata: Applications regarding land-use and civil defence planning

    NASA Astrophysics Data System (ADS)

    Crisci, G. M.; Avolio, M. V.; D'Ambrosio, D.; di Gregorio, S.; Lupiano, G. V.; Rongo, R.; Spataro, W.; Benhcke, B.; Neri, M.

    2009-04-01

    Forecasting the time, character and impact of future eruptions is difficult at volcanoes with complex eruptive behaviour, such as Mount Etna, where eruptions occur from the summit and on the flanks, affecting areas distant from each other. Modern efforts for hazard evaluation and contingency planning in volcanic areas draw heavily on hazard maps and numerical simulations. The computational model here applied belongs to the SCIARA family of lava flow simulation models. In the specific case this is the SCIARA-fv release, which is considered to give the most accurate and efficient performance, given the extent (567 km2) of the study area and the great number of simulations to be carried out. The model is based on the Cellular Automata computational paradigm and, specifically, on the Macroscopic Cellular Automata approach for the modelling of spatially extended dynamic systems2. This work addresses the problem of compiling high-detailed susceptibility maps with an elaborate approach in the numerical simulation of Etnean lava flows, based on the results of 39,300 simulations of flows erupted from a grid of 393 hypothetical vents in the eastern sector of Etna. This sector was chosen because it is densely populated and frequently affected by flank eruptions. Besides the definition of general susceptibility maps, the availability of a large number of lava flows of different eruption types, magnitudes and locations simulated for this study allows the instantaneous extraction of various scenarios on demand. For instance, in a Civil Defence oriented application, it is possible to identify all source areas of lava flows capable of affecting a given area of interest, such as a town or a major infrastructure. Indeed, this application is rapidly accomplished by querying the simulation database, by selecting the lava flows that affect the area of interest and by circumscribing their sources. Eventually, a specific category of simulation is dedicated to the assessment of protective measures, such as earth barriers, for mitigating lava invasion susceptibility in given areas. For the case if the town of Nicolosi, results show that the barrier would be necessary to effectively protect the town centre. The methodology here described can therefore represent a substantial advance in the field of lava flows impact prediction and can also have immediate, far-reaching implications both in land-use and civil defence planning.

  11. Ku-band signal design study. [space shuttle orbiter data processing network

    NASA Technical Reports Server (NTRS)

    Rubin, I.

    1978-01-01

    Analytical tools, methods and techniques for assessing the design and performance of the space shuttle orbiter data processing system (DPS) are provided. The computer data processing network is evaluated in the key areas of queueing behavior synchronization and network reliability. The structure of the data processing network is described as well as the system operation principles and the network configuration. The characteristics of the computer systems are indicated. System reliability measures are defined and studied. System and network invulnerability measures are computed. Communication path and network failure analysis techniques are included.

  12. The Reality of National Computer Networking for Higher Education. Proceedings of the 1978 EDUCOM Fall Conference. EDUCOM Series in Computing and Telecommunications in Higher Education 3.

    ERIC Educational Resources Information Center

    Emery, James C., Ed.

    A comprehensive review of the current status, prospects, and problems of computer networking in higher education is presented from the perspectives of both computer users and network suppliers. Several areas of computer use are considered including applications for instruction, research, and administration in colleges and universities. In the…

  13. Design of a Film-Cooled Entraining Diffuser.

    DTIC Science & Technology

    1980-04-01

    AD-A783 951 DEFENCE RESEARCH ESTABLISHMENT SUFFIELD RALSTON (ALBERTA) FIG 20/4 NL3 DESIGN OF A FILM-COOLED ENTRAINING DIFFUSER. 1U) APR 80 S B MURRAY...S.B. Murray C PCN 27C01 April 1980 80 4 29 004 DEFENCE RESEARCH ESTABLISHMENT SUFFIELD: RALSTON: ALBERTA WARNING rht ... , i. to - °aton is per lle...ulje(f to -ogoltio • IIl proprieh’~ra~r ind wtent it hh , i j l - UNCLASS I FI ED Li m DEFENCE RESEARCH ESTABLISHMENT SUFFIELD RALSTON ALBERTA

  14. The Effect of a Flare Pack on the High Speed Performance of the Jindivik Mk203B Target Aircraft,

    DTIC Science & Technology

    1980-09-01

    8217.SA. 6ME5 bAP C I- 4A ft 06 V1WY .4 V000 1P V4 405,s *4,40 WM M ft Op a~ BmE anf e.- -’ X.WOM 13.1,0 %0000 vmv400 %500 1~wO . 0 00 4111,S a 4!o~ca cocoa...Defence Scientist 2 Superintendent, Science and Technology Programs 3 Australian Defence Scientific and Technical Representative (UK) Counsellor, Defence

  15. Modelling Broadband Scattering From Shelled Spheres in a Waveguide

    DTIC Science & Technology

    2007-10-01

    profonde. Le contenu spectral de l’echo produit par une cible peut varier de fagon appreciable en fonction de sa profondeur et de sa distance dans le...Canada’s leader in defence and National Security Science and Technology R&D pour la defense Canada Chef de file au Canada en matiere de science et...Copy No. nent Development Canada pour la defense Canada • ^g, M Defence Research and Recherche et deyeloppem r£ m> DEFENCE I « M

  16. Defence Industrial Policies and Their Impact on Acquisition Outcomes: A Comparative Analysis of the United Kingdom and Australia

    DTIC Science & Technology

    2012-09-01

    this case, there is a price premium relative to globally least-cost purchases if such capabilities exist elsewhere and are being employed at a level of...operational sovereignty and security, and the technology areas where MOD would rely on international defence cooperation or open global technology...planning assumptions (i.e. future budgets) • What was required for retention in the UK industrial base 10 • Overview of the global defence market

  17. Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool

    ERIC Educational Resources Information Center

    Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.

    2013-01-01

    In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…

  18. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  19. The development of computer networks: First results from a microeconomic model

    NASA Astrophysics Data System (ADS)

    Maier, Gunther; Kaufmann, Alexander

    Computer networks like the Internet are gaining importance in social and economic life. The accelerating pace of the adoption of network technologies for business purposes is a rather recent phenomenon. Many applications are still in the early, sometimes even experimental, phase. Nevertheless, it seems to be certain that networks will change the socioeconomic structures we know today. This is the background for our special interest in the development of networks, in the role of spatial factors influencing the formation of networks, and consequences of networks on spatial structures, and in the role of externalities. This paper discusses a simple economic model - based on a microeconomic calculus - that incorporates the main factors that generate the growth of computer networks. The paper provides analytic results about the generation of computer networks. The paper discusses (1) under what conditions economic factors will initiate the process of network formation, (2) the relationship between individual and social evaluation, and (3) the efficiency of a network that is generated based on economic mechanisms.

  20. Interferon-inducible effector mechanisms in cell-autonomous immunity

    PubMed Central

    MacMicking, John D.

    2014-01-01

    Interferons (IFNs) induce the expression of hundreds of genes as part of an elaborate antimicrobial programme designed to combat infection in all nucleated cells — a process termed cell-autonomous immunity. As described in this Review, recent genomic and subgenomic analyses have begun to assign functional properties to novel IFN-inducible effector proteins that restrict bacteria, protozoa and viruses in different subcellular compartments and at different stages of the pathogen life cycle. Several newly described host defence factors also participate in canonical oxidative and autophagic pathways by spatially coordinating their activities to enhance microbial killing. Together, these IFN-induced effector networks help to confer vertebrate host resistance to a vast and complex microbial world. PMID:22531325

  1. Comparing efficacy of different taxonomic resolutions and surrogates in detecting changes in soft bottom assemblages due to coastal defence structures.

    PubMed

    Bertasi, Fabio; Colangelo, Marina Antonia; Colosio, Francesco; Gregorio, Gianni; Abbiati, Marco; Ceccherelli, Victor Ugo

    2009-05-01

    Sandy shores on the West coast of the North Adriatic Sea are extensively protected by different types of defence structures to prevent coastal erosion. Coastal defence schemes modify the hydrodynamic regime, the sediment structure and composition thus affecting the benthic assemblages. This study examines the effectiveness in detecting changes in soft bottom assemblages caused by coastal defence structures by using different levels of taxonomic resolution, polychaetes and/or bivalves as surrogates and different data transformations. A synoptic analyses of three datasets of subtidal benthic macrofauna used in studies aimed at assessing the impact of breakwaters along the North Adriatic coast has been done. Analyses of similarities and correlations between distance matrices were done using matrices with different levels of taxonomic resolution, and with polychaetes or bivalves data alone. Lentidium mediterraneum was the most abundant species in all datasets. Its abundance was not consistently related to the presence of defence structures. Moreover, distribution patterns of L. mediterraneum were masking the structure of the whole macrofaunal assemblages. Removal of L. mediterraneum from the datasets allowed the detection of changes in benthic assemblages due to coastal defences. Analyses on different levels of taxonomic resolution showed that the level of family maintained sufficient information to detect the impacts of coastal defence structures on benthic assemblages. Moreover, the outcomes depended on the transformation used. Patterns of distribution of bivalves, used as surrogates, showed low correlations with the patterns of the total macrofaunal species assemblages. Patterns of polychaetes, if identified to the species or genus level showed higher correlations with the whole dataset. However, the identification of polychaetes to species and genus level is as costly as the identification of all macrobenthic taxa at family level. This study provided additional evidences that taxonomic sufficiency is a useful tool in environmental monitoring, also in investigations on the impacts of coastal defence structures on subtidal macrofauna. The use of coarser taxonomic level, being time-efficient, would allow improving sampling designs of monitoring programs by increasing replication in space and time and by allowing long term monitoring studies.

  2. Computer network defense system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less

  3. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    ERIC Educational Resources Information Center

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…

  4. From photons to big-data applications: terminating terabits

    PubMed Central

    2016-01-01

    Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. PMID:26809573

  5. From photons to big-data applications: terminating terabits.

    PubMed

    Zilberman, Noa; Moore, Andrew W; Crowcroft, Jon A

    2016-03-06

    Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. © 2016 The Authors.

  6. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment.

    PubMed

    Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che

    2014-01-16

    To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks.

  7. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment

    PubMed Central

    2014-01-01

    Background To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. Results This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Conclusions Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks. PMID:24428926

  8. Editorial [Special issue on software defined networks and infrastructures, network function virtualisation, autonomous systems and network management

    DOE PAGES

    Biswas, Amitava; Liu, Chen; Monga, Inder; ...

    2016-01-01

    For last few years, there has been a tremendous growth in data traffic due to high adoption rate of mobile devices and cloud computing. Internet of things (IoT) will stimulate even further growth. This is increasing scale and complexity of telecom/internet service provider (SP) and enterprise data centre (DC) compute and network infrastructures. As a result, managing these large network-compute converged infrastructures is becoming complex and cumbersome. To cope up, network and DC operators are trying to automate network and system operations, administrations and management (OAM) functions. OAM includes all non-functional mechanisms which keep the network running.

  9. The European computer model for optronic system performance prediction (ECOMOS)

    NASA Astrophysics Data System (ADS)

    Keßler, Stefan; Bijl, Piet; Labarre, Luc; Repasi, Endre; Wittenstein, Wolfgang; Bürsing, Helge

    2017-10-01

    ECOMOS is a multinational effort within the framework of an EDA Project Arrangement. Its aim is to provide a generally accepted and harmonized European computer model for computing nominal Target Acquisition (TA) ranges of optronic imagers operating in the Visible or thermal Infrared (IR). The project involves close co-operation of defence and security industry and public research institutes from France, Germany, Italy, The Netherlands and Sweden. ECOMOS uses and combines well-accepted existing European tools to build up a strong competitive position. This includes two TA models: the analytical TRM4 model and the image-based TOD model. In addition, it uses the atmosphere model MATISSE. In this paper, the central idea of ECOMOS is exposed. The overall software structure and the underlying models are shown and elucidated. The status of the project development is given as well as a short discussion of validation tests and an outlook on the future potential of simulation for sensor assessment.

  10. A computer tool to support in design of industrial Ethernet.

    PubMed

    Lugli, Alexandre Baratella; Santos, Max Mauro Dias; Franco, Lucia Regina Horta Rodrigues

    2009-04-01

    This paper presents a computer tool to support in the project and development of an industrial Ethernet network, verifying the physical layer (cables-resistance and capacitance, scan time, network power supply-POE's concept "Power Over Ethernet" and wireless), and occupation rate (amount of information transmitted to the network versus the controller network scan time). These functions are accomplished without a single physical element installed in the network, using only simulation. The computer tool has a software that presents a detailed vision of the network to the user, besides showing some possible problems in the network, and having an extremely friendly environment.

  11. Sharing Writing through Computer Networking.

    ERIC Educational Resources Information Center

    Fey, Marion H.

    1997-01-01

    Suggests computer networking can support the essential purposes of the collaborative-writing movement, offering opportunities for sharing writing. Notes that literacy teachers are exploring the connectivity of computer networking through numerous designs that use either real-time or asynchronous communication. Discusses new roles for students and…

  12. Organising a University Computer System: Analytical Notes.

    ERIC Educational Resources Information Center

    Jacquot, J. P.; Finance, J. P.

    1990-01-01

    Thirteen trends in university computer system development are identified, system user requirements are analyzed, critical system qualities are outlined, and three options for organizing a computer system are presented. The three systems include a centralized network, local network, and federation of local networks. (MSE)

  13. Classroom Computer Network.

    ERIC Educational Resources Information Center

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  14. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  15. Diverse opportunities in defence

    NASA Astrophysics Data System (ADS)

    Brown, Gareth

    2016-08-01

    Working at the UK's defence laboratory gives Gareth Brown the ability to apply his physics and mathematics knowledge to real-world applications - and not necessarily in the ways you might expect. This article is Crown copyright

  16. Testing for the induction of anti-herbivory defences in four Portuguese macroalgae by direct and water-borne cues of grazing amphipods

    NASA Astrophysics Data System (ADS)

    Yun, Hee Young; Cruz, Joana; Treitschke, Michaela; Wahl, Martin; Molis, Markus

    2007-09-01

    Herbivory is a key factor in regulating plant biomass, thereby driving ecosystem performance. Algae have developed multiple adaptations to cope with grazers, including morphological and chemical defences. In a series of experiments we investigated whether several species of macroalgae possess anti-herbivore defences and whether these could be regulated to demand, i.e. grazing events. The potential of direct grazing on defence induction was assessed for two brown ( Dictyopteris membranacea, Fucus vesiculosus) and two red seaweeds ( Gelidium sesquipedale, Sphaerococcus coronopifolius) from São Rafael and Ria Formosa, Portugal. Bioassays conducted with live algal pieces and agar-based food containing lipophilic algal extracts were used to detect changes in palatability after exposure to amphipod attacks (=treatment phase). Fucus vesiculosus was the only species significantly reducing palatability in response to direct amphipod-attacks. This pattern was observed in live F. vesiculosus pieces and agar-based food containing a lipophilic extract, suggesting that lipophilic compounds produced during the treatment phase were responsible for the repulsion of grazers. Water-borne cues of grazed F. vesiculosus as well as non-grazing amphipods also reduced palatability of neighbouring conspecifics. However, this effect was only observed in live tissues of F. vesiculosus. This study is the first to show that amphipods, like isopods, are capable to induce anti-herbivory defences in F. vesiculosus and that a seasonally variable effectiveness of chemical defences might serve as a dynamic control in alga-herbivore interactions.

  17. Military milk: breastfeeding rates among Australian Defence Force women who return to military service following maternity leave.

    PubMed

    Stewart, Kelley

    2015-02-01

    The breastfeeding behaviors among Australian Defence Force women have not previously been examined. Studies have shown that breastfeeding prevalence and duration are affected by maternity leave entitlements and returning to work. This study aimed to benchmark breastfeeding initiation, prevalence, and duration among a cohort of Australian Defence Force women and to compare these findings against Australian population norms. A cross-sectional survey was conducted via email in 2008 for Australian Defence Force women who had taken maternity leave in the Australian financial year of 2006/2007. Analysis of breastfeeding indicators was undertaken. Ninety-eight percent of Australian Defence Force women in this cohort initiated breastfeeding and breastfed for a median duration of 8 months, returning to work when the mean age of the child was 8.4 months. Breastfeeding prevalence did not meet 2003 Australian National Health and Medical Research Council targets by 6 months postpartum but compared favorably to the Australian population norms. Sixty-six percent of the respondents returned to work full-time, with a median breastfeeding duration of 7 months. Women who returned to work part-time had a longer median duration of 10 months. Breastfeeding rates among this cohort of Australian Defence Force women compare favorably with the general Australian population until 9 months, coinciding with returning to work after a period of maternity leave. The results support recent Australian population studies on breastfeeding and employment. © The Author(s) 2014.

  18. Effects of reflex-based self-defence training on police performance in simulated high-pressure arrest situations.

    PubMed

    Renden, Peter G; Savelsbergh, Geert J P; Oudejans, Raôul R D

    2017-05-01

    We investigated the effects of reflex-based self-defence training on police performance in simulated high-pressure arrest situations. Police officers received this training as well as a regular police arrest and self-defence skills training (control training) in a crossover design. Officers' performance was tested on several variables in six reality-based scenarios before and after each training intervention. Results showed improved performance after the reflex-based training, while there was no such effect of the regular police training. Improved performance could be attributed to better communication, situational awareness (scanning area, alertness), assertiveness, resolution, proportionality, control and converting primary responses into tactical movements. As officers trained complete violent situations (and not just physical skills), they learned to use their actions before physical contact for de-escalation but also for anticipation on possible attacks. Furthermore, they learned to respond against attacks with skills based on their primary reflexes. The results of this study seem to suggest that reflex-based self-defence training better prepares officers for performing in high-pressure arrest situations than the current form of police arrest and self-defence skills training. Practitioner Summary: Police officers' performance in high-pressure arrest situations improved after a reflex-based self-defence training, while there was no such effect of a regular police training. As officers learned to anticipate on possible attacks and to respond with skills based on their primary reflexes, they were better able to perform effectively.

  19. Phospholipase D and phosphatidic acid in plant defence response: from protein–protein and lipid–protein interactions to hormone signalling

    PubMed Central

    Zhao, Jian

    2015-01-01

    Phospholipase Ds (PLDs) and PLD-derived phosphatidic acids (PAs) play vital roles in plant hormonal and environmental responses and various cellular dynamics. Recent studies have further expanded the functions of PLDs and PAs into plant–microbe interaction. The molecular diversities and redundant functions make PLD–PA an important signalling complex regulating lipid metabolism, cytoskeleton dynamics, vesicle trafficking, and hormonal signalling in plant defence through protein–protein and protein–lipid interactions or hormone signalling. Different PLD–PA signalling complexes and their targets have emerged as fast-growing research topics for understanding their numerous but not yet established roles in modifying pathogen perception, signal transduction, and downstream defence responses. Meanwhile, advanced lipidomics tools have allowed researchers to reveal further the mechanisms of PLD–PA signalling complexes in regulating lipid metabolism and signalling, and their impacts on jasmonic acid/oxylipins, salicylic acid, and other hormone signalling pathways that essentially mediate plant defence responses. This review attempts to summarize the progress made in spatial and temporal PLD/PA signalling as well as PLD/PA-mediated modification of plant defence. It presents an in-depth discussion on the functions and potential mechanisms of PLD–PA complexes in regulating actin filament/microtubule cytoskeleton, vesicle trafficking, and hormonal signalling, and in influencing lipid metabolism-derived metabolites as critical signalling components in plant defence responses. The discussion puts PLD–PA in a broader context in order to guide future research. PMID:25680793

  20. Rapid adenosine release in the nucleus tractus solitarii during defence response in rats: real-time measurement in vivo

    PubMed Central

    Dale, Nicholas; Gourine, Alexander V; Llaudet, Enrique; Bulmer, David; Thomas, Teresa; Spyer, K Michael

    2002-01-01

    We have measured the release of adenosine and inosine from the dorsal surface of the brainstem and from within the nucleus tractus solitarii (NTS) during the defence response evoked by hypothalamic stimulation in the anaesthetised rat. At the surface of the brainstem, only release of inosine was detected on hypothalamic defence area stimulation. This inosine signal was greatly reduced by addition of the ecto-5′-nucleotidase inhibitor α,β-methylene ADP (200 μM), suggesting that the inosine arose from adenosine that was produced in the extracellular space by the prior release of ATP. By placing a microelectrode biosensor into the NTS under stereotaxic control we have recorded release of adenosine within this nucleus. By contrast to the brainstem surface, a fast increase in adenosine, accompanied only by a much smaller change in inosine levels, was seen following stimulation of the hypothalamic defence area. The release of adenosine following hypothalamic stimulation was mainly confined to a narrow region of the NTS some 500 μm in length around the level of the obex. Interestingly the release of adenosine was depletable: when the defence reaction was evoked at short time intervals, much less adenosine was released on the second stimulus. Our novel techniques have given unprecedented real-time measurement and localisation of adenosine release in vivo and demonstrate that adenosine is released at the right time and in sufficient quantities to contribute to the cardiovascular components of the defence reaction. PMID:12356888

  1. A method of non-contact reading code based on computer vision

    NASA Astrophysics Data System (ADS)

    Zhang, Chunsen; Zong, Xiaoyu; Guo, Bingxuan

    2018-03-01

    With the purpose of guarantee the computer information exchange security between internal and external network (trusted network and un-trusted network), A non-contact Reading code method based on machine vision has been proposed. Which is different from the existing network physical isolation method. By using the computer monitors, camera and other equipment. Deal with the information which will be on exchanged, Include image coding ,Generate the standard image , Display and get the actual image , Calculate homography matrix, Image distort correction and decoding in calibration, To achieve the computer information security, Non-contact, One-way transmission between the internal and external network , The effectiveness of the proposed method is verified by experiments on real computer text data, The speed of data transfer can be achieved 24kb/s. The experiment shows that this algorithm has the characteristics of high security, fast velocity and less loss of information. Which can meet the daily needs of the confidentiality department to update the data effectively and reliably, Solved the difficulty of computer information exchange between Secret network and non-secret network, With distinctive originality, practicability, and practical research value.

  2. Closeness Possible through Computer Networking.

    ERIC Educational Resources Information Center

    Dodd, Julie E.

    1989-01-01

    Points out the benefits of computer networking for scholastic journalism. Discusses three systems currently offering networking possibilities for publications: the Student Press Information Network; the Youth Communication Service; and the Dow Jones Newspaper Fund's electronic mail system. (MS)

  3. The Tricarboxylic Acid Cycle, an Ancient Metabolic Network with a Novel Twist

    PubMed Central

    Mailloux, Ryan J.; Bériault, Robin; Lemire, Joseph; Singh, Ranji; Chénier, Daniel R.; Hamel, Robert D.; Appanna, Vasu D.

    2007-01-01

    The tricarboxylic acid (TCA) cycle is an essential metabolic network in all oxidative organisms and provides precursors for anabolic processes and reducing factors (NADH and FADH2) that drive the generation of energy. Here, we show that this metabolic network is also an integral part of the oxidative defence machinery in living organisms and α-ketoglutarate (KG) is a key participant in the detoxification of reactive oxygen species (ROS). Its utilization as an anti-oxidant can effectively diminish ROS and curtail the formation of NADH, a situation that further impedes the release of ROS via oxidative phosphorylation. Thus, the increased production of KG mediated by NADP-dependent isocitrate dehydrogenase (NADP-ICDH) and its decreased utilization via the TCA cycle confer a unique strategy to modulate the cellular redox environment. Activities of α-ketoglutarate dehydrogenase (KGDH), NAD-dependent isocitrate dehydrogenase (NAD-ICDH), and succinate dehydrogenase (SDH) were sharply diminished in the cellular systems exposed to conditions conducive to oxidative stress. These findings uncover an intricate link between TCA cycle and ROS homeostasis and may help explain the ineffective TCA cycle that characterizes various pathological conditions and ageing. PMID:17668068

  4. Email networks and the spread of computer viruses

    NASA Astrophysics Data System (ADS)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  5. Characterizing Crowd Participation and Productivity of Foldit Through Web Scraping

    DTIC Science & Technology

    2016-03-01

    Berkeley Open Infrastructure for Network Computing CDF Cumulative Distribution Function CPU Central Processing Unit CSSG Crowdsourced Serious Game...computers at once can create a similar capacity. According to Anderson [6], principal investigator for the Berkeley Open Infrastructure for Network...extraterrestrial life. From this project, a software-based distributed computing platform called the Berkeley Open Infrastructure for Network Computing

  6. Relative impacts of environmental variation and evolutionary history on the nestedness and modularity of tree–herbivore networks

    PubMed Central

    Robinson, Kathryn M; Hauzy, Céline; Loeuille, Nicolas; Albrectsen, Benedicte R

    2015-01-01

    Nestedness and modularity are measures of ecological networks whose causative effects are little understood. We analyzed antagonistic plant–herbivore bipartite networks using common gardens in two contrasting environments comprised of aspen trees with differing evolutionary histories of defence against herbivores. These networks were tightly connected owing to a high level of specialization of arthropod herbivores that spend a large proportion of the life cycle on aspen. The gardens were separated by ten degrees of latitude with resultant differences in abiotic conditions. We evaluated network metrics and reported similar connectance between gardens but greater numbers of links per species in the northern common garden. Interaction matrices revealed clear nestedness, indicating subsetting of the bipartite interactions into specialist divisions, in both the environmental and evolutionary aspen groups, although nestedness values were only significant in the northern garden. Variation in plant vulnerability, measured as the frequency of herbivore specialization in the aspen population, was significantly partitioned by environment (common garden) but not by evolutionary origin of the aspens. Significant values of modularity were observed in all network matrices. Trait-matching indicated that growth traits, leaf morphology, and phenolic metabolites affected modular structure in both the garden and evolutionary groups, whereas extra-floral nectaries had little influence. Further examination of module configuration revealed that plant vulnerability explained considerable variance in web structure. The contrasting conditions between the two gardens resulted in bottom-up effects of the environment, which most strongly influenced the overall network architecture, however, the aspen groups with dissimilar evolutionary history also showed contrasting degrees of nestedness and modularity. Our research therefore shows that, while evolution does affect the structure of aspen–herbivore bipartite networks, the role of environmental variations is a dominant constraint. PMID:26306175

  7. Post-secretory fate of host defence components in mucus.

    PubMed

    Salathe, Matthias; Forteza, Rosanna; Conner, Gregory E

    2002-01-01

    Airway mucus is a complex mixture of secretory products that provide a multifaceted defence against infection. Among many antimicrobial substances, mucus contains a peroxidase identical to milk lactoperoxidase (LPO) that is produced by goblet cells and submucosal glands. Airway secretions contain the substrates for LPO, namely thiocyanate and hydrogen peroxide, at concentrations sufficient for production of the biocidal compound hypothiocyanite, a fact confirmed by us in vitro. In vivo, inhibition of airway LPO in sheep significantly inhibits bacterial clearance, suggesting that the LPO system is a major contributor to host defences. Since secretory products including LPO are believed to be steadily removed by mucociliary clearance, their amount and availability on the surface is thought to be controlled solely by secretion. In contrast to this paradigm, new data suggest that LPO and other substances are retained at the ciliary border of the airway epithelium by binding to surface-associated hyaluronan, thereby providing an apical, fully active enzyme pool. Thus, hyaluronan, secreted from submucosal gland cells, plays a previously unrecognized pivotal role in mucosal host defence by retaining LPO and possibly other substances important for first line host defence at the apical surface 'ready for use' and protected from ciliary clearance.

  8. A cellular backline: specialization of host membranes for defence.

    PubMed

    Faulkner, Christine

    2015-03-01

    In plant-pathogen interactions, the host plasma membrane serves as a defence front for pathogens that invade from the extracellular environment. As such, the lipid bilayer acts as a scaffold that targets and delivers defence responses to the site of attack. During pathogen infection, numerous changes in plasma membrane composition, organization, and structure occur. There is increasing evidence that this facilitates the execution of a variety of responses, highlighting the regulatory role membranes play in cellular responses. Membrane microdomains such as lipid rafts are hypothesized to create signalling platforms for receptor signalling in response to pathogen perception and for callose synthesis. Further, the genesis of pathogen-associated structures such as papillae and the extra-haustorial membrane necessitates polarization of membranes and membrane trafficking pathways. Unlocking the mechanisms by which this occurs will enable greater understanding of how targeted defences, some of which result in resistance, are executed. This review will survey some of the changes that occur in host membranes during pathogen attack and how these are associated with the generation of defence responses. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  9. Solving Constraint Satisfaction Problems with Networks of Spiking Neurons

    PubMed Central

    Jonke, Zeno; Habenschuss, Stefan; Maass, Wolfgang

    2016-01-01

    Network of neurons in the brain apply—unlike processors in our current generation of computer hardware—an event-based processing strategy, where short pulses (spikes) are emitted sparsely by neurons to signal the occurrence of an event at a particular point in time. Such spike-based computations promise to be substantially more power-efficient than traditional clocked processing schemes. However, it turns out to be surprisingly difficult to design networks of spiking neurons that can solve difficult computational problems on the level of single spikes, rather than rates of spikes. We present here a new method for designing networks of spiking neurons via an energy function. Furthermore, we show how the energy function of a network of stochastically firing neurons can be shaped in a transparent manner by composing the networks of simple stereotypical network motifs. We show that this design approach enables networks of spiking neurons to produce approximate solutions to difficult (NP-hard) constraint satisfaction problems from the domains of planning/optimization and verification/logical inference. The resulting networks employ noise as a computational resource. Nevertheless, the timing of spikes plays an essential role in their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines) and Gibbs sampling. PMID:27065785

  10. A Network Primer: Full-Fledged Educational Networks.

    ERIC Educational Resources Information Center

    Lehrer, Ariella

    1988-01-01

    Discusses some of the factors included in choosing appropriate computer networks for the classroom. Describes such networks as those produced by Apple Computer, Corvus Systems, Velan, Berkeley Softworks, Tandy, LAN-TECH, Unisys, and International Business Machines (IBM). (TW)

  11. Australian Space Situational Awareness Capability Demonstrations

    NASA Astrophysics Data System (ADS)

    Morreale, B.; Bessell, T.; Rutten, M.; Cheung, B.

    Australia is increasing its contribution to the global space situational awareness (SSA) problem by committing to acquire and operate SSA sensors. Over the last year, a series of collaborative SSA experiments have been undertaken to demonstrate the capabilities of Australian sensors. These experiments aimed to demonstrate how existing Australian sensors could perform in a surveillance of space role, prove passive radar’s capability to observe low earth orbit (LEO) satellites and perform SSA handoffs to optical sensors. The trials established a data sharing and communications protocol that bridged defence, academia, and industry partners. Geographically dispersed optical assets, including the Falcon telescope in Canberra, Raven telescopes in Exmouth (Western Australia) and Defence Science and Technology (DST) Telescopes in Adelaide (South Australia) collected on LEO satellites and established cueing protocols. The Murchison Widefield Array (MWA) located in Western Australia, demonstrated the capability of passive radar as an SSA asset after successfully observing LEO satellites based on reflected terrestrial radio signals. The combination of radar and optical SSA assets allows for the exploitation of each sensors unique advantages and locations across the Australian continent. This paper outlines the capabilities and diversity of Australian optical and radar sensors as demonstrated by field trials in 2016 and 2017. It suggests future potential for harnessing novel radar and optical integration techniques to supplement high-value assets such as the Space Surveillance Telescope as part of the Space Surveillance Network.

  12. Biological modelling of a computational spiking neural network with neuronal avalanches.

    PubMed

    Li, Xiumin; Chen, Qing; Xue, Fangzheng

    2017-06-28

    In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance.This article is part of the themed issue 'Mathematical methods in medicine: neuroscience, cardiology and pathology'. © 2017 The Author(s).

  13. Biological modelling of a computational spiking neural network with neuronal avalanches

    NASA Astrophysics Data System (ADS)

    Li, Xiumin; Chen, Qing; Xue, Fangzheng

    2017-05-01

    In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance. This article is part of the themed issue `Mathematical methods in medicine: neuroscience, cardiology and pathology'.

  14. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  15. Embracing Statistical Challenges in the Information Technology Age

    DTIC Science & Technology

    2006-01-01

    computation and feature selection. Moreover, two research projects on network tomography and arctic cloud detection are used throughout the paper to bring...prominent Network Tomography problem, origin- destination (OD) traffic estimation. It demonstrates well how the two modes of data collection interact...software debugging (Biblit et al, 2005 [2]), and network tomography for computer network management. Computer sys- tem problems exist long before the IT

  16. Artificial Neural Network Metamodels of Stochastic Computer Simulations

    DTIC Science & Technology

    1994-08-10

    SUBTITLE r 5. FUNDING NUMBERS Artificial Neural Network Metamodels of Stochastic I () Computer Simulations 6. AUTHOR(S) AD- A285 951 Robert Allen...8217!298*1C2 ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC COMPUTER SIMULATIONS by Robert Allen Kilmer B.S. in Education Mathematics, Indiana...dedicate this document to the memory of my father, William Ralph Kilmer. mi ABSTRACT Signature ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC

  17. DISCRETE EVENT SIMULATION OF OPTICAL SWITCH MATRIX PERFORMANCE IN COMPUTER NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imam, Neena; Poole, Stephen W

    2013-01-01

    In this paper, we present application of a Discrete Event Simulator (DES) for performance modeling of optical switching devices in computer networks. Network simulators are valuable tools in situations where one cannot investigate the system directly. This situation may arise if the system under study does not exist yet or the cost of studying the system directly is prohibitive. Most available network simulators are based on the paradigm of discrete-event-based simulation. As computer networks become increasingly larger and more complex, sophisticated DES tool chains have become available for both commercial and academic research. Some well-known simulators are NS2, NS3, OPNET,more » and OMNEST. For this research, we have applied OMNEST for the purpose of simulating multi-wavelength performance of optical switch matrices in computer interconnection networks. Our results suggest that the application of DES to computer interconnection networks provides valuable insight in device performance and aids in topology and system optimization.« less

  18. Thermodynamic characterization of networks using graph polynomials

    NASA Astrophysics Data System (ADS)

    Ye, Cheng; Comin, César H.; Peron, Thomas K. DM.; Silva, Filipi N.; Rodrigues, Francisco A.; Costa, Luciano da F.; Torsello, Andrea; Hancock, Edwin R.

    2015-09-01

    In this paper, we present a method for characterizing the evolution of time-varying complex networks by adopting a thermodynamic representation of network structure computed from a polynomial (or algebraic) characterization of graph structure. Commencing from a representation of graph structure based on a characteristic polynomial computed from the normalized Laplacian matrix, we show how the polynomial is linked to the Boltzmann partition function of a network. This allows us to compute a number of thermodynamic quantities for the network, including the average energy and entropy. Assuming that the system does not change volume, we can also compute the temperature, defined as the rate of change of entropy with energy. All three thermodynamic variables can be approximated using low-order Taylor series that can be computed using the traces of powers of the Laplacian matrix, avoiding explicit computation of the normalized Laplacian spectrum. These polynomial approximations allow a smoothed representation of the evolution of networks to be constructed in the thermodynamic space spanned by entropy, energy, and temperature. We show how these thermodynamic variables can be computed in terms of simple network characteristics, e.g., the total number of nodes and node degree statistics for nodes connected by edges. We apply the resulting thermodynamic characterization to real-world time-varying networks representing complex systems in the financial and biological domains. The study demonstrates that the method provides an efficient tool for detecting abrupt changes and characterizing different stages in network evolution.

  19. Analysis of stationary availability factor of two-level backbone computer networks with arbitrary topology

    NASA Astrophysics Data System (ADS)

    Rahman, P. A.

    2018-05-01

    This scientific paper deals with the two-level backbone computer networks with arbitrary topology. A specialized method, offered by the author for calculation of the stationary availability factor of the two-level backbone computer networks, based on the Markov reliability models for the set of the independent repairable elements with the given failure and repair rates and the methods of the discrete mathematics, is also discussed. A specialized algorithm, offered by the author for analysis of the network connectivity, taking into account different kinds of the network equipment failures, is also observed. Finally, this paper presents an example of calculation of the stationary availability factor for the backbone computer network with the given topology.

  20. High performance network and channel-based storage

    NASA Technical Reports Server (NTRS)

    Katz, Randy H.

    1991-01-01

    In the traditional mainframe-centered view of a computer system, storage devices are coupled to the system through complex hardware subsystems called input/output (I/O) channels. With the dramatic shift towards workstation-based computing, and its associated client/server model of computation, storage facilities are now found attached to file servers and distributed throughout the network. We discuss the underlying technology trends that are leading to high performance network-based storage, namely advances in networks, storage devices, and I/O controller and server architectures. We review several commercial systems and research prototypes that are leading to a new approach to high performance computing based on network-attached storage.

  1. Telecommunication Networks. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on utilizing the telecommunications capabilities of computers. Network capabilities including electronic mail, bulletin boards, and access to distant databases are briefly explained. Networks useful to the educator, general commercial systems, and local…

  2. Network and computing infrastructure for scientific applications in Georgia

    NASA Astrophysics Data System (ADS)

    Kvatadze, R.; Modebadze, Z.

    2016-09-01

    Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.

  3. PROFEAT Update: A Protein Features Web Server with Added Facility to Compute Network Descriptors for Studying Omics-Derived Networks.

    PubMed

    Zhang, P; Tao, L; Zeng, X; Qin, C; Chen, S Y; Zhu, F; Yang, S Y; Li, Z R; Chen, W P; Chen, Y Z

    2017-02-03

    The studies of biological, disease, and pharmacological networks are facilitated by the systems-level investigations using computational tools. In particular, the network descriptors developed in other disciplines have found increasing applications in the study of the protein, gene regulatory, metabolic, disease, and drug-targeted networks. Facilities are provided by the public web servers for computing network descriptors, but many descriptors are not covered, including those used or useful for biological studies. We upgraded the PROFEAT web server http://bidd2.nus.edu.sg/cgi-bin/profeat2016/main.cgi for computing up to 329 network descriptors and protein-protein interaction descriptors. PROFEAT network descriptors comprehensively describe the topological and connectivity characteristics of unweighted (uniform binding constants and molecular levels), edge-weighted (varying binding constants), node-weighted (varying molecular levels), edge-node-weighted (varying binding constants and molecular levels), and directed (oriented processes) networks. The usefulness of the network descriptors is illustrated by the literature-reported studies of the biological networks derived from the genome, interactome, transcriptome, metabolome, and diseasome profiles. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Calculating a checksum with inactive networking components in a computing system

    DOEpatents

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2014-12-16

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  5. Calculating a checksum with inactive networking components in a computing system

    DOEpatents

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2015-01-27

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  6. Imposed glutathione-mediated redox switch modulates the tobacco wound-induced protein kinase and salicylic acid-induced protein kinase activation state and impacts on defence against Pseudomonas syringae.

    PubMed

    Matern, Sanja; Peskan-Berghoefer, Tatjana; Gromes, Roland; Kiesel, Rebecca Vazquez; Rausch, Thomas

    2015-04-01

    The role of the redox-active tripeptide glutathione in plant defence against pathogens has been studied extensively; however, the impact of changes in cellular glutathione redox potential on signalling processes during defence reactions has remained elusive. This study explored the impact of elevated glutathione content on the cytosolic redox potential and on early defence signalling at the level of mitogen-activated protein kinases (MAPKs), as well as on subsequent defence reactions, including changes in salicylic acid (SA) content, pathogenesis-related gene expression, callose depositions, and the hypersensitive response. Wild-type (WT) Nicotiana tabacum L. and transgenic high-glutathione lines (HGL) were transformed with the cytosol-targeted sensor GRX1-roGFP2 to monitor the cytosolic redox state. Surprisingly, HGLs displayed an oxidative shift in their cytosolic redox potential and an activation of the tobacco MAPKs wound-induced protein kinase (WIPK) and SA-induced protein kinase (SIPK). This activation occurred in the absence of any change in free SA content, but was accompanied by constitutively increased expression of several defence genes. Similarly, rapid activation of MAPKs could be induced in WT tobacco by exposure to either reduced or oxidized glutathione. When HGL plants were challenged with adapted or non-adapted Pseudomonas syringae pathovars, the cytosolic redox shift was further amplified and the defence response was markedly increased, showing a priming effect for SA and callose; however, the initial and transient hyperactivation of MAPK signalling was attenuated in HGLs. The results suggest that, in tobacco, MAPK and SA signalling may operate independently, both possibly being modulated by the glutathione redox potential. Possible mechanisms for redox-mediated MAPK activation are discussed. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  7. Uncovering the defence responses of Eucalyptus to pests and pathogens in the genomics age.

    PubMed

    Naidoo, Sanushka; Külheim, Carsten; Zwart, Lizahn; Mangwanda, Ronishree; Oates, Caryn N; Visser, Erik A; Wilken, Febé E; Mamni, Thandekile B; Myburg, Alexander A

    2014-09-01

    Long-lived tree species are subject to attack by various pests and pathogens during their lifetime. This problem is exacerbated by climate change, which may increase the host range for pathogens and extend the period of infestation by pests. Plant defences may involve preformed barriers or induced resistance mechanisms based on recognition of the invader, complex signalling cascades, hormone signalling, activation of transcription factors and production of pathogenesis-related (PR) proteins with direct antimicrobial or anti-insect activity. Trees have evolved some unique defence mechanisms compared with well-studied model plants, which are mostly herbaceous annuals. The genome sequence of Eucalyptus grandis W. Hill ex Maiden has recently become available and provides a resource to extend our understanding of defence in large woody perennials. This review synthesizes existing knowledge of defence mechanisms in model plants and tree species and features mechanisms that may be important for defence in Eucalyptus, such as anatomical variants and the role of chemicals and proteins. Based on the E. grandis genome sequence, we have identified putative PR proteins based on sequence identity to the previously described plant PR proteins. Putative orthologues for PR-1, PR-2, PR-4, PR-5, PR-6, PR-7, PR-8, PR-9, PR-10, PR-12, PR-14, PR-15 and PR-17 have been identified and compared with their orthologues in Populus trichocarpa Torr. & A. Gray ex Hook and Arabidopsis thaliana (L.) Heynh. The survey of PR genes in Eucalyptus provides a first step in identifying defence gene targets that may be employed for protection of the species in future. Genomic resources available for Eucalyptus are discussed and approaches for improving resistance in these hardwood trees, earmarked as a bioenergy source in future, are considered. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. ARACHNE: A neural-neuroglial network builder with remotely controlled parallel computing

    PubMed Central

    Rusakov, Dmitri A.; Savtchenko, Leonid P.

    2017-01-01

    Creating and running realistic models of neural networks has hitherto been a task for computing professionals rather than experimental neuroscientists. This is mainly because such networks usually engage substantial computational resources, the handling of which requires specific programing skills. Here we put forward a newly developed simulation environment ARACHNE: it enables an investigator to build and explore cellular networks of arbitrary biophysical and architectural complexity using the logic of NEURON and a simple interface on a local computer or a mobile device. The interface can control, through the internet, an optimized computational kernel installed on a remote computer cluster. ARACHNE can combine neuronal (wired) and astroglial (extracellular volume-transmission driven) network types and adopt realistic cell models from the NEURON library. The program and documentation (current version) are available at GitHub repository https://github.com/LeonidSavtchenko/Arachne under the MIT License (MIT). PMID:28362877

  9. A new graph-based method for pairwise global network alignment

    PubMed Central

    Klau, Gunnar W

    2009-01-01

    Background In addition to component-based comparative approaches, network alignments provide the means to study conserved network topology such as common pathways and more complex network motifs. Yet, unlike in classical sequence alignment, the comparison of networks becomes computationally more challenging, as most meaningful assumptions instantly lead to NP-hard problems. Most previous algorithmic work on network alignments is heuristic in nature. Results We introduce the graph-based maximum structural matching formulation for pairwise global network alignment. We relate the formulation to previous work and prove NP-hardness of the problem. Based on the new formulation we build upon recent results in computational structural biology and present a novel Lagrangian relaxation approach that, in combination with a branch-and-bound method, computes provably optimal network alignments. The Lagrangian algorithm alone is a powerful heuristic method, which produces solutions that are often near-optimal and – unlike those computed by pure heuristics – come with a quality guarantee. Conclusion Computational experiments on the alignment of protein-protein interaction networks and on the classification of metabolic subnetworks demonstrate that the new method is reasonably fast and has advantages over pure heuristics. Our software tool is freely available as part of the LISA library. PMID:19208162

  10. Engaging Cyber Communities

    DTIC Science & Technology

    2010-04-01

    technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in

  11. Historians' testimony on “common knowledge” of the risks of tobacco use: a review and analysis of experts testifying on behalf of cigarette manufacturers in civil litigation

    PubMed Central

    Kyriakoudes, Louis M

    2006-01-01

    A qualitative analysis of the trial and deposition testimony of professional historians who have testified on behalf of the tobacco industry shows that defence historians present a view of past knowledge about tobacco in which the public was frequently warned that cigarettes were both deadly and addictive over the broad historical period. While defence historians testify to conducting significant levels of independent research, they also draw upon a common body of research conducted by industry counsel to support its litigation efforts. Defence historians unduly limit their research materials, ignoring industry records and, therefore, critically undermine their ability to evaluate industry activity in the smoking and health controversy as it unfolded in historical time. A consequence is that defence historians present a skewed history of the cigarette in which the tobacco industry all but ceases to exist. PMID:17130618

  12. Families of returned defence force personnel: a changing landscape of challenges.

    PubMed

    Berle, David; Steel, Zachary

    2015-08-01

    This paper aims to identify the key challenges experienced by the families of defence force personnel following deployment. We undertook a selective review of four post-deployment challenges to the families of defence force personnel: (1) changes to relationships; (2) changes to family member roles and responsibilities; (3) adjustment of children and parenting challenges; and (4) anger, family conflict and violence. Emerging issues in the area of post-deployment adjustment are also discussed. Empirical studies of post-deployment family adjustment are lacking. Each of the reviewed challenges can contribute to psychological difficulties and precipitate contact with mental health services. The challenges faced by defence force personnel when returning from deployment arise within a family context. Clinicians should thoroughly assess these factors in families following deployment, but also recognise family strengths and resilience to these challenges. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  13. Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks

    ERIC Educational Resources Information Center

    Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita

    2017-01-01

    More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…

  14. Systems Librarian and Automation Review.

    ERIC Educational Resources Information Center

    Schuyler, Michael

    1992-01-01

    Discusses software sharing on computer networks and the need for proper bandwidth; and describes the technology behind FidoNet, a computer network made up of electronic bulletin boards. Network features highlighted include front-end mailers, Zone Mail Hour, Nodelist, NetMail, EchoMail, computer conferences, tosser and scanner programs, and host…

  15. Models of Dynamic Relations Among Service Activities, System State and Service Quality on Computer and Network Systems

    DTIC Science & Technology

    2010-01-01

    Service quality on computer and network systems has become increasingly important as many conventional service transactions are moved online. Service quality of computer and network services can be measured by the performance of the service process in throughput, delay, and so on. On a computer and network system, competing service requests of users and associated service activities change the state of limited system resources which in turn affects the achieved service ...relations of service activities, system state and service

  16. I/O routing in a multidimensional torus network

    DOEpatents

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2017-02-07

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  17. I/O routing in a multidimensional torus network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destinationmore » address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.« less

  18. The Evaluation of Rekeying Protocols Within the Hubenko Architecture as Applied to Wireless Sensor Networks

    DTIC Science & Technology

    2009-03-01

    SENSOR NETWORKS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and...hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the...rekeying protocol should be applied given particular network parameters, such as WSN size. 10 1.3 Experimental Approach A computer simulation in

  19. Neural-Network Simulator

    NASA Technical Reports Server (NTRS)

    Mitchell, Paul H.

    1991-01-01

    F77NNS (FORTRAN 77 Neural Network Simulator) computer program simulates popular back-error-propagation neural network. Designed to take advantage of vectorization when used on computers having this capability, also used on any computer equipped with ANSI-77 FORTRAN Compiler. Problems involving matching of patterns or mathematical modeling of systems fit class of problems F77NNS designed to solve. Program has restart capability so neural network solved in stages suitable to user's resources and desires. Enables user to customize patterns of connections between layers of network. Size of neural network F77NNS applied to limited only by amount of random-access memory available to user.

  20. Why Do Computer Viruses Survive In The Internet?

    NASA Astrophysics Data System (ADS)

    Ifti, Margarita; Neumann, Paul

    2010-01-01

    We use the three-species cyclic competition model (Rock-Paper-Scissors), described by reactions A+B→2B, B+C→2C, C+A→2A, for emulating a computer network with e-mail viruses. Different topologies of the network bring about different dynamics of the epidemics. When the parameters of the network are varied, it is observed that very high clustering coefficients are necessary for a pandemics to happen. The differences between the networks of computer users, e-mail networks, and social networks, as well as their role in determining the nature of epidemics are also discussed.

  1. Surveillance of Space in Australia

    NASA Astrophysics Data System (ADS)

    Newsam, G.

    Australia's geography and technology base got it off to a flying start in the early days of surveillance of space, starting with CSIRO's first radio telescope in the 1940's and climaxing in NASA's establishment of station 43 in the Deep Space Network at Tidbinbilla in 1965. But Britain's exit from space and the subsequent closure of the Woomera launch range and associated space tracking facilities in the early 1970's saw the start of a long draw-down of capability. Programs such as CSIRO's radio astronomy telescopes, Electro-Optic Systems' adoption of laser technology for satellite laser ranging and tracking system, and the exploration of the use of technology developed in Australia's over-the-horizon-radar program for surveillance of space, kept some interest in the problem alive, but there has been no serious national investment in the area for the last thirty years. Recently, however, increased awareness of the vulnerability of space systems and the need to include potential opponents' space capabilities in operations planning has led to a revival of interest in space situational awareness within the Australian Defence Organisation. While firm commitments to new systems must wait on the next Defence White Paper due out at the end of 2007 and the policy directions it formally endorses, discussions have already started with the US on participating in the Space Surveillance Network (SSN) and developing a comprehensive space situational awareness capability. In support of these initiatives the Defence Science and Technology Organisation (DSTO) is drawing up an inventory of relevant Australian capabilities, technologies and activities: the paper will describe the findings of this inventory, and in particular local technologies and systems that might be deployed in Australia to contribute to the SSN. In the optical regime the available options are rather limited; they centre primarily on the satellite laser ranging technology developed by Electro-Optic Systems and operating in stations at Yarragadee, Western Australia and Mt Stromlo, Australian Capital Territory. Recently, however, Australia has also agreed to host a node of AFRL's Extended HANDS telescope network in Learmonth, Western Australia, and discussions are underway with researchers in Australian academia about also participating in this research program. In the RF regime, however, DSTO has substantial HF and microwave radar programs, elements of which could be readily adapted to surveillance of space. Proposals have already been developed internally within both programs for various forms of space surveillance systems including both broad area surveillance and imaging along with some very initial technology concept demonstrator systems. Recently proposals have also been floated to substantially increase Australia's civilian space surveillance programs including the Ionospheric Prediction Service's longstanding program to monitor the ionosphere and space weather, meteor radars and other systems. Finally Australia's bid to host the international Square Kilometre Array radio telescope has already generated concrete commitments to establish several very substantial RF arrays in Western Australia that may also provide instruments of unprecedented sensitivity and resolution for surveillance of space. The paper will survey these technology development programs and associated progress on integrating them into some sort of national program for space situational awareness.

  2. Leaf habit does not determine the investment in both physical and chemical defences and pair-wise correlations between these defensive traits.

    PubMed

    Moreira, X; Pearse, I S

    2017-05-01

    Plant life-history strategies associated with resource acquisition and economics (e.g. leaf habit) are thought to be fundamental determinants of the traits and mechanisms that drive herbivore pressure, resource allocation to plant defensive traits, and the simultaneous expression (positive correlations) or trade-offs (negative correlations) between these defensive traits. In particular, it is expected that evergreen species - which usually grow slower and support constant herbivore pressure in comparison with deciduous species - will exhibit higher levels of both physical and chemical defences and a higher predisposition to the simultaneous expression of physical and chemical defensive traits. Here, by using a dataset which included 56 oak species (Quercus genus), we investigated whether leaf habit of plant species governs the investment in both physical and chemical defences and pair-wise correlations between these defensive traits. Our results showed that leaf habit does not determine the production of most leaf physical and chemical defences. Although evergreen oak species had higher levels of leaf toughness and specific leaf mass (physical defences) than deciduous oak species, both traits are essentially prerequisites for evergreenness. Similarly, our results also showed that leaf habit does not determine pair-wise correlations between defensive traits because most physical and chemical defensive traits were simultaneously expressed in both evergreen and deciduous oak species. Our findings indicate that leaf habit does not substantially contribute to oak species differences in plant defence investment. © 2017 German Botanical Society and The Royal Botanical Society of the Netherlands.

  3. Phospholipase D and phosphatidic acid in plant defence response: from protein-protein and lipid-protein interactions to hormone signalling.

    PubMed

    Zhao, Jian

    2015-04-01

    Phospholipase Ds (PLDs) and PLD-derived phosphatidic acids (PAs) play vital roles in plant hormonal and environmental responses and various cellular dynamics. Recent studies have further expanded the functions of PLDs and PAs into plant-microbe interaction. The molecular diversities and redundant functions make PLD-PA an important signalling complex regulating lipid metabolism, cytoskeleton dynamics, vesicle trafficking, and hormonal signalling in plant defence through protein-protein and protein-lipid interactions or hormone signalling. Different PLD-PA signalling complexes and their targets have emerged as fast-growing research topics for understanding their numerous but not yet established roles in modifying pathogen perception, signal transduction, and downstream defence responses. Meanwhile, advanced lipidomics tools have allowed researchers to reveal further the mechanisms of PLD-PA signalling complexes in regulating lipid metabolism and signalling, and their impacts on jasmonic acid/oxylipins, salicylic acid, and other hormone signalling pathways that essentially mediate plant defence responses. This review attempts to summarize the progress made in spatial and temporal PLD/PA signalling as well as PLD/PA-mediated modification of plant defence. It presents an in-depth discussion on the functions and potential mechanisms of PLD-PA complexes in regulating actin filament/microtubule cytoskeleton, vesicle trafficking, and hormonal signalling, and in influencing lipid metabolism-derived metabolites as critical signalling components in plant defence responses. The discussion puts PLD-PA in a broader context in order to guide future research. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  4. PM2.5, oxidant defence and cardiorespiratory health: a review.

    PubMed

    Weichenthal, Scott A; Godri-Pollitt, Krystal; Villeneuve, Paul J

    2013-05-04

    Airborne fine particle mass concentrations (PM2.5) are used for ambient air quality management worldwide based in part on known cardiorespiratory health effects. While oxidative stress is generally thought to be an important mechanism in determining these effects, relatively few studies have specifically examined how oxidant defence may impact susceptibility to particulate air pollution. Here we review studies that explore the impact of polymorphisms in anti-oxidant related genes or anti-oxidant supplementation on PM2.5-induced cardiorespiratory outcomes in an effort to summarize existing evidence related to oxidative stress defence and the health effects of PM2.5. Recent studies of PM-oxidative burden were also examined. In total, nine studies were identified and reviewed and existing evidence generally suggests that oxidant defence may modify the impact of PM2.5 exposure on various health outcomes, particularly heart rate variability (a measure of autonomic function) which was the most common outcome examined in the studies reviewed. Few studies examined interactions between PM2.5 and oxidant defence for respiratory outcomes, and in general studies focused primarily on acute health effects. Therefore, further evaluation of the potential modifying role of oxidant defence in PM2.5-induced health effects is required, particularly for chronic outcomes. Similarly, while an exposure metric that captures the ability of PM2.5 to cause oxidative stress may offer advantages over traditional mass concentration measurements, little epidemiological evidence is currently available to evaluate the potential benefits of such an approach. Therefore, further evaluation is required to determine how this metric may be incorporated in ambient air quality management.

  5. Plant-mediated effects on an insect-pathogen interaction vary with intraspecific genetic variation in plant defences.

    PubMed

    Shikano, Ikkei; Shumaker, Ketia L; Peiffer, Michelle; Felton, Gary W; Hoover, Kelli

    2017-04-01

    Baculoviruses are food-borne microbial pathogens that are ingested by insects on contaminated foliage. Oxidation of plant-derived phenolics, activated by insect feeding, can directly interfere with infections in the gut. Since phenolic oxidation is an important component of plant resistance against insects, baculoviruses are suggested to be incompatible with plant defences. However, plants among and within species invest differently in a myriad of chemical and physical defences. Therefore, we hypothesized that among eight soybean genotypes, some genotypes would be able to maintain both high resistance against an insect pest and high efficacy of a baculovirus. Soybean constitutive (non-induced) and jasmonic acid (JA)-induced (anti-herbivore response) resistance was measured against the fall armyworm Spodoptera frugiperda (weight gain, leaf consumption and utilization). Indicators of phenolic oxidation were measured as foliar phenolic content and peroxidase activity. Levels of armyworm mortality inflicted by baculovirus (SfMNPV) did not vary among soybean genotypes when the virus was ingested with non-induced foliage. Ingestion of the virus on JA-induced foliage reduced armyworm mortality, relative to non-induced foliage, on some soybean genotypes. Baculovirus efficacy was lower when ingested with foliage that contained higher phenolic content and defensive properties that reduced armyworm weight gain and leaf utilization. However, soybean genotypes that defended the plant by reducing consumption rate and strongly deterred feeding upon JA-induction did not reduce baculovirus efficacy, indicating that these defences may be more compatible with baculoviruses to maximize plant protection. Differential compatibility of defence traits with the third trophic level highlights an important cost/trade-off associated with plant defence strategies.

  6. Leaf Colour as a Signal of Chemical Defence to Insect Herbivores in Wild Cabbage (Brassica oleracea).

    PubMed

    Green, Jonathan P; Foster, Rosie; Wilkins, Lucas; Osorio, Daniel; Hartley, Susan E

    2015-01-01

    Leaf colour has been proposed to signal levels of host defence to insect herbivores, but we lack data on herbivory, leaf colour and levels of defence for wild host populations necessary to test this hypothesis. Such a test requires measurements of leaf spectra as they would be sensed by herbivore visual systems, as well as simultaneous measurements of chemical defences and herbivore responses to leaf colour in natural host-herbivore populations. In a large-scale field survey of wild cabbage (Brassica oleracea) populations, we show that variation in leaf colour and brightness, measured according to herbivore spectral sensitivities, predicts both levels of chemical defences (glucosinolates) and abundance of specialist lepidopteran (Pieris rapae) and hemipteran (Brevicoryne brassicae) herbivores. In subsequent experiments, P. rapae larvae achieved faster growth and greater pupal mass when feeding on plants with bluer leaves, which contained lower levels of aliphatic glucosinolates. Glucosinolate-mediated effects on larval performance may thus contribute to the association between P. rapae herbivory and leaf colour observed in the field. However, preference tests found no evidence that adult butterflies selected host plants based on leaf coloration. In the field, B. brassicae abundance varied with leaf brightness but greenhouse experiments were unable to identify any effects of brightness on aphid preference or performance. Our findings suggest that although leaf colour reflects both levels of host defences and herbivore abundance in the field, the ability of herbivores to respond to colour signals may be limited, even in species where performance is correlated with leaf colour.

  7. Leaf Colour as a Signal of Chemical Defence to Insect Herbivores in Wild Cabbage (Brassica oleracea)

    PubMed Central

    Wilkins, Lucas; Osorio, Daniel; Hartley, Susan E.

    2015-01-01

    Leaf colour has been proposed to signal levels of host defence to insect herbivores, but we lack data on herbivory, leaf colour and levels of defence for wild host populations necessary to test this hypothesis. Such a test requires measurements of leaf spectra as they would be sensed by herbivore visual systems, as well as simultaneous measurements of chemical defences and herbivore responses to leaf colour in natural host-herbivore populations. In a large-scale field survey of wild cabbage (Brassica oleracea) populations, we show that variation in leaf colour and brightness, measured according to herbivore spectral sensitivities, predicts both levels of chemical defences (glucosinolates) and abundance of specialist lepidopteran (Pieris rapae) and hemipteran (Brevicoryne brassicae) herbivores. In subsequent experiments, P. rapae larvae achieved faster growth and greater pupal mass when feeding on plants with bluer leaves, which contained lower levels of aliphatic glucosinolates. Glucosinolate-mediated effects on larval performance may thus contribute to the association between P. rapae herbivory and leaf colour observed in the field. However, preference tests found no evidence that adult butterflies selected host plants based on leaf coloration. In the field, B. brassicae abundance varied with leaf brightness but greenhouse experiments were unable to identify any effects of brightness on aphid preference or performance. Our findings suggest that although leaf colour reflects both levels of host defences and herbivore abundance in the field, the ability of herbivores to respond to colour signals may be limited, even in species where performance is correlated with leaf colour. PMID:26353086

  8. A Herbivorous Mite Down-Regulates Plant Defence and Produces Web to Exclude Competitors

    PubMed Central

    Sarmento, Renato A.; Lemos, Felipe; Dias, Cleide R.; Kikuchi, Wagner T.; Rodrigues, Jean C. P.; Pallini, Angelo; Sabelis, Maurice W.; Janssen, Arne

    2011-01-01

    Herbivores may interact with each other through resource competition, but also through their impact on plant defence. We recently found that the spider mite Tetranychus evansi down-regulates plant defences in tomato plants, resulting in higher rates of oviposition and population growth on previously attacked than on unattacked leaves. The danger of such down-regulation is that attacked plants could become a more profitable resource for heterospecific competitors, such as the two-spotted spider mite Tetranychus urticae. Indeed, T. urticae had an almost 2-fold higher rate of oviposition on leaf discs on which T. evansi had fed previously. In contrast, induction of direct plant defences by T. urticae resulted in decreased oviposition by T. evansi. Hence, both herbivores affect each other through induced plant responses. However, when populations of T. evansi and T. urticae competed on the same plants, populations of the latter invariably went extinct, whereas T. evansi was not significantly affected by the presence of its competitor. This suggests that T. evansi can somehow prevent its competitor from benefiting from the down-regulated plant defence, perhaps by covering it with a profuse web. Indeed, we found that T. urticae had difficulties reaching the leaf surface to feed when the leaf was covered with web produced by T. evansi. Furthermore, T. evansi produced more web when exposed to damage or other cues associated with T. urticae. We suggest that the silken web produced by T. evansi serves to prevent competitors from profiting from down-regulated plant defences. PMID:21887311

  9. Optical interconnection networks for high-performance computing systems

    NASA Astrophysics Data System (ADS)

    Biberman, Aleksandr; Bergman, Keren

    2012-04-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers.

  10. Research Activity in Computational Physics utilizing High Performance Computing: Co-authorship Network Analysis

    NASA Astrophysics Data System (ADS)

    Ahn, Sul-Ah; Jung, Youngim

    2016-10-01

    The research activities of the computational physicists utilizing high performance computing are analyzed by bibliometirc approaches. This study aims at providing the computational physicists utilizing high-performance computing and policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of researchers for high-performance computational physics as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2004-2013. We extracted the author rank in the physics field utilizing high-performance computing by the number of papers published during ten years from 2004. Finally, we drew the co-authorship network for 45 top-authors and their coauthors, and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.

  11. Node fingerprinting: an efficient heuristic for aligning biological networks.

    PubMed

    Radu, Alex; Charleston, Michael

    2014-10-01

    With the continuing increase in availability of biological data and improvements to biological models, biological network analysis has become a promising area of research. An emerging technique for the analysis of biological networks is through network alignment. Network alignment has been used to calculate genetic distance, similarities between regulatory structures, and the effect of external forces on gene expression, and to depict conditional activity of expression modules in cancer. Network alignment is algorithmically complex, and therefore we must rely on heuristics, ideally as efficient and accurate as possible. The majority of current techniques for network alignment rely on precomputed information, such as with protein sequence alignment, or on tunable network alignment parameters, which may introduce an increased computational overhead. Our presented algorithm, which we call Node Fingerprinting (NF), is appropriate for performing global pairwise network alignment without precomputation or tuning, can be fully parallelized, and is able to quickly compute an accurate alignment between two biological networks. It has performed as well as or better than existing algorithms on biological and simulated data, and with fewer computational resources. The algorithmic validation performed demonstrates the low computational resource requirements of NF.

  12. A program to compute the soft Robinson-Foulds distance between phylogenetic networks.

    PubMed

    Lu, Bingxin; Zhang, Louxin; Leong, Hon Wai

    2017-03-14

    Over the past two decades, phylogenetic networks have been studied to model reticulate evolutionary events. The relationships among phylogenetic networks, phylogenetic trees and clusters serve as the basis for reconstruction and comparison of phylogenetic networks. To understand these relationships, two problems are raised: the tree containment problem, which asks whether a phylogenetic tree is displayed in a phylogenetic network, and the cluster containment problem, which asks whether a cluster is represented at a node in a phylogenetic network. Both the problems are NP-complete. A fast exponential-time algorithm for the cluster containment problem on arbitrary networks is developed and implemented in C. The resulting program is further extended into a computer program for fast computation of the Soft Robinson-Foulds distance between phylogenetic networks. Two computer programs are developed for facilitating reconstruction and validation of phylogenetic network models in evolutionary and comparative genomics. Our simulation tests indicated that they are fast enough for use in practice. Additionally, the distribution of the Soft Robinson-Foulds distance between phylogenetic networks is demonstrated to be unlikely normal by our simulation data.

  13. Student and Instructor Perceptions of the Usefulness of Computer-Based Microworlds in Supporting the Teaching and Assessment of Computer Networking Skills: An Exploratory Study

    ERIC Educational Resources Information Center

    Dabbagh, Nada; Beattie, Mark

    2010-01-01

    Skill shortages in the area of computer network troubleshooting are becoming increasingly acute. According to research sponsored by Cisco's Learning Institute, the demand for professionals with computer networking skills in the United States and Canada will outpace the supply of workers with those skills by an average of eight percent per year…

  14. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks

    NASA Astrophysics Data System (ADS)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-01

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  15. Deep learning for computational chemistry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goh, Garrett B.; Hodas, Nathan O.; Vishnu, Abhinav

    The rise and fall of artificial neural networks is well documented in the scientific literature of both the fields of computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on “deep” neural networks. Within the last few years, we have seen the transformative impact of deep learning the computer science domain, notably in speech recognition and computer vision, to the extent that the majority of practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. Inmore » this review, we provide an introductory overview into the theory of deep neural networks and their unique properties as compared to traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including QSAR, virtual screening, protein structure modeling, QM calculations, materials synthesis and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non neural networks state-of-the-art models across disparate research topics, and deep neural network based models often exceeded the “glass ceiling” expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a useful tool and may grow into a pivotal role for various challenges in the computational chemistry field.« less

  16. Ubiquitous human computing.

    PubMed

    Zittrain, Jonathan

    2008-10-28

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  17. Computer-Based Semantic Network in Molecular Biology: A Demonstration.

    ERIC Educational Resources Information Center

    Callman, Joshua L.; And Others

    This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…

  18. Neural network approach to proximity effect corrections in electron-beam lithography

    NASA Astrophysics Data System (ADS)

    Frye, Robert C.; Cummings, Kevin D.; Rietman, Edward A.

    1990-05-01

    The proximity effect, caused by electron beam backscattering during resist exposure, is an important concern in writing submicron features. It can be compensated by appropriate local changes in the incident beam dose, but computation of the optimal correction usually requires a prohibitively long time. We present an example of such a computation on a small test pattern, which we performed by an iterative method. We then used this solution as a training set for an adaptive neural network. After training, the network computed the same correction as the iterative method, but in a much shorter time. Correcting the image with a software based neural network resulted in a decrease in the computation time by a factor of 30, and a hardware based network enhanced the computation speed by more than a factor of 1000. Both methods had an acceptably small error of 0.5% compared to the results of the iterative computation. Additionally, we verified that the neural network correctly generalized the solution of the problem to include patterns not contained in its training set.

  19. Critical phenomena in communication/computation networks with various topologies and suboptimal to optimal resource allocation

    NASA Astrophysics Data System (ADS)

    Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi

    2015-01-01

    We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.

  20. Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services

    DTIC Science & Technology

    2007-03-01

    potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global

  1. Modeling a Wireless Network for International Space Station

    NASA Technical Reports Server (NTRS)

    Alena, Richard; Yaprak, Ece; Lamouri, Saad

    2000-01-01

    This paper describes the application of wireless local area network (LAN) simulation modeling methods to the hybrid LAN architecture designed for supporting crew-computing tools aboard the International Space Station (ISS). These crew-computing tools, such as wearable computers and portable advisory systems, will provide crew members with real-time vehicle and payload status information and access to digital technical and scientific libraries, significantly enhancing human capabilities in space. A wireless network, therefore, will provide wearable computer and remote instruments with the high performance computational power needed by next-generation 'intelligent' software applications. Wireless network performance in such simulated environments is characterized by the sustainable throughput of data under different traffic conditions. This data will be used to help plan the addition of more access points supporting new modules and more nodes for increased network capacity as the ISS grows.

  2. Distributed computing methodology for training neural networks in an image-guided diagnostic application.

    PubMed

    Plagianakos, V P; Magoulas, G D; Vrahatis, M N

    2006-03-01

    Distributed computing is a process through which a set of computers connected by a network is used collectively to solve a single problem. In this paper, we propose a distributed computing methodology for training neural networks for the detection of lesions in colonoscopy. Our approach is based on partitioning the training set across multiple processors using a parallel virtual machine. In this way, interconnected computers of varied architectures can be used for the distributed evaluation of the error function and gradient values, and, thus, training neural networks utilizing various learning methods. The proposed methodology has large granularity and low synchronization, and has been implemented and tested. Our results indicate that the parallel virtual machine implementation of the training algorithms developed leads to considerable speedup, especially when large network architectures and training sets are used.

  3. Local area networking: Ames centerwide network

    NASA Technical Reports Server (NTRS)

    Price, Edwin

    1988-01-01

    A computer network can benefit the user by making his/her work quicker and easier. A computer network is made up of seven different layers with the lowest being the hardware, the top being the user, and the middle being the software. These layers are discussed.

  4. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  5. Inverse targeting —An effective immunization strategy

    NASA Astrophysics Data System (ADS)

    Schneider, C. M.; Mihaljev, T.; Herrmann, H. J.

    2012-05-01

    We propose a new method to immunize populations or computer networks against epidemics which is more efficient than any continuous immunization method considered before. The novelty of our method resides in the way of determining the immunization targets. First we identify those individuals or computers that contribute the least to the disease spreading measured through their contribution to the size of the largest connected cluster in the social or a computer network. The immunization process follows the list of identified individuals or computers in inverse order, immunizing first those which are most relevant for the epidemic spreading. We have applied our immunization strategy to several model networks and two real networks, the Internet and the collaboration network of high-energy physicists. We find that our new immunization strategy is in the case of model networks up to 14%, and for real networks up to 33% more efficient than immunizing dynamically the most connected nodes in a network. Our strategy is also numerically efficient and can therefore be applied to large systems.

  6. Improving Coalitions through S&T Cooperation

    DTIC Science & Technology

    2008-12-01

    Canada Potentially disruptive technologies that could provide decisive advantage for the CF • Quantum capabilities • Autonomous intelligent systems...the gaps in the CF Strategic Capability Roadmap • Position Defence to exploit emerging or disruptive technologies • Reduce the costs of defence

  7. AlGaInN laser diode technology and systems for defence and security applications

    NASA Astrophysics Data System (ADS)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lucja; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2015-05-01

    The latest developments in AlGaInN laser diode technology are reviewed for defence and security applications such as underwater communications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., ~380nm, to the visible ~530nm, by tuning the indium content of the laser GaInN quantum well. Thus AlGaInN laser diode technology is a key enabler for the development of new disruptive system level applications in displays, telecom, defence and other industries.

  8. Dopamine is a key regulator in the signalling pathway underlying predator-induced defences in Daphnia

    PubMed Central

    Weiss, Linda C.; Leese, Florian; Laforsch, Christian; Tollrian, Ralph

    2015-01-01

    The waterflea Daphnia is a model to investigate the genetic basis of phenotypic plasticity resulting from one differentially expressed genome. Daphnia develops adaptive phenotypes (e.g. morphological defences) thwarting predators, based on chemical predator cue perception. To understand the genomic basis of phenotypic plasticity, the description of the precedent cellular and neuronal mechanisms is fundamental. However, key regulators remain unknown. All neuronal and endocrine stimulants were able to modulate but not induce defences, indicating a pathway of interlinked steps. A candidate able to link neuronal with endocrine responses is the multi-functional amine dopamine. We here tested its involvement in trait formation in Daphnia pulex and Daphnia longicephala using an induction assay composed of predator cues combined with dopaminergic and cholinergic stimulants. The mere application of both stimulants was sufficient to induce morphological defences. We determined dopamine localization in cells found in close association with the defensive trait. These cells serve as centres controlling divergent morphologies. As a mitogen and sclerotization agent, we anticipate that dopamine is involved in proliferation and structural formation of morphological defences. Furthermore, dopamine pathways appear to be interconnected with endocrine pathways, and control juvenile hormone and ecdysone levels. In conclusion, dopamine is suggested as a key regulator of phenotypic plasticity. PMID:26423840

  9. Independently recruited oxidases from the glucose-methanol-choline oxidoreductase family enabled chemical defences in leaf beetle larvae (subtribe Chrysomelina) to evolve

    PubMed Central

    Rahfeld, Peter; Kirsch, Roy; Kugel, Susann; Wielsch, Natalie; Stock, Magdalena; Groth, Marco; Boland, Wilhelm; Burse, Antje

    2014-01-01

    Larvae of the leaf beetle subtribe Chrysomelina sensu stricto repel their enemies by displaying glandular secretions that contain defensive compounds. These repellents can be produced either de novo (iridoids) or by using plant-derived precursors (e.g. salicylaldehyde). The autonomous production of iridoids, as in Phaedon cochleariae, is the ancestral chrysomeline chemical defence and predates the evolution of salicylaldehyde-based defence. Both biosynthesis strategies include an oxidative step of an alcohol intermediate. In salicylaldehyde-producing species, this step is catalysed by salicyl alcohol oxidases (SAOs) of the glucose-methanol-choline (GMC) oxidoreductase superfamily, but the enzyme oxidizing the iridoid precursor is unknown. Here, we show by in vitro as well as in vivo experiments that P. cochleariae also uses an oxidase from the GMC superfamily for defensive purposes. However, our phylogenetic analysis of chrysomeline GMC oxidoreductases revealed that the oxidase of the iridoid pathway originated from a GMC clade different from that of the SAOs. Thus, the evolution of a host-independent chemical defence followed by a shift to a host-dependent chemical defence in chrysomeline beetles coincided with the utilization of genes from different GMC subfamilies. These findings illustrate the importance of the GMC multi-gene family for adaptive processes in plant–insect interactions. PMID:24943369

  10. OsMYC2 mediates numerous defence-related transcriptional changes via jasmonic acid signalling in rice.

    PubMed

    Ogawa, Satoshi; Kawahara-Miki, Ryouka; Miyamoto, Koji; Yamane, Hisakazu; Nojiri, Hideaki; Tsujii, Yoshimasa; Okada, Kazunori

    2017-05-06

    Jasmonic acid (JA) plays central roles in various events in plants, especially defence against pathogens and insects. The basic helix-loop-helix (bHLH) transcription factor MYC2 has attracted attention as a master regulator of JA signalling in dicotyledonous plants. However, how MYC2 functions in monocotyledonous plants, including agriculturally important crops such as cultivated rice, has been poorly understood. To elucidate the comprehensive effects of rice MYC2 (OsMYC2) on the JA-inducible transcriptional modifications, we performed RNA-sequencing by using OsMYC2-knockdown plants (osmyc2RNAi). In osmyc2RNAi, JA-inducible expression of many defence-related genes, for example chitinases and proteinase inhibitors, was compromised. Decrease in JA-dependent activation of the biosynthetic pathways of specialised metabolites, especially defence compounds, was also evident in the osmyc2RNAi line. Furthermore, a substantial change was noted in the expression of distinct types of transcription factors, such as MYB-type factors, likely depicting the importance of OsMYC2 in not only defence responses but also other morphogenetic events. Our findings provide fundamental information to understand the overall functions of MYC2 in JA signalling in monocotyledonous plants, which might yield agricultural benefits. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Prey survival by predator intimidation: an experimental study of peacock butterfly defence against blue tits

    PubMed Central

    Vallin, Adrian; Jakobsson, Sven; Lind, Johan; Wiklund, Christer

    2005-01-01

    Long-lived butterflies that hibernate as adults are expected to have well-developed antipredation devices as a result of their long exposure to natural enemies. The peacock butterfly, Inachis io, for instance, is a cryptic leaf mimic when resting, but shifts to active defence when disturbed, performing a repeated sequence of movements exposing major eyespots on the wings accompanied by a hissing noise. We studied the effect of visual and auditory defence by staging experiments in which wild-caught blue tits, Parus caeruleus, were presented with one of six kinds of experimentally manipulated living peacock butterflies as follows: butterflies with eyespots painted over and their controls (painted on another part of the wing), butterflies with their sound production aborted (small part of wings removed) and their controls, and butterflies with eyespots painted over and sound production aborted and their controls. The results showed that eyespots alone, or in combination with sound, constituted an effective defence; only 1 out of 34 butterflies with intact eyespots was killed, whereas 13 out of 20 butterflies without eyespots were killed. The killed peacocks were eaten, indicating that they are not distasteful. Hence, intimidation by bluffing can be an efficient means of defence for an edible prey. PMID:16024383

  12. Attraction of Phytoseiulus persimilis (Acari: Phytoseiidae) towards volatiles from various Tetranychus urticae-infested plant species.

    PubMed

    van den Boom, C E M; van Beek, T A; Dicke, M

    2002-12-01

    Plants infested with the spider mite Tetranychus urticae Koch, may indirectly defend themselves by releasing volatiles that attract the predatory mite Phytoseiulus persimilis Athias-Henriot. Several plants from different plant families that varied in the level of spider mite acceptance were tested in an olfactometer. The predatory mites were significantly attracted to the spider mite-infested leaves of all test plant species. No differences in attractiveness of the infested plant leaves were found for predatory mites reared on spider mites on the different test plants or on lima bean. Thus, experience with the spider mite-induced plant volatiles did not affect the predatory mites. Jasmonic acid was applied to ginkgo leaves to induce a mimic of a spider mite-induced volatile blend, because the spider mites did not survive when incubated on ginkgo. The volatile blend induced in ginkgo by jasmonic acid was slightly attractive to predatory mites. Plants with a high degree of direct defence were thought to invest less in indirect defence than plants with a low degree of direct defence. However, plants that had a strong direct defence such as ginkgo and sweet pepper, did emit induced volatiles that attracted the predatory mite. This indicates that a combination of direct and indirect defence is to some extent compatible in plant species.

  13. Enzyme-driven metabolomic screening: a proof-of-principle method for discovery of plant defence compounds targeted by pathogens.

    PubMed

    Carere, Jason; Colgrave, Michelle L; Stiller, Jiri; Liu, Chunji; Manners, John M; Kazan, Kemal; Gardiner, Donald M

    2016-11-01

    Plants produce a variety of secondary metabolites to defend themselves from pathogen attack, while pathogens have evolved to overcome plant defences by producing enzymes that degrade or modify these defence compounds. However, many compounds targeted by pathogen enzymes currently remain enigmatic. Identifying host compounds targeted by pathogen enzymes would enable us to understand the potential importance of such compounds in plant defence and modify them to make them insensitive to pathogen enzymes. Here, a proof of concept metabolomics-based method was developed to discover plant defence compounds modified by pathogens using two pathogen enzymes with known targets in wheat and tomato. Plant extracts treated with purified pathogen enzymes were subjected to LC-MS, and the relative abundance of metabolites before and after treatment were comparatively analysed. Using two enzymes from different pathogens the in planta targets could be found by combining relatively simple enzymology with the power of untargeted metabolomics. Key to the method is dataset simplification based on natural isotope occurrence and statistical filtering, which can be scripted. The method presented here will aid in our understanding of plant-pathogen interactions and may lead to the development of new plant protection strategies. © 2016 CSIRO. New Phytologist © 2016 New Phytologist Trust.

  14. Local-Area-Network Simulator

    NASA Technical Reports Server (NTRS)

    Gibson, Jim; Jordan, Joe; Grant, Terry

    1990-01-01

    Local Area Network Extensible Simulator (LANES) computer program provides method for simulating performance of high-speed local-area-network (LAN) technology. Developed as design and analysis software tool for networking computers on board proposed Space Station. Load, network, link, and physical layers of layered network architecture all modeled. Mathematically models according to different lower-layer protocols: Fiber Distributed Data Interface (FDDI) and Star*Bus. Written in FORTRAN 77.

  15. Object-oriented Tools for Distributed Computing

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.

    1993-01-01

    Distributed computing systems are proliferating, owing to the availability of powerful, affordable microcomputers and inexpensive communication networks. A critical problem in developing such systems is getting application programs to interact with one another across a computer network. Remote interprogram connectivity is particularly challenging across heterogeneous environments, where applications run on different kinds of computers and operating systems. NetWorks! (trademark) is an innovative software product that provides an object-oriented messaging solution to these problems. This paper describes the design and functionality of NetWorks! and illustrates how it is being used to build complex distributed applications for NASA and in the commercial sector.

  16. Distinguishing humans from computers in the game of go: A complex network approach

    NASA Astrophysics Data System (ADS)

    Coquidé, C.; Georgeot, B.; Giraud, O.

    2017-08-01

    We compare complex networks built from the game of go and obtained from databases of human-played games with those obtained from computer-played games. Our investigations show that statistical features of the human-based networks and the computer-based networks differ, and that these differences can be statistically significant on a relatively small number of games using specific estimators. We show that the deterministic or stochastic nature of the computer algorithm playing the game can also be distinguished from these quantities. This can be seen as a tool to implement a Turing-like test for go simulators.

  17. Collaboration for Land, Air, Sea, and Space Vehicles: Developing the Common Ground in Vehicle Dynamics, System Identification, Control, and Handling Qualities (La collaboration dans le domaine des vehicules terrestres, aeriens, maritimes et spatiaux: L’etablissement d’une approche commune de la dynamique des vehicules, l’identification des systemes, et les qualite’s de controle et de pilotage)

    DTIC Science & Technology

    2002-11-01

    slots in the side of the tail boom, which, by coupling with the predominately downward flow induced by the main rotor , produces “Coanda Effect ” and thus...conduct and promote cooperative research and information exchange. The objective is to support the development and effective use of national defence...decision makers. The RTO performs its mission with the support of an extensive network of national experts. It also ensures effective coordination with

  18. Antioxidants and the Integrity of Ocular Tissues

    PubMed Central

    Cabrera, Marcela P.; Chihuailaf, Ricardo H.

    2011-01-01

    Oxygen-derived free radicals are normally generated in many pathways. These radicals can interact with various cellular components and induce cell injury. When free radicals exceed the antioxidant capacity, cell injury causes diverse pathologic changes in the organs. The imbalance between the generation of free radicals and antioxidant defence is known as oxidative stress. The eye can suffer the effect of oxidative damage due to the etiopathogenesis of some pathological changes related to oxidative stress. This paper reviews the role of oxidative stress in the onset and progression of damage in different eye structures, the involvement of the antioxidant network in protecting and maintaining the homeostasis of this organ, and the potential assessment methodologies used in research and in some cases in clinical practice. PMID:21789267

  19. High-speed on-chip windowed centroiding using photodiode-based CMOS imager

    NASA Technical Reports Server (NTRS)

    Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)

    2003-01-01

    A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.

  20. High-speed on-chip windowed centroiding using photodiode-based CMOS imager

    NASA Technical Reports Server (NTRS)

    Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)

    2004-01-01

    A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.

  1. Calculation and simulation of atmospheric refraction effects in maritime environments

    NASA Astrophysics Data System (ADS)

    Dion, Denis, Jr.; Gardenal, Lionel; Lahaie, P.; Forand, J. Luc

    2001-01-01

    Near the sea surface, atmospheric refraction and turbulence affect both IR transmission and image quality. This produces an impact on both the detection and classification/identification of targets. With the financial participation of the U.S. Office of Naval Research (ONR), Canada's Defence Research Establishment Valcartier (DREV) is developing PRIME (Propagation Resources In the Maritime Environment), a computer model aimed at describing the overall atmospheric effects on IR imagery systems in the marine surface layer. PRIME can be used as a complement to MODTRAN to compute the effective transmittance in the marine surface layer, taking into account the lens effects caused by refraction. It also provides information on image degradation caused by both refraction and turbulence. This paper reviews the refraction phenomena that take place in the surface layer and discusses their effects on target detection and identification. We then show how PRIME can benefit detection studies and image degradation simulations.

  2. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.

    PubMed

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  3. Learning Universal Computations with Spikes

    PubMed Central

    Thalmeier, Dominik; Uhlmann, Marvin; Kappen, Hilbert J.; Memmesheimer, Raoul-Martin

    2016-01-01

    Providing the neurobiological basis of information processing in higher animals, spiking neural networks must be able to learn a variety of complicated computations, including the generation of appropriate, possibly delayed reactions to inputs and the self-sustained generation of complex activity patterns, e.g. for locomotion. Many such computations require previous building of intrinsic world models. Here we show how spiking neural networks may solve these different tasks. Firstly, we derive constraints under which classes of spiking neural networks lend themselves to substrates of powerful general purpose computing. The networks contain dendritic or synaptic nonlinearities and have a constrained connectivity. We then combine such networks with learning rules for outputs or recurrent connections. We show that this allows to learn even difficult benchmark tasks such as the self-sustained generation of desired low-dimensional chaotic dynamics or memory-dependent computations. Furthermore, we show how spiking networks can build models of external world systems and use the acquired knowledge to control them. PMID:27309381

  4. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    PubMed Central

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613

  5. Embedding global barrier and collective in torus network with each node combining input from receivers according to class map for output to senders

    DOEpatents

    Chen, Dong; Coteus, Paul W; Eisley, Noel A; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E

    2013-08-27

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.

  6. Manual of Documentation Practices Applicable to Defence-Aerospace Scientific and Technical Information. Volume 2. Section 4 - Data Recording and Storage. Section 5 - Mechanization Systems and Operations. Section 6 - Announcement Services and Publications

    DTIC Science & Technology

    1979-07-01

    processes rely upon the coincidence of holes drilled , with considerable precision, in special cards. The computer can handle this kind of basic...PERFORMANCE 70No.12,17/2 Gray.R.A. Cabaniss,0.H. 4i.1972 63PP 57ref Indexing Terms: * Metrology /*Standards/Physics/Physicr Availability: TRC L1.20 A1-SURV...within the parent organsation is gauged to fit within this requitement. The imiphiations of this aspvct of SI processing are dealt with in detail in

  7. Directory of Factual and Numeric Databases of Relevance to Aerospace and Defence R and D (Repertoire de Bases de donnees Factuelles ou Numeriques d’interet pour la R and D).

    DTIC Science & Technology

    1992-07-01

    have become quite common in science and engineering, and will become more so as the demand for reliable data increases, and with it the pace of data...la derniere decennie. Elles sont appelees a jouer un r6le plus important. a l’avenir. avec l’evolution de Ia demande d’intormations tiables et...computational codes. The wind tunnel data contained in the SEADS data base were obained using these forward fuselage models (10%, 4% and 2%) over the Match

  8. A 30m resolution hydrodynamic model of the entire conterminous United States.

    NASA Astrophysics Data System (ADS)

    Bates, P. D.; Neal, J. C.; Smith, A.; Sampson, C.; Johnson, K.; Wing, O.

    2016-12-01

    In this paper we describe the development and validation of a 30m resolution hydrodynamic model covering the entire conterminous United States. The model can be used to simulate inundation and water depths resulting from either return period flows (so equivalent to FEMA Flood Insurance Rate Maps), hindcasts of historic events or forecasts of future river flow from a rainfall-runoff or land surface model. As topographic data the model uses the U.S. Geological Survey National Elevation Dataset or NED, and return period flows are generated using a regional flood frequency analysis methodology (Smith et al., 2015. Worldwide flood frequency estimation. Water Resources Research, 51, 539-553). Flood defences nationwide are represented using data from the US Army Corps of Engineers. Using these data flows are simulated using an explicit and highly efficient finite difference solution of the local inertial form of the Shallow Water equations identical to that implemented in the LISFLOOD-FP model. Even with this efficient numerical solution a simulation at this resolution over a whole continent is a huge undertaking, and a variety of High Performance Computing technologies therefore need to be employed to make these simulations possible. The size of the output datasets is also challenging, and to solve this we use the GIS and graphical display functions of Google Earth Engine to facilitate easy visualisation and interrogation of the results. The model is validated against the return period flood extents contained in FEMA Flood Insurance Rate Maps and real flood event data from the Texas 2015 flood event which was hindcast using the model. Finally, we present an application of the model to the Upper Mississippi river basin where simulations both with and without flood defences are used to determine floodplain areas benefitting from protection in order to quantify the benefits of flood defence spending.

  9. Computer Code for Transportation Network Design and Analysis

    DOT National Transportation Integrated Search

    1977-01-01

    This document describes the results of research into the application of the mathematical programming technique of decomposition to practical transportation network problems. A computer code called Catnap (for Control Analysis Transportation Network A...

  10. Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William

    A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less

  11. Fluid Centrality: A Social Network Analysis of Social-Technical Relations in Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Enriquez, Judith Guevarra

    2010-01-01

    In this article, centrality is explored as a measure of computer-mediated communication (CMC) in networked learning. Centrality measure is quite common in performing social network analysis (SNA) and in analysing social cohesion, strength of ties and influence in CMC, and computer-supported collaborative learning research. It argues that measuring…

  12. The Effectiveness of Using Virtual Laboratories to Teach Computer Networking Skills in Zambia

    ERIC Educational Resources Information Center

    Lampi, Evans

    2013-01-01

    The effectiveness of using virtual labs to train students in computer networking skills, when real equipment is limited or unavailable, is uncertain. The purpose of this study was to determine the effectiveness of using virtual labs to train students in the acquisition of computer network configuration and troubleshooting skills. The study was…

  13. Submarine Pressure Hull Collapse Considering Corrosion and Penetrations

    DTIC Science & Technology

    2010-11-01

    Original signed by Liam Gannon Liam Gannon Defence Scientist Approved by Original signed by Neil Pegg Neil Pegg Head/Warship Performance Approved... Heath , D.C. (2001). Submarine Structural Analysis Suite, SubSAS Phase 1. (DREA TM 2001-025). Defence Research Establishment Atlantic. DRDC

  14. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  15. Documentary of MFENET, a national computer network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shuttleworth, B.O.

    1977-06-01

    The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less

  16. Network Management of the SPLICE Computer Network.

    DTIC Science & Technology

    1982-12-01

    Approved for public release; distri4ition unlimited. Network lanagenent Df the SPLICE Computer Network by Zriig E. Opal captaini United St~tes larine... structure of the network must leni itself t3 change and reconfiguration, one author [Ref. 2: p.21] recommended that a global bus topology be adopted for...statistics, trace statistics, snapshot statistiZs, artifi - cial traffic generators, auulat on, a network measurement center which includes control, collction

  17. Menadione Sodium Bisulphite (MSB) enhances the resistance response of tomato, leading to repel mollusc pests.

    PubMed

    Carrillo-Perdomo, Estefanía; Jiménez-Arias, David; Aller, Ángel; Borges, Andrés A

    2016-05-01

    Snails and slugs are terrestrial gastropods representing an important biotic stress that adversely affects crop yields. These pests are typically controlled with molluscicides, which produce pollution and toxicity and further induce the evolution of resistance mechanisms, making pest management even more challenging. In our work, we have assessed the efficacy of two different plant defence activators, menadione sodium bisulphite (MSB) and 1,2,3-benzothiadiazole-7-thiocarboxylic acid S-methyl ester (BTH), as inducers of resistance mechanisms of the model plant for defence, Solanum lycopersicum, against the generalist mollusc Theba grasseti (Helicidae). The study was designed to test the feeding behaviour and choice of snails, and also to analyse the expression profile of different genes specifically involved in defence against herbivores and wounds. Our data suggest that, through the downregulation of the terpene volatile genes and the production of proteinase inhibitors, treated MSB plants may be less apparent to herbivores that use herbivore-induced plant volatiles for host location. By contrast, BTH was not effective in the treatment of the pest, probably owing to an antagonistic effect derived from the induction of both salicylic-acid-dependent and jasmonic-acid-dependent pathways. This information is crucial to determine the genetic basis of the choice of terrestrial gastropod herbivores in tomato, providing valuable insight into how the plant defence activators could control herbivore pests in plants. Our work not only reports for the first time the interaction between tomato and a mollusc pest but also presents the action of two plant defence inductors that seems to produce opposed responses by inducing resistance mechanisms through different defence pathways. © 2015 Society of Chemical Industry.

  18. Plant defences on land and in water: why are they so different?

    PubMed Central

    2016-01-01

    Background Plants (attached photosynthesizing organisms) are eaten by a wide variety of herbivorous animals. Despite a vast literature on plant defence, contrasting patterns of antiherbivore adaptation among marine, freshwater and land plants have been little noticed, documented or understood. Scope Here I show how the surrounding medium (water or air) affects not only the plants themselves, but also the sensory and locomotor capacities of herbivores and their predators, and I discuss patterns of defence and host specialization of plants and herbivores on land and in water. I analysed the literature on herbivory with special reference to mechanical defences and sensory cues emitted by plants. Spines, hairs, asymmetrically oriented features on plant surfaces, and visual and olfactory signals that confuse or repel herbivores are common in land plants but rare or absent in water-dwelling plants. Small terrestrial herbivores are more often host-specific than their aquatic counterparts. I propose that patterns of selection on terrestrial herbivores and plants differ from those on aquatic species. Land plants must often attract animal dispersers and pollinators that, like their herbivorous counterparts, require sophisticated locomotor and sensory abilities. Plants counter their attractiveness to animal helpers by evolving effective contact defences and long-distance cues that mislead or warn herbivores. The locomotor and sensory world of small aquatic herbivores is more limited. These characteristics result from the lower viscosity and density of air compared with water as well as from limitations on plant physiology and signal transmission in water. Evolutionary innovations have not eliminated the contrasts in the conditions of life between water and land. Conclusion Plant defence can be understood fully when herbivores and their victims are considered in the broader context of other interactions among coexisting species and of the medium in which these interactions occur. PMID:27091505

  19. Correlations between leaf toughness and phenolics among species in contrasting environments of Australia and New Caledonia

    PubMed Central

    Read, Jennifer; Sanson, Gordon D.; Caldwell, Elizabeth; Clissold, Fiona J.; Chatain, Alex; Peeters, Paula; Lamont, Byron B.; De Garine-Wichatitsky, Michel; Jaffré, Tanguy; Kerr, Stuart

    2009-01-01

    Background and Aims Plants are likely to invest in multiple defences, given the variety of sources of biotic and abiotic damage to which they are exposed. However, little is known about syndromes of defence across plant species and how these differ in contrasting environments. Here an investigation is made into the association between carbon-based chemical and mechanical defences, predicting that species that invest heavily in mechanical defence of leaves will invest less in chemical defence. Methods A combination of published and unpublished data is used to test whether species with tougher leaves have lower concentrations of phenolics, using 125 species from four regions of Australia and the Pacific island of New Caledonia, in evergreen vegetation ranging from temperate shrubland and woodland to tropical shrubland and rainforest. Foliar toughness was measured as work-to-shear and specific work-to-shear (work-to-shear per unit leaf thickness). Phenolics were measured as ‘total phenolics’ and by protein precipitation (an estimate of tannin activity) per leaf dry mass. Key Results Contrary to prediction, phenolic concentrations were not negatively correlated with either measure of leaf toughness when examined across all species, within regions or within any plant community. Instead, measures of toughness (particularly work-to-shear) and phenolics were often positively correlated in shrubland and rainforest (but not dry forest) in New Caledonia, with a similar trend suggested for shrubland in south-western Australia. The common feature of these sites was low concentrations of soil nutrients, with evidence of P limitation. Conclusions Positive correlations between toughness and phenolics in vegetation on infertile soils suggest that additive investment in carbon-based mechanical and chemical defences is advantageous and cost-effective in these nutrient-deficient environments where carbohydrate may be in surplus. PMID:19098067

  20. Increased Host Investment in Extrafloral Nectar (EFN) Improves the Efficiency of a Mutualistic Defensive Service

    PubMed Central

    González-Teuber, Marcia; Silva Bueno, Juan Carlos; Heil, Martin; Boland, Wilhelm

    2012-01-01

    Extrafloral nectar (EFN) plays an important role as plant indirect defence through the attraction of defending ants. Like all rewards produced in the context of a mutualism, however, EFN is in danger of being exploited by non-ant consumers that do not defend the plant against herbivores. Here we asked whether plants, by investing more in EFN, can improve their indirect defence, or rather increase the risk of losing this investment to EFN thieves. We used the obligate plant-ant Acacia-Pseudomyrmex system and examined experimentally in the field during the dry and the rainy seasons how variations in EFN secretion are related to (i) ant activity, to (ii) the ant-mediated defence against herbivores and (iii) the exploitation of EFN by non-ant consumers. Extrafloral investment enhanced ant recruitment and was positively related to the ant mediated defence against herbivores. The ant-mediated protection from exploiters also increased in proportion to the nectar sugar concentration. Although the daily peak of EFN production coincided with the highest activity of EFN thieves, Pseudomyrmex ferrugineus ants protected this resource effectively from exploiters. Nevertheless, the defensive effects by ants differed among seasons. During the dry season, plants grew slower and secreted more EFN than in the rainy season, and thus, experienced a higher level of ant-mediated indirect defence. Our results show that an increased plant investment in an indirect defence trait can improve the resulting defensive service against both herbivores and exploiters. EFN secretion by obligate ant-plants represents a defensive trait for which the level of investment correlates positively with the beneficial effects obtained. PMID:23056362

  1. The ethylene response factor Pti5 contributes to potato aphid resistance in tomato independent of ethylene signalling

    PubMed Central

    Wu, Chengjun; Avila, Carlos A.; Goggin, Fiona L.

    2015-01-01

    Ethylene response factors (ERFs) comprise a large family of transcription factors that regulate numerous biological processes including growth, development, and response to environmental stresses. Here, we report that Pti5, an ERF in tomato [Solanum lycopersicum (Linnaeus)] was transcriptionally upregulated in response to the potato aphid Macrosiphum euphorbiae (Thomas), and contributed to plant defences that limited the population growth of this phloem-feeding insect. Virus-induced gene silencing of Pti5 enhanced aphid population growth on tomato, both on an aphid-susceptible cultivar and on a near-isogenic genotype that carried the Mi-1.2 resistance (R) gene. These results indicate that Pti5 contributes to basal resistance in susceptible plants and also can synergize with other R gene-mediated defences to limit aphid survival and reproduction. Although Pti5 contains the ERF motif, induction of this gene by aphids was independent of ethylene, since the ACC deaminase (ACD) transgene, which inhibits ethylene synthesis, did not diminish the responsiveness of Pti5 to aphid infestation. Furthermore, experiments with inhibitors of ethylene synthesis revealed that Pti5 and ethylene have distinctly different roles in plant responses to aphids. Whereas Pti5 contributed to antibiotic plant defences that limited aphid survival and reproduction on both resistant (Mi-1.2+) and susceptible (Mi-1.2–) genotypes, ethylene signalling promoted aphid infestation on susceptible plants but contributed to antixenotic defences that deterred the early stages of aphid host selection on resistant plants. These findings suggest that the antixenotic defences that inhibit aphid settling and the antibiotic defences that depress fecundity and promote mortality are regulated through different signalling pathways. PMID:25504643

  2. Deimatic display in the European swallowtail butterfly as a secondary defence against attacks from great tits.

    PubMed

    Olofsson, Martin; Eriksson, Stephan; Jakobsson, Sven; Wiklund, Christer

    2012-01-01

    Many animals reduce the risk of being attacked by a predator through crypsis, masquerade or, alternatively, by advertising unprofitability by means of aposematic signalling. Behavioural attributes in prey employed after discovery, however, signify the importance of also having an effective secondary defence if a predator uncovers, or is immune to, the prey's primary defence. In butterflies, as in most animals, secondary defence generally consists of escape flights. However, some butterfly species have evolved other means of secondary defence such as deimatic displays/startle displays. The European swallowtail, Papilio machaon, employs what appears to be a startle display by exposing its brightly coloured dorsal wing surface upon disturbance and, if the disturbance continues, by intermittently protracting and relaxing its wing muscles generating a jerky motion of the wings. This display appears directed towards predators but whether it is effective in intimidating predators so that they refrain from attacks has never been tested experimentally. In this study we staged encounters between a passerine predator, the great tit, Parus major, and live and dead swallowtail butterflies in a two-choice experiment. Results showed that the dead butterfly was virtually always attacked before the live butterfly, and that it took four times longer before a bird attacked the live butterfly. When the live butterfly was approached by a bird this generally elicited the butterfly's startle display, which usually caused the approaching bird to flee. We also performed a palatability test of the butterflies and results show that the great tits seemed to find them palatable. We conclude that the swallowtail's startle display of conspicuous coloration and jerky movements is an efficient secondary defence against small passerines. We also discuss under what conditions predator-prey systems are likely to aid the evolution of deimatic behaviours in harmless and palatable prey.

  3. Testing phenotypic trade-offs in the chemical defence strategy of Scots pine under growth-limiting field conditions.

    PubMed

    Villari, Caterina; Faccoli, Massimo; Battisti, Andrea; Bonello, Pierluigi; Marini, Lorenzo

    2014-09-01

    Plants protect themselves from pathogens and herbivores through fine-tuned resource allocation, including trade-offs among resource investments to support constitutive and inducible defences. However, empirical research, especially concerning conifers growing under natural conditions, is still scarce. We investigated the complexity of constitutive and induced defences in a natural Scots pine (Pinus sylvestris L.) stand under growth-limiting conditions typical of alpine environments. Phenotypic trade-offs at three hierarchical levels were tested by investigating the behaviour of phenolic compounds and terpenoids of outer bark and phloem. We tested resource-derived phenotypic correlations between (i) constitutive and inducible defences vs tree ring growth, (ii) different constitutive defence metabolites and (iii) constitutive concentration and inducible variation of individual metabolites. Tree ring growth was positively correlated only with constitutive concentration of total terpenoids, and no overall phenotypic trade-offs between different constitutive defensive metabolites were found. At the lowest hierarchical level tested, i.e., at the level of relationship between constitutive and inducible variation of individual metabolites, we found that different compounds displayed different behaviours; we identified five different defensive metabolite response types, based on direction and strength of the response, regardless of tree age and growth rate. Therefore, under growth-limiting field conditions, Scots pine appears to utilize varied and complex outer bark and phloem defence chemistry, in which only part of the constitutive specialized metabolism is influenced by tree growth, and individual components do not appear to be expressed in a mutually exclusive manner in either constitutive or inducible metabolism. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Computer-Based Information Networks: Selected Examples.

    ERIC Educational Resources Information Center

    Hardesty, Larry

    The history, purpose, and operation of six computer-based information networks are described in general and nontechnical terms. In the introduction the many definitions of an information network are explored. Ohio College Library Center's network (OCLC) is the first example. OCLC began in 1963, and since early 1973 has been extending its services…

  5. Network Computing for Distributed Underwater Acoustic Sensors

    DTIC Science & Technology

    2014-03-31

    underwater sensor network with mobility. In preparation. [3] EvoLogics (2013), Underwater Acoustic Modems, (Product Information Guide... Wireless Communications, 9(9), 2934–2944. [21] Pompili, D. and Akyildiz, I. (2010), A multimedia cross-layer protocol for underwater acoustic sensor networks ... Network Computing for Distributed Underwater Acoustic Sensors M. Barbeau E. Kranakis

  6. MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning

    PubMed Central

    Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man

    2015-01-01

    Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation. PMID:26681933

  7. Deep learning with coherent nanophotonic circuits

    NASA Astrophysics Data System (ADS)

    Shen, Yichen; Harris, Nicholas C.; Skirlo, Scott; Prabhu, Mihika; Baehr-Jones, Tom; Hochberg, Michael; Sun, Xin; Zhao, Shijie; Larochelle, Hugo; Englund, Dirk; Soljačić, Marin

    2017-07-01

    Artificial neural networks are computational network models inspired by signal processing in the brain. These models have dramatically improved performance for many machine-learning tasks, including speech and image recognition. However, today's computing hardware is inefficient at implementing neural networks, in large part because much of it was designed for von Neumann computing schemes. Significant effort has been made towards developing electronic architectures tuned to implement artificial neural networks that exhibit improved computational speed and accuracy. Here, we propose a new architecture for a fully optical neural network that, in principle, could offer an enhancement in computational speed and power efficiency over state-of-the-art electronics for conventional inference tasks. We experimentally demonstrate the essential part of the concept using a programmable nanophotonic processor featuring a cascaded array of 56 programmable Mach-Zehnder interferometers in a silicon photonic integrated circuit and show its utility for vowel recognition.

  8. MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning.

    PubMed

    Liu, Yang; Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man

    2015-01-01

    Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation.

  9. On the sample complexity of learning for networks of spiking neurons with nonlinear synaptic interactions.

    PubMed

    Schmitt, Michael

    2004-09-01

    We study networks of spiking neurons that use the timing of pulses to encode information. Nonlinear interactions model the spatial groupings of synapses on the neural dendrites and describe the computations performed at local branches. Within a theoretical framework of learning we analyze the question of how many training examples these networks must receive to be able to generalize well. Bounds for this sample complexity of learning can be obtained in terms of a combinatorial parameter known as the pseudodimension. This dimension characterizes the computational richness of a neural network and is given in terms of the number of network parameters. Two types of feedforward architectures are considered: constant-depth networks and networks of unconstrained depth. We derive asymptotically tight bounds for each of these network types. Constant depth networks are shown to have an almost linear pseudodimension, whereas the pseudodimension of general networks is quadratic. Networks of spiking neurons that use temporal coding are becoming increasingly more important in practical tasks such as computer vision, speech recognition, and motor control. The question of how well these networks generalize from a given set of training examples is a central issue for their successful application as adaptive systems. The results show that, although coding and computation in these networks is quite different and in many cases more powerful, their generalization capabilities are at least as good as those of traditional neural network models.

  10. Broadcasting a message in a parallel computer

    DOEpatents

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  11. A collaborative computing framework of cloud network and WBSN applied to fall detection and 3-D motion reconstruction.

    PubMed

    Lai, Chin-Feng; Chen, Min; Pan, Jeng-Shyang; Youn, Chan-Hyun; Chao, Han-Chieh

    2014-03-01

    As cloud computing and wireless body sensor network technologies become gradually developed, ubiquitous healthcare services prevent accidents instantly and effectively, as well as provides relevant information to reduce related processing time and cost. This study proposes a co-processing intermediary framework integrated cloud and wireless body sensor networks, which is mainly applied to fall detection and 3-D motion reconstruction. In this study, the main focuses includes distributed computing and resource allocation of processing sensing data over the computing architecture, network conditions and performance evaluation. Through this framework, the transmissions and computing time of sensing data are reduced to enhance overall performance for the services of fall events detection and 3-D motion reconstruction.

  12. A Feasibility Study of Synthesizing Subsurfaces Modeled with Computational Neural Networks

    NASA Technical Reports Server (NTRS)

    Wang, John T.; Housner, Jerrold M.; Szewczyk, Z. Peter

    1998-01-01

    This paper investigates the feasibility of synthesizing substructures modeled with computational neural networks. Substructures are modeled individually with computational neural networks and the response of the assembled structure is predicted by synthesizing the neural networks. A superposition approach is applied to synthesize models for statically determinate substructures while an interface displacement collocation approach is used to synthesize statically indeterminate substructure models. Beam and plate substructures along with components of a complicated Next Generation Space Telescope (NGST) model are used in this feasibility study. In this paper, the limitations and difficulties of synthesizing substructures modeled with neural networks are also discussed.

  13. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  14. Inducible defences as key adaptations for the successful invasion of Daphnia lumholtzi in North America?

    PubMed

    Engel, Katharina; Tollrian, Ralph

    2009-05-22

    The mechanisms underlying successful biological invasions often remain unclear. In the case of the tropical water flea Daphnia lumholtzi, which invaded North America, it has been suggested that this species possesses a high thermal tolerance, which in the course of global climate change promotes its establishment and rapid spread. However, D. lumholtzi has an additional remarkable feature: it is the only water flea that forms rigid head spines in response to chemicals released in the presence of fishes. These morphologically (phenotypically) plastic traits serve as an inducible defence against these predators. Here, we show in controlled mesocosm experiments that the native North American species Daphnia pulicaria is competitively superior to D. lumholtzi in the absence of predators. However, in the presence of fish predation the invasive species formed its defences and became dominant. This observation of a predator-mediated switch in dominance suggests that the inducible defence against fish predation may represent a key adaptation for the invasion success of D. lumholtzi.

  15. Can genetically based clines in plant defence explain greater herbivory at higher latitudes?

    PubMed

    Anstett, Daniel N; Ahern, Jeffrey R; Glinos, Julia; Nawar, Nabanita; Salminen, Juha-Pekka; Johnson, Marc T J

    2015-12-01

    Greater plant defence is predicted to evolve at lower latitudes in response to increased herbivore pressure. However, recent studies question the generality of this pattern. In this study, we tested for genetically based latitudinal clines in resistance to herbivores and underlying defence traits of Oenothera biennis. We grew plants from 137 populations from across the entire native range of O. biennis. Populations from lower latitudes showed greater resistance to multiple specialist and generalist herbivores. These patterns were associated with an increase in total phenolics at lower latitudes. A significant proportion of the phenolics were driven by the concentrations of two major ellagitannins, which exhibited opposing latitudinal clines. Our analyses suggest that these findings are unlikely to be explained by local adaptation of herbivore populations or genetic variation in phenology. Rather greater herbivory at high latitudes can be explained by latitudinal clines in the evolution of plant defences. © 2015 John Wiley & Sons Ltd/CNRS.

  16. Ventral medullary neurones excited from the hypothalamic and mid-brain defence areas.

    PubMed

    Hilton, S M; Smith, P R

    1984-07-01

    In cats anaesthetised with chloralose, the ventral medulla was explored in and around the strip previously identified as the location of the efferent pathway from the hypothalamic and mid-brain defence areas to the spinal cord, in a search for neurones excited by electrical stimulation of the defence areas. Such units were found mostly in the caudal part of this strip, at a depth of not more than 500 microns from the surface. Nearly all were located in the ventral part of nucleus paragigantocellularis lateralis (PGL) at the level of the rostral pole of the inferior olive. There was evidence of temporal and spatial facilitation, indicating a convergent excitatory input from the defence areas onto neurones in PGL. This is consistent with earlier evidence of a synaptic relay in the efferent pathway at this site. When the pathway is blocked at this site, arterial blood pressure falls profoundly, so activity in these neurones may be essential for the normal level of sympathetic nerve activity.

  17. Food supplementation mitigates dispersal-dependent differences in nest defence in a passerine bird.

    PubMed

    Récapet, Charlotte; Daniel, Grégory; Taroni, Joëlle; Bize, Pierre; Doligez, Blandine

    2016-05-01

    Dispersing and non-dispersing individuals often differ in phenotypic traits (e.g. physiology, behaviour), but to what extent these differences are fixed or driven by external conditions remains elusive. We experimentally tested whether differences in nest-defence behaviour between dispersing and non-dispersing individuals changed with local habitat quality in collared flycatchers, by providing additional food during the nestling rearing period. In control (non-food-supplemented) nests, dispersers were less prone to defend their brood compared with non-dispersers, whereas in food-supplemented nests, dispersing and non-dispersing individuals showed equally strong nest defence. We discuss the importance of dispersal costs versus adaptive flexibility in reproductive investment in shaping these differences in nest-defence behaviour between dispersing and non-dispersing individuals. Irrespective of the underlying mechanisms, our study emphasizes the importance of accounting for environmental effects when comparing traits between dispersing and non-dispersing individuals, and in turn assessing the costs and benefits of dispersal. © 2016 The Author(s).

  18. Scalable Optical-Fiber Communication Networks

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Peterson, John C.

    1993-01-01

    Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.

  19. Constructing Neuronal Network Models in Massively Parallel Environments.

    PubMed

    Ippen, Tammo; Eppler, Jochen M; Plesser, Hans E; Diesmann, Markus

    2017-01-01

    Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers.

  20. Constructing Neuronal Network Models in Massively Parallel Environments

    PubMed Central

    Ippen, Tammo; Eppler, Jochen M.; Plesser, Hans E.; Diesmann, Markus

    2017-01-01

    Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers. PMID:28559808

  1. Locating hardware faults in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  2. OpenFlow Extensions for Programmable Quantum Networks

    DTIC Science & Technology

    2017-06-19

    Extensions for Programmable Quantum Networks by Venkat Dasari, Nikolai Snow, and Billy Geerhart Computational and Information Sciences Directorate...distribution is unlimited. 1 1. Introduction Quantum networks and quantum computing have been receiving a surge of interest recently.1–3 However, there has...communicate using entangled particles and perform calculations using quantum logic gates. Additionally, quantum computing uses a quantum bit (qubit

  3. Advanced Computational Techniques for Power Tube Design.

    DTIC Science & Technology

    1986-07-01

    fixturing applications, in addition to the existing computer-aided engineering capabilities. o Helix TWT Manufacturing has Implemented a tooling and fixturing...illustrates the ajor features of this computer network. ) The backbone of our system is a Sytek Broadband Network (LAN) which Interconnects terminals and...automatic network analyzer (FANA) which electrically characterizes the slow-wave helices of traveling-wave tubes ( TWTs ) -- both for engineering design

  4. EST sequencing and gene expression profiling of defence-related genes from Persea americana infected with Phytophthora cinnamomi

    PubMed Central

    2011-01-01

    Background Avocado (Persea americana) belongs to the Lauraceae family and is an important commercial fruit crop in over 50 countries. The most serious pathogen affecting avocado production is Phytophthora cinnamomi which causes Phytophthora root rot (PRR). Root pathogens such as P. cinnamomi and their interactions with hosts are poorly understood and despite the importance of both the avocado crop and the effect Phytophthora has on its cultivation, there is a lack of molecular knowledge underpinning our understanding of defence strategies against the pathogen. In order to initiate a better understanding of host-specific defence we have generated EST data using 454 pyrosequencing and profiled nine defence-related genes from Pc-infected avocado roots. Results 2.0 Mb of data was generated consisting of ~10,000 reads on a single lane of the GS FLX platform. Using the Newbler assembler 371 contigs were assembled, of which 367 are novel for Persea americana. Genes were classified according to Gene Ontology terms. In addition to identifying root-specific ESTs we were also able to identify and quantify the expression of nine defence-related genes that were differentially regulated in response to P. cinnamomi. Genes such as metallothionein, thaumatin and the pathogenesis related PsemI, mlo and profilin were found to be differentially regulated. Conclusions This is the first study in elucidating the avocado root transcriptome as well as identifying defence responses of avocado roots to the root pathogen P. cinnamomi. Our data is currently the only EST data that has been generated for avocado rootstocks, and the ESTs identified in this study have already been useful in identifying defence-related genes as well as providing gene information for other studies looking at processes such as ROS regulation as well as hypoxia in avocado roots. Our EST data will aid in the elucidation of the avocado transcriptome and identification of markers for improved rootstock breeding and screening. The characterization of the avocado transcriptome will furthermore form a basis for functional genomics of basal angiosperms. PMID:22108245

  5. EST sequencing and gene expression profiling of defence-related genes from Persea americana infected with Phytophthora cinnamomi.

    PubMed

    Mahomed, Waheed; Berg, Noëlani van den

    2011-11-23

    Avocado (Persea americana) belongs to the Lauraceae family and is an important commercial fruit crop in over 50 countries. The most serious pathogen affecting avocado production is Phytophthora cinnamomi which causes Phytophthora root rot (PRR). Root pathogens such as P. cinnamomi and their interactions with hosts are poorly understood and despite the importance of both the avocado crop and the effect Phytophthora has on its cultivation, there is a lack of molecular knowledge underpinning our understanding of defence strategies against the pathogen. In order to initiate a better understanding of host-specific defence we have generated EST data using 454 pyrosequencing and profiled nine defence-related genes from Pc-infected avocado roots. 2.0 Mb of data was generated consisting of ~10,000 reads on a single lane of the GS FLX platform. Using the Newbler assembler 371 contigs were assembled, of which 367 are novel for Persea americana. Genes were classified according to Gene Ontology terms. In addition to identifying root-specific ESTs we were also able to identify and quantify the expression of nine defence-related genes that were differentially regulated in response to P. cinnamomi. Genes such as metallothionein, thaumatin and the pathogenesis related PsemI, mlo and profilin were found to be differentially regulated. This is the first study in elucidating the avocado root transcriptome as well as identifying defence responses of avocado roots to the root pathogen P. cinnamomi. Our data is currently the only EST data that has been generated for avocado rootstocks, and the ESTs identified in this study have already been useful in identifying defence-related genes as well as providing gene information for other studies looking at processes such as ROS regulation as well as hypoxia in avocado roots. Our EST data will aid in the elucidation of the avocado transcriptome and identification of markers for improved rootstock breeding and screening. The characterization of the avocado transcriptome will furthermore form a basis for functional genomics of basal angiosperms.

  6. Induction of host defences by Rhizobium during ineffective nodulation of pea (Pisum sativum L.) carrying symbiotically defective mutations sym40 (PsEFD), sym33 (PsIPD3/PsCYCLOPS) and sym42.

    PubMed

    Ivanova, Kira A; Tsyganova, Anna V; Brewin, Nicholas J; Tikhonovich, Igor A; Tsyganov, Viktor E

    2015-11-01

    Rhizobia are able to establish a beneficial interaction with legumes by forming a new organ, called the symbiotic root nodule, which is a unique ecological niche for rhizobial nitrogen fixation. Rhizobial infection has many similarities with pathogenic infection and induction of defence responses accompanies both interactions, but defence responses are induced to a lesser extent during rhizobial infection. However, strong defence responses may result from incompatible interactions between legumes and rhizobia due to a mutation in either macro- or microsymbiont. The aim of this research was to analyse different plant defence reactions in response to Rhizobium infection for several pea (Pisum sativum) mutants that result in ineffective symbiosis. Pea mutants were examined by histochemical and immunocytochemical analyses, light, fluorescence and transmission electron microscopy and quantitative real-time PCR gene expression analysis. It was observed that mutations in pea symbiotic genes sym33 (PsIPD3/PsCYCLOPS encoding a transcriptional factor) and sym40 (PsEFD encoding a putative negative regulator of the cytokinin response) led to suberin depositions in ineffective nodules, and in the sym42 there were callose depositions in infection thread (IT) and host cell walls. The increase in deposition of unesterified pectin in IT walls was observed for mutants in the sym33 and sym42; for mutant in the sym42, unesterified pectin was also found around degrading bacteroids. In mutants in the genes sym33 and sym40, an increase in the expression level of a gene encoding peroxidase was observed. In the genes sym40 and sym42, an increase in the expression levels of genes encoding a marker of hypersensitive reaction and PR10 protein was demonstrated. Thus, a range of plant defence responses like suberisation, callose and unesterified pectin deposition as well as activation of defence genes can be triggered by different pea single mutations that cause perception of an otherwise beneficial strain of Rhizobium as a pathogen.

  7. The Effectiveness, Costs and Coastal Protection Benefits of Natural and Nature-Based Defences

    PubMed Central

    Narayan, Siddharth; Beck, Michael W.; Reguero, Borja G.; Losada, Iñigo J.; van Wesenbeeck, Bregje; Pontee, Nigel; Sanchirico, James N.; Ingram, Jane Carter; Lange, Glenn-Marie; Burks-Copes, Kelly A.

    2016-01-01

    There is great interest in the restoration and conservation of coastal habitats for protection from flooding and erosion. This is evidenced by the growing number of analyses and reviews of the effectiveness of habitats as natural defences and increasing funding world-wide for nature-based defences–i.e. restoration projects aimed at coastal protection; yet, there is no synthetic information on what kinds of projects are effective and cost effective for this purpose. This paper addresses two issues critical for designing restoration projects for coastal protection: (i) a synthesis of the costs and benefits of projects designed for coastal protection (nature-based defences) and (ii) analyses of the effectiveness of coastal habitats (natural defences) in reducing wave heights and the biophysical parameters that influence this effectiveness. We (i) analyse data from sixty-nine field measurements in coastal habitats globally and examine measures of effectiveness of mangroves, salt-marshes, coral reefs and seagrass/kelp beds for wave height reduction; (ii) synthesise the costs and coastal protection benefits of fifty-two nature-based defence projects and; (iii) estimate the benefits of each restoration project by combining information on restoration costs with data from nearby field measurements. The analyses of field measurements show that coastal habitats have significant potential for reducing wave heights that varies by habitat and site. In general, coral reefs and salt-marshes have the highest overall potential. Habitat effectiveness is influenced by: a) the ratios of wave height-to-water depth and habitat width-to-wavelength in coral reefs; and b) the ratio of vegetation height-to-water depth in salt-marshes. The comparison of costs of nature-based defence projects and engineering structures show that salt-marshes and mangroves can be two to five times cheaper than a submerged breakwater for wave heights up to half a metre and, within their limits, become more cost effective at greater depths. Nature-based defence projects also report benefits ranging from reductions in storm damage to reductions in coastal structure costs. PMID:27135247

  8. Proteomic characterization of the Rph15 barley resistance gene-mediated defence responses to leaf rust

    PubMed Central

    2012-01-01

    Background Leaf rust, caused by the biotrophic fungal pathogen Puccinia hordei, is one of the most important foliar disease of barley (Hordeum vulgare) and represents a serious threat in many production regions of the world. The leaf rust resistance gene Rph15 is of outstanding interest for resistance breeding because it confers resistance to over 350 Puccinia hordei isolates collected from around the world. Molecular and biochemical mechanisms responsible for the Rph15 effectiveness are currently not investigated. The aim of the present work was to study the Rph15-based defence responses using a proteomic approach. Results Protein pattern changes in response to the leaf rust pathogen infection were investigated in two barley near isogenic lines (NILs), Bowman (leaf rust susceptible) and Bowman-Rph15 (leaf rust resistant), differing for the introgression of the leaf rust resistance gene Rph15. Two infection time points, 24 hours and four days post inoculation (dpi), were analysed. No statistically significant differences were identified at the early time point, while at 4 dpi eighteen protein spots were significantly up or down regulated with a fold-change equal or higher than two in response to pathogen infection. Almost all the pathogen-responsive proteins were identified in the Bowman-Rph15 resistant NIL. Protein spots were characterized by LC-MS/MS analysis and found to be involved in photosynthesis and energy metabolism, carbohydrate metabolism, protein degradation and defence. Proteomic data were complemented by transcriptional analysis of the respective genes. The identified proteins can be related to modulation of the photosynthetic apparatus components, re-direction of the metabolism to sustain defence responses and deployment of defence proteins. Conclusions The identification of leaf rust infection-modulated defence responses restricted to the resistant NIL support the hypothesis that basal defence responses of Bowman, but not the Rph15 resistance gene-based ones, are suppressed or delayed by pathogen effectors to levels below the detection power of the adopted proteomic approach. Additionally, Rph15-mediated resistance processes identified mainly resides on a modulation of primary metabolism, affecting photosyntesis and carbohydrate pool. PMID:23167439

  9. Expression profiling of marker genes responsive to the defence-associated phytohormones salicylic acid, jasmonic acid and ethylene in Brachypodium distachyon.

    PubMed

    Kouzai, Yusuke; Kimura, Mamiko; Yamanaka, Yurie; Watanabe, Megumi; Matsui, Hidenori; Yamamoto, Mikihiro; Ichinose, Yuki; Toyoda, Kazuhiro; Onda, Yoshihiko; Mochida, Keiichi; Noutoshi, Yoshiteru

    2016-03-02

    Brachypodium distachyon is a promising model plants for grasses. Infections of Brachypodium by various pathogens that severely impair crop production have been reported, and the species accordingly provides an alternative platform for investigating molecular mechanisms of pathogen virulence and plant disease resistance. To date, we have a broad picture of plant immunity only in Arabidopsis and rice; therefore, Brachypodium may constitute a counterpart that displays the commonality and uniqueness of defence systems among plant species. Phytohormones play key roles in plant biotic stress responses, and hormone-responsive genes are used to qualitatively and quantitatively evaluate disease resistance responses during pathogen infection. For these purposes, defence-related phytohormone marker genes expressed at time points suitable for defence-response monitoring are needed. Information about their expression profiles over time as well as their response specificity is also helpful. However, useful marker genes are still rare in Brachypodium. We selected 34 candidates for Brachypodium marker genes on the basis of protein-sequence similarity to known marker genes used in Arabidopsis and rice. Brachypodium plants were treated with the defence-related phytohormones salicylic acid, jasmonic acid and ethylene, and their transcription levels were measured 24 and 48 h after treatment. Two genes for salicylic acid, 7 for jasmonic acid and 2 for ethylene were significantly induced at either or both time points. We then focused on 11 genes encoding pathogenesis-related (PR) 1 protein and compared their expression patterns with those of Arabidopsis and rice. Phylogenetic analysis suggested that Brachypodium contains several PR1-family genes similar to rice genes. Our expression profiling revealed that regulation patterns of some PR1 genes as well as of markers identified for defence-related phytohormones are closely related to those in rice. We propose that the Brachypodium immune hormone marker genes identified in this study will be useful to plant pathologists who use Brachypodium as a model pathosystem, because the timing of their transcriptional activation matches that of the disease resistance response. Our results using Brachypodium also suggest that monocots share a characteristic immune system, defined as the common defence system, that is different from that of dicots.

  10. A Strategic Approach to Network Defense: Framing the Cloud

    DTIC Science & Technology

    2011-03-10

    accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.

  11. Code 672 observational science branch computer networks

    NASA Technical Reports Server (NTRS)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  12. A Novel College Network Resource Management Method using Cloud Computing

    NASA Astrophysics Data System (ADS)

    Lin, Chen

    At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

  13. Cellular computational platform and neurally inspired elements thereof

    DOEpatents

    Okandan, Murat

    2016-11-22

    A cellular computational platform is disclosed that includes a multiplicity of functionally identical, repeating computational hardware units that are interconnected electrically and optically. Each computational hardware unit includes a reprogrammable local memory and has interconnections to other such units that have reconfigurable weights. Each computational hardware unit is configured to transmit signals into the network for broadcast in a protocol-less manner to other such units in the network, and to respond to protocol-less broadcast messages that it receives from the network. Each computational hardware unit is further configured to reprogram the local memory in response to incoming electrical and/or optical signals.

  14. Embedding global and collective in a torus network with message class map based tree path selection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Dong; Coteus, Paul W.; Eisley, Noel A.

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computermore » program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.« less

  15. Cut set-based risk and reliability analysis for arbitrarily interconnected networks

    DOEpatents

    Wyss, Gregory D.

    2000-01-01

    Method for computing all-terminal reliability for arbitrarily interconnected networks such as the United States public switched telephone network. The method includes an efficient search algorithm to generate minimal cut sets for nonhierarchical networks directly from the network connectivity diagram. Efficiency of the search algorithm stems in part from its basis on only link failures. The method also includes a novel quantification scheme that likewise reduces computational effort associated with assessing network reliability based on traditional risk importance measures. Vast reductions in computational effort are realized since combinatorial expansion and subsequent Boolean reduction steps are eliminated through analysis of network segmentations using a technique of assuming node failures to occur on only one side of a break in the network, and repeating the technique for all minimal cut sets generated with the search algorithm. The method functions equally well for planar and non-planar networks.

  16. Evolution of host innate defence: insights from C. elegans and primitive invertebrates

    PubMed Central

    Irazoqui, Javier E.; Urbach, Jonathan M.; Ausubel, Frederick M.

    2010-01-01

    Preface The genetically tractable model organism Caenorhabditis elegans was first used to model bacterial virulence in vivo a decade ago. Since then, great strides have been made in the identification of host response pathways that are involved in the defence against infection. Strikingly, C. elegans seems to detect and respond to infection without the involvement of its Toll-like receptor homologue, in contrast to the well-established role for these proteins in innate immunity in mammals. What, therefore, do we know about host defence mechanisms in C. elegans, and what can they tell us about innate immunity in higher organisms? PMID:20029447

  17. Chloroform-induced insanity defence confounds lawyer Lincoln.

    PubMed

    Spiegel, A D; Suskind, P B

    1997-12-01

    During an 1857 trial, the defence claimed that the accused should be absolved of wilful murder because an overdose of chloroform during surgery induced insanity. In a rare appearance as a prosecutor, Abraham Lincoln tried the case for the State of Illinois. Expert medical witnesses testified about the side effects of chloroform and chloroform-induced insanity. Significantly, Lincoln was not knowledgeable about medical jurisprudence and overlooked potential sources of evidence and expert witnesses. Defence lawyers presented an impressive array of physicians to testify about insanity, about chloroform and about the results of an overdosage during anaesthesia. Considering the state of scientific knowledge at the time, the trial was notable.

  18. Computer network access to scientific information systems for minority universities

    NASA Astrophysics Data System (ADS)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  19. Networking Micro-Processors for Effective Computer Utilization in Nursing

    PubMed Central

    Mangaroo, Jewellean; Smith, Bob; Glasser, Jay; Littell, Arthur; Saba, Virginia

    1982-01-01

    Networking as a social entity has important implications for maximizing computer resources for improved utilization in nursing. This paper describes the one process of networking of complementary resources at three institutions. Prairie View A&M University, Texas A&M University and the University of Texas School of Public Health, which has effected greater utilization of computers at the college. The results achieved in this project should have implications for nurses, users, and consumers in the development of computer resources.

  20. Use of medical information by computer networks raises major concerns about privacy.

    PubMed Central

    OReilly, M

    1995-01-01

    The development of computer data-bases and long-distance computer networks is leading to improvements in Canada's health care system. However, these developments come at a cost and require a balancing act between access and confidentiality. Columnist Michael OReilly, who in this article explores the security of computer networks, notes that respect for patients' privacy must be given as high a priority as the ability to see their records in the first place. Images p213-a PMID:7600474

  1. Research on Influence of Cloud Environment on Traditional Network Security

    NASA Astrophysics Data System (ADS)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  2. Collective Computation of Neural Network

    DTIC Science & Technology

    1990-03-15

    Sciences, Beijing ABSTRACT Computational neuroscience is a new branch of neuroscience originating from current research on the theory of computer...scientists working in artificial intelligence engineering and neuroscience . The paper introduces the collective computational properties of model neural...vision research. On this basis, the authors analyzed the significance of the Hopfield model. Key phrases: Computational Neuroscience , Neural Network, Model

  3. An Exploratory Study of Internet Addiction, Usage and Communication Pleasure.

    ERIC Educational Resources Information Center

    Chou, Chien; Chou, Jung; Tyan, Nay-Ching Nancy

    This study examined the correlation between Internet addiction, usage, and communication pleasure. Research questions were: (1) What is computer network addiction? (2) How can one measure the degree of computer network addiction? (3) What is the correlation between the degree of users' network addiction and their network usage? (4) What is the…

  4. SNAP: A computer program for generating symbolic network functions

    NASA Technical Reports Server (NTRS)

    Lin, P. M.; Alderson, G. E.

    1970-01-01

    The computer program SNAP (symbolic network analysis program) generates symbolic network functions for networks containing R, L, and C type elements and all four types of controlled sources. The program is efficient with respect to program storage and execution time. A discussion of the basic algorithms is presented, together with user's and programmer's guides.

  5. A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing.

    PubMed

    Sillin, Henry O; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V; Aono, Masakazu; Stieg, Adam Z; Gimzewski, James K

    2013-09-27

    Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.

  6. A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing

    NASA Astrophysics Data System (ADS)

    Sillin, Henry O.; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V.; Aono, Masakazu; Stieg, Adam Z.; Gimzewski, James K.

    2013-09-01

    Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.

  7. Deep learning for computational chemistry.

    PubMed

    Goh, Garrett B; Hodas, Nathan O; Vishnu, Abhinav

    2017-06-15

    The rise and fall of artificial neural networks is well documented in the scientific literature of both computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on multilayer neural networks. Within the last few years, we have seen the transformative impact of deep learning in many domains, particularly in speech recognition and computer vision, to the extent that the majority of expert practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. In this review, we provide an introductory overview into the theory of deep neural networks and their unique properties that distinguish them from traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including quantitative structure activity relationship, virtual screening, protein structure prediction, quantum chemistry, materials design, and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non-neural networks state-of-the-art models across disparate research topics, and deep neural network-based models often exceeded the "glass ceiling" expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a valuable tool for computational chemistry. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  8. Label-free proteome profiling reveals developmental-dependent patterns in young barley grains.

    PubMed

    Kaspar-Schoenefeld, Stephanie; Merx, Kathleen; Jozefowicz, Anna Maria; Hartmann, Anja; Seiffert, Udo; Weschke, Winfriede; Matros, Andrea; Mock, Hans-Peter

    2016-06-30

    Due to its importance as a cereal crop worldwide, high interest in the determination of factors influencing barley grain quality exists. This study focusses on the elucidation of protein networks affecting early grain developmental processes. NanoLC-based separation coupled to label-free MS detection was applied to gain insights into biochemical processes during five different grain developmental phases (pre-storage until storage phase, 3days to 16days after flowering). Multivariate statistics revealed two distinct developmental patterns during the analysed grain developmental phases: proteins showed either highest abundance in the middle phase of development - in the transition phase - or at later developmental stages - within the storage phase. Verification of developmental patterns observed by proteomic analysis was done by applying hypothesis-driven approaches, namely Western Blot analysis and enzyme assays. High general metabolic activity of the grain with regard to protein synthesis, cell cycle regulation, defence against oxidative stress, and energy production via photosynthesis was observed in the transition phase. Proteins upregulated in the storage phase are related towards storage protein accumulation, and interestingly to the defence of storage reserves against pathogens. A mixed regulatory pattern for most enzymes detected in our study points to regulatory mechanisms at the level of protein isoforms. In-depth understanding of early grain developmental processes of cereal caryopses is of high importance as they influence final grain weight and quality. Our knowledge about these processes is still limited, especially on proteome level. To identify key mechanisms in early barley grain development, a label-free data-independent proteomics acquisition approach has been applied. Our data clearly show, that proteins either exhibit highest expression during cellularization and the switch to the storage phase (transition phase, 5-7 DAF), or during storage product accumulation (10-16 DAF). The results highlight versatile cellular metabolic activity in the transition phase and strong convergence towards storage product accumulation in the storage phase. Notably, both phases are characterized by particular protective mechanism, such as scavenging of oxidative stress and defence against pathogens, during the transition and the storage phase, respectively. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Network Monitoring and Fault Detection on the University of Illinois at Urbana-Champaign Campus Computer Network.

    ERIC Educational Resources Information Center

    Sng, Dennis Cheng-Hong

    The University of Illinois at Urbana-Champaign (UIUC) has a large campus computer network serving a community of about 20,000 users. With such a large network, it is inevitable that there are a wide variety of technologies co-existing in a multi-vendor environment. Effective network monitoring tools can help monitor traffic and link usage, as well…

  10. Link failure detection in a parallel computer

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Megerian, Mark G.; Smith, Brian E.

    2010-11-09

    Methods, apparatus, and products are disclosed for link failure detection in a parallel computer including compute nodes connected in a rectangular mesh network, each pair of adjacent compute nodes in the rectangular mesh network connected together using a pair of links, that includes: assigning each compute node to either a first group or a second group such that adjacent compute nodes in the rectangular mesh network are assigned to different groups; sending, by each of the compute nodes assigned to the first group, a first test message to each adjacent compute node assigned to the second group; determining, by each of the compute nodes assigned to the second group, whether the first test message was received from each adjacent compute node assigned to the first group; and notifying a user, by each of the compute nodes assigned to the second group, whether the first test message was received.

  11. Communal range defence in primates as a public goods dilemma.

    PubMed

    Willems, Erik P; Arseneau, T Jean M; Schleuning, Xenia; van Schaik, Carel P

    2015-12-05

    Classic socio-ecological theory holds that the occurrence of aggressive range defence is primarily driven by ecological incentives, most notably by the economic defendability of an area or the resources it contains. While this ecological cost-benefit framework has great explanatory power in solitary or pair-living species, comparative work on group-living primates has always found economic defendability to be a necessary, but not sufficient condition to account for the distribution of effective range defence across the taxon. This mismatch between theory and observation has recently been ascribed to a collective action problem among group members in, what is more informatively viewed as, a public goods dilemma: mounting effective defence of a communal range against intrusions by outgroup conspecifics. We here further develop this framework, and report on analyses at three levels of biological organization: across species, across populations within a single lineage and across groups and individuals within a single population. We find that communal range defence in primates very rarely involves collective action sensu stricto and that it is best interpreted as the outcome of opportunistic and strategic individual-level decisions. Whether the public good of a defended communal range is produced by solitary, joint or collective action is thus the outcome of the interplay between the unique characteristics of each individual, local and current socio-ecological conditions, and fundamental life-history traits of the species. © 2015 The Author(s).

  12. Green leaf volatiles: biosynthesis, biological functions and their applications in biotechnology.

    PubMed

    ul Hassan, Muhammad Naeem; Zainal, Zamri; Ismail, Ismanizan

    2015-08-01

    Plants have evolved numerous constitutive and inducible defence mechanisms to cope with biotic and abiotic stresses. These stresses induce the expression of various genes to activate defence-related pathways that result in the release of defence chemicals. One of these defence mechanisms is the oxylipin pathway, which produces jasmonates, divinylethers and green leaf volatiles (GLVs) through the peroxidation of polyunsaturated fatty acids (PUFAs). GLVs have recently emerged as key players in plant defence, plant-plant interactions and plant-insect interactions. Some GLVs inhibit the growth and propagation of plant pathogens, including bacteria, viruses and fungi. In certain cases, GLVs released from plants under herbivore attack can serve as aerial messengers to neighbouring plants and to attract parasitic or parasitoid enemies of the herbivores. The plants that perceive these volatile signals are primed and can then adapt in preparation for the upcoming challenges. Due to their 'green note' odour, GLVs impart aromas and flavours to many natural foods, such as vegetables and fruits, and therefore, they can be exploited in industrial biotechnology. The aim of this study was to review the progress and recent developments in research on the oxylipin pathway, with a specific focus on the biosynthesis and biological functions of GLVs and their applications in industrial biotechnology. © 2015 Society for Experimental Biology, Association of Applied Biologists and John Wiley & Sons Ltd.

  13. Exploring growth-defence trade-offs in Arabidopsis: phytochrome B inactivation requires JAZ10 to suppress plant immunity but not to trigger shade-avoidance responses.

    PubMed

    Cerrudo, Ignacio; Caliri-Ortiz, M Emilia; Keller, Mercedes M; Degano, M Eugenia; Demkura, Patricia V; Ballaré, Carlos L

    2017-05-01

    Under conditions that involve a high risk of competition for light among neighbouring plants, shade-intolerant species often display increased shoot elongation and greater susceptibility to pathogens and herbivores. The functional links between morphological and defence responses to crowding are not well understood. In Arabidopsis, the protein JAZ10 is thought to play a key role connecting the inactivation of the photoreceptor phytochrome B (phyB), which takes place under competition for light, with the repression of jasmonate-mediated plant defences. Here, we show that a null mutation of the JAZ10 gene in Arabidopsis did not affect plant growth nor did it suppress the shade-avoidance responses elicited by phyB inactivation. However, the jaz10 mutation restored many of the defence traits that are missing in the phyB mutant, including the ability to express robust responses to jasmonate and to accumulate indolic glucosinolates. Furthermore, the jaz10phyB double mutant showed a significantly increased resistance to the pathogenic fungus Botrytis cinerea compared with the phyB parental line. Our results demonstrate that, by inactivating JAZ10, it is possible to partially uncouple shade avoidance from defence suppression in Arabidopsis. These findings may provide clues to improve plant resistance to pathogens in crops that are planted at high density. © 2016 John Wiley & Sons Ltd.

  14. Communal range defence in primates as a public goods dilemma

    PubMed Central

    Willems, Erik P.; Arseneau, T. Jean. M.; Schleuning, Xenia; van Schaik, Carel P.

    2015-01-01

    Classic socio-ecological theory holds that the occurrence of aggressive range defence is primarily driven by ecological incentives, most notably by the economic defendability of an area or the resources it contains. While this ecological cost–benefit framework has great explanatory power in solitary or pair-living species, comparative work on group-living primates has always found economic defendability to be a necessary, but not sufficient condition to account for the distribution of effective range defence across the taxon. This mismatch between theory and observation has recently been ascribed to a collective action problem among group members in, what is more informatively viewed as, a public goods dilemma: mounting effective defence of a communal range against intrusions by outgroup conspecifics. We here further develop this framework, and report on analyses at three levels of biological organization: across species, across populations within a single lineage and across groups and individuals within a single population. We find that communal range defence in primates very rarely involves collective action sensu stricto and that it is best interpreted as the outcome of opportunistic and strategic individual-level decisions. Whether the public good of a defended communal range is produced by solitary, joint or collective action is thus the outcome of the interplay between the unique characteristics of each individual, local and current socio-ecological conditions, and fundamental life-history traits of the species. PMID:26503678

  15. Knowing your friends and foes--plant receptor-like kinases as initiators of symbiosis or defence.

    PubMed

    Antolín-Llovera, Meritxell; Petutsching, Elena Kristin; Ried, Martina Katharina; Lipka, Volker; Nürnberger, Thorsten; Robatzek, Silke; Parniske, Martin

    2014-12-01

    The decision between defence and symbiosis signalling in plants involves alternative and modular plasma membrane-localized receptor complexes. A critical step in their activation is ligand-induced homo- or hetero-oligomerization of leucine-rich repeat (LRR)- and/or lysin motif (LysM) receptor-like kinases (RLKs). In defence signalling, receptor complexes form upon binding of pathogen-associated molecular patterns (PAMPs), including the bacterial flagellin-derived peptide flg22, or chitin. Similar mechanisms are likely to operate during the perception of microbial symbiont-derived (lipo)-chitooligosaccharides. The structurally related chitin-oligomer ligands chitooctaose and chitotetraose trigger defence and symbiosis signalling, respectively, and their discrimination involves closely related, if not identical, LysM-RLKs. This illustrates the demand for and the challenges imposed on decision mechanisms that ensure appropriate signal initiation. Appropriate signalling critically depends on abundance and localization of RLKs at the cell surface. This is regulated by internalization, which also provides a mechanism for the removal of activated signalling RLKs. Abundance of the malectin-like domain (MLD)-LRR-RLK Symbiosis Receptor-like Kinase (SYMRK) is additionally controlled by cleavage of its modular ectodomain, which generates a truncated and rapidly degraded RLK fragment. This review explores LRR- and LysM-mediated signalling, the involvement of MLD-LRR-RLKs in symbiosis and defence, and the role of endocytosis in RLK function. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  16. Sperm antioxidant defences decrease during epididymal transit from caput to cauda in parallel with increases in epididymal fluid in the goat (Capra hircus).

    PubMed

    Rana, Mashidur; Roy, Sudhir C; Divyashree, Bannur C

    2017-09-01

    The status of antioxidant defences of both spermatozoa and their associated fluids during epididymal transit from the caput to cauda have not been studied so far in any species. Herein we report for the first time that sperm antioxidant defences, namely Cu,Zn-superoxide dismutase (Cu,Zn-SOD) and catalase activity, decrease significantly (P<0.05) from the caput to cauda during epididymal transit in parallel with increases in Cu,Zn-SOD, total SOD and total glutathione peroxidase (GPx) activity in the luminal fluid of the respective segments. However, levels of GPX1 and GPX3 in epididymal fluid did not change significantly from the caput to cauda. Catalase was detected for the first time in goat spermatozoa. A significantly higher total antioxidant capacity of caudal fluid than of the caput suggests a requirement for a rich antioxidant environment for the storage of spermatozoa. The retention of cytoplasmic droplets in most of the caudal spermatozoa confirmed that these droplets do not contribute to the increased antioxidant defences of cauda epididymidal fluid. Thus, the antioxidant defences of the spermatozoa and their associated epididymal fluid are modulated from the caput to cauda in a region-specific manner. This may be one of the compensatory mechanisms of epididymal fluid to scavenge any excess reactive oxygen species produced in the microenvironment of spermatozoa.

  17. Antenna analysis using neural networks

    NASA Technical Reports Server (NTRS)

    Smith, William T.

    1992-01-01

    Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary). A comparison between the simulated and actual W-L techniques is shown for a triangular-shaped pattern. Dolph-Chebyshev is a different class of synthesis technique in that D-C is used for side lobe control as opposed to pattern shaping. The interesting thing about D-C synthesis is that the side lobes have the same amplitude. Five-element arrays were used. Again, 41 pattern samples were used for the input. Nine actual D-C patterns ranging from -10 dB to -30 dB side lobe levels were used to train the network. A comparison between simulated and actual D-C techniques for a pattern with -22 dB side lobe level is shown. The goal for this research was to evaluate the performance of neural network computing with antennas. Future applications will employ the backpropagation training algorithm to drastically reduce the computational complexity involved in performing EM compensation for surface errors in large space reflector antennas.

  18. Antenna analysis using neural networks

    NASA Astrophysics Data System (ADS)

    Smith, William T.

    1992-09-01

    Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary).

  19. Computers, Networks, and Desegregation at San Jose High Academy.

    ERIC Educational Resources Information Center

    Solomon, Gwen

    1987-01-01

    Describes magnet high school which was created in California to meet desegregation requirements and emphasizes computer technology. Highlights include local computer networks that connect science and music labs, the library/media center, business computer lab, writing lab, language arts skills lab, and social studies classrooms; software; teacher…

  20. Specification of Computer Systems by Objectives.

    ERIC Educational Resources Information Center

    Eltoft, Douglas

    1989-01-01

    Discusses the evolution of mainframe and personal computers, and presents a case study of a network developed at the University of Iowa called the Iowa Computer-Aided Engineering Network (ICAEN) that combines Macintosh personal computers with Apollo workstations. Functional objectives are stressed as the best measure of system performance. (LRW)

Top