Sample records for defense identification code

  1. 48 CFR 204.7005 - Assignment of order codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification Numbers 204.7005 Assignment of order codes. (a) The Defense Logistics Agency, Acquisition Policy...-1000 Air Force: SAF/AQCI, 1060 Air Force Pentagon, Washington, DC 20330-1060 Defense Logistics Agency: Defense Logistics Agency, Acquisition Policy Branch (J-3311), John J. Kingman Road, Fort Belvoir, VA 22060...

  2. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracting office uses to identify an offeror. The three types of contractor identification codes are CAGE... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  3. Federal Logistics Information System (FLIS) Procedures Manual, Volume 4. Item Identification.

    DTIC Science & Technology

    1995-01-01

    Functional I DRMS Defense Reutilization 1,15 Description and Marketing FDM Full Descriptive 2 Service Method (Item DPSC Defense Personnel 2,13,14...under DIC KRE, return code ment or segment mix of FLIS data. For interna- AU. tional cataloging, only one Output Data RequestV Code may be used per...Screening Results) with KMR (Matching NATO Maintenance and Supply Agency (NAMSA), Reference-Screening) and either KFC (File Data the custodian for control

  4. Light Infantry in the Defense of Urban Europe.

    DTIC Science & Technology

    1986-12-14

    if applicable) 6c. ADDRESS (City, State, and ZIP Code ) 7b. ADDRESS (City, State, and ZIP Code ) Fort Leavenworth, Kansas 66027-6900 Ba. NAME OF FUNDING...SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) Sc. ADDRESS (City, State, and ZIP Code ) 10...PAGE COUNT wo - EFROM TO144 16. SUPPLEMENTARY NOTATION 17. COSATI CODES A*SUBJECT TERMS (Continue on reverse if necessary and identify by block

  5. Wartime Tracking of Class I Surface Shipments from Production or Procurement to Destination

    DTIC Science & Technology

    1992-04-01

    Armed Forces I ICAF-FAP National Defense University 6c. ADDRESS (City, State, ard ZIP Code ) 7b. ADDRESS (City, State, and ZIP Code ) Fort Lesley J...INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) 9c. ADDRESS (City, State, and ZIP Code ) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK...COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP 19. ABSTRACT (Continue on reverse

  6. An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

    DTIC Science & Technology

    2005-03-01

    codes speed up consumer shopping, package shipping, and inventory tracking. RFID offers many advantages over bar codes, as the table below shows...sunlight” (Accenture, 2001, p. 4). Finally, one of the most significant advantages of RFID is the advent of anti-collision. Anti-collision allows an...RFID reader to read and/or write to multiple tags at one time, which is not possible for bar codes. Despite the many advantages RFID over bar codes

  7. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  8. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  9. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  10. 48 CFR 204.7201 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... means a code that the contracting office uses to identify an offeror. The three types of contractor... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Definitions. 204.7201... OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification 204.7201 Definitions. (a...

  11. An Analysis of the Defense Acquisition Strategy for Unmanned Systems

    DTIC Science & Technology

    2014-03-01

    product service code RAA Rapid Acquisition Authority RCS radar cross section REF Rapid Equipping Force RFID radio frequency identification RDT...commercialization of the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID...companies following the September 11 , 2001 attacks. It is important to note that despite advances in GPS technology and long-range communications

  12. An Analysis of the Defense Acquisition Strategy for Unmanned Systems

    DTIC Science & Technology

    2013-11-20

    Product Service Code RAA Rapid Acquisition Authority RCS Radar Cross Section REF Rapid Equipping Force RFID Radio Frequency Identification RDT...the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID technology...enabling miniaturized Free Space Optical Communications systems capable of scaling across data rates, distances, and platforms and integrating with radio

  13. 48 CFR 252.211-7003 - Item identification and valuation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., used to retrieve data encoded on machine-readable media. Concatenated unique item identifier means— (1... Defense Logistics Information System (DLIS) Commercial and Government Entity (CAGE) Code). Issuing agency... identifier. Item means a single hardware article or a single unit formed by a grouping of subassemblies...

  14. An Analysis of Serial Number Tracking Automatic Identification Technology as Used in Naval Aviation Programs

    DTIC Science & Technology

    2002-09-01

    employed by the supermarket industry in 1973. Other common linear bar code symbologies are Code 39, pioneered by the defense and automotive industries...Teller Machine ( ATM ) cards are one of the prominent uses of this technology, but to a lesser extent, the technology has been used for shop floor...additional power is transmitted to it through the probe, extending its charge. There is a risk of data loss if the CMB is not accessed from time to time

  15. Triboelectric-Based Transparent Secret Code.

    PubMed

    Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju

    2018-04-01

    Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.

  16. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  17. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  18. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  19. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  20. 32 CFR 321.4 - Requirements for identification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Requirements for identification. 321.4 Section 321.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.4 Requirements for identification. (a...

  1. A qualitative content analysis of global health engagements in Peacekeeping and Stability Operations Institute's stability operations lessons learned and information management system.

    PubMed

    Nang, Roberto N; Monahan, Felicia; Diehl, Glendon B; French, Daniel

    2015-04-01

    Many institutions collect reports in databases to make important lessons-learned available to their members. The Uniformed Services University of the Health Sciences collaborated with the Peacekeeping and Stability Operations Institute to conduct a descriptive and qualitative analysis of global health engagements (GHEs) contained in the Stability Operations Lessons Learned and Information Management System (SOLLIMS). This study used a summative qualitative content analysis approach involving six steps: (1) a comprehensive search; (2) two-stage reading and screening process to identify first-hand, health-related records; (3) qualitative and quantitative data analysis using MAXQDA, a software program; (4) a word cloud to illustrate word frequencies and interrelationships; (5) coding of individual themes and validation of the coding scheme; and (6) identification of relationships in the data and overarching lessons-learned. The individual codes with the most number of text segments coded included: planning, personnel, interorganizational coordination, communication/information sharing, and resources/supplies. When compared to the Department of Defense's (DoD's) evolving GHE principles and capabilities, the SOLLIMS coding scheme appeared to align well with the list of GHE capabilities developed by the Department of Defense Global Health Working Group. The results of this study will inform practitioners of global health and encourage additional qualitative analysis of other lessons-learned databases. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  2. Automatic Identification Technology: Tracking Weapons and Ammunition for the Norwegian Armed Forces

    DTIC Science & Technology

    2011-06-01

    and their error rate. It can also add an anti - theft feature that provides an extra service to the launderers.35 Firms that have problems with...33  Figure 15.  Handheld 2D Matrix Reader with USB and Bluetooth Connections. .............34  Figure 16.  NDLO is...CCD Charge Coupled Device DoD United States Department of Defense EPC Electronic Product Code ERP Enterprise Resource Planning GHz Giga

  3. 32 CFR 635.19 - Offense codes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Offense codes. 635.19 Section 635.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.19 Offense codes. (a) The offense code describes, as nearly as possible, the...

  4. Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2: Initial Operational Test and Evaluation Report

    DTIC Science & Technology

    2015-05-01

    Director, Operational Test and Evaluation Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial...Operational Test and Evaluation Report May 2015 This report on the Department of Defense (DOD) Automated Biometric Identification System...COVERED - 4. TITLE AND SUBTITLE Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2 Initial Operational Test

  5. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining themore » facility and executing the mission of the High-Level Waste Storage Tank Farms.« less

  6. 32 CFR 636.11 - Installation traffic codes

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes 636.11 Section 636.11 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes In...

  7. Comparing the Effectiveness of Two KC-10 Concepts of Operation - An Examination of Tanker/Airlift Support in a Fighter Deployment to Europe

    DTIC Science & Technology

    1986-06-01

    PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (Ii’ ppticable) Sc. ADDRESS (City, State and ZIP Code) 10. SOURCE OF FUNDING NOS...total of 60 KC-10s were available to support the fighter deployment. This number represented the projected KC-10 procurement for the year 1990 as...search for relevant government studies was accomplished through the Defense Technical Information Center (DTIC). All their 3-9 research related to

  8. Semiannual Technical Summary, 1 October 1990 - 31 March 1991 (Royal Norwegian Council for Scientific and Industrial Research)

    DTIC Science & Technology

    1991-05-01

    Ronal Njorwegian Council !,r ScrerithC arid Industrial RuseIarch R A YI~L ~ AD-A242 758 NORSAR Scientific Report No . 2-90/91 Semiannual Technical...Authorization T/9141/B/PKP ARPA Order No . 4138 AMD # 16 Program Code No . OF10 Name of Contractor Royal Norwegian Council for Scientific and Industrial ...PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION Defense Advanced -- "’able) Contract No . F08606-89-C-0005 Pae~h rjsct A ..... 8c. ADDRESS (Ci-tytate

  9. 32 CFR 935.130 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Applicability. 935.130 Section 935.130 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.130 Applicability. This subpart applies to self-propelled...

  10. 32 CFR 935.130 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Applicability. 935.130 Section 935.130 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.130 Applicability. This subpart applies to self-propelled...

  11. 32 CFR 935.130 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Applicability. 935.130 Section 935.130 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.130 Applicability. This subpart applies to self-propelled...

  12. 32 CFR 935.130 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Applicability. 935.130 Section 935.130 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.130 Applicability. This subpart applies to self-propelled...

  13. 32 CFR 935.130 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Applicability. 935.130 Section 935.130 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.130 Applicability. This subpart applies to self-propelled...

  14. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  15. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  16. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  17. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  18. 41 CFR 102-34.95 - What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What motor vehicle identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially? 102... identification must the Department of Defense (DOD) display on motor vehicles it owns or leases commercially...

  19. 32 CFR 935.138 - Motor bus operation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Motor bus operation. 935.138 Section 935.138 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.138 Motor bus operation. Each person operating a motor...

  20. 32 CFR 935.138 - Motor bus operation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Motor bus operation. 935.138 Section 935.138 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.138 Motor bus operation. Each person operating a motor...

  1. 32 CFR 935.133 - Right-of-way.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Right-of-way. 935.133 Section 935.133 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.133 Right-of-way. (a) A pedestrian has the right-of-way over...

  2. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  3. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  4. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  5. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  6. 32 CFR 2400.12 - Identification and markings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification and markings. 2400.12 Section 2400.12 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION...

  7. 32 CFR 935.140 - Motor vehicle maintenance and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Motor vehicle maintenance and equipment. 935.140 Section 935.140 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.140 Motor vehicle maintenance and equipment. (a) Each person who has custod...

  8. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  9. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  10. 32 CFR Appendix A to Part 195 - Programs to Which This Part Applies

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-EFFECTUATION OF TITLE VI OF THE CIVIL RIGHTS ACT OF 1964 Pt. 195, App. A Appendix A to Part 195—Programs to... Defense assistance to programs of adult education in civil defense subjects (50 United States Code App. 2281 (e), (f)). 6. Office of Civil Defense radiological instruments grants (50 United States Code App...

  11. 32 CFR Appendix A to Part 195 - Programs to Which This Part Applies

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...-EFFECTUATION OF TITLE VI OF THE CIVIL RIGHTS ACT OF 1964 Pt. 195, App. A Appendix A to Part 195—Programs to... Defense assistance to programs of adult education in civil defense subjects (50 United States Code App. 2281 (e), (f)). 6. Office of Civil Defense radiological instruments grants (50 United States Code App...

  12. Open Globe Injury Patient Identification in Warfare Clinical Notes1

    PubMed Central

    Apostolova, Emilia; White, Helen A.; Morris, Patty A.; Eliason, David A.; Velez, Tom

    2017-01-01

    The aim of this study is to utilize the Defense and Veterans Eye Injury and Vision Registry clinical data derived from DoD and VA medical systems which include documentation of care while in combat, and develop methods for comprehensive and reliable Open Globe Injury (OGI) patient identification. In particular, we focus on the use of free-form clinical notes, since structured data, such as diagnoses or procedure codes, as found in early post-trauma clinical records, may not be a comprehensive and reliable indicator of OGIs. The challenges of the task include low incidence rate (few positive examples), idiosyncratic military ophthalmology vocabulary, extreme brevity of notes, specialized abbreviations, typos and misspellings. We modeled the problem as a text classification task and utilized a combination of supervised learning (SVMs) and word embeddings learnt in a unsupervised manner, achieving a precision of 92.50% and a recall of89.83%o. The described techniques are applicable to patient cohort identification with limited training data and low incidence rate. PMID:29854104

  13. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Policy-Public safety: Requirement for early identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will...

  14. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Policy-Public safety: Requirement for early identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will...

  15. 78 FR 64483 - Meeting of the Department of Defense Military Family Readiness Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Military Family Readiness Council AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Department of Defense is... Register Liaison Officer, Department of Defense. [FR Doc. 2013-25512 Filed 10-28-13; 8:45 am] BILLING CODE...

  16. Identification of a Maize Locus that Modulates the Hypersensitive Defense Response, Using Mutant-Assisted Gene Identification and Characterization (MAGIC)

    USDA-ARS?s Scientific Manuscript database

    The hypersensitive response (HR) is the most visible and arguably the most important defense response in plants, although the details of how it is controlled and executed remain patchy. In this paper a novel genetic technique called MAGIC (Mutant-Assisted Gene Identification and Characterization) i...

  17. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots.

    PubMed

    Gómez-Lama Cabanás, Carmen; Schilirò, Elisabetta; Valverde-Corredor, Antonio; Mercado-Blanco, Jesús

    2014-01-01

    Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA) against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH) cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets), many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR) experiments aiming to: (1) validate the induction of these genes, and (2) shed light on their expression pattern along time (from 1 to 15 days). Induction of olive genes potentially coding for lipoxygenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase, and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e., JERF, bHLH, WRKY), as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mounts a wide array of systemic defense responses in distant tissues (stems, leaves). This sheds light on how olive plants respond to the "non-hostile" colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  18. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    PubMed Central

    Gómez-Lama Cabanás, Carmen; Schilirò, Elisabetta; Valverde-Corredor, Antonio; Mercado-Blanco, Jesús

    2014-01-01

    Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA) against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH) cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets), many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR) experiments aiming to: (1) validate the induction of these genes, and (2) shed light on their expression pattern along time (from 1 to 15 days). Induction of olive genes potentially coding for lipoxygenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase, and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e., JERF, bHLH, WRKY), as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mounts a wide array of systemic defense responses in distant tissues (stems, leaves). This sheds light on how olive plants respond to the “non-hostile” colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7. PMID:25250017

  19. Development of Adaptive Coping From Mid to Late Life: A 70-Year Longitudinal Study of Defense Maturity and Its Psychosocial Correlates.

    PubMed

    Martin-Joy, John S; Malone, Johanna C; Cui, Xing-Jia; Johansen, Pål-Ørjan; Hill, Kevin P; Rahman, M Omar; Waldinger, Robert J; Vaillant, George E

    2017-09-01

    The present study examines changes in defense maturity from mid to late life using data from an over 70-year longitudinal study. A sample of 72 men was followed beginning in late adolescence. Participants' childhoods were coded for emotional warmth. Defense mechanisms were coded by independent raters using the Q-Sort of Defenses (, Ego mechanisms of defense: A guide for clinicians and researchers 217-233) based on interview data gathered at approximately ages 52 and 75. We examined psychosocial correlates of defenses at midlife, late life, and changes in defense from mid to late life. Overall, defenses grew more adaptive from midlife to late life. However, results differed on the basis of the emotional warmth experienced in the participants' childhoods. In midlife, men who experienced warm childhoods used more adaptive (mature) defenses; yet by late life, this difference in defensive maturity had disappeared. Men who experienced less childhood warmth were more likely to show an increase in adaptive defenses during the period from mid to late life.

  20. Error-Detecting Identification Codes for Algebra Students.

    ERIC Educational Resources Information Center

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  1. The Identification and Modification of Defense Mechanisms in Counseling.

    ERIC Educational Resources Information Center

    Clark, Arthur J.

    1991-01-01

    Suggests considerations and strategies for identifying and modifying a client's defense mechanisms in counseling. Provides definitions of individual defenses and indicators for identifying the mechanisms. Literature review focuses on counseling implications of defenses. Process of defense mechanism modification is illustrated through case example.…

  2. 76 FR 21870 - Meeting of the Defense Advisory Committee on Military Personnel Testing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Defense Advisory Committee on... 102-3.150, the Department of Defense announces that the following Federal advisory committee meeting... Liaison Officer, Department of Defense. [FR Doc. 2011-9440 Filed 4-18-11; 8:45 am] BILLING CODE 5001-06-P ...

  3. 32 CFR 215.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... armed forces pursuant to the provisions of chapter 15 of Title 10, United States Code. (b) Federal... 32 National Defense 2 2011-07-01 2011-07-01 false Definitions. 215.3 Section 215.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS...

  4. 76 FR 32839 - Defense Federal Acquisition Regulation Supplement; Agency Office of the Inspector General (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-06

    ... 52.203-13, Contractor Code of Business Ethics and Conduct. This final rule corrects two omissions in... Subjects in 48 CFR Parts 203 and 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition... clause 52.203-13, Contractor Code of Business Ethics and Conduct. * * * * * PART 252--SOLICITATION...

  5. 32 CFR 161.2 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Applicability. 161.2 Section 161.2 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY IDENTIFICATION (ID) CARDS FOR... Applicability. This part applies to: (a) The Office of the Secretary of Defense (OSD), the Military Departments...

  6. Defense Logistics: A Completed Comprehensive Strategy is Needed to Guide DOD’s In-Transit Visibility Efforts

    DTIC Science & Technology

    2013-02-01

    Defense Logistics List of Abbreviations aRFID active radio frequency identification DOD Department of Defense RFID...The Navy and the Air Force each have their own Active Radio Frequency Identification ( aRFID ) Migration Program. These two programs are included...with the aRFID Program and the aRFID Infrastructure, respectively and are therefore not listed in the table. Appendix III: Comments from the

  7. 78 FR 33993 - Defense Federal Acquisition Regulation Supplement; Clarification of “F” Orders in the Procurement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 204 RIN 0750-AH80 Defense Federal Acquisition Regulation Supplement; Clarification of ``F'' Orders in the Procurement Instrument Identification Number Structure (DFARS Case 2012-D040); Correction AGENCY: Defense Acquisition Regulations System...

  8. Prophage-mediated defense against viral attack and viral counter-defense

    PubMed Central

    Dedrick, Rebekah M.; Jacobs-Sera, Deborah; Guerrero Bustamante, Carlos A.; Garlena, Rebecca A.; Mavrich, Travis N.; Pope, Welkin H.; Reyes, Juan C Cervantes; Russell, Daniel A.; Adair, Tamarah; Alvey, Richard; Bonilla, J. Alfred; Bricker, Jerald S.; Brown, Bryony R.; Byrnes, Deanna; Cresawn, Steven G.; Davis, William B.; Dickson, Leon A.; Edgington, Nicholas P.; Findley, Ann M.; Golebiewska, Urszula; Grose, Julianne H.; Hayes, Cory F.; Hughes, Lee E.; Hutchison, Keith W.; Isern, Sharon; Johnson, Allison A.; Kenna, Margaret A.; Klyczek, Karen K.; Mageeney, Catherine M.; Michael, Scott F.; Molloy, Sally D.; Montgomery, Matthew T.; Neitzel, James; Page, Shallee T.; Pizzorno, Marie C.; Poxleitner, Marianne K.; Rinehart, Claire A.; Robinson, Courtney J.; Rubin, Michael R.; Teyim, Joseph N.; Vazquez, Edwin; Ware, Vassie C.; Washington, Jacqueline; Hatfull, Graham F.

    2017-01-01

    Temperate phages are common and prophages are abundant residents of sequenced bacterial genomes. Mycobacteriophages are viruses infecting mycobacterial hosts including Mycobacterium tuberculosis and Mycobacterium smegmatis, encompass substantial genetic diversity, and are commonly temperate. Characterization of ten Cluster N temperate mycobacteriophages reveals at least five distinct prophage-expressed viral defense systems that interfere with infection of lytic and temperate phages that are either closely-related (homotypic defense) or unrelated (heterotypic defense). Target specificity is unpredictable, ranging from a single target phage to one-third of those tested. The defense systems include a single-subunit restriction system, a heterotypic exclusion system, and a predicted (p)ppGpp synthetase, which blocks lytic phage growth, promotes bacterial survival, and enables efficient lysogeny. The predicted (p)ppGpp synthetase coded by the Phrann prophage defends against phage Tweety infection, but Tweety codes for a tetrapeptide repeat protein, gp54, that acts as a highly effective counter-defense system. Prophage-mediated viral defense offers an efficient mechanism for bacterial success in host-virus dynamics, and counter-defense promotes phage co-evolution. PMID:28067906

  9. 48 CFR 209.571-6 - Identification of organizational conflicts of interest.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... organizational conflicts of interest. 209.571-6 Section 209.571-6 Federal Acquisition Regulations System DEFENSE... Organizational and Consultant Conflicts of Interest 209.571-6 Identification of organizational conflicts of interest. When evaluating organizational conflicts of interest for major defense acquisition programs or...

  10. Violations of temporary flight restrictions and air defense identification zones : an analysis of airspace violations and pilot report data

    DOT National Transportation Integrated Search

    2005-09-30

    This document provides the results from a study into the apparent factors and causes of violations of restricted airspace, particularly temporary flight restrictions (TFRs) and air defense identification zones (ADIZs). By illuminating the reasons for...

  11. 48 CFR 211.274-2 - Policy for item unique identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy for item unique identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  12. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  13. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  14. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  15. 48 CFR 211.274-2 - Policy for unique item identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Policy for unique item identification. 211.274-2 Section 211.274-2 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING DESCRIBING AGENCY NEEDS Using and Maintaining...

  16. 32 CFR 204.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Purpose. 204.1 Section 204.1 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS USER FEES § 204.1 Purpose. This part implements the DoD program under Title 31, United States Code, section 9701...

  17. 76 FR 58137 - Defense Federal Acquisition Regulation Supplement; Positive Law Codification of Title 41 U.S.C...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-20

    ... Supplement; Positive Law Codification of Title 41 U.S.C. (DFARS Case 2011-D036) AGENCY: Defense Acquisition... DFARS to the new Codification of Title 41, United States Code, ``Public Contracts.'' DATES: Effective... of Title 41, United States Code (U.S.C.), entitled ``Public Contracts.'' The purpose of this final...

  18. 49 CFR 178.905 - Large Packaging identification codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed by...

  19. Defense Primer: DOD Contractors

    DTIC Science & Technology

    2017-02-10

    contractors . A defense contractor , as defined by the Code of Federal Regulations, is “any individual, firm, corporation, partnership, association...158.3, “Definitions”). Within the defense policy community, the term contractor is commonly used in two different contexts. The word can describe

  20. Combat Identification Systems COMO Integrated Air Defense Model Evaluation (CISE) Study

    DTIC Science & Technology

    1989-02-01

    use K or IR , whichever one applies) E-6 CAA-SR-89- 3 Subroutine PDECLR 1/21/88 Before label 1000 Insert: IF (IR.GT.10) IR a 10 These changes were made...Internal Distribution: Unclassified Library 2 F-2 CAA-SR-89- 3 GLOSSARY 1. ABBREVIATIONS, ACRONYMS, AND SHORT TERMS ADM2 Air Defense Models Modification...STUDY REPORT ’ , CAA-Sn-89- 3 i , .- CD o COMBAT IDENTIFICATION SYSTEMS N COMO INTEGRATED AIR DEFENSE MODEL EVALUATION (CISE) STUDY FEBRUARY 1989

  1. 32 CFR 644.355 - Preparation and submission of reports of excess.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Department of Defense.” Report of excess will indicate that the provisions of title 10, United States Code... 32 National Defense 4 2014-07-01 2013-07-01 true Preparation and submission of reports of excess. 644.355 Section 644.355 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY...

  2. 32 CFR 644.355 - Preparation and submission of reports of excess.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Department of Defense.” Report of excess will indicate that the provisions of title 10, United States Code... 32 National Defense 4 2010-07-01 2010-07-01 true Preparation and submission of reports of excess. 644.355 Section 644.355 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY...

  3. 32 CFR 644.355 - Preparation and submission of reports of excess.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense.” Report of excess will indicate that the provisions of title 10, United States Code... 32 National Defense 4 2012-07-01 2011-07-01 true Preparation and submission of reports of excess. 644.355 Section 644.355 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY...

  4. 32 CFR 644.355 - Preparation and submission of reports of excess.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Department of Defense.” Report of excess will indicate that the provisions of title 10, United States Code... 32 National Defense 4 2013-07-01 2013-07-01 false Preparation and submission of reports of excess. 644.355 Section 644.355 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY...

  5. Genome defense against exogenous nucleic acids in eukaryotes by non-coding DNA occurs through CRISPR-like mechanisms in the cytosol and the bodyguard protection in the nucleus.

    PubMed

    Qiu, Guo-Hua

    2016-01-01

    In this review, the protective function of the abundant non-coding DNA in the eukaryotic genome is discussed from the perspective of genome defense against exogenous nucleic acids. Peripheral non-coding DNA has been proposed to act as a bodyguard that protects the genome and the central protein-coding sequences from ionizing radiation-induced DNA damage. In the proposed mechanism of protection, the radicals generated by water radiolysis in the cytosol and IR energy are absorbed, blocked and/or reduced by peripheral heterochromatin; then, the DNA damage sites in the heterochromatin are removed and expelled from the nucleus to the cytoplasm through nuclear pore complexes, most likely through the formation of extrachromosomal circular DNA. To strengthen this hypothesis, this review summarizes the experimental evidence supporting the protective function of non-coding DNA against exogenous nucleic acids. Based on these data, I hypothesize herein about the presence of an additional line of defense formed by small RNAs in the cytosol in addition to their bodyguard protection mechanism in the nucleus. Therefore, exogenous nucleic acids may be initially inactivated in the cytosol by small RNAs generated from non-coding DNA via mechanisms similar to the prokaryotic CRISPR-Cas system. Exogenous nucleic acids may enter the nucleus, where some are absorbed and/or blocked by heterochromatin and others integrate into chromosomes. The integrated fragments and the sites of DNA damage are removed by repetitive non-coding DNA elements in the heterochromatin and excluded from the nucleus. Therefore, the normal eukaryotic genome and the central protein-coding sequences are triply protected by non-coding DNA against invasion by exogenous nucleic acids. This review provides evidence supporting the protective role of non-coding DNA in genome defense. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Unique identification code for medical fundus images using blood vessel pattern for tele-ophthalmology applications.

    PubMed

    Singh, Anushikha; Dutta, Malay Kishore; Sharma, Dilip Kumar

    2016-10-01

    Identification of fundus images during transmission and storage in database for tele-ophthalmology applications is an important issue in modern era. The proposed work presents a novel accurate method for generation of unique identification code for identification of fundus images for tele-ophthalmology applications and storage in databases. Unlike existing methods of steganography and watermarking, this method does not tamper the medical image as nothing is embedded in this approach and there is no loss of medical information. Strategic combination of unique blood vessel pattern and patient ID is considered for generation of unique identification code for the digital fundus images. Segmented blood vessel pattern near the optic disc is strategically combined with patient ID for generation of a unique identification code for the image. The proposed method of medical image identification is tested on the publically available DRIVE and MESSIDOR database of fundus image and results are encouraging. Experimental results indicate the uniqueness of identification code and lossless recovery of patient identity from unique identification code for integrity verification of fundus images. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. 76 FR 52138 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ...; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design control activity. (i) With... aviation critical safety item is to be used; and (ii) With respect to a ship critical safety item, means...-AG92 Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

  8. 76 FR 14641 - Defense Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Federal Acquisition Regulation Supplement; Identification of Critical Safety Items (DFARS Case 2010-D022... contract clause that clearly identifies any items being purchased that are critical safety items so that.... SUPPLEMENTARY INFORMATION: I. Background This DFARS case was initiated at the request of the Defense Contract...

  9. Estimating DoD Transportation Spending: Analyses of Contract and Payment Transactions

    DTIC Science & Technology

    2007-01-01

    the Defense Logistics Agency (DLA) and of expenditures by shipment material and volume (or cube). The analysis of DLA expenditures appears in Appendix...Defense Logistics Agency (DLA) not completely captured in DD350 data. Limited implementation outside the United States confines inferences that can be...Defense Information Systems Agency DLA Defense Logistics Agency DoD U.S. Department of Defense DoDAAC U.S. Department of Defense Activity Address Code

  10. An Investigation of Possible Discriminating Earned Value Variables in Department of Defense Major Acquisition Program Cancellation

    DTIC Science & Technology

    2013-06-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Some major defense acquisition programs (MDAPs) are cancelled...68 VI. PRACTICAL IMPLICATIONS FOR DEFENSE ACQUISITION .....................73 A . OVERVIEW...Contract Performance Report C /SCSC Cost/Schedule Control Systems Criteria CV Cost Variance CV % Cost Variance Percentage DAE Defense Acquisition

  11. Defense mechanisms and psychological adjustment in childhood.

    PubMed

    Sandstrom, Marlene J; Cramer, Phebe

    2003-08-01

    The association between maturity of defense use and psychological functioning was assessed in a group of 95 elementary school children. Defense mechanisms were measured using a valid and reliable storytelling task, and psychological adjustment was assessed through a combination of parent and self-report questionnaires. Correlational analyses indicated that children who relied on the developmentally immature defense of denial reported higher levels of self-rated social anxiety and depression and received higher ratings of parent-reported internalizing and externalizing behavior problems. However, children who made use of the developmentally mature defense of identification exhibited higher scores on perceived competence in social, academic, conduct, athletic, and global domains. Significantly, there was no relationship between children's use of denial and their level of perceived competence or between children's use of identification and their degree of maladjustment.

  12. Change in children's externalizing and internalizing behavior problems: the role of defense mechanisms.

    PubMed

    Cramer, Phebe

    2015-03-01

    This study investigates the relation of defense mechanism to children's externalizing and internalizing behavior problems, as assessed from mothers' report at age 9 and 12 years, based on archival data. The defense mechanisms of denial, projection, and identification were assessed from Thematic Apperception Test stories told by the children at age 9 years, using the Defense Mechanism Manual (Cramer, The development of defense mechanisms: Theory, research and assessment. New York: Springer-Verlag, 1991a; Protecting the self: Defense mechanisms in action. New York: Guilford Press, 2006). The results showed that the use of identification predicted a decrease in externalizing behaviors between age 9 and 12 years. In contrast, change in internalizing behaviors was not predicted by defense use, but the use of projection was related to fewer internalizing behaviors at both ages. These findings are consistent with the idea that behavioral intervention stressing self-regulation can be effective in reducing externalizing problems, but internalizing problems require an intervention that is sensitive to the underlying behavioral inhibition in these children.

  13. Identification and Analysis of Jasmonate Pathway Genes in Coffea canephora (Robusta Coffee) by In Silico Approach.

    PubMed

    Bharathi, Kosaraju; Sreenath, H L

    2017-07-01

    Coffea canephora is the commonly cultivated coffee species in the world along with Coffea arabica . Different pests and pathogens affect the production and quality of the coffee. Jasmonic acid (JA) is a plant hormone which plays an important role in plants growth, development, and defense mechanisms, particularly against insect pests. The key enzymes involved in the production of JA are lipoxygenase, allene oxide synthase, allene oxide cyclase, and 12-oxo-phytodienoic reductase. There is no report on the genes involved in JA pathway in coffee plants. We made an attempt to identify and analyze the genes coding for these enzymes in C. canephora . First, protein sequences of jasmonate pathway genes from model plant Arabidopsis thaliana were identified in the National Center for Biotechnology Information (NCBI) database. These protein sequences were used to search the web-based database Coffee Genome Hub to identify homologous protein sequences in C. canephora genome using Basic Local Alignment Search Tool (BLAST). Homologous protein sequences for key genes were identified in the C. canephora genome database. Protein sequences of the top matches were in turn used to search in NCBI database using BLAST tool to confirm the identity of the selected proteins and to identify closely related genes in species. The protein sequences from C. canephora database and the top matches in NCBI were aligned, and phylogenetic trees were constructed using MEGA6 software and identified the genetic distance of the respective genes. The study identified the four key genes of JA pathway in C. canephora , confirming the conserved nature of the pathway in coffee. The study expected to be useful to further explore the defense mechanisms of coffee plants. JA is a plant hormone that plays an important role in plant defense against insect pests. Genes coding for the 4 key enzymes involved in the production of JA viz., LOX, AOS, AOC, and OPR are identified in C. canephora (robusta coffee) by bioinformatic approaches confirming the conserved nature of the pathway in coffee. The findings are useful to understand the defense mechanisms of C. canephora and coffee breeding in the long run. JA is a plant hormone that plays an important role in plant defense against insect pests. Genes coding for the 4 key enzymes involved in the production of JA viz., LOX, AOS, AOC and OPR were identified and analyzed in C. canephora (robusta coffee) by in silico approach. The study has confirmed the conserved nature of JA pathway in coffee; the findings are useful to further explore the defense mechanisms of coffee plants. Abbreviations used: C. canephora : Coffea canephora ; C. arabica : Coffea arabica ; JA: Jasmonic acid; CGH: Coffee Genome Hub; NCBI: National Centre for Biotechnology Information; BLAST: Basic Local Alignment Search Tool; A. thaliana : Arabidopsis thaliana ; LOX: Lipoxygenase, AOS: Allene oxide synthase; AOC: Allene oxide cyclase; OPR: 12 oxo phytodienoic reductase.

  14. 32 CFR 718.4 - Delegations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Delegations. 718.4 Section 718.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL MISSING PERSONS ACT § 718.4... Department (Code MSPA), United States Marine Corps, with respect to personnel in the Marine Corps, authority...

  15. Defense Mechanisms: Discussions and Bibliographies; General or Multiple, and Specific.

    ERIC Educational Resources Information Center

    Pedrini, D. T.; Pedrini, Bonnie C.

    This publication considers some Freudian ego mechanisms. The first discussion and bibliography concerns defense mechanisms, in general or in multiple; after which, the discussions and bibliographies concern specific defense mechanisms: denial; displacement, substitution, sublimation; fixation; identification, introjection, incorporation,…

  16. 32 CFR 311.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.4 Policy. It is DoD policy, in..., United States Code, commonly known and hereafter referred to as the “Privacy Act” and Appendix I of...

  17. 78 FR 54632 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0189] Proposed Collection...) 372-0857. SUPPLEMENTARY INFORMATION: Title; Associated Form; and OMB Number: Department of Defense... Officer, Department of Defense. [FR Doc. 2013-21582 Filed 9-4-13; 8:45 am] BILLING CODE 5001-06-P ...

  18. 76 FR 13990 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-HA-0033] Proposed Collection; Comment Request AGENCY: Office of the Assistant Secretary of Defense for Health Affairs, DoD. ACTION... Officer, Department of Defense. [FR Doc. 2011-5910 Filed 3-14-11; 8:45 am] BILLING CODE 5001-06-P ...

  19. 22 CFR 125.3 - Exports of classified technical data and classified defense articles.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in the Department of Defense National Industrial Security Program Operating Manual (unless such.... It should also list the facility security clearance code of all U.S. parties on the license and include the Defense Security Service cognizant security office of the party responsible for packaging the...

  20. 32 CFR 935.101 - Seizure of property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Seizure of property. 935.101 Section 935.101 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Criminal Actions § 935.101 Seizure of property. Any property seized in connection...

  1. 32 CFR 935.164 - Boat operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Boat operations. 935.164 Section 935.164 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Public Safety § 935.164 Boat operations. The operator of each boat used at Wake...

  2. 32 CFR 935.164 - Boat operations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Boat operations. 935.164 Section 935.164 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Public Safety § 935.164 Boat operations. The operator of each boat used at Wake...

  3. 32 CFR 935.164 - Boat operations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Boat operations. 935.164 Section 935.164 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Public Safety § 935.164 Boat operations. The operator of each boat used at Wake...

  4. 32 CFR 935.164 - Boat operations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Boat operations. 935.164 Section 935.164 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Public Safety § 935.164 Boat operations. The operator of each boat used at Wake...

  5. 32 CFR 935.164 - Boat operations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Boat operations. 935.164 Section 935.164 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Public Safety § 935.164 Boat operations. The operator of each boat used at Wake...

  6. 78 FR 57622 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2013-OS-0194] Proposed Collection; Comment Request AGENCY: Defense Logistics Agency (DLA), DoD. ACTION: Notice. SUMMARY: In compliance with..., Department of Defense. [FR Doc. 2013-22789 Filed 9-18-13; 8:45 am] BILLING CODE 5001-06-P ...

  7. 32 CFR 161.11 - Benefits for National Guard and Reserve Members of the Uniformed Services.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Benefits for National Guard and Reserve Members of the Uniformed Services. 161.11 Section 161.11 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY IDENTIFICATION (ID) CARDS FOR MEMBERS OF THE UNIFORMED SERVICES, THEIR...

  8. 32 CFR Appendix A to Part 57 - Procedures for the Provision of Early Intervention Services for Infants and Toddlers With...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... 32 National Defense 1 2010-07-01 2010-07-01 false Procedures for the Provision of Early... With Disabilities and Their Families A. Identification and Screening (1) Each Military Department shall...

  9. 32 CFR Appendix A to Part 57 - Procedures for the Provision of Early Intervention Services for Infants and Toddlers With...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... 32 National Defense 1 2014-07-01 2014-07-01 false Procedures for the Provision of Early... With Disabilities and Their Families A. Identification and Screening (1) Each Military Department shall...

  10. 32 CFR Appendix A to Part 57 - Procedures for the Provision of Early Intervention Services for Infants and Toddlers With...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... 32 National Defense 1 2011-07-01 2011-07-01 false Procedures for the Provision of Early... With Disabilities and Their Families A. Identification and Screening (1) Each Military Department shall...

  11. 32 CFR Appendix A to Part 57 - Procedures for the Provision of Early Intervention Services for Infants and Toddlers With...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... 32 National Defense 1 2012-07-01 2012-07-01 false Procedures for the Provision of Early... With Disabilities and Their Families A. Identification and Screening (1) Each Military Department shall...

  12. 32 CFR Appendix A to Part 57 - Procedures for the Provision of Early Intervention Services for Infants and Toddlers With...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... 32 National Defense 1 2013-07-01 2013-07-01 false Procedures for the Provision of Early... With Disabilities and Their Families A. Identification and Screening (1) Each Military Department shall...

  13. 48 CFR 304.7001 - Numbering acquisitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... numeric identification code assigned by ASFR/OGAPA/DA to the contracting office within the servicing... following: (1) The three-digit identification code (HHS) of the Department. (2) A one-digit numeric...: P SAMHSA: S (3) The three-digit numeric identification code assigned by ASFR/OGAPA/DA to the...

  14. 48 CFR 304.7001 - Numbering acquisitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... numeric identification code assigned by ASFR/OGAPA/DA to the contracting office within the servicing... following: (1) The three-digit identification code (HHS) of the Department. (2) A one-digit numeric...: P SAMHSA: S (3) The three-digit numeric identification code assigned by ASFR/OGAPA/DA to the...

  15. 48 CFR 304.7001 - Numbering acquisitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... numeric identification code assigned by ASFR/OGAPA/DA to the contracting office within the servicing... following: (1) The three-digit identification code (HHS) of the Department. (2) A one-digit numeric...: P SAMHSA: S (3) The three-digit numeric identification code assigned by ASFR/OGAPA/DA to the...

  16. An Analysis of Turkey’s Defense Systems Acquisition Policy

    DTIC Science & Technology

    2009-03-01

    i NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT An Analysis of Turkey’s Defense Systems Acquisition...2009 3. REPORT TYPE AND DATES COVERED MBA THESIS 4. TITLE AND SUBTITLE An Analysis of Turkey’s Defense Systems Acquisition Policy 6. AUTHOR(S...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The purpose of this MBA thesis is to analyze Turkey’s defense systems acquisition policy and

  17. Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures

    DTIC Science & Technology

    2015-09-01

    soundness or completeness. An incomplete analysis will produce extra edges in the CFG that might allow an attacker to slip through. An unsound analysis...Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures by Isaac Noah Evans Submitted to the Department of Electrical...Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer

  18. We Are Not Numbers: The Use of Identification Codes in Online Learning

    ERIC Educational Resources Information Center

    Francis-Poscente, Krista; Moisey, Susan Darlene

    2012-01-01

    This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…

  19. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy

    DTIC Science & Technology

    2015-12-01

    Development, Test, and Evaluation RFID Radio Frequency Identification SEP Supporting Execution Plan Strategy Strategy to Improve Asset...migration of active Radio Frequency Identification ( RFID )19 from a proprietary communication standard protocol to an international standard to...technologies enabling hands-off processing of materiel deploying through the Defense Transportation System. Materiel marked with RFID tags may be remotely

  20. 41 CFR 101-30.103-1 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... consideration efficiency, economy, and other interests of the Government. (b) The Defense Cataloging and Standardization Act (chapter 145, title 10, U.S. Code) authorizes the Secretary of Defense to develop a single...

  1. 78 FR 68425 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0208] Submission for OMB Review; Comment Request ACTION: Notice. SUMMARY: The Department of Defense has submitted to OMB for... Officer, Department of Defense. [FR Doc. 2013-27250 Filed 11-13-13; 8:45 am] BILLING CODE 5001-06-P ...

  2. 75 FR 22750 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket No. DOD-2009-OS-0171] Submission for OMB Review; Comment Request ACTION: Notice. The Department of Defense has submitted to OMB for clearance, the..., Department of Defense. [FR Doc. 2010-10131 Filed 4-29-10; 8:45 am] BILLING CODE 5001-06-P ...

  3. 76 FR 111 - Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Notice of Federal Advisory Committee Meeting AGENCY.... 552b, as amended), and 41 CFR 102-3.150, the Department of Defense announces that the following Federal... Liaison Officer, Department of Defense. [FR Doc. 2010-33096 Filed 12-30-10; 8:45 am] BILLING CODE 5001-06...

  4. Defense styles of pedophilic offenders.

    PubMed

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  5. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...

  6. Operation of the Defense Acquisition System

    DTIC Science & Technology

    2008-12-08

    United States Code (l) DoD Directive 8320.02, “Data Sharing in a Net-Centric Department of Defense,” December 2, 2004 (m) DoD Instruction 5200.39...2004 (t) ISO 15418-1999- “EAN/ UCC Application Identifiers and Fact Data Identifiers and Maintenance” (u) ISO 15434-1999 – “Transfer Syntax for High...Acquisition Knowledge Sharing System7 (y) Section 644 of title 15, United States Code, “Procurement strategies; contract bundling” (z) Public Law 101-576

  7. 78 FR 35609 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2013-0018] Privacy Act of 1974; System... 10, 2013. Aaron Siegel, Alternate OSD Federal Register Liaison Officer, Department of Defense. N06110... of Social Security Number (SSN), Department of Defense Identification Number (DoD ID Number), Unit...

  8. In silico identification and characterization of conserved miRNAs and their target genes in sweet potato (Ipomoea batatas L.) Expressed Sequence Tags (ESTs)

    PubMed Central

    Dehury, Budheswar; Panda, Debashis; Sahu, Jagajjit; Sahu, Mousumi; Sarma, Kishore; Barooah, Madhumita; Sen, Priyabrata; Modi, Mahendra Kumar

    2013-01-01

    The endogenous small non-coding micro RNAs (miRNAs), which are typically ~21–24 nt nucleotides, play a crucial role in regulating the intrinsic normal growth of cells and development of the plants as well as in maintaining the integrity of genomes. These small non-coding RNAs function as the universal specificity factors in post-transcriptional gene silencing. Discovering miRNAs, identifying their targets, and further inferring miRNA functions is a routine process to understand normal biological processes of miRNAs and their roles in the development of plants. Comparative genomics based approach using expressed sequence tags (EST) and genome survey sequences (GSS) offer a cost-effective platform for identification and characterization of miRNAs and their target genes in plants. Despite the fact that sweet potato (Ipomoea batatas L.) is an important staple food source for poor small farmers throughout the world, the role of miRNA in various developmental processes remains largely unknown. In this paper, we report the computational identification of miRNAs and their target genes in sweet potato from their ESTs. Using comparative genomics-based approach, 8 potential miRNA candidates belonging to miR168, miR2911, and miR156 families were identified from 23 406 ESTs in sweet potato. A total of 42 target genes were predicted and their probable functions were illustrated. Most of the newly identified miRNAs target transcription factors as well as genes involved in plant growth and development, signal transduction, metabolism, defense, and stress response. The identification of miRNAs and their targets is expected to accelerate the pace of miRNA discovery, leading to an improved understanding of the role of miRNA in development and physiology of sweet potato, as well as stress response. PMID:24067297

  9. 48 CFR 211.275 - Radio frequency identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Radio frequency identification. ...

  10. 36 CFR 1237.24 - What are special considerations for storage and maintenance of aerial photographic records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... maintenance of aerial photographic records? (a) Mark each aerial film container with a unique identification code to facilitate identification and filing. (b) Mark aerial film indexes with the unique aerial film identification codes or container codes for the aerial film that they index. Also, file and mark the aerial...

  11. 36 CFR § 1237.24 - What are special considerations for storage and maintenance of aerial photographic records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... maintenance of aerial photographic records? (a) Mark each aerial film container with a unique identification code to facilitate identification and filing. (b) Mark aerial film indexes with the unique aerial film identification codes or container codes for the aerial film that they index. Also, file and mark the aerial...

  12. 36 CFR 1237.24 - What are special considerations for storage and maintenance of aerial photographic records?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... maintenance of aerial photographic records? (a) Mark each aerial film container with a unique identification code to facilitate identification and filing. (b) Mark aerial film indexes with the unique aerial film identification codes or container codes for the aerial film that they index. Also, file and mark the aerial...

  13. 36 CFR 1237.24 - What are special considerations for storage and maintenance of aerial photographic records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... maintenance of aerial photographic records? (a) Mark each aerial film container with a unique identification code to facilitate identification and filing. (b) Mark aerial film indexes with the unique aerial film identification codes or container codes for the aerial film that they index. Also, file and mark the aerial...

  14. 36 CFR 1237.24 - What are special considerations for storage and maintenance of aerial photographic records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maintenance of aerial photographic records? (a) Mark each aerial film container with a unique identification code to facilitate identification and filing. (b) Mark aerial film indexes with the unique aerial film identification codes or container codes for the aerial film that they index. Also, file and mark the aerial...

  15. 77 FR 66823 - Freedom of Information Act Request for Papers Submitted to DARPA for the 2011 100 Year Starship...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-07

    ... DEPARTMENT OF DEFENSE Office of the Secretary Freedom of Information Act Request for Papers Submitted to DARPA for the 2011 100 Year Starship Symposium AGENCY: Defense Advanced Research Projects..., Department of Defense. [FR Doc. 2012-27186 Filed 11-6-12; 8:45 am] BILLING CODE 5001-06-P ...

  16. [QR-Code based patient tracking: a cost-effective option to improve patient safety].

    PubMed

    Fischer, M; Rybitskiy, D; Strauß, G; Dietz, A; Dressler, C R

    2013-03-01

    Hospitals are implementing a risk management system to avoid patient or surgery mix-ups. The trend is to use preoperative checklists. This work deals specifically with a type of patient identification, which is realized by storing patient data on a patient-fixed medium. In 127 ENT surgeries data relevant for patient identification were encrypted in a 2D-QR-Code. The code, as a separate document coming with the patient chart or as a patient wristband, has been decrypted in the OR and the patient data were presented visible for all persons. The decoding time, the compliance of the patient data, as well as the duration of the patient identification was compared with the traditional patient identification by inspection of the patient chart. A total of 125 QR codes were read. The time for the decrypting of QR-Code was 5.6 s, the time for the screen view for patient identification was 7.9 s, and for a comparison group of 75 operations traditional patient identification was 27.3 s. Overall, there were 6 relevant information errors in the two parts of the experiment. This represents a ratio of 0.6% for 8 relevant classes per each encrypted QR code. This work allows a cost effective way to technically support patient identification based on electronic patient data. It was shown that the use in the clinical routine is possible. The disadvantage is a potential misinformation from incorrect or missing information in the HIS, or due to changes of the data after the code was created. The QR-code-based patient tracking is seen as a useful complement to the already widely used identification wristband. © Georg Thieme Verlag KG Stuttgart · New York.

  17. 48 CFR 211.275 - Passive radio frequency identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Passive radio frequency identification. 211.275 Section 211.275 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Requirements Documents 211.275 Passive radio frequency identification. ...

  18. Counterfeit Electronic Parts Controls in the Department of Defense Supply Chain

    DTIC Science & Technology

    2015-06-01

    Equipment Manufacturer RFID Radio Frequency Identification SASC Senate Armed Services Committee SECDEF Secretary of Defense SWPaC Space, Weight...radio frequency identification ( RFID ). Upon the use of that printer, the RFID is checked to ensure it is a valid platform, and will not work if the... RFID is not confirmed to be valid (Richetto, 2011). Greater collaboration with industry would also help with one of the primary drivers of

  19. Identification of positive selection in disease response genes within members of the Poaceae.

    PubMed

    Rech, Gabriel E; Vargas, Walter A; Sukno, Serenella A; Thon, Michael R

    2012-12-01

    Millions of years of coevolution between plants and pathogens can leave footprints on their genomes and genes involved on this interaction are expected to show patterns of positive selection in which novel, beneficial alleles are rapidly fixed within the population. Using information about upregulated genes in maize during Colletotrichum graminicola infection and resources available in the Phytozome database, we looked for evidence of positive selection in the Poaceae lineage, acting on protein coding sequences related with plant defense. We found six genes with evidence of positive selection and another eight with sites showing episodic selection. Some of them have already been described as evolving under positive selection, but others are reported here for the first time including genes encoding isocitrate lyase, dehydrogenases, a multidrug transporter, a protein containing a putative leucine-rich repeat and other proteins with unknown functions. Mapping positively selected residues onto the predicted 3-D structure of proteins showed that most of them are located on the surface, where proteins are in contact with other molecules. We present here a set of Poaceae genes that are likely to be involved in plant defense mechanisms and have evidence of positive selection. These genes are excellent candidates for future functional validation.

  20. An empirical look at the Defense Mechanism Test (DMT): reliability and construct validity.

    PubMed

    Ekehammar, Bo; Zuber, Irena; Konstenius, Marja-Liisa

    2005-07-01

    Although the Defense Mechanism Test (DMT) has been in use for almost half a century, there are still quite contradictory views about whether it is a reliable instrument, and if so, what it really measures. Thus, based on data from 39 female students, we first examined DMT inter-coder reliability by analyzing the agreement among trained judges in their coding of the same DMT protocols. Second, we constructed a "parallel" photographic picture that retained all structural characteristic of the original and analyzed DMT parallel-test reliability. Third, we examined the construct validity of the DMT by (a) employing three self-report defense-mechanism inventories and analyzing the intercorrelations between DMT defense scores and corresponding defenses in these instruments, (b) studying the relationships between DMT responses and scores on trait and state anxiety, and (c) relating DMT-defense scores to measures of self-esteem. The main results showed that the DMT can be coded with high reliability by trained coders, that the parallel-test reliability is unsatisfactory compared to traditional psychometric standards, that there is a certain generalizability in the number of perceptual distortions that people display from one picture to another, and that the construct validation provided meager empirical evidence for the conclusion that the DMT measures what it purports to measure, that is, psychological defense mechanisms.

  1. 76 FR 24862 - Meeting of a Federal Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... minutes. 9:15 a.m. Defense Acquisition Workforce Talent Management Initiative. 10:45 a.m. Army Senior... Liaison Officer, Department of Defense. [FR Doc. 2011-10679 Filed 5-2-11; 8:45 am] BILLING CODE 5001-06-P ...

  2. Self-Reported Pleasantness Ratings and Examiner-Coded Defensiveness in Response to Touch in Children with ASD: Effects of Stimulus Material and Bodily Location

    ERIC Educational Resources Information Center

    Cascio, Carissa J.; Lorenzi, Jill; Baranek, Grace T.

    2016-01-01

    Tactile defensiveness, characterized by behavioral hyperresponsiveness and negative emotional responses to touch, is a common manifestation of aberrant sensory processing in autism spectrum disorders (ASD) and other developmental disabilities (DD). Variations in tactile defensiveness with the properties of the stimulus and the bodily site of…

  3. 78 FR 47675 - Meeting of the National Commission on the Structure of the Air Force; Cancellation of August 6...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-06

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the National Commission on the Structure..., 2013 (78 FR 46329), the Department of Defense published a notice announcing an August 6, 2013 meeting... Register Liaison Officer, Department of Defense. [FR Doc. 2013-18937 Filed 8-5-13; 8:45 am] BILLING CODE...

  4. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    DTIC Science & Technology

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  5. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  6. 76 FR 80907 - TRICARE Prime Urgent Care Demonstration Project

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary TRICARE Prime Urgent Care Demonstration Project....S. Code, section 1092, entitled Department Of Defense TRICARE Prime Urgent Care Demonstration Project. The demonstration project is intended to test whether allowing four visits to an urgent care...

  7. Mapping Department of Defense laboratory results to Logical Observation Identifiers Names and Codes (LOINC).

    PubMed

    Lau, Lee Min; Banning, Pam D; Monson, Kent; Knight, Elva; Wilson, Pat S; Shakib, Shaun C

    2005-01-01

    The Department of Defense (DoD) has used a common application, Composite Health Care System (CHCS), throughout all DoD facilities. However, the master files used to encode patient data in CHCS are not identical across DoD facilities. The encoded data is thus not interoperable from one DoD facility to another. To enable data interoperability in the next-generation system, CHCS II, and for the DoD to exchange laboratory results with external organizations such as the Veterans Administration (VA), the disparate master file codes for laboratory results are mapped to Logical Observation Identifier Names and Codes (LOINC) wherever possible. This paper presents some findings from our experience mapping DoD laboratory results to LOINC.

  8. Natural language processing of clinical notes for identification of critical limb ischemia.

    PubMed

    Afzal, Naveed; Mallipeddi, Vishnu Priya; Sohn, Sunghwan; Liu, Hongfang; Chaudhry, Rajeev; Scott, Christopher G; Kullo, Iftikhar J; Arruda-Olson, Adelaide M

    2018-03-01

    Critical limb ischemia (CLI) is a complication of advanced peripheral artery disease (PAD) with diagnosis based on the presence of clinical signs and symptoms. However, automated identification of cases from electronic health records (EHRs) is challenging due to absence of a single definitive International Classification of Diseases (ICD-9 or ICD-10) code for CLI. In this study, we extend a previously validated natural language processing (NLP) algorithm for PAD identification to develop and validate a subphenotyping NLP algorithm (CLI-NLP) for identification of CLI cases from clinical notes. We compared performance of the CLI-NLP algorithm with CLI-related ICD-9 billing codes. The gold standard for validation was human abstraction of clinical notes from EHRs. Compared to billing codes the CLI-NLP algorithm had higher positive predictive value (PPV) (CLI-NLP 96%, billing codes 67%, p < 0.001), specificity (CLI-NLP 98%, billing codes 74%, p < 0.001) and F1-score (CLI-NLP 90%, billing codes 76%, p < 0.001). The sensitivity of these two methods was similar (CLI-NLP 84%; billing codes 88%; p < 0.12). The CLI-NLP algorithm for identification of CLI from narrative clinical notes in an EHR had excellent PPV and has potential for translation to patient care as it will enable automated identification of CLI cases for quality projects, clinical decision support tools and support a learning healthcare system. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  9. High-Power Ultrasound for Disinfection of Graywater and Ballast Water: A Beaker-Scale and Pilot-Scale Investigation

    DTIC Science & Technology

    2006-06-01

    The authors thank Denise Aylor (613) and Erick Satchell (613) for performing the cavitation erosion measurements and JoAnn Burkholder (North Carolina...20376 CODE 613 (AYLOR) 1 CODE 613 (SATCHELL) 1 COMMANDER CODE 617 (LEE, JOHN ) 1 NAVAL SURFACE WARFARE CENTER CODE 617 (BRIZZOLARA) 10 DAHLGREN...WUN-FOGLE) 10 CODE 702 (STRASBORG) 1 DEFENSE TECHNICAL INFORMATION CODE 3442 (TIC) 1 CENTER 8725 JOHN KINGMAN ROAD SUITE 0944 FORT BELVOIR VA 22060

  10. U.S. Army Medical Research Institute of Infectious Diseases

    MedlinePlus

    ... Health Organization. As a reference laboratory for the Department of Defense, we set the standard for identification of biological agents. Our customers in the Army and the Department of Defense know us as a "tech base" organization that ...

  11. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response

    PubMed Central

    2014-01-01

    Background Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA“s” and PthC“s” of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Results Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA“s” and PthC“s” in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. Conclusions The identification of PthA“s” and PthC“s” targets, such as the LOB (LATERAL ORGAN BOUNDARY) and CCNBS genes that we report here, is key for the understanding of the canker symptoms development during host susceptibility, or the defenses of sweet orange against the canker bacteria. We have narrowed down candidate targets to a few, which pointed out the host metabolic pathways explored by the pathogens. PMID:24564253

  12. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response.

    PubMed

    Pereira, Andre L A; Carazzolle, Marcelo F; Abe, Valeria Y; de Oliveira, Maria L P; Domingues, Mariane N; Silva, Jaqueline C; Cernadas, Raul A; Benedetti, Celso E

    2014-02-25

    Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA"s" and PthC"s" of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA"s" and PthC"s" in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. The identification of PthA"s" and PthC"s" targets, such as the LOB (lateral organ boundary) and CCNBS genes that we report here, is key for the understanding of the canker symptoms development during host susceptibility, or the defenses of sweet orange against the canker bacteria. We have narrowed down candidate targets to a few, which pointed out the host metabolic pathways explored by the pathogens.

  13. A review of automatic patient identification options for public health care centers with restricted budgets.

    PubMed

    García-Betances, Rebeca I; Huerta, Mónica K

    2012-01-01

    A comparative review is presented of available technologies suitable for automatic reading of patient identification bracelet tags. Existing technologies' backgrounds, characteristics, advantages and disadvantages, are described in relation to their possible use by public health care centers with budgetary limitations. A comparative assessment is presented of suitable automatic identification systems based on graphic codes, both one- (1D) and two-dimensional (2D), printed on labels, as well as those based on radio frequency identification (RFID) tags. The analysis looks at the tradeoffs of these technologies to provide guidance to hospital administrator looking to deploy patient identification technology. The results suggest that affordable automatic patient identification systems can be easily and inexpensively implemented using 2D code printed on low cost bracelet labels, which can then be read and automatically decoded by ordinary mobile smart phones. Because of mobile smart phones' present versatility and ubiquity, the implantation and operation of 2D code, and especially Quick Response® (QR) Code, technology emerges as a very attractive alternative to automate the patients' identification processes in low-budget situations.

  14. A Review of Automatic Patient Identification Options for Public Health Care Centers with Restricted Budgets

    PubMed Central

    García-Betances, Rebeca I.; Huerta, Mónica K.

    2012-01-01

    A comparative review is presented of available technologies suitable for automatic reading of patient identification bracelet tags. Existing technologies’ backgrounds, characteristics, advantages and disadvantages, are described in relation to their possible use by public health care centers with budgetary limitations. A comparative assessment is presented of suitable automatic identification systems based on graphic codes, both one- (1D) and two-dimensional (2D), printed on labels, as well as those based on radio frequency identification (RFID) tags. The analysis looks at the tradeoffs of these technologies to provide guidance to hospital administrator looking to deploy patient identification technology. The results suggest that affordable automatic patient identification systems can be easily and inexpensively implemented using 2D code printed on low cost bracelet labels, which can then be read and automatically decoded by ordinary mobile smart phones. Because of mobile smart phones’ present versatility and ubiquity, the implantation and operation of 2D code, and especially Quick Response® (QR) Code, technology emerges as a very attractive alternative to automate the patients’ identification processes in low-budget situations. PMID:23569629

  15. The effect of a redundant color code on an overlearned identification task

    NASA Technical Reports Server (NTRS)

    Obrien, Kevin

    1992-01-01

    The possibility of finding redundancy gains with overlearned tasks was examined using a paradigm varying familiarity with the stimulus set. Redundant coding in a multidimensional stimulus was demonstrated to result in increased identification accuracy and decreased latency of identification when compared to stimuli varying on only one dimension. The advantages attributable to redundant coding are referred to as redundancy gain and were found for a variety of stimulus dimension combinations, including the use of hue or color as one of the dimensions. Factors that have affected redundancy gain include the discriminability of the levels of one stimulus dimension and the level of stimulus-to-response association. The results demonstrated that response time is in part a function of familiarity, but no effect of redundant color coding was demonstrated. Implications of research on coding in identification tasks for display design are discussed.

  16. DELFIC: Department of Defense Fallout Prediction System. Volume I - Fundamentals

    DTIC Science & Technology

    1979-12-31

    102 H2590D. DTIC•;. 17.) 1 i{1•ELECT ’ Prepared for " JAUG 2 ? 1980 Director DEFENSE NUCLEAR AGENCY B Wai’hington, D. C. 20305 808 1O8x Destroy this...2 1. INTRODUCTION AND OVERVIEW -- --- - -------------- - --- ---- 7 2. INITIALIZATION AND CLOUD RISE...61 6 1. INTRODUCTION AND OVERVIEW DELFIC (DEfense Land Fallout Interpretative Code) is intended for re- search in local nuclear fallout

  17. Should the Department of Defense Hedge Oil Prices in Order to Save Money

    DTIC Science & Technology

    2008-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT Should the Department of Defense Hedge Oil Prices In Order...DATES COVERED MBA Professional Report 4. TITLE AND SUBTITLE Should the Department of Defense Hedge Oil Prices in Order to Save Money? 6. James...the DoD. 15. NUMBER OF PAGES 59 14. SUBJECT TERMS Futures, Options, Swaps, Hedging . Oil Prices, DoD, Procurement 16. PRICE CODE

  18. Proceedings of the Workshop on software tools for distributed intelligent control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herget, C.J.

    1990-09-01

    The Workshop on Software Tools for Distributed Intelligent Control Systems was organized by Lawrence Livermore National Laboratory for the United States Army Headquarters Training and Doctrine Command and the Defense Advanced Research Projects Agency. The goals of the workshop were to the identify the current state of the art in tools which support control systems engineering design and implementation, identify research issues associated with writing software tools which would provide a design environment to assist engineers in multidisciplinary control design and implementation, formulate a potential investment strategy to resolve the research issues and develop public domain code which can formmore » the core of more powerful engineering design tools, and recommend test cases to focus the software development process and test associated performance metrics. Recognizing that the development of software tools for distributed intelligent control systems will require a multidisciplinary effort, experts in systems engineering, control systems engineering, and compute science were invited to participate in the workshop. In particular, experts who could address the following topics were selected: operating systems, engineering data representation and manipulation, emerging standards for manufacturing data, mathematical foundations, coupling of symbolic and numerical computation, user interface, system identification, system representation at different levels of abstraction, system specification, system design, verification and validation, automatic code generation, and integration of modular, reusable code.« less

  19. 75 FR 15693 - Extension of Web-Based TRICARE Assistance Program Demonstration Project

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Extension of Web-Based TRICARE Assistance Program Demonstration Project AGENCY: Department of Defense (DoD). ACTION: Notice of a Web-Based TRICARE Assistance... States Code, Section 1092, entitled Web-Based TRICARE Assistance Program. This demonstration was...

  20. 77 FR 17462 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2012-0006] Proposed Collection..., Department of Defense. [FR Doc. 2012-7074 Filed 3-23-12; 8:45 am] BILLING CODE 5001-06-P ... of 1995, the Department of the Army announces a proposed public information collection and seeks...

  1. 78 FR 76715 - Presidential Determination Pursuant to Section 1245(d)(4)(B) and (C) of the National Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-18

    ... National Defense Authorization Act for Fiscal Year 2012, Public Law 112-81, and consistent with my... HOUSE, Washington, November 29, 2013. [FR Doc. 2013-30276 Filed 12-17-13; 11:15 am] Billing code 4710-10 ...

  2. 77 FR 8842 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-15

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID USA-2008-0006] Proposed Collection... effort as a useful self-assessment, self-improvement, and benchmarking tool, while ensuring that data..., Department of Defense. [FR Doc. 2012-3506 Filed 2-14-12; 8:45 am] BILLING CODE 5001-06-P ...

  3. 77 FR 59339 - Contractor Qualifications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 209 Contractor Qualifications CFR Correction In Title 48 of the Code of Federal Regulations, Chapter 2 (Parts 201-299), revised as of October 1, 2011, on page 55, in section 209.104-70, paragraph (a) is amended by revising the...

  4. 77 FR 59339 - Patents, Data, and Copyrights; CFR Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 227 Patents, Data, and Copyrights; CFR Correction In Title 48 of the Code of Federal Regulations, Chapter 2 (Parts 201--299... article embodying a vessel design, must be consistent with the Government's rights in technical data...

  5. Association of Circulating Transfer RNA fragments with antibody response to Mycoplasma bovis in beef cattle.

    PubMed

    Casas, Eduardo; Cai, Guohong; Kuehn, Larry A; Register, Karen B; McDaneld, Tara G; Neill, John D

    2018-03-13

    High throughput sequencing allows identification of small non-coding RNAs. Transfer RNA Fragments are a class of small non-coding RNAs, and have been identified as being involved in inhibition of gene expression. Given their role, it is possible they may be involved in mediating the infection-induced defense response in the host. Therefore, the objective of this study was to identify 5' transfer RNA fragments (tRF5s) associated with a serum antibody response to M. bovis in beef cattle. The tRF5s encoding alanine, glutamic acid, glycine, lysine, proline, selenocysteine, threonine, and valine were associated (P < 0.05) with antibody response against M. bovis. tRF5s encoding alanine, glutamine, glutamic acid, glycine, histidine, lysine, proline, selenocysteine, threonine, and valine were associated (P < 0.05) with season, which could be attributed to calf growth. There were interactions (P < 0.05) between antibody response to M. bovis and season for tRF5 encoding selenocysteine (anticodon UGA), proline (anticodon CGG), and glutamine (anticodon TTG). Selenocysteine is a rarely used amino acid that is incorporated into proteins by the opal stop codon (UGA), and its function is not well understood. Differential expression of tRF5s was identified between ELISA-positive and negative animals. Production of tRF5s may be associated with a host defense mechanism triggered by bacterial infection, or it may provide some advantage to a pathogen during infection of a host. Further studies are needed to establish if tRF5s could be used as a diagnostic marker of chronic exposure.

  6. 32 CFR 1907.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1907.13... ORDER 12958 Filing of Challenges § 1907.13 Identification of material at issue. Authorized holders shall append the documents at issue and clearly mark those portions subject to the challenge. If information...

  7. 32 CFR 1802.13 - Identification of material at issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Identification of material at issue. 1802.13... EXECUTIVE ORDER 12958 Filing Of Challenges § 1802.13 Identification of material at issue. Authorized holders shall append the documents at issue and clearly mark those portions subject to the challenge. If...

  8. 48 CFR 243.170 - Identification of foreign military sale (FMS) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Identification of foreign military sale (FMS) requirements. 243.170 Section 243.170 Federal Acquisition Regulations System DEFENSE....170 Identification of foreign military sale (FMS) requirements. Follow the procedures at PGI 243.170...

  9. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  10. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  11. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  12. 32 CFR 707.7 - Submarine identification light.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all around...

  13. Small Business and Defense Acquisitions: A Review of Policies and Current Practices

    DTIC Science & Technology

    2011-01-01

    Office of Management and Budget xviii Small Business and Defense Acquisitions: A Review of Policies and Current Practices PSC Product and Service Code...themselves as minority-owned, women-owned, veteran- owned, or small disadvantaged businesses . The resulting database gives sourcing managers a tool for...REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Small Business and Defense Acquisitions: A

  14. 77 FR 59343 - Contracting by Negotiation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 3415 Contracting by Negotiation CFR Correction In Title 48 of the Code of Federal Regulations, Chapter 29 to End, revised as of October 1, 2011, on page 150, in section 3415.605, paragraph (d) is correctly revised, and section 3415...

  15. 78 FR 36113 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... Date: June 17, 2013. FOR FURTHER INFORMATION CONTACT: Ms. Kortnee Stewart, Defense Acquisition... 2. Section 222.7404(c) is amended by inserting the words ``and PGI 222.7404(c)'' after the word ``procedures''. [FR Doc. 2013-14295 Filed 6-14-13; 8:45 am] BILLING CODE 5001-06-P ...

  16. 77 FR 59339 - Acquisition of Commercial Items

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 212 Acquisition of Commercial Items CFR Correction 212.504 [Corrected] In Title 48 of the Code of Federal Regulations, Chapter 2 (Parts 201--299), revised as of October 1, 2011, on page 73, in section 212.504, paragraph (a) is...

  17. 77 FR 59339 - Publicizing Contract Actions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 205 Publicizing Contract Actions CFR Correction 205.470 [Corrected] In Title 48 of the Code of Federal Regulations, Chapter 2 (Parts 201--299), revised as of October 1, 2011, on page 38, in section 205.470, the first sentence is...

  18. Public Health Emergency Management Within the Department of Defense

    DTIC Science & Technology

    2010-03-05

    February 20071 (aa) DoD Instruction 1100.21, “ Voluntary Services in the Department of Defense,” March 11, 2002 (ab) DoD Instruction 5210.25...include eradication of disease, identification of affected animals, animal quarantine implementation, euthanasia , carcass disposal, cleaning and

  19. 78 FR 30231 - Defense Federal Acquisition Regulation Supplement: Clarification of “F” Orders in the Procurement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... Identification Number Structure (DFARS Case 2012-D040) AGENCY: Defense Acquisition Regulations System, Department... data by the ``F'' in 9th position does not provide a sufficiently discrete result. DoD uses other data...

  20. SEE: improving nurse-patient communications and preventing software piracy in nurse call applications.

    PubMed

    Unluturk, Mehmet S

    2012-06-01

    Nurse call system is an electrically functioning system by which patients can call upon from a bedside station or from a duty station. An intermittent tone shall be heard and a corridor lamp located outside the room starts blinking with a slow or a faster rate depending on the call origination. It is essential to alert nurses on time so that they can offer care and comfort without any delay. There are currently many devices available for a nurse call system to improve communication between nurses and patients such as pagers, RFID (radio frequency identification) badges, wireless phones and so on. To integrate all these devices into an existing nurse call system and make they communicate with each other, we propose software client applications called bridges in this paper. We also propose a window server application called SEE (Supervised Event Executive) that delivers messages among these devices. A single hardware dongle is utilized for authentication and copy protection for SEE. Protecting SEE with securities provided by dongle only is a weak defense against hackers. In this paper, we develop some defense patterns for hackers such as calculating checksums in runtime, making calls to dongle from multiple places in code and handling errors properly by logging them into database.

  1. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    PubMed

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  2. Improving throughput for temporal target nomination using existing infrastructure

    NASA Astrophysics Data System (ADS)

    Raeth, Peter G.

    2007-04-01

    Earlier, we reported on predictive anomaly detection (PAD) for nominating targets within data streams generated by persistent sensing and surveillance. This technique is purely temporal and does not directly depend on the physics attendant on the sensed environment. Since PAD adapts to evolving data streams, there are no determinacy assumptions. We showed PAD to be general across sensor types, demonstrating it using synthetic chaotic data and in audio, visual, and infrared applications. Defense-oriented demonstrations included explosions, muzzle flashes, and missile and aircraft detection. Experiments were ground-based and air-to-air. As new sensors come on line, PAD offers immediate data filtering and target nomination. Its results can be taken individually, pixel by pixel, for spectral analysis and material detection/identification. They can also be grouped for shape analysis, target identification, and track development. PAD analyses reduce data volume by around 95%, depending on target number and size, while still retaining all target indicators. While PAD's code is simple when compared to physics codes, PAD tends to build a huge model. A PAD model for 512 x 640 frames may contain 19,660,800 Gaussian basis functions. (PAD models grow linearly with the number of pixels and the frequency content, in the FFT sense, of the sensed scenario's background data). PAD's complexity in terms of computational and data intensity is an example of what one sees in new algorithms now in the R&D pipeline, especially as DoD seeks capability that runs fully automatic, with little to no human interaction. Work is needed to improve algorithms' throughput while employing existing infrastructure, yet allowing for growth in the types of hardware employed. In this present paper, we discuss a generic cluster interface for legacy codes that can be partitioned at the data level. The discussion's foundation is the growth of PAD models to accommodate a particular scenario and the need to reduce false alarms while preserving all targets. The discussion closes with a view of future software and hardware opportunities.

  3. 48 CFR 204.7205 - Novation agreements, mergers and sales of assets.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Novation agreements, mergers and sales of assets. 204.7205 Section 204.7205 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL ADMINISTRATIVE MATTERS Contractor Identification...

  4. Proteomic identification of early salicylate- and flg22-responsive redox-sensitive proteins in Arabidopsis

    PubMed Central

    Liu, Pei; Zhang, Huoming; Yu, Boying; Xiong, Liming; Xia, Yiji

    2015-01-01

    Accumulation of reactive oxygen species (ROS) is one of the early defense responses against pathogen infection in plants. The mechanism about the initial and direct regulation of the defense signaling pathway by ROS remains elusive. Perturbation of cellular redox homeostasis by ROS is believed to alter functions of redox-sensitive proteins through their oxidative modifications. Here we report an OxiTRAQ-based proteomic study in identifying proteins whose cysteines underwent oxidative modifications in Arabidopsis cells during the early response to salicylate or flg22, two defense pathway elicitors that are known to disturb cellular redox homeostasis. Among the salicylate- and/or flg22-responsive redox-sensitive proteins are those involved in transcriptional regulation, chromatin remodeling, RNA processing, post-translational modifications, and nucleocytoplasmic shuttling. The identification of the salicylate-/flg22-responsive redox-sensitive proteins provides a foundation from which further study can be conducted toward understanding biological significance of their oxidative modifications during the plant defense response. PMID:25720653

  5. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  6. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  7. 32 CFR 643.22 - Policy-Public safety: Requirement for early identification of lands containing dangerous materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... identification of lands containing dangerous materials. 643.22 Section 643.22 National Defense Department of...—Public safety: Requirement for early identification of lands containing dangerous materials. (a) DA will... lands by explosives, military chemical or other dangerous materials. (c) Procedures with respect to...

  8. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  9. I-S/A AMPE (Inter-Service/Agency Automated Message Processing Exchange) Database Update User’s Manual.

    DTIC Science & Technology

    1987-03-31

    I E.EF-C.-J I So-SUSSCR I SEP -RJLITI 4 1 So"-.LESC F Il BEP -TEF-r, I I So4-SIJSCR I EEP- POLUT 1 001---- 5 ISk-SUESEC PI E: I Si -SUE:-CP I EP-TEPtl...wartime) E-𔃾 r 3 Table 1;-l (cont) U Code Agency - Department of Defense DQ Central Security Service 3 DR Defense Contract Audit Agency DS Defense

  10. Defense Depot Mechanicsburg Total Quality Management Implementation Plan

    DTIC Science & Technology

    1989-06-01

    B T I TLEE 5 . FUNDING NUMBERS Defense Depot Mechanicsburg Total Quality Management Implementation Plan 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME...Form 298 (Rev. 2-89) L296- 102 Acces.ion For NYI J ... I:: ted DEFENSE DEPOT MECHANICSBURG PENNSYLVANIAL--I By_ TOTAL QUALITY MANAGEMENT K_~ t buty-n...IMPLEMENTATION PLAN Avmail-t!Ilty Codes IvLl c 2Dd/or JUN 3 0 1989 iDizt Special PURPOSE The purpose of this Total Quality Management Implementation

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    Standardization of grant and contract awardee names has been an area of concern since the development of the Department`s Procurement and Assistance Data System (PADS). A joint effort was begun in 1983 by the Office of Scientific and Technical Information (OSTI) and the Office of Procurement and Assistance Management/Information Systems and Analysis Division to develop a means for providing uniformity of awardee names. As a result of this effort, a method of assigning vendor identification codes to each unique awardee name, division, city, and state combination was developed and is maintained by OSTI. Changes to vendor identification codes or awardeemore » names contained in PADS can be made only by OSTI. Awardee names in the Directory indicate that the awardee has had a prime contract (excluding purchase orders of $10,000 or less) with, or a financial assistance award from, the Department. Award status--active, inactive, or retired--is not shown. The Directory is in alphabetic sequence based on awardee name and reflects the OSTI-assigned vendor identification code to the right of the name. A vendor identification code is assigned to each unique awardee name, division, city, and state (for place of performance). The same vendor identification code is used for awards throughout the Department.« less

  12. 32 CFR 935.53 - Contempt.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Contempt. 935.53 Section 935.53 National Defense... CODE Penalties § 935.53 Contempt. A Judge may, in any civil or criminal case or proceeding, punish any person for disobedience of any order of the Court, or for any contempt committed in the presence of the...

  13. 32 CFR 935.13 - Revocation or suspension of permits and registrations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... registrations. 935.13 Section 935.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE TERRITORIAL AND INSULAR REGULATIONS WAKE ISLAND CODE Civil Administration Authority § 935.13... reasons, within 30 days thereafter. (d) If a hearing is not granted within 30 days, a written decision is...

  14. Identification of an insect-produced olfactory cue that primes plant defenses

    USDA-ARS?s Scientific Manuscript database

    It is increasingly clear that plants can perceive and respond to olfactory cues. Yet, knowledge about the specificity and sensitivity of such perception remains limited. We previously documented priming of anti-herbivore defenses in tall goldenrod plants (Solidago altissima) by volatile emissions fr...

  15. Environmental Fluid Dynamics Code

    EPA Science Inventory

    The Environmental Fluid Dynamics Code (EFDC)is a state-of-the-art hydrodynamic model that can be used to simulate aquatic systems in one, two, and three dimensions. It has evolved over the past two decades to become one of the most widely used and technically defensible hydrodyn...

  16. Synchronizing Defense Transportation System Reference Files

    DTIC Science & Technology

    1998-02-01

    and Pressure Vessel Code Federal Specification Military Specification BS AWS DIN JIS Food and Drug Administration Therapeutic Equivalence...269 270 276 278 279 280 282 287 288 289 292 293 294 296 299 300 301 302 307 308 309 311 312 314 Code source title ASME Boiler

  17. The Impact of Political Violence on Marketing Development in South Vietnam; 1955 through 1972

    DTIC Science & Technology

    1976-06-01

    this series, which was de - signed to measure the impact of political violence on employ- ment indicators of marketing development, was constructed...Demonstrations Sanctions Variable (Coefficient) de 501) Violence (Code 504) (Code 506) (Code 519) Evex (T-Ratio) (Code S02) (Codi Number of Motor 109 .9a b c...NATIONAL DEFENSE UNIVERSITY INDUSTRIAL COLLEGE OF THE ARMED FORCES WASHINGTON. D.C. 20319U/ THE IMPACT OF POLITICAL VIOLENCE ON MARKETING

  18. Identification codes for organizations listed in computerized data systems of the U.S. Geological Survey

    USGS Publications Warehouse

    Blackwell, C.D.

    1988-01-01

    Codes for the unique identification of public and private organizations listed in computerized data systems are presented. These codes are used by the U.S. Geological Survey 's National Water Data Exchange (NAWDEX), National Water Data Storage and Retrieval System (WATSTORE), National Cartographic Information Center (NCIC), and Office of Water Data Coordination (OWDC). The format structure of the codes is discussed and instructions are given for requesting new books. (Author 's abstract)

  19. 3 CFR - Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code Presidential Documents Other Presidential Documents Memorandum of June 19, 2013 Delegation of Reporting Functions Specified in Section 491 of Title 10, United State Code Memorandum for the Secretary of Defense B...

  20. 22 CFR 126.17 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and the...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...; (ii) Technical data (including data packages, technical papers, manuals, presentations, specifications... person who receives defense articles, including technical data, but who does not have access to such... (other than technical data) shall be individually labeled with the appropriate identification detailed in...

  1. 22 CFR 126.16 - Exemption pursuant to the Defense Trade Cooperation Treaty between the United States and Australia.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... section; (ii) Technical data (including data packages, technical papers, manuals, presentations..., defense articles, including technical data, for the sole purpose of effecting onward movement to members... (other than technical data) shall be individually labeled with the appropriate identification detailed in...

  2. Department of Defense Chemical, Biological, Radiological, and Nuclear Defense Program. FY2003-2005 Performance Plan

    DTIC Science & Technology

    2004-05-01

    Agents (NTAs) Compare the direct effects of PAF on smooth muscle, hematic constituents, and lung to determine role in toxicity. Continue to...baselined. Long Range Biometric Target ID System Explore technologies for a long range biometric target identification system. 3.5.1.6

  3. Department of Defense Dependents Schools Special Education Dispute Management System.

    ERIC Educational Resources Information Center

    Dependents Schools (DOD), Washington, DC.

    The regulations outline procedures and policies for resolving disputes in special education in the U.S. Department of Defense Dependents schools. Processes involved in conferences, mediation, and due process hearings concerning issues of identification, eligibility, individualized education programs, or programing are outlined. At each of the…

  4. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    DTIC Science & Technology

    2010-01-01

    SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE 13 . ABSTRACT After ten years the ESDP has reached an important...premier_ministre/2008/11- novembre /16­ juncker/index.html - accessed 14 September 2009. 2 Javier Solana, “Preface,” in: What Ambitions for European Defense in...security of the Union, including the eventual framing of a common defense policy ….” 13 First and foremost the Treaty required member nations to build

  5. 48 CFR 203.1004 - Contract clauses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Contractor Code of Business Ethics and Conduct 203.1004 Contract clauses. (a) Use the clause at 252.203-7003 in solicitations and contracts that include the FAR clause 52.203-13, Contractor Code of Business Ethics and Conduct...

  6. 5 CFR 890.1303 - Eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... EMPLOYEES HEALTH BENEFITS PROGRAM Department of Defense Federal Employees Health Benefits Program... Code, for self-only coverage or for self and family coverage. A self and family enrollment will include... family” in section 8901(5) of title 5, United States Code. A self and family enrollment will not cover a...

  7. 5 CFR 890.1303 - Eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... EMPLOYEES HEALTH BENEFITS PROGRAM Department of Defense Federal Employees Health Benefits Program... Code, for self-only coverage or for self and family coverage. A self and family enrollment will include... family” in section 8901(5) of title 5, United States Code. A self and family enrollment will not cover a...

  8. Fabrication and Evaluation of InSb CID Arrays

    DTIC Science & Technology

    1976-08-01

    Eck l Mail Stop 55 Santa Barbara Research Center 75 Coromar Drive Goleta, California 93017 Stephen P. Emmons ’■ Mail Stop 134 Texas Instruments...Attn: Code 2629 ° Attn: Code 2627 6 Defense Documentation Center, Bldg. 5 - S47031 Cameron Station, Alexandrias Va. 22314 12

  9. Four year-olds use norm-based coding for face identity.

    PubMed

    Jeffery, Linda; Read, Ainsley; Rhodes, Gillian

    2013-05-01

    Norm-based coding, in which faces are coded as deviations from an average face, is an efficient way of coding visual patterns that share a common structure and must be distinguished by subtle variations that define individuals. Adults and school-aged children use norm-based coding for face identity but it is not yet known if pre-school aged children also use norm-based coding. We reasoned that the transition to school could be critical in developing a norm-based system because school places new demands on children's face identification skills and substantially increases experience with faces. Consistent with this view, face identification performance improves steeply between ages 4 and 7. We used face identity aftereffects to test whether norm-based coding emerges between these ages. We found that 4 year-old children, like adults, showed larger face identity aftereffects for adaptors far from the average than for adaptors closer to the average, consistent with use of norm-based coding. We conclude that experience prior to age 4 is sufficient to develop a norm-based face-space and that failure to use norm-based coding cannot explain 4 year-old children's poor face identification skills. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. 76 FR 33615 - Energy Priorities and Allocations System Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-09

    ... 44 U.S.C. 1510. #0; #0;The Code of Federal Regulations is sold by the Superintendent of Documents. #0... domestic energy supplies pursuant to its authority under Section 101(c) of the Defense Production Act (50 U... order to promote the national defense pursuant to its DPA authorities other than section 101(c). The...

  11. 33 CFR Appendix C to Part 230 - Notice of Intent To Prepare a Draft EIS

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Draft EIS C Appendix C to Part 230 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE PROCEDURES FOR IMPLEMENTING NEPA Pt. 230, App. C Appendix C to Part 230... commanders: Department of Defense Corps of Engineer, Department of the Army, 3710-XX (Use Local Billing Code...

  12. 75 FR 74021 - Renewal of Department of Defense Federal Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... reason. Board members appointed by the Secretary of Defense, who are not full-time or permanent part-time... travel and per diem for official travel, in accordance with Title 5, United States Code, Section 5703... Officer, pursuant to DoD policy, shall be a full-time or permanent part-time DoD employee, and shall be...

  13. 32 CFR 935.139 - Motor vehicle operator qualifications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Motor vehicle operator qualifications. 935.139... AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.139 Motor vehicle operator qualifications. (a) No person may operate a privately owned motor vehicle on Wake Island unless he has an island...

  14. 48 CFR 204.7202-1 - CAGE codes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe use of CAGE codes. (b..., Federal Center, 74 Washington Avenue, North, Battle Creek, MI 49017-3084. Their telephone number is: toll-free 1-888-352-9333); (B) The on-line access to the CAGE file through the Defense Logistics Information...

  15. 75 FR 34634 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... DEPARTMENT OF DEFENSE National Geospatial-Intelligence Agency 32 CFR Part 320 Privacy Act; Implementation CFR Correction In Title 32 of the Code of Federal Regulations, Parts 191 to 399, revised as of...-INTELLIGENCE AGENCY (NGA) PRIVACY [FR Doc. 2010-14884 Filed 6-17-10; 8:45 am] BILLING CODE 1505-01-D ...

  16. 32 CFR 935.139 - Motor vehicle operator qualifications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Motor vehicle operator qualifications. 935.139... AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.139 Motor vehicle operator qualifications. (a) No person may operate a privately owned motor vehicle on Wake Island unless he has an island...

  17. An Analysis of the Effect of Knowledge Management on the Execution of Simplified Acquisition Procedures

    DTIC Science & Technology

    2012-12-27

    of Work UCC Uniform Commercial Code USD(AT&L) Under Secretary of Defense for Acquisition, Technology, and Logistics WBS Work Breakdown Structure...intensive career field. The FAR, the DFARS, and other federal agency supplements of the FAR, the Uniform Commercial Code ( UCC ), installation guidelines

  18. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  19. Evaluation of Computational Codes for Underwater Hull Analysis Model Applications

    DTIC Science & Technology

    2014-02-05

    desirable that the code can be run on a Windows operating system on the laptop, desktop, or workstation. The focus on Windows machines allows for...transition to such systems as operated on the Navy-Marine Corp Internet (NMCI). For each code the initial cost and yearly maintenance are identified...suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports

  20. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  1. Identification of defense-related genes newly-associated with tomato flower abscission

    USDA-ARS?s Scientific Manuscript database

    The current abscission model suggests the formation of a post-abscission trans-differentiation of a protective layer as the last step of the process. The present report expands the repertoire of genes activated in the tomato flower abscission zone (AZ), which are likely to be involved in defense res...

  2. Optimized scalar promotion with load and splat SIMD instructions

    DOEpatents

    Eichenberger, Alexander E; Gschwind, Michael K; Gunnels, John A

    2013-10-29

    Mechanisms for optimizing scalar code executed on a single instruction multiple data (SIMD) engine are provided. Placement of vector operation-splat operations may be determined based on an identification of scalar and SIMD operations in an original code representation. The original code representation may be modified to insert the vector operation-splat operations based on the determined placement of vector operation-splat operations to generate a first modified code representation. Placement of separate splat operations may be determined based on identification of scalar and SIMD operations in the first modified code representation. The first modified code representation may be modified to insert or delete separate splat operations based on the determined placement of the separate splat operations to generate a second modified code representation. SIMD code may be output based on the second modified code representation for execution by the SIMD engine.

  3. Optimized scalar promotion with load and splat SIMD instructions

    DOEpatents

    Eichenberger, Alexandre E [Chappaqua, NY; Gschwind, Michael K [Chappaqua, NY; Gunnels, John A [Yorktown Heights, NY

    2012-08-28

    Mechanisms for optimizing scalar code executed on a single instruction multiple data (SIMD) engine are provided. Placement of vector operation-splat operations may be determined based on an identification of scalar and SIMD operations in an original code representation. The original code representation may be modified to insert the vector operation-splat operations based on the determined placement of vector operation-splat operations to generate a first modified code representation. Placement of separate splat operations may be determined based on identification of scalar and SIMD operations in the first modified code representation. The first modified code representation may be modified to insert or delete separate splat operations based on the determined placement of the separate splat operations to generate a second modified code representation. SIMD code may be output based on the second modified code representation for execution by the SIMD engine.

  4. Competitive code-based fast palmprint identification using a set of cover trees

    NASA Astrophysics Data System (ADS)

    Yue, Feng; Zuo, Wangmeng; Zhang, David; Wang, Kuanquan

    2009-06-01

    A palmprint identification system recognizes a query palmprint image by searching for its nearest neighbor from among all the templates in a database. When applied on a large-scale identification system, it is often necessary to speed up the nearest-neighbor searching process. We use competitive code, which has very fast feature extraction and matching speed, for palmprint identification. To speed up the identification process, we extend the cover tree method and propose to use a set of cover trees to facilitate the fast and accurate nearest-neighbor searching. We can use the cover tree method because, as we show, the angular distance used in competitive code can be decomposed into a set of metrics. Using the Hong Kong PolyU palmprint database (version 2) and a large-scale palmprint database, our experimental results show that the proposed method searches for nearest neighbors faster than brute force searching.

  5. Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters

    NASA Astrophysics Data System (ADS)

    Watanabe, Osamu; Fukuhara, Takahiro; Kiya, Hitoshi

    A method of identifying JPEG 2000 images with different coding parameters, such as code-block sizes, quantization-step sizes, and resolution levels, is presented. It does not produce false-negative matches regardless of different coding parameters (compression rate, code-block size, and discrete wavelet transform (DWT) resolutions levels) or quantization step sizes. This feature is not provided by conventional methods. Moreover, the proposed approach is fast because it uses the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information without embedded block coding with optimized truncation (EBCOT) decoding. The experimental results revealed the effectiveness of image identification based on the new method.

  6. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    ERIC Educational Resources Information Center

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  7. Defense Demilitarization Manual

    DTIC Science & Technology

    1991-10-01

    dichloroethyl) sulfide ( Mustard Gas , HD or H). 16. Component. See subparagraph 32. (3) Ethyldichloroarsine. (ED). 17. Controlled Item Inventory Code (CIIC). A... Gas Cylinder Components, Grinding/ W elding for Drill Purposes ............................... A7-65 75 Rifle, Cal. .30, MI, Receiver Rail, Welding...U.S. Munitions List. (except tear gas formulations containing 1 percent or less CN or CS), sternutators and irritant smoke, CATEGORY XIX - DEFENSE

  8. 32 CFR 935.132 - Speed limits.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Speed limits. 935.132 Section 935.132 National... WAKE ISLAND CODE Motor Vehicle Code § 935.132 Speed limits. Each person operating a motor vehicle on... day, road and weather conditions, the kind of motor vehicle, and the proximity to persons or buildings...

  9. 32 CFR 935.132 - Speed limits.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Speed limits. 935.132 Section 935.132 National... WAKE ISLAND CODE Motor Vehicle Code § 935.132 Speed limits. Each person operating a motor vehicle on... day, road and weather conditions, the kind of motor vehicle, and the proximity to persons or buildings...

  10. 32 CFR 935.132 - Speed limits.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Speed limits. 935.132 Section 935.132 National... WAKE ISLAND CODE Motor Vehicle Code § 935.132 Speed limits. Each person operating a motor vehicle on... day, road and weather conditions, the kind of motor vehicle, and the proximity to persons or buildings...

  11. 75 FR 59101 - Defense Federal Acquisition Regulation Supplement; DoD Office of the Inspector General Address...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-27

    ....203-13, Contractor Code of Business Ethics and Conduct. DATES: Effective Date: September 27, 2010. FOR... Acquisition Regulation (FAR) Case 2007-006, ``Contractor Business Ethics Compliance Program and Disclosure... date of December 12, 2008. The contract clause entitled ``Contractor Code of Business Ethics and...

  12. 48 CFR 52.204-18 - Commercial and Government Entity Code Maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... assigned to entities located in the United States or its outlying areas by the Defense Logistics Agency... NATO Support Agency (NSPA) to entities located outside the United States and its outlying areas that... code on the contract. (c) Contractors located in the United States or its outlying areas that are not...

  13. 32 CFR 935.140 - Motor vehicle maintenance and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Motor vehicle maintenance and equipment. 935.140... AND INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.140 Motor vehicle maintenance and equipment. (a) Each person who has custody of a motor vehicle on Wake Island shall present that vehicle for...

  14. 76 FR 38051 - Defense Federal Acquisition Regulation Supplement; Definition of Sexual Assault (DFARS Case 2010...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-29

    ... offenses addressed in the definition are covered under the Uniform Code of Military Justice. Further, sexual assault offenses in the definition, which are not covered by the Uniform Code of Military Justice.... DATES: Effective date: June 29, 2011. FOR FURTHER INFORMATION CONTACT: Mr. Julian Thrash, 703-602-0310...

  15. 76 FR 78874 - Defense Federal Acquisition Regulation Supplement: Title 41 Positive Law Codification-Further...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... Regulation Supplement: Title 41 Positive Law Codification--Further Implementation (DFARS Case 2012- D003... statutory titles to the new Positive Law Codification of Title 41, United States Code, ``Public Contracts... 111-350 enacted a new codified version of Title 41 United States Code (U.S.C.), entitled ``Public...

  16. 32 CFR 935.132 - Speed limits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Speed limits. 935.132 Section 935.132 National... WAKE ISLAND CODE Motor Vehicle Code § 935.132 Speed limits. Each person operating a motor vehicle on Wake Island shall operate it at a speed— (a) That is reasonable, safe, and proper, considering time of...

  17. 32 CFR 935.132 - Speed limits.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Speed limits. 935.132 Section 935.132 National... WAKE ISLAND CODE Motor Vehicle Code § 935.132 Speed limits. Each person operating a motor vehicle on Wake Island shall operate it at a speed— (a) That is reasonable, safe, and proper, considering time of...

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rasouli, C.; Abbasi Davani, F., E-mail: fabbasidavani@gmail.com

    A series of experiments and numerical calculations have been done on the Damavand tokamak for accurate determination of equilibrium parameters, such as the plasma boundary position and shape. For this work, the pickup coils of the Damavand tokamak were recalibrated and after that a plasma boundary shape identification code was developed for analyzing the experimental data, such as magnetic probes and coils currents data. The plasma boundary position, shape and other parameters are determined by the plasma shape identification code. A free-boundary equilibrium code was also generated for comparison with the plasma boundary shape identification results and determination of requiredmore » fields to obtain elongated plasma in the Damavand tokamak.« less

  19. 21 CFR 1271.290 - Tracking.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... TISSUE-BASED PRODUCTS Current Good Tissue Practice § 1271.290 Tracking. (a) General. If you perform any... designed to facilitate effective tracking, using the distinct identification code, from the donor to the... for recording the distinct identification code and type of each HCT/P distributed to a consignee to...

  20. Long non-coding RNAs as molecular players in plant defense against pathogens.

    PubMed

    Zaynab, Madiha; Fatima, Mahpara; Abbas, Safdar; Umair, Muhammad; Sharif, Yasir; Raza, Muhammad Ammar

    2018-05-31

    Long non-coding RNAs (lncRNAs) has significant role in of gene expression and silencing pathways for several biological processes in eukaryotes. lncRNAs has been reported as key player in remodeling chromatin and genome architecture, RNA stabilization and transcription regulation, including enhancer-associated activity. Host lncRNAs are reckoned as compulsory elements of plant defense. In response to pathogen attack, plants protect themselves with the help of lncRNAs -dependent immune systems in which lncRNAs regulate pathogen-associated molecular patterns (PAMPs) and other effectors. Role of lncRNAs in plant microbe interaction has been studied extensively but regulations of several lncRNAs still need extensive research. In this study we discussed and provide as overview the topical advancements and findings relevant to pathogen attack and plant defense mediated by lncRNAs. It is hoped that lncRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. Copyright © 2018. Published by Elsevier Ltd.

  1. 33 CFR 337.9 - Identification and use of disposal areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) evaluation and environmental assessment or environmental impact statement should also address long-term... ARMY, DEPARTMENT OF DEFENSE PRACTICE AND PROCEDURE § 337.9 Identification and use of disposal areas. (a... life of existing disposal areas. Requests for water quality certification and/or coastal zone...

  2. Defensive Spiroketals from Asceles glaber (Phasmatodea): Absolute Configuration and Effects on Ants and Mosquitoes

    USDA-ARS?s Scientific Manuscript database

    Recently we discovered that the defensive spray of Asceles glaber, a stick insect native to Thailand, contains two spiroketals (major: 2(S)-(-)-(E,E)-2- methyl-1,7-dioxaspiro[5.5]undecane and minor: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this report we: 1) illustrate the identification o...

  3. Effects of various electrode configurations on music perception, intonation and speaker gender identification.

    PubMed

    Landwehr, Markus; Fürstenberg, Dirk; Walger, Martin; von Wedel, Hasso; Meister, Hartmut

    2014-01-01

    Advances in speech coding strategies and electrode array designs for cochlear implants (CIs) predominantly aim at improving speech perception. Current efforts are also directed at transmitting appropriate cues of the fundamental frequency (F0) to the auditory nerve with respect to speech quality, prosody, and music perception. The aim of this study was to examine the effects of various electrode configurations and coding strategies on speech intonation identification, speaker gender identification, and music quality rating. In six MED-EL CI users electrodes were selectively deactivated in order to simulate different insertion depths and inter-electrode distances when using the high definition continuous interleaved sampling (HDCIS) and fine structure processing (FSP) speech coding strategies. Identification of intonation and speaker gender was determined and music quality rating was assessed. For intonation identification HDCIS was robust against the different electrode configurations, whereas fine structure processing showed significantly worse results when a short electrode depth was simulated. In contrast, speaker gender recognition was not affected by electrode configuration or speech coding strategy. Music quality rating was sensitive to electrode configuration. In conclusion, the three experiments revealed different outcomes, even though they all addressed the reception of F0 cues. Rapid changes in F0, as seen with intonation, were the most sensitive to electrode configurations and coding strategies. In contrast, electrode configurations and coding strategies did not show large effects when F0 information was available over a longer time period, as seen with speaker gender. Music quality relies on additional spectral cues other than F0, and was poorest when a shallow insertion was simulated.

  4. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  5. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...

  6. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Identification of principal geographic code numbers. 228.03 Section 228.03 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT RULES ON SOURCE, ORIGIN AND NATIONALITY FOR COMMODITIES AND SERVICES FINANCED BY USAID Definitions and Scope of This Part...

  7. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for...

  8. 47 CFR 3.22 - Number of accounting authority identification codes per applicant.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... assign U.S. AAICs for entities settling accounts of U.S. licensed vessels in the maritime mobile and...

  9. Total Quality Management Implementation Plan: Defense Depot, Ogden

    DTIC Science & Technology

    1989-07-01

    NUMBERS Total Quality Management Implementation Plan Defense Depot Ogden 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...PAGES TQM (Total Quality Management ), Continuous Process Improvement, Depot Operations, Process Action Teams 16. PRICE CODE 17. SECURITY...034 A Message From The Commander On Total Quality Management i fully support the DLA aoproacii to Total Quality Management . As stated by General

  10. Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation

    DTIC Science & Technology

    2006-06-16

    Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline

  11. 77 FR 5242 - Notice of Intent To Grant Exclusive Patent License; Daniel Defense, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone (812) 854-4100. Authority: 35 U.S.C. 207, 37...

  12. 32 CFR 935.134 - Arm signals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Arm signals. 935.134 Section 935.134 National... WAKE ISLAND CODE Motor Vehicle Code § 935.134 Arm signals. (a) Any person operating a motor vehicle and... signal for a turn or stop is made by fully extending the left arm as follows: (1) Left turn—extend left...

  13. 32 CFR 935.134 - Arm signals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Arm signals. 935.134 Section 935.134 National... WAKE ISLAND CODE Motor Vehicle Code § 935.134 Arm signals. (a) Any person operating a motor vehicle and... signal for a turn or stop is made by fully extending the left arm as follows: (1) Left turn—extend left...

  14. 32 CFR 935.134 - Arm signals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Arm signals. 935.134 Section 935.134 National... WAKE ISLAND CODE Motor Vehicle Code § 935.134 Arm signals. (a) Any person operating a motor vehicle and... signal for a turn or stop is made by fully extending the left arm as follows: (1) Left turn—extend left...

  15. 32 CFR 153.4 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Code. (3) Coordinate the assistance to be provided the Department of Defense with the U.S. Attorney's... logistical support, available resources, appropriate personnel, or the communications infrastructure...

  16. Environmental durability diagnostic for printed identification codes of polymer insulation for distribution pipelines

    NASA Astrophysics Data System (ADS)

    Zhuravleva, G. N.; Nagornova, I. V.; Kondratov, A. P.; Bablyuk, E. B.; Varepo, L. G.

    2017-08-01

    A research and modelling of weatherability and environmental durability of multilayer polymer insulation of both cable and pipelines with printed barcodes or color identification information were performed. It was proved that interlayer printing of identification codes in distribution pipelines insulation coatings provides high marking stability to light and atmospheric condensation. This allows to carry out their distant damage control. However, microbiological fouling of upper polymer layer hampers the distant damage pipelines identification. The color difference values and density changes of PE and PVC printed insolation due to weather and biological factors were defined.

  17. 48 CFR 223.303 - Contract clause.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material...

  18. Distributed Common Ground System - Army Increment 2 (DCGS-A Inc 2)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Distributed Common Ground System - Army Increment 2 ( DCGS -A Inc 2) Defense Acquisition...Management Information Retrieval (DAMIR) UNCLASSIFIED DCGS -A Inc 2 2016 MAR UNCLASSIFIED 2 Table of Contents Common Acronyms and Abbreviations...Determined TY - Then Year U.S.C- United States Code USD(AT&L) - Under Secretary of Defense for Acquisition, Technology, & Logistics DCGS -A Inc 2

  19. CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 4. July/August 2014

    DTIC Science & Technology

    2014-07-01

    hires him for the work.” To do this with a development project, isolate parts of the sys- tem the development of which is not obvious and develop...class. Coupling makes it more difficult to isolate units of code for testing. The interdependence also makes code comprehension more difficult and...coupled, it is more difficult or impossible to isolate the module under test to ensure the test is focusing only on the desired code and producing

  20. Notes on Some Schizoid Mechanisms

    PubMed Central

    KLEIN, MELANIE

    1996-01-01

    I propose to summarize some of the conclusions presented in this paper. One of my main points was the suggestion that in the first few months of life anxiety is predominantly experienced as fear of persecution and that this contributes to certain mechanisms and defenses which characterize the paranoid and schizoid positions. Outstanding among these defenses is the mechanism of splitting internal and external objects, emotions, and the ego. These mechanisms and defenses are part of normal development and at the same time form the basis for later schizophrenic illness. I described the processes underlying identification by projection as a combination of splitting off parts of the self and projecting them on to another person, and some of the effects this identification has on normal and schizoid object relations. The onset of the depressive position is the juncture at which by regression schizoid mechanisms may be reinforced. I also suggested a close connection between the manic-depressive and schizoid disorders, based on the interaction between the infantile schizoid and depressive positions. PMID:22700275

  1. Identification of the protein sequence of the type III effector XopD from the B100 strain of Xanthomonas campestris pv campestris

    PubMed Central

    Canonne, Joanne; Pichereaux, Carole; Marino, Daniel; Roby, Dominique; Rossignol, Michel; Rivas, Susana

    2012-01-01

    During evolution, pathogens have developed sophisticated strategies to suppress plant defense responses and promote successful colonization of their hosts. In their attempt to quell host resistance, Gram-negative phytopathogenic bacteria inject type III effectors (T3Es) into plant cells, where they typically target plant components essential for the establishment of defense responses. We have recently shown that the XopD T3E from the strain B100 of Xanthomonas campestris pathovar campestris (XopDXccB100) is able to target AtMYB30, a positive regulator of Arabidopsis defense responses. This protein interaction leads to inhibition of AtMYB30 transcriptional activity and promotion of bacterial virulence. Here, we describe the identification of the complete protein sequence of XopDXccB100, which presents an N-terminal extension of 40 amino acids with respect to the protein annotated in public databases. The implications of this finding are discussed. PMID:22353870

  2. An Approach to Defensible Nondiscriminatory Identification Model for the Gifted.

    ERIC Educational Resources Information Center

    Long, Robert R.

    To develop an approach for a nondiscriminatory identification model for gifted students in Rome (GA) City Schools, mean IQ scores on the Otis-Lennon Mental Ability test were compared for fourth, fifth, and tenth grade students divided into four groups: White advantaged, White disadvantaged, Black advantaged, and Black disadvantaged. A significant…

  3. 48 CFR 227.7103-10 - Contractor identification and marking of technical data to be furnished with restrictive markings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and marking of technical data to be furnished with restrictive markings. 227.7103-10 Section 227.7103... DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Technical Data 227.7103-10 Contractor identification and marking of technical data to be furnished with restrictive markings...

  4. Invasive Species Guidebook for Department of Defense Installations in the Chesapeake Bay Watershed: Identification, Control, and Restoration

    DTIC Science & Technology

    2007-11-01

    INSTALLATIONS IN THE CHESAPEAKE BAY WATERSHED IDENTIFICATION AND CONTROL METHODS Cogongrass ( Imperata cylindrica ) Description & Biology – A large...Crown vetch Coronilla varia MD, VA 14 Leafy spurge Euphorbia esula VA 15 Ground ivy Glechoma hederacea DC, MD, PA, VA, WV 17 Cogongrass Imperata

  5. Deciphering Systemic Wound Responses of the Pumpkin Extrafascicular Phloem by Metabolomics and Stable Isotope-Coded Protein Labeling1[C][W

    PubMed Central

    Gaupels, Frank; Sarioglu, Hakan; Beckmann, Manfred; Hause, Bettina; Spannagl, Manuel; Draper, John; Lindermayr, Christian; Durner, Jörg

    2012-01-01

    In cucurbits, phloem latex exudes from cut sieve tubes of the extrafascicular phloem (EFP), serving in defense against herbivores. We analyzed inducible defense mechanisms in the EFP of pumpkin (Cucurbita maxima) after leaf damage. As an early systemic response, wounding elicited transient accumulation of jasmonates and a decrease in exudation probably due to partial sieve tube occlusion by callose. The energy status of the EFP was enhanced as indicated by increased levels of ATP, phosphate, and intermediates of the citric acid cycle. Gas chromatography coupled to mass spectrometry also revealed that sucrose transport, gluconeogenesis/glycolysis, and amino acid metabolism were up-regulated after wounding. Combining ProteoMiner technology for the enrichment of low-abundance proteins with stable isotope-coded protein labeling, we identified 51 wound-regulated phloem proteins. Two Sucrose-Nonfermenting1-related protein kinases and a 32-kD 14-3-3 protein are candidate central regulators of stress metabolism in the EFP. Other proteins, such as the Silverleaf Whitefly-Induced Protein1, Mitogen Activated Protein Kinase6, and Heat Shock Protein81, have known defensive functions. Isotope-coded protein labeling and western-blot analyses indicated that Cyclophilin18 is a reliable marker for stress responses of the EFP. As a hint toward the induction of redox signaling, we have observed delayed oxidation-triggered polymerization of the major Phloem Protein1 (PP1) and PP2, which correlated with a decline in carbonylation of PP2. In sum, wounding triggered transient sieve tube occlusion, enhanced energy metabolism, and accumulation of defense-related proteins in the pumpkin EFP. The systemic wound response was mediated by jasmonate and redox signaling. PMID:23085839

  6. Translation of the Department of Defense Disease and Injury Codes to the Eighth Revision International Classification of Diseases for use by the Military Services.

    DTIC Science & Technology

    1976-06-01

    with, the DDDIC entity. 3. The ICDA-8 contracts groups of diseases or accidents which had been presented in expanded form in the DDDIC. Example: DDDIC...DDDIC. 4. The ICDA-8 expands groups of entities which had been presented in more condensed folin in the DDDIC. Example: DDDIC ICDA-8 Code Ntmuber Code...rapidly find a disease entity and all closely related entities. At the Naval Health Research Center (N11RC) a new code nunber was given to each

  7. 32 CFR 935.131 - Right-hand side of the road.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Right-hand side of the road. 935.131 Section 935... INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.131 Right-hand side of the road. Each person driving a motor vehicle on Wake Island shall drive on the right-hand side of the road, except where...

  8. 32 CFR 935.131 - Right-hand side of the road.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Right-hand side of the road. 935.131 Section 935... INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.131 Right-hand side of the road. Each person driving a motor vehicle on Wake Island shall drive on the right-hand side of the road, except where...

  9. 32 CFR 935.131 - Right-hand side of the road.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Right-hand side of the road. 935.131 Section 935... INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.131 Right-hand side of the road. Each person driving a motor vehicle on Wake Island shall drive on the right-hand side of the road, except where...

  10. 32 CFR 935.131 - Right-hand side of the road.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Right-hand side of the road. 935.131 Section 935... INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.131 Right-hand side of the road. Each person driving a motor vehicle on Wake Island shall drive on the right-hand side of the road, except where...

  11. 32 CFR 935.131 - Right-hand side of the road.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Right-hand side of the road. 935.131 Section 935... INSULAR REGULATIONS WAKE ISLAND CODE Motor Vehicle Code § 935.131 Right-hand side of the road. Each person driving a motor vehicle on Wake Island shall drive on the right-hand side of the road, except where...

  12. Acquisition Handbook - Update. Comprehensive Approach to Reusable Defensive Software (CARDS)

    DTIC Science & Technology

    1994-03-25

    designs, and implementation components (source code, test plans, procedures and results, and system/software documentation). This handbook provides a...activities where software components are acquired, evaluated, tested and sometimes modified. In addition to serving as a facility for the acquisition and...systems from such components [1]. Implementation components are at the lowest level and consist of: specifications; detailed designs; code, test

  13. Extracellular Alkalinization as a Defense Response in Potato Cells.

    PubMed

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  14. 48 CFR 223.370-4 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material...

  15. 48 CFR 223.370-2 - Definition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material...

  16. Weighted SAW reflector gratings for orthogonal frequency coded SAW tags and sensors

    NASA Technical Reports Server (NTRS)

    Puccio, Derek (Inventor); Malocha, Donald (Inventor)

    2011-01-01

    Weighted surface acoustic wave reflector gratings for coding identification tags and sensors to enable unique sensor operation and identification for a multi-sensor environment. In an embodiment, the weighted reflectors are variable while in another embodiment the reflector gratings are apodized. The weighting technique allows the designer to decrease reflectively and allows for more chips to be implemented in a device and, consequently, more coding diversity. As a result, more tags and sensors can be implemented using a given bandwidth when compared with uniform reflectors. Use of weighted reflector gratings with OFC makes various phase shifting schemes possible, such as in-phase and quadrature implementations of coded waveforms resulting in reduced device size and increased coding.

  17. Priming processes in the Simon task: more evidence from the lexical decision task for a third route in the Simon effect.

    PubMed

    Metzker, Manja; Dreisbach, Gesine

    2011-06-01

    Recently, it was proposed that the Simon effect would result not only from two interfering processes, as classical dual-route models assume, but from three processes. It was argued that priming from the spatial code to the nonspatial code might facilitate the identification of the nonspatial stimulus feature in congruent Simon trials. In the present study, the authors provide evidence that the identification of the nonspatial information can be facilitated by the activation of an associated spatial code. In three experiments, participants first associated centrally presented animal and fruit pictures with spatial responses. Subsequently, participants decided whether laterally presented letter strings were words (animal, fruit, or other words) or nonwords; stimulus position could be congruent or incongruent to the associated spatial code. As hypothesized, animal and fruit words were identified faster at congruent than at incongruent stimulus positions from the association phase. The authors conclude that the activation of the spatial code spreads to the nonspatial code, resulting in facilitated stimulus identification in congruent trials. These results speak to the assumption of a third process involved in the Simon task.

  18. F-22 Operational Squadron and T-38 Detachment Beddown at Tyndall Air Force Base, Florida

    DTIC Science & Technology

    2011-08-01

    tactics, radar employment, identification, weapons employment, defensive response, electronic countermeasures, and electronic counter...use, and electronic countermeasures. Warning Area, MOA, and ATCAA 2,000 AGL to 60,000 MSL 0.75 to 1.5 hour (Dissimilar) Air Combat...night), air refueling, and strike-force rendezvous, conducting air-to-ground strikes, strike force defense and escort, air intercepts, electronic

  19. Identification of Radiation Sources in a Peacetime Environment

    DTIC Science & Technology

    1998-04-01

    Radionuclides in Medicine, Research, and Industry (continued) Isotope Symbol Polonium - 210 Po- 210 Promethium-147 Pr-147 Radium-226 Ra-226 Selenium-75 Se...Defense Intelligence Document Prepared by: Epidemiology and Environmental Health Division Armed Forces Medical Intelligence Center Defense...1811-1-96, May 1996, which should be destroyed. 2 I o % m > 1 >* This product responds to U.S. Army Center for Health Promotion and

  20. Department of Defense Chemical and Biological Defense Program. FY2004-2006 Performance Plan

    DTIC Science & Technology

    2005-03-01

    Agents (NTAs) Compare the direct effects of PAF on smooth muscle, hematic constituents, and lung to determine role in toxicity. Continue to identify...Range Biometric Target ID System Explore technologies for a long range biometric target identification system. Air Containment Monitoring System...Continue development of systems for contained air monitoring for chemical agents.Long Range Biometric Air Containment Monitoring System Continued

  1. 48 CFR 223.302 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material Safety Data 223.302...

  2. 48 CFR 223.370-5 - Contract clauses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material...

  3. Identification and Classification of Orthogonal Frequency Division Multiple Access (OFDMA) Signals Used in Next Generation Wireless Systems

    DTIC Science & Technology

    2012-03-01

    advanced antenna systems AMC adaptive modulation and coding AWGN additive white Gaussian noise BPSK binary phase shift keying BS base station BTC ...QAM-16, and QAM-64, and coding types include convolutional coding (CC), convolutional turbo coding (CTC), block turbo coding ( BTC ), zero-terminating

  4. A Model of an Integrated Air Defense System (IADS) for the TACOPS program

    DTIC Science & Technology

    1991-09-01

    SUBJECT TERMS (Continue on reverse If necessary and Identify by block number) FIELD GROUP SUB-GROUP Integrated Air Defense System, iADS, TACOPS...needed. Selection criteria for picking a Measurement Of Effectiveness (MOE) are presented. Acceslon For I NTIS CRA&I DTIC TAB 0 Unannouticed 1 ...Justification B y ............................................... Di.,t ibiation Av.iabilily Codes Avai i:.djor Dist A- 1 THESIS DISCLAIMER The reader is cautioned

  5. To amend title 10, United States Code, to authorize the Secretary of Defense to make grants to recognized science and technology secondary schools to support research and development projects at such schools in science, mathematics, engineering, and technology to supplement the national security functions of the Department of Defense.

    THOMAS, 111th Congress

    Rep. Connolly, Gerald E. [D-VA-11

    2009-07-24

    House - 01/12/2010 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Identifying Homelessness among Veterans Using VA Administrative Data: Opportunities to Expand Detection Criteria.

    PubMed

    Peterson, Rachel; Gundlapalli, Adi V; Metraux, Stephen; Carter, Marjorie E; Palmer, Miland; Redd, Andrew; Samore, Matthew H; Fargo, Jamison D

    2015-01-01

    Researchers at the U.S. Department of Veterans Affairs (VA) have used administrative criteria to identify homelessness among U.S. Veterans. Our objective was to explore the use of these codes in VA health care facilities. We examined VA health records (2002-2012) of Veterans recently separated from the military and identified as homeless using VA conventional identification criteria (ICD-9-CM code V60.0, VA specific codes for homeless services), plus closely allied V60 codes indicating housing instability. Logistic regression analyses examined differences between Veterans who received these codes. Health care services and co-morbidities were analyzed in the 90 days post-identification of homelessness. VA conventional criteria identified 21,021 homeless Veterans from Operations Enduring Freedom, Iraqi Freedom, and New Dawn (rate 2.5%). Adding allied V60 codes increased that to 31,260 (rate 3.3%). While certain demographic differences were noted, Veterans identified as homeless using conventional or allied codes were similar with regards to utilization of homeless, mental health, and substance abuse services, as well as co-morbidities. Differences were noted in the pattern of usage of homelessness-related diagnostic codes in VA facilities nation-wide. Creating an official VA case definition for homelessness, which would include additional ICD-9-CM and other administrative codes for VA homeless services, would likely allow improved identification of homeless and at-risk Veterans. This also presents an opportunity for encouraging uniformity in applying these codes in VA facilities nationwide as well as in other large health care organizations.

  7. Identifying Homelessness among Veterans Using VA Administrative Data: Opportunities to Expand Detection Criteria

    PubMed Central

    Peterson, Rachel; Gundlapalli, Adi V.; Metraux, Stephen; Carter, Marjorie E.; Palmer, Miland; Redd, Andrew; Samore, Matthew H.; Fargo, Jamison D.

    2015-01-01

    Researchers at the U.S. Department of Veterans Affairs (VA) have used administrative criteria to identify homelessness among U.S. Veterans. Our objective was to explore the use of these codes in VA health care facilities. We examined VA health records (2002-2012) of Veterans recently separated from the military and identified as homeless using VA conventional identification criteria (ICD-9-CM code V60.0, VA specific codes for homeless services), plus closely allied V60 codes indicating housing instability. Logistic regression analyses examined differences between Veterans who received these codes. Health care services and co-morbidities were analyzed in the 90 days post-identification of homelessness. VA conventional criteria identified 21,021 homeless Veterans from Operations Enduring Freedom, Iraqi Freedom, and New Dawn (rate 2.5%). Adding allied V60 codes increased that to 31,260 (rate 3.3%). While certain demographic differences were noted, Veterans identified as homeless using conventional or allied codes were similar with regards to utilization of homeless, mental health, and substance abuse services, as well as co-morbidities. Differences were noted in the pattern of usage of homelessness-related diagnostic codes in VA facilities nation-wide. Creating an official VA case definition for homelessness, which would include additional ICD-9-CM and other administrative codes for VA homeless services, would likely allow improved identification of homeless and at-risk Veterans. This also presents an opportunity for encouraging uniformity in applying these codes in VA facilities nationwide as well as in other large health care organizations. PMID:26172386

  8. 48 CFR 223.370-3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material Safety Data 223.370...

  9. 48 CFR 223.370-1 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Hazardous Material Identification and Material Safety Data 223.370...

  10. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    PubMed

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here.

  11. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  12. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  13. 48 CFR 252.211-7006 - Passive Radio Frequency Identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... radio frequency identification (RFID) or item unique identification (IUID) information, order... CodeTM (EPC®) means an identification scheme for universally identifying physical objects via RFID tags... passive RFID technology. Exterior container means a MIL-STD-129 defined container, bundle, or assembly...

  14. 32 CFR 85.5 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...)), Office of the Assistant Secretary of Defense (Acquisition and Logistics) (OASD(A&L)), the Office of the... and Forms Center, Attn: Code 1062, 5801 Tabor Avenue, Philadelphia, PA 19120. (b) The Assistant...

  15. 32 CFR 85.5 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...)), Office of the Assistant Secretary of Defense (Acquisition and Logistics) (OASD(A&L)), the Office of the... and Forms Center, Attn: Code 1062, 5801 Tabor Avenue, Philadelphia, PA 19120. (b) The Assistant...

  16. 32 CFR 85.5 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...)), Office of the Assistant Secretary of Defense (Acquisition and Logistics) (OASD(A&L)), the Office of the... and Forms Center, Attn: Code 1062, 5801 Tabor Avenue, Philadelphia, PA 19120. (b) The Assistant...

  17. 32 CFR 85.5 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...)), Office of the Assistant Secretary of Defense (Acquisition and Logistics) (OASD(A&L)), the Office of the... and Forms Center, Attn: Code 1062, 5801 Tabor Avenue, Philadelphia, PA 19120. (b) The Assistant...

  18. 32 CFR 85.5 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...)), Office of the Assistant Secretary of Defense (Acquisition and Logistics) (OASD(A&L)), the Office of the... and Forms Center, Attn: Code 1062, 5801 Tabor Avenue, Philadelphia, PA 19120. (b) The Assistant...

  19. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  20. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  1. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  2. 48 CFR 203.1003 - Requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Contractor Code of... notification of a possible contractor violation of the type described in FAR 3.1003(b), coordinate the matter...

  3. On fuzzy semantic similarity measure for DNA coding.

    PubMed

    Ahmad, Muneer; Jung, Low Tang; Bhuiyan, Md Al-Amin

    2016-02-01

    A coding measure scheme numerically translates the DNA sequence to a time domain signal for protein coding regions identification. A number of coding measure schemes based on numerology, geometry, fixed mapping, statistical characteristics and chemical attributes of nucleotides have been proposed in recent decades. Such coding measure schemes lack the biologically meaningful aspects of nucleotide data and hence do not significantly discriminate coding regions from non-coding regions. This paper presents a novel fuzzy semantic similarity measure (FSSM) coding scheme centering on FSSM codons׳ clustering and genetic code context of nucleotides. Certain natural characteristics of nucleotides i.e. appearance as a unique combination of triplets, preserving special structure and occurrence, and ability to own and share density distributions in codons have been exploited in FSSM. The nucleotides׳ fuzzy behaviors, semantic similarities and defuzzification based on the center of gravity of nucleotides revealed a strong correlation between nucleotides in codons. The proposed FSSM coding scheme attains a significant enhancement in coding regions identification i.e. 36-133% as compared to other existing coding measure schemes tested over more than 250 benchmarked and randomly taken DNA datasets of different organisms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. 48 CFR 227.7103-3 - Early identification of technical data to be furnished to the Government with restrictions on use...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... technical data to be furnished to the Government with restrictions on use, reproduction or disclosure. 227..., DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Technical Data 227.7103-3 Early identification of technical data to be furnished to the Government with restrictions...

  5. 48 CFR 227.7103-3 - Early identification of technical data to be furnished to the Government with restrictions on use...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... technical data to be furnished to the Government with restrictions on use, reproduction or disclosure. 227..., DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Technical Data 227.7103-3 Early identification of technical data to be furnished to the Government with restrictions...

  6. 48 CFR 227.7103-3 - Early identification of technical data to be furnished to the Government with restrictions on use...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... technical data to be furnished to the Government with restrictions on use, reproduction or disclosure. 227..., DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Technical Data 227.7103-3 Early identification of technical data to be furnished to the Government with restrictions...

  7. Computer-assisted bar-coding system significantly reduces clinical laboratory specimen identification errors in a pediatric oncology hospital.

    PubMed

    Hayden, Randall T; Patterson, Donna J; Jay, Dennis W; Cross, Carl; Dotson, Pamela; Possel, Robert E; Srivastava, Deo Kumar; Mirro, Joseph; Shenep, Jerry L

    2008-02-01

    To assess the ability of a bar code-based electronic positive patient and specimen identification (EPPID) system to reduce identification errors in a pediatric hospital's clinical laboratory. An EPPID system was implemented at a pediatric oncology hospital to reduce errors in patient and laboratory specimen identification. The EPPID system included bar-code identifiers and handheld personal digital assistants supporting real-time order verification. System efficacy was measured in 3 consecutive 12-month time frames, corresponding to periods before, during, and immediately after full EPPID implementation. A significant reduction in the median percentage of mislabeled specimens was observed in the 3-year study period. A decline from 0.03% to 0.005% (P < .001) was observed in the 12 months after full system implementation. On the basis of the pre-intervention detected error rate, it was estimated that EPPID prevented at least 62 mislabeling events during its first year of operation. EPPID decreased the rate of misidentification of clinical laboratory samples. The diminution of errors observed in this study provides support for the development of national guidelines for the use of bar coding for laboratory specimens, paralleling recent recommendations for medication administration.

  8. DefEX: Hands-On Cyber Defense Exercise for Undergraduate Students

    DTIC Science & Technology

    2011-07-01

    Injection, and 4) File Upload. Next, the students patched the associated flawed Perl and PHP Hypertext Preprocessor ( PHP ) code. Finally, students...underlying script. The Zora XSS vulnerability existed in a PHP file that echoed unfiltered user input back to the screen. To eliminate the...vulnerability, students filtered the input using the PHP htmlentities function and retested the code. The htmlentities function translates certain ambiguous

  9. Director of Small and Disadvantaged Business Utilization

    DTIC Science & Technology

    1989-03-17

    Small and Disadvantaged Business Utilization References: (a) Title 15, United States Code (b) Title 10, United States Code (c) DoD 5025.1-M, "Department...position of Director of Small and Disadvantaged Business Utilization (Director, SADBU) under the direction, authority, and control of the Under...Defense Agencies, and the DoD Field Activities. C. RESPONSIBILITIES The Director of Small and Disadvantaged Business Utilization shall serve as the

  10. Effects of Debris Entrainment and Multi-Phase Flow on Plug Loading in an MX Trench.

    DTIC Science & Technology

    1978-09-15

    gas stream of density (pg) and velocity (Vg) is: -., * -) - * 2~ TD FD Pg (V P V) Vp-Vg I CD( TD ) (A.1) 4 where the drag coefficient (CD) is defined by...ATTN: FCPR ATTN: Code L53 , J. Forrest Field Command Naval Facilities Engineering Command Defense Nuclear Agency ATTN: Code 09M22C Livermore Division

  11. Identification of genes potentially responsible for extra-oral digestion and overcoming plant defense from salivary glands of the tarnished plant bug (Lygus lineolaris) using cDNA sequencing

    USDA-ARS?s Scientific Manuscript database

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris) feeding. TPBs secrete saliva during feeding to facilitate the piercing into plant tissues. More importantly, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the p...

  12. Evaluation of Defense Hotline Allegations at the Defense Contract Audit Agency Santa Barbara Suboffice

    DTIC Science & Technology

    2014-10-08

    and suspected fraud were not reported; • time and material vouchers were excluded from a paid voucher review; • a supervisor did not support an...6 Requirements for Identification of Potential Fraud __________________________________________6 Audit Deficiencies and Performance Metrics...officer and DCAA auditor an incurred cost submission six months after the end of the contractor’s fiscal year. Incurred cost audits are usually performed

  13. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  14. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    PubMed

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  15. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    ,

    1988-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  16. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    USGS Publications Warehouse

    ,

    1985-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  17. Effective Identification of Similar Patients Through Sequential Matching over ICD Code Embedding.

    PubMed

    Nguyen, Dang; Luo, Wei; Venkatesh, Svetha; Phung, Dinh

    2018-04-11

    Evidence-based medicine often involves the identification of patients with similar conditions, which are often captured in ICD (International Classification of Diseases (World Health Organization 2013)) code sequences. With no satisfying prior solutions for matching ICD-10 code sequences, this paper presents a method which effectively captures the clinical similarity among routine patients who have multiple comorbidities and complex care needs. Our method leverages the recent progress in representation learning of individual ICD-10 codes, and it explicitly uses the sequential order of codes for matching. Empirical evaluation on a state-wide cancer data collection shows that our proposed method achieves significantly higher matching performance compared with state-of-the-art methods ignoring the sequential order. Our method better identifies similar patients in a number of clinical outcomes including readmission and mortality outlook. Although this paper focuses on ICD-10 diagnosis code sequences, our method can be adapted to work with other codified sequence data.

  18. 48 CFR 304.7001 - Numbering acquisitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracting office identification codes currently in use is contained in the DCIS Users' Manual, available at... than one code may apply in a specific situation, or for additional codes, refer to the DCIS Users' Manual or consult with the cognizant DCIS coordinator/focal point for guidance on which code governs...

  19. "I want to be a daddy!": meanings of masculine identifications in girls.

    PubMed

    Rees, K

    1987-07-01

    This paper suggests revisions in our understanding of feminine identity formation, the girl's negative oedipus complex, and masculine identifications in girls. Analytic material from the cases of three girls is used to explore the various origins and intrapsychic functions of masculine identifications at each phase of the girl's development. Accounts of feminine development based on such concepts as castration shock, primary femininity, primary identification with mother, or core gender identity are seen as oversimplified. Feminine and masculine identifications are neither primary nor secondary, but the product of a long line of development, of ongoing conflict resolution, and of defensive transformations.

  20. Report of the Defense Review Committee for the Code of Conduct. Volume 2. Supplement,

    DTIC Science & Technology

    1976-01-01

    think of all the innocent people killed, schools and churches destroyed, medical aid stations ruined ...." "During the (preflight) briefings, I was...other people could live by the Code of Conduct, then I could too, but I don’t think you could ever find anybody who was ever released that lived...Code of Conduct; it was trying just to survive." " I think there is a need for some sort of document to assist people , particularly people who could

  1. Method and apparatus for data decoding and processing

    DOEpatents

    Hunter, Timothy M.; Levy, Arthur J.

    1992-01-01

    A system and technique is disclosed for automatically controlling the decoding and digitizaiton of an analog tape. The system includes the use of a tape data format which includes a plurality of digital codes recorded on the analog tape in a predetermined proximity to a period of recorded analog data. The codes associated with each period of analog data include digital identification codes prior to the analog data, a start of data code coincident with the analog data recording, and an end of data code subsequent to the associated period of recorded analog data. The formatted tape is decoded in a processing and digitization system which includes an analog tape player coupled to a digitizer to transmit analog information from the recorded tape over at least one channel to the digitizer. At the same time, the tape player is coupled to a decoder and interface system which detects and decodes the digital codes on the tape corresponding to each period of recorded analog data and controls tape movement and digitizer initiation in response to preprogramed modes. A host computer is also coupled to the decoder and interface system and the digitizer and programmed to initiate specific modes of data decoding through the decoder and interface system including the automatic compilation and storage of digital identification information and digitized data for the period of recorded analog data corresponding to the digital identification data, compilation and storage of selected digitized data representing periods of recorded analog data, and compilation of digital identification information related to each of the periods of recorded analog data.

  2. Shot PRISCILLA: A Test of the PLUMBBOB Series, 24 June 1957.

    DTIC Science & Technology

    1981-02-27

    Block 20. If different from Report) I6. SUPPLEMENTARY NOTES This Work sponsored by the Defense Nuclear Agency under RDT&E RMSS Code B350079464...rile Defense Nuclear Agency Action Officer, Major H. L. Reese, under whom this work was done, wishes to acknowledge the research and editing...Operation PLUMBBOB. All activities of the NTO were under the overall control of an AEC-appointed Test Manager, assisted by the Test Director. The NTO

  3. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  4. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  5. Refining the accuracy of validated target identification through coding variant fine-mapping in type 2 diabetes.

    PubMed

    Mahajan, Anubha; Wessel, Jennifer; Willems, Sara M; Zhao, Wei; Robertson, Neil R; Chu, Audrey Y; Gan, Wei; Kitajima, Hidetoshi; Taliun, Daniel; Rayner, N William; Guo, Xiuqing; Lu, Yingchang; Li, Man; Jensen, Richard A; Hu, Yao; Huo, Shaofeng; Lohman, Kurt K; Zhang, Weihua; Cook, James P; Prins, Bram Peter; Flannick, Jason; Grarup, Niels; Trubetskoy, Vassily Vladimirovich; Kravic, Jasmina; Kim, Young Jin; Rybin, Denis V; Yaghootkar, Hanieh; Müller-Nurasyid, Martina; Meidtner, Karina; Li-Gao, Ruifang; Varga, Tibor V; Marten, Jonathan; Li, Jin; Smith, Albert Vernon; An, Ping; Ligthart, Symen; Gustafsson, Stefan; Malerba, Giovanni; Demirkan, Ayse; Tajes, Juan Fernandez; Steinthorsdottir, Valgerdur; Wuttke, Matthias; Lecoeur, Cécile; Preuss, Michael; Bielak, Lawrence F; Graff, Marielisa; Highland, Heather M; Justice, Anne E; Liu, Dajiang J; Marouli, Eirini; Peloso, Gina Marie; Warren, Helen R; Afaq, Saima; Afzal, Shoaib; Ahlqvist, Emma; Almgren, Peter; Amin, Najaf; Bang, Lia B; Bertoni, Alain G; Bombieri, Cristina; Bork-Jensen, Jette; Brandslund, Ivan; Brody, Jennifer A; Burtt, Noël P; Canouil, Mickaël; Chen, Yii-Der Ida; Cho, Yoon Shin; Christensen, Cramer; Eastwood, Sophie V; Eckardt, Kai-Uwe; Fischer, Krista; Gambaro, Giovanni; Giedraitis, Vilmantas; Grove, Megan L; de Haan, Hugoline G; Hackinger, Sophie; Hai, Yang; Han, Sohee; Tybjærg-Hansen, Anne; Hivert, Marie-France; Isomaa, Bo; Jäger, Susanne; Jørgensen, Marit E; Jørgensen, Torben; Käräjämäki, Annemari; Kim, Bong-Jo; Kim, Sung Soo; Koistinen, Heikki A; Kovacs, Peter; Kriebel, Jennifer; Kronenberg, Florian; Läll, Kristi; Lange, Leslie A; Lee, Jung-Jin; Lehne, Benjamin; Li, Huaixing; Lin, Keng-Hung; Linneberg, Allan; Liu, Ching-Ti; Liu, Jun; Loh, Marie; Mägi, Reedik; Mamakou, Vasiliki; McKean-Cowdin, Roberta; Nadkarni, Girish; Neville, Matt; Nielsen, Sune F; Ntalla, Ioanna; Peyser, Patricia A; Rathmann, Wolfgang; Rice, Kenneth; Rich, Stephen S; Rode, Line; Rolandsson, Olov; Schönherr, Sebastian; Selvin, Elizabeth; Small, Kerrin S; Stančáková, Alena; Surendran, Praveen; Taylor, Kent D; Teslovich, Tanya M; Thorand, Barbara; Thorleifsson, Gudmar; Tin, Adrienne; Tönjes, Anke; Varbo, Anette; Witte, Daniel R; Wood, Andrew R; Yajnik, Pranav; Yao, Jie; Yengo, Loïc; Young, Robin; Amouyel, Philippe; Boeing, Heiner; Boerwinkle, Eric; Bottinger, Erwin P; Chowdhury, Rajiv; Collins, Francis S; Dedoussis, George; Dehghan, Abbas; Deloukas, Panos; Ferrario, Marco M; Ferrières, Jean; Florez, Jose C; Frossard, Philippe; Gudnason, Vilmundur; Harris, Tamara B; Heckbert, Susan R; Howson, Joanna M M; Ingelsson, Martin; Kathiresan, Sekar; Kee, Frank; Kuusisto, Johanna; Langenberg, Claudia; Launer, Lenore J; Lindgren, Cecilia M; Männistö, Satu; Meitinger, Thomas; Melander, Olle; Mohlke, Karen L; Moitry, Marie; Morris, Andrew D; Murray, Alison D; de Mutsert, Renée; Orho-Melander, Marju; Owen, Katharine R; Perola, Markus; Peters, Annette; Province, Michael A; Rasheed, Asif; Ridker, Paul M; Rivadineira, Fernando; Rosendaal, Frits R; Rosengren, Anders H; Salomaa, Veikko; Sheu, Wayne H-H; Sladek, Rob; Smith, Blair H; Strauch, Konstantin; Uitterlinden, André G; Varma, Rohit; Willer, Cristen J; Blüher, Matthias; Butterworth, Adam S; Chambers, John Campbell; Chasman, Daniel I; Danesh, John; van Duijn, Cornelia; Dupuis, Josée; Franco, Oscar H; Franks, Paul W; Froguel, Philippe; Grallert, Harald; Groop, Leif; Han, Bok-Ghee; Hansen, Torben; Hattersley, Andrew T; Hayward, Caroline; Ingelsson, Erik; Kardia, Sharon L R; Karpe, Fredrik; Kooner, Jaspal Singh; Köttgen, Anna; Kuulasmaa, Kari; Laakso, Markku; Lin, Xu; Lind, Lars; Liu, Yongmei; Loos, Ruth J F; Marchini, Jonathan; Metspalu, Andres; Mook-Kanamori, Dennis; Nordestgaard, Børge G; Palmer, Colin N A; Pankow, James S; Pedersen, Oluf; Psaty, Bruce M; Rauramaa, Rainer; Sattar, Naveed; Schulze, Matthias B; Soranzo, Nicole; Spector, Timothy D; Stefansson, Kari; Stumvoll, Michael; Thorsteinsdottir, Unnur; Tuomi, Tiinamaija; Tuomilehto, Jaakko; Wareham, Nicholas J; Wilson, James G; Zeggini, Eleftheria; Scott, Robert A; Barroso, Inês; Frayling, Timothy M; Goodarzi, Mark O; Meigs, James B; Boehnke, Michael; Saleheen, Danish; Morris, Andrew P; Rotter, Jerome I; McCarthy, Mark I

    2018-04-01

    We aggregated coding variant data for 81,412 type 2 diabetes cases and 370,832 controls of diverse ancestry, identifying 40 coding variant association signals (P < 2.2 × 10 -7 ); of these, 16 map outside known risk-associated loci. We make two important observations. First, only five of these signals are driven by low-frequency variants: even for these, effect sizes are modest (odds ratio ≤1.29). Second, when we used large-scale genome-wide association data to fine-map the associated variants in their regional context, accounting for the global enrichment of complex trait associations in coding sequence, compelling evidence for coding variant causality was obtained for only 16 signals. At 13 others, the associated coding variants clearly represent 'false leads' with potential to generate erroneous mechanistic inference. Coding variant associations offer a direct route to biological insight for complex diseases and identification of validated therapeutic targets; however, appropriate mechanistic inference requires careful specification of their causal contribution to disease predisposition.

  6. Computerized Dental Comparison: A Critical Review of Dental Coding and Ranking Algorithms Used in Victim Identification.

    PubMed

    Adams, Bradley J; Aschheim, Kenneth W

    2016-01-01

    Comparison of antemortem and postmortem dental records is a leading method of victim identification, especially for incidents involving a large number of decedents. This process may be expedited with computer software that provides a ranked list of best possible matches. This study provides a comparison of the most commonly used conventional coding and sorting algorithms used in the United States (WinID3) with a simplified coding format that utilizes an optimized sorting algorithm. The simplified system consists of seven basic codes and utilizes an optimized algorithm based largely on the percentage of matches. To perform this research, a large reference database of approximately 50,000 antemortem and postmortem records was created. For most disaster scenarios, the proposed simplified codes, paired with the optimized algorithm, performed better than WinID3 which uses more complex codes. The detailed coding system does show better performance with extremely large numbers of records and/or significant body fragmentation. © 2015 American Academy of Forensic Sciences.

  7. Plant identification credibility in ethnobotany: a closer look at Polish ethnographic studies

    PubMed Central

    2010-01-01

    Background This paper is an attempt to estimate the percentage of erroneously identified taxa in ethnographic studies concerning the use of plants and to propose a code for recording credibility of identification in historical ethnobotany publications. Methods A sample of Polish-language ethnobotanical literature (45 published sources from 1874-2005) and four collections of voucher specimens (from 1894-1975) were analyzed. Errors were detected in the publications by comparing the data with existing knowledge on the distribution of plant names and species ranges. The voucher specimens were re-examined. A one-letter code was invented for quick identification of the credibility of data published in lists of species compiled from historical or ethnographic sources, according to the source of identification: voucher specimen, Latin binominal, botanical expert, obvious widespread name, folk name, mode of use, range, physical description or photograph. To test the use of the code an up-to-date list of wild food plants used in Poland was made. Results A significant difference between the ratio of mistakes in the voucher specimen collections and the ratio of detectable mistakes in the studies without herbarium documentation was found. At least 2.3% of taxa in the publications were identified erroneously (mean rate was 6.2% per publication), and in half of these mistakes even the genus was not correct. As many as 10.0% of voucher specimens (on average 9.2% per collection) were originally erroneously identified, but three quarters of the identification mistakes remained within-genus. The species of the genera Thymus, Rumex and Rubus were most often confused within the genus. Not all of the invented credibility codes were used in the list of wild food plants, but they may be useful for other researchers. The most often used codes were the ones signifying identification by: voucher specimen, botanical expert and by a common name used throughout the country. Conclusions The results of this study support the rigorous use of voucher specimens in ethnobotany, although they also reveal a relatively high percentage of misidentified taxa in the specimens studied. The invented credibility coding system may become a useful tool for communication between historical ethnobotanists, particularly in creating larger databases. PMID:21167056

  8. Reduction in specimen labeling errors after implementation of a positive patient identification system in phlebotomy.

    PubMed

    Morrison, Aileen P; Tanasijevic, Milenko J; Goonan, Ellen M; Lobo, Margaret M; Bates, Michael M; Lipsitz, Stuart R; Bates, David W; Melanson, Stacy E F

    2010-06-01

    Ensuring accurate patient identification is central to preventing medical errors, but it can be challenging. We implemented a bar code-based positive patient identification system for use in inpatient phlebotomy. A before-after design was used to evaluate the impact of the identification system on the frequency of mislabeled and unlabeled samples reported in our laboratory. Labeling errors fell from 5.45 in 10,000 before implementation to 3.2 in 10,000 afterward (P = .0013). An estimated 108 mislabeling events were prevented by the identification system in 1 year. Furthermore, a workflow step requiring manual preprinting of labels, which was accompanied by potential labeling errors in about one quarter of blood "draws," was removed as a result of the new system. After implementation, a higher percentage of patients reported having their wristband checked before phlebotomy. Bar code technology significantly reduced the rate of specimen identification errors.

  9. An abstract model of rogue code insertion into radio frequency wireless networks. The effects of computer viruses on the Program Management Office

    NASA Astrophysics Data System (ADS)

    Feudo, Christopher V.

    1994-04-01

    This dissertation demonstrates that inadequately protected wireless LANs are more vulnerable to rogue program attack than traditional LANs. Wireless LANs not only run the same risks as traditional LANs, but they also run additional risks associated with an open transmission medium. Intruders can scan radio waves and, given enough time and resources, intercept, analyze, decipher, and reinsert data into the transmission medium. This dissertation describes the development and instantiation of an abstract model of the rogue code insertion process into a DOS-based wireless communications system using radio frequency (RF) atmospheric signal transmission. The model is general enough to be applied to widely used target environments such as UNIX, Macintosh, and DOS operating systems. The methodology and three modules, the prober, activator, and trigger modules, to generate rogue code and insert it into a wireless LAN were developed to illustrate the efficacy of the model. Also incorporated into the model are defense measures against remotely introduced rogue programs and a cost-benefit analysis that determined that such defenses for a specific environment were cost-justified.

  10. EO/IR scene generation open source initiative for real-time hardware-in-the-loop and all-digital simulation

    NASA Astrophysics Data System (ADS)

    Morris, Joseph W.; Lowry, Mac; Boren, Brett; Towers, James B.; Trimble, Darian E.; Bunfield, Dennis H.

    2011-06-01

    The US Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) and the Redstone Test Center (RTC) has formed the Scene Generation Development Center (SGDC) to support the Department of Defense (DoD) open source EO/IR Scene Generation initiative for real-time hardware-in-the-loop and all-digital simulation. Various branches of the DoD have invested significant resources in the development of advanced scene and target signature generation codes. The SGDC goal is to maintain unlimited government rights and controlled access to government open source scene generation and signature codes. In addition, the SGDC provides development support to a multi-service community of test and evaluation (T&E) users, developers, and integrators in a collaborative environment. The SGDC has leveraged the DoD Defense Information Systems Agency (DISA) ProjectForge (https://Project.Forge.mil) which provides a collaborative development and distribution environment for the DoD community. The SGDC will develop and maintain several codes for tactical and strategic simulation, such as the Joint Signature Image Generator (JSIG), the Multi-spectral Advanced Volumetric Real-time Imaging Compositor (MAVRIC), and Office of the Secretary of Defense (OSD) Test and Evaluation Science and Technology (T&E/S&T) thermal modeling and atmospherics packages, such as EOView, CHARM, and STAR. Other utility packages included are the ContinuumCore for real-time messaging and data management and IGStudio for run-time visualization and scenario generation.

  11. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    PubMed

    Zhang, Ai-bing; Feng, Jie; Ward, Robert D; Wan, Ping; Gao, Qiang; Wu, Jun; Zhao, Wei-zhong

    2012-01-01

    Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI) region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS) genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF) to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish) and two representing non-coding ITS barcodes (rust fungi and brown algae). Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ) and Maximum likelihood (ML) methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI) of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40%) for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37%) for 1094 brown algae queries, both using ITS barcodes.

  12. Role of defense/stress-related marker genes, proteins and secondary metabolites in defining rice self-defense mechanisms.

    PubMed

    Jwa, Nam-Soo; Agrawal, Ganesh Kumar; Tamogami, Shigeru; Yonekura, Masami; Han, Oksoo; Iwahashi, Hitoshi; Rakwal, Randeep

    2006-01-01

    Rice, a first cereal crop whose draft genome sequence from two subspecies (japonica-type cv. Nipponbare and indica-type 93-11) was available in 2002, along with its almost complete genome sequence in 2005, has drawn the attention of researchers worldwide because of its immense impact on human existence. One of the most critical research areas in rice is to discern the self-defense mechanism(s), an innate property of all living organisms. The last few decades have seen scattered research into rice responses to diverse environmental stimuli and stress factors. Our understanding on rice self-defense mechanism has increased considerably with accelerated research during recent years mainly due to identification and characterization of several defense/stress-related components, genes, proteins and secondary metabolites. As these identified components have been used to study the defense/stress pathways, their compilation in this review will undoubtedly help rice (and others) researchers to effectively use them as a potential marker for better understanding, and ultimately, in defining rice (and plant) self-defense response pathways.

  13. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 15 2013-04-01 2013-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification number...

  14. 26 CFR 31.6011(b)-1 - Employers' identification numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 15 2014-04-01 2014-04-01 false Employers' identification numbers. 31.6011(b)-1... Subtitle F, Internal Revenue Code of 1954) § 31.6011(b)-1 Employers' identification numbers. (a... Insurance Contributions Act, but who prior to such day neither has been assigned an identification number...

  15. Prompt Radiation Protection Factors

    DTIC Science & Technology

    2018-02-01

    dimensional Monte-Carlo radiation transport code MCNP (Monte Carlo N-Particle) and the evaluation of the protection factors (ratio of dose in the open to...radiation was performed using the three dimensional Monte- Carlo radiation transport code MCNP (Monte Carlo N-Particle) and the evaluation of the protection...by detonation of a nuclear device have placed renewed emphasis on evaluation of the consequences in case of such an event. The Defense Threat

  16. Using Large Signal Code TESLA for Wide Band Klystron Simulations

    DTIC Science & Technology

    2006-04-01

    tuning procedure TESLA simulates of high power klystron [3]. accurately actual eigenmodes of the structure as a solution Wide band klystrons very often...on band klystrons with two-gap two-mode resonators. The decomposition of simulation region into an external results of TESLA simulations for NRL S ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP022454 TITLE: Using Large Signal Code TESLA for Wide Band Klystron

  17. An Analysis of Defense Information and Information Technology Articles: A Sixteen-Year Perspective

    DTIC Science & Technology

    2009-03-01

    exploratory,” or “subjective” ( Denzin & Lincoln , 2000). Existing Research This research is based on content analysis methodologies utilized by Carter...same codes ( Denzin & Lincoln , 2000). Different analysts should code the same text in a similar manner (Weber, 1990). Typically, researchers compute...chosen. Krippendorf recommends an agreement level of at least .70 (Krippendorff, 2004). Some scholars use a cut-off rate of .80 ( Denzin & Lincoln

  18. Defense Acquisition Workforce: Better Identification, Development, and Oversight Needed for Personnel Involved in Acquiring Services

    DTIC Science & Technology

    2011-09-01

    suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway...maintenance or operations support for a missile range to grass cutting, and many things in between. According to the Defense Science Board, buying...may be found on the last Belva M. Martin page of this report. Staff acknowledgements are listed in appendix VII. t Director, Acquisition and

  19. Surface Effect Takeoff and Landing System (SETOLS)

    DTIC Science & Technology

    1974-04-01

    State-of-the-Art 33 4. Program Tranisfer ~34 5. Future Research 34 6. Current Organizational Contacts and Identification 36 I REFE~RENCES 37 DEFENSE...ability to taxi over water, mud, low tree stumps, and empty and water-filled ditches. The flight tests indicated no significant changes in the...flight Lested from hard--surface runways, turf, water, snow, and fine sand. The aircraft also demonstrated the ability to taxi across mud, low tree

  20. The Politics of Defence Budgeting: A Study of Organisation and Resource Allocation in the United Kingdom and the United States,

    DTIC Science & Technology

    1983-01-01

    fourth responsible for guided weapons and electronics across-the-board. Each controller would be an accounting officer directly responsible to... electronics . Thereafter, as Hastie Smith says, "the identification of the systems controllers with their Service boards [the committees corporately...COMM. COMD. ASST SECDEF CNTR & INTEL) (HEALTH AFFAIRS) ASST TO THE SECDEF (ATOMIC ENERGY ) R DEFENSE LLIGENCE SE AGENCIES DEESEDFES)EFENSE DEFENSE

  1. IRIG Serial Time Code Formats

    DTIC Science & Technology

    2016-08-01

    codes contain control functions (CFs) that are reserved for encoding various controls, identification, and other special- purpose functions. Time...set of CF bits for the encoding of various control, identification, and other special- purpose functions. The control bits may be programmed in any... recycles yearly. • There are 18 CFs occur between position identifiers P6 and P8. Any CF bit or combination of bits can be programmed to read a

  2. Self-Defense by Any Other Name is Still Self-Defense

    DTIC Science & Technology

    2003-04-01

    Unlimited D D15Th3WON STAT13ENT L YNANNOUNIPV 03 JUSMIICATION BY DISTIBUTON/T AVAILABILIT CODES DIST1ZDtmN AVAILABILI AQM SPECI~ALH DATE ACCMSIONED...homeport? When the invasion force enters another state’s sovereign waters ? Is it as simplistic as which side fired the first shot? 34 These rhetorical...States’ sovereignty in her territorial waters and even led to the occasional killing of Whereas armed vessels sailing under authority or pretence of

  3. 21 CFR 801.57 - Discontinuation of legacy FDA identification numbers assigned to devices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Discontinuation of legacy FDA identification... Device Identification § 801.57 Discontinuation of legacy FDA identification numbers assigned to devices... been assigned an FDA labeler code to facilitate use of NHRIC or NDC numbers may continue to use that...

  4. 32 CFR 536.27 - Identification of a proper claimant.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Transfer or assignment. (1) Under the Antiassignment Act (31 U.S.C. 3727) and Defense Finance and... benefit of creditors, corporate liquidations, consolidations, or reorganizations, and where title passes...

  5. Pacific Northwest ecoclass codes for seral and potential natural communities.

    Treesearch

    Frederick C. Hall

    1998-01-01

    Lists codes for identification of potential natural communities (plant association, habitat types), their seral status, and vegetation structure in and around the Pacific Northwest. Codes are a six-digit alphanumeric system using the first letter of tree species, life-form, seral status, and structure so that most codes can be directly interpreted. Seven appendices...

  6. Applying a Service-Oriented Architecture to Operational Flight Program Development

    DTIC Science & Technology

    2007-09-01

    using two Java 2 Enterprise Edition (J2EE) Web servers. The weapon models were accessed using a SUN Microsystems Java Web Services Development Pack...Oriented Architectures 22 CROSSTALK The Journal of Defense Software Engineering September 2007 tion, and Spring/ Hibernate to provide the data access...tion since a major coding effort was avoided. The majority of the effort was tweaking pre-existing Java source code and editing of eXtensible Markup

  7. Competitive region orientation code for palmprint verification and identification

    NASA Astrophysics Data System (ADS)

    Tang, Wenliang

    2015-11-01

    Orientation features of the palmprint have been widely investigated in coding-based palmprint-recognition methods. Conventional orientation-based coding methods usually used discrete filters to extract the orientation feature of palmprint. However, in real operations, the orientations of the filter usually are not consistent with the lines of the palmprint. We thus propose a competitive region orientation-based coding method. Furthermore, an effective weighted balance scheme is proposed to improve the accuracy of the extracted region orientation. Compared with conventional methods, the region orientation of the palmprint extracted using the proposed method can precisely and robustly describe the orientation feature of the palmprint. Extensive experiments on the baseline PolyU and multispectral palmprint databases are performed and the results show that the proposed method achieves a promising performance in comparison to conventional state-of-the-art orientation-based coding methods in both palmprint verification and identification.

  8. Phonological Coding Abilities: Identification of Impairments Related to Phonologically Based Reading Problems.

    ERIC Educational Resources Information Center

    Swank, Linda K.

    1994-01-01

    Relationships between phonological coding abilities and reading outcomes have implications for differential diagnosis of language-based reading problems. The theoretical construct of specific phonological coding ability is explained, including phonological encoding, phonological awareness and metaphonology, lexical access, working memory, and…

  9. Signal Prediction With Input Identification

    NASA Technical Reports Server (NTRS)

    Juang, Jer-Nan; Chen, Ya-Chin

    1999-01-01

    A novel coding technique is presented for signal prediction with applications including speech coding, system identification, and estimation of input excitation. The approach is based on the blind equalization method for speech signal processing in conjunction with the geometric subspace projection theory to formulate the basic prediction equation. The speech-coding problem is often divided into two parts, a linear prediction model and excitation input. The parameter coefficients of the linear predictor and the input excitation are solved simultaneously and recursively by a conventional recursive least-squares algorithm. The excitation input is computed by coding all possible outcomes into a binary codebook. The coefficients of the linear predictor and excitation, and the index of the codebook can then be used to represent the signal. In addition, a variable-frame concept is proposed to block the same excitation signal in sequence in order to reduce the storage size and increase the transmission rate. The results of this work can be easily extended to the problem of disturbance identification. The basic principles are outlined in this report and differences from other existing methods are discussed. Simulations are included to demonstrate the proposed method.

  10. Repeated Evolution of the Pyrrolizidine Alkaloid–Mediated Defense System in Separate Angiosperm LineagesW⃞

    PubMed Central

    Reimann, Andreas; Nurhayati, Niknik; Backenköhler, Anita; Ober, Dietrich

    2004-01-01

    Species of several unrelated families within the angiosperms are able to constitutively produce pyrrolizidine alkaloids as a defense against herbivores. In pyrrolizidine alkaloid (PA) biosynthesis, homospermidine synthase (HSS) catalyzes the first specific step. HSS was recruited during angiosperm evolution from deoxyhypusine synthase (DHS), an enzyme involved in the posttranslational activation of eukaryotic initiation factor 5A. Phylogenetic analysis of 23 cDNA sequences coding for HSS and DHS of various angiosperm species revealed at least four independent recruitments of HSS from DHS: one within the Boraginaceae, one within the monocots, and two within the Asteraceae family. Furthermore, sequence analyses indicated elevated substitution rates within HSS-coding sequences after each gene duplication, with an increased level of nonsynonymous mutations. However, the contradiction between the polyphyletic origin of the first enzyme in PA biosynthesis and the structural identity of the final biosynthetic PA products needs clarification. PMID:15466410

  11. Angiostrongylus cantonensis: identification and characterization of microRNAs in male and female adults.

    PubMed

    Chen, Mu-Xin; Ai, Lin; Xu, Min-Jun; Zhang, Ren-Li; Chen, Shao-Hong; Zhang, Yong-Nian; Guo, Jian; Cai, Yu-Chun; Tian, Li-Guang; Zhang, Ling-Ling; Zhu, Xing-Quan; Chen, Jia-Xu

    2011-06-01

    Angiostrongylus cantonensis causes eosinophilic meningitis and eosinophilic pleocytosis in humans and is of significant socio-economic importance globally. microRNAs (miRNAs) are endogenous small non-coding RNAs that play crucial roles in gene expression regulation, cellular function and defense, homeostasis and pathogenesis. They have been identified in a diverse range of organisms. The objective of this study was to determine and characterize miRNAs of female and male adults of A. cantonensis by Solexa deep sequencing. A total of 8,861,260 and 10,957,957 high quality reads with 20 and 23 conserved miRNAs were obtained in females and males, respectively. No new miRNA sequence was found. Nucleotide bias analysis showed that uracil was the prominent nucleotide, particularly at positions of 1, 10, 14, 17 and 22, approximately at the beginning, middle and the end of the conserved miRNAs. To our knowledge, this is the first report of miRNA profiles in A. cantonensis, which may represent a new platform for studying regulation of genes and their networks in A. cantonensis. Copyright © 2011 Elsevier Inc. All rights reserved.

  12. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  13. An implementation framework for the feedback of individual research results and incidental findings in research.

    PubMed

    Thorogood, Adrian; Joly, Yann; Knoppers, Bartha Maria; Nilsson, Tommy; Metrakos, Peter; Lazaris, Anthoula; Salman, Ayat

    2014-12-23

    This article outlines procedures for the feedback of individual research data to participants. This feedback framework was developed in the context of a personalized medicine research project in Canada. Researchers in this domain have an ethical obligation to return individual research results and/or material incidental findings that are clinically significant, valid and actionable to participants. Communication of individual research data must proceed in an ethical and efficient manner. Feedback involves three procedural steps: assessing the health relevance of a finding, re-identifying the affected participant, and communicating the finding. Re-identification requires researchers to break the code in place to protect participant identities. Coding systems replace personal identifiers with a numerical code. Double coding systems provide added privacy protection by separating research data from personal identifying data with a third "linkage" database. A trusted and independent intermediary, the "keyholder", controls access to this linkage database. Procedural guidelines for the return of individual research results and incidental findings are lacking. This article outlines a procedural framework for the three steps of feedback: assessment, re-identification, and communication. This framework clarifies the roles of the researcher, Research Ethics Board, and keyholder in the process. The framework also addresses challenges posed by coding systems. Breaking the code involves privacy risks and should only be carried out in clearly defined circumstances. Where a double coding system is used, the keyholder plays an important role in balancing the benefits of individual feedback with the privacy risks of re-identification. Feedback policies should explicitly outline procedures for the assessment of findings, and the re-identification and contact of participants. The responsibilities of researchers, the Research Ethics Board, and the keyholder must be clearly defined. We provide general guidelines for keyholders involved in feedback. We also recommend that Research Ethics Boards should not be directly involved in the assessment of individual findings. Hospitals should instead establish formal, interdisciplinary clinical advisory committees to help researchers determine whether or not an uncertain finding should be returned.

  14. Bar code-based pre-transfusion check in pre-operative autologous blood donation.

    PubMed

    Ohsaka, Akimichi; Furuta, Yoshiaki; Ohsawa, Toshiya; Kobayashi, Mitsue; Abe, Katsumi; Inada, Eiichi

    2010-10-01

    The objective of this study was to demonstrate the feasibility of a bar code-based identification system for the pre-transfusion check at the bedside in the setting of pre-operative autologous blood donation (PABD). Between July 2003 and December 2008 we determined the compliance rate and causes of failure of electronic bedside checking for PABD transfusion. A total of 5627 (9% of all transfusions) PABD units were administered without a single mistransfusion. The overall rate of compliance with electronic checking was 99%. The bar code-based identification system was applicable to the pre-transfusion check for PABD transfusion. Copyright © 2010 Elsevier Ltd. All rights reserved.

  15. CSTminer: a web tool for the identification of coding and noncoding conserved sequence tags through cross-species genome comparison

    PubMed Central

    Castrignanò, Tiziana; Canali, Alessandro; Grillo, Giorgio; Liuni, Sabino; Mignone, Flavio; Pesole, Graziano

    2004-01-01

    The identification and characterization of genome tracts that are highly conserved across species during evolution may contribute significantly to the functional annotation of whole-genome sequences. Indeed, such sequences are likely to correspond to known or unknown coding exons or regulatory motifs. Here, we present a web server implementing a previously developed algorithm that, by comparing user-submitted genome sequences, is able to identify statistically significant conserved blocks and assess their coding or noncoding nature through the measure of a coding potential score. The web tool, available at http://www.caspur.it/CSTminer/, is dynamically interconnected with the Ensembl genome resources and produces a graphical output showing a map of detected conserved sequences and annotated gene features. PMID:15215464

  16. [Organizational problems of disaster victim identification in mass casualties as exemplified by Tu 154-M and Airbus A310 passenger plane crashes].

    PubMed

    Volkov, A V; Kolkutin, V V; Klevno, V A; Shkol'nikov, B V; Kornienko, I V

    2008-01-01

    Managerial experience is described that was gained during the large-scale work on victim identification following mass casualties in the Tu 154-M and Airbus A310 passenger plane crashes. The authors emphasize the necessity to set up a specialized agency of constant readiness meeting modern requirements for the implementation of a system of measures for personality identification. This agency must incorporate relevant departments of the Ministries of Health, Defense, and Emergency Situations as well as investigative authorities and other organizations.

  17. Endogenous small RNAs and antibacterial immunity in plants.

    PubMed

    Jin, Hailing

    2008-08-06

    Small RNAs are non-coding regulatory RNA molecules that control gene expression by mediating mRNA degradation, translational inhibition, or chromatin modification. Virus-derived small RNAs induce silencing of viral RNAs and are essential for antiviral defense in both animal and plant systems. The role of host endogenous small RNAs on antibacterial immunity has only recently been recognized. Host disease resistance and defense responses are achieved by activation and repression of a large array of genes. Certain endogenous small RNAs in plants, including microRNAs (miRNAs) and small interfering RNAs (siRNAs), are induced or repressed in response to pathogen attack and subsequently regulate the expression of genes involved in disease resistance and defense responses by mediating transcriptional or post-transcriptional gene silencing. Thus, these small RNAs play an important role in gene expression reprogramming in plant disease resistance and defense responses. This review focuses on the recent findings of plant endogenous small RNAs in antibacterial immunity.

  18. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  19. The link between national security and biometrics

    NASA Astrophysics Data System (ADS)

    Etter, Delores M.

    2005-03-01

    National security today requires identification of people, things and activities. Biometrics plays an important role in the identification of people, and indirectly, in the identification of things and activities. Therefore, the development of technology and systems that provide faster and more accurate biometric identification is critical to the defense of our country. In addition, the development of a broad range of biometrics is necessary to provide the range of options needed to address flexible and adaptive adversaries. This paper will discuss the importance of a number of critical areas in the development of an environment to support biometrics, including research and development, biometric education, standards, pilot projects, and privacy assurance.

  20. Attachment style and defense mechanisms in parents who abuse their children.

    PubMed

    Cramer, Phebe; Kelly, Francis D

    2010-09-01

    Adult attachment style, defense mechanisms, and personal history of abuse was studied in a group of abusive parents. As a group, these parents made unusually high use of the defense of denial; this was especially true of those with a Fearful attachment style. However, the use of Identification was characteristic of those with a Preoccupied attachment style. Further, personal abuse history was related to adult attachment style. Those who reported having been abused as a child were less likely to have a Secure attachment style, and a history of physical or sexual abuse was associated with a Preoccupied style. In general, these findings support the deactivating/hyperactivating defensive theory of Mikulincer et al (Emotion Regulation in Couples and Families: Pathways to Dysfunction and Health. 2006; pp 77-99. Washington (WA): American Psychological Association).

  1. Countering MANPADS: study of new concepts and applications: part two

    NASA Astrophysics Data System (ADS)

    Maltese, Dominique; Vergnolle, Jean-François; Aragones, Julien; Renaudat, Mathieu

    2007-04-01

    The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of protecting systems (i.e. Directed Infra Red Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, identification, targeting and jamming capabilities to face MANPAD threats. Besides, Multiple Missiles attacks become more and more current scenarios to deal with. In this paper, a practical example of DIRCM systems under study at SAGEM DEFENSE & SECURITY Company is presented. The article is the continuation of a previous SPIE one. Self-protection solutions include built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Targets scenarios including multiple threats are considered to design systems architectures. In a first step, the article reminds the context, current and future threats (IR seekers of different generations...), and scenarios for system definition. Then, it focuses on potential self-protection systems under study at SAGEM DEFENSE & SECURITY Company. Different strategies including target identification, multi band laser and active imagery have been previously studied in order to design DIRCM System solutions. Thus, results of self-protection scenarios are provided for different MANPAD scenarios to highlight key problems to solve. Data have been obtained from simulation software modeling full DIRCM systems architectures on technical and operational scenarios (parametric studies).

  2. 42 CFR 433.37 - Reporting provider payments to Internal Revenue Service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification of providers by— (1) Social security number if— (i) The provider is in solo practice; or (ii) The... security number or employer identification number. ... identification number for all other providers. (c) Compliance with section 6041 of the Internal Revenue Code. The...

  3. DEFENSIVE SPIROKETALS FROM Asceles glaber (PHASMATODEA): ABSOLUTE CONFIGURATION AND EFFECTS ON ANTS AND MOSQUITOES

    PubMed Central

    DOSSEY, AARON T.; WHITAKER, JOHN M.; DANCEL, MARIA CRISTINA A.; VANDER MEER, ROBERT K.; BERNIER, ULRICH R.; GOTTARDO, MARCO; ROUSH, WILLIAM R.

    2012-01-01

    Insects are the largest and most diverse group of organisms on earth, with over 1,000,000 species identified to date. Stick insects (“walkingsticks” or “phasmids”, Order Phasmatodea) are well known for and name derived from their uncanny stereotypical use of camouflage as a primary line of defense from predation. However, many species also possess a potent chemical defense spray. Recently we discovered that the defensive spray of Asceles glaber contains spiroketals (confirmed major component: (2S,6R)-(−)(E)-2-methyl-1,7-dioxaspiro[5.5]undecane and tentative minor component: 2-ethyl-1,6-dioxaspiro[4.5]decane) and glucose. In this paper we 1) illustrate the identification of spiroketals and glucose in the defense spray of A. glaber using Nuclear Magnetic Resonance (NMR), Gas Chromatography/Mass Spectrometry (GC/MS), and comparison with a synthetic reference sample, 2) provide the elucidation of the absolute configuration of the major spiroketal in that defense spray and 3) demonstrate the effect of this compound and its enantiomer on both fire ants (Solenopsis invicta) and mosquitoes (Aedes aegypti). PMID:22976590

  4. 77 FR 76936 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-31

    ...; List of Subjects in 48 CFR Parts 201, 203, 204, 215, 219, 245, and 252 Government procurement. Manuel... clause 52.203-13, Contractor Code of Business Ethics and Conduct, is the DoD Office of Inspector General...

  5. A Technique for Machine-Aided Indexing

    ERIC Educational Resources Information Center

    Klingbiel, Paul H.

    1973-01-01

    The technique for machine-aided indexing developed at the Defense Documentation Center (DDC) is illustrated on a randomly chosen abstract. Additional text is provided in coded form so that the reader can more fully explore this technique. (2 references) (Author)

  6. A sacrificial millipede altruistically protects its swarm using a drone blood enzyme, mandelonitrile oxidase

    PubMed Central

    Ishida, Yuko; Kuwahara, Yasumasa; Dadashipour, Mohammad; Ina, Atsutoshi; Yamaguchi, Takuya; Morita, Masashi; Ichiki, Yayoi; Asano, Yasuhisa

    2016-01-01

    Soldiers of some eusocial insects exhibit an altruistic self-destructive defense behavior in emergency situations when attacked by large enemies. The swarm-forming invasive millipede, Chamberlinius hualienensis, which is not classified as eusocial animal, exudes irritant chemicals such as benzoyl cyanide as a defensive secretion. Although it has been thought that this defensive chemical was converted from mandelonitrile, identification of the biocatalyst has remained unidentified for 40 years. Here, we identify the novel blood enzyme, mandelonitrile oxidase (ChuaMOX), which stoichiometrically catalyzes oxygen consumption and synthesis of benzoyl cyanide and hydrogen peroxide from mandelonitrile. Interestingly the enzymatic activity is suppressed at a blood pH of 7, and the enzyme is segregated by membranes of defensive sacs from mandelonitrile which has a pH of 4.6, the optimum pH for ChuaMOX activity. In addition, strong body muscle contractions are necessary for de novo synthesis of benzoyl cyanide. We propose that, to protect its swarm, the sacrificial millipede also applies a self-destructive defense strategy—the endogenous rupturing of the defensive sacs to mix ChuaMOX and mandelonitrile at an optimum pH. Further study of defensive systems in primitive arthropods will pave the way to elucidate the evolution of altruistic defenses in the animal kingdom. PMID:27265180

  7. A sacrificial millipede altruistically protects its swarm using a drone blood enzyme, mandelonitrile oxidase.

    PubMed

    Ishida, Yuko; Kuwahara, Yasumasa; Dadashipour, Mohammad; Ina, Atsutoshi; Yamaguchi, Takuya; Morita, Masashi; Ichiki, Yayoi; Asano, Yasuhisa

    2016-06-06

    Soldiers of some eusocial insects exhibit an altruistic self-destructive defense behavior in emergency situations when attacked by large enemies. The swarm-forming invasive millipede, Chamberlinius hualienensis, which is not classified as eusocial animal, exudes irritant chemicals such as benzoyl cyanide as a defensive secretion. Although it has been thought that this defensive chemical was converted from mandelonitrile, identification of the biocatalyst has remained unidentified for 40 years. Here, we identify the novel blood enzyme, mandelonitrile oxidase (ChuaMOX), which stoichiometrically catalyzes oxygen consumption and synthesis of benzoyl cyanide and hydrogen peroxide from mandelonitrile. Interestingly the enzymatic activity is suppressed at a blood pH of 7, and the enzyme is segregated by membranes of defensive sacs from mandelonitrile which has a pH of 4.6, the optimum pH for ChuaMOX activity. In addition, strong body muscle contractions are necessary for de novo synthesis of benzoyl cyanide. We propose that, to protect its swarm, the sacrificial millipede also applies a self-destructive defense strategy-the endogenous rupturing of the defensive sacs to mix ChuaMOX and mandelonitrile at an optimum pH. Further study of defensive systems in primitive arthropods will pave the way to elucidate the evolution of altruistic defenses in the animal kingdom.

  8. Insights from human studies into the host defense against candidiasis.

    PubMed

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. DEVELOPMENT PLAN FOR THE CAUSAL ANALYSIS ...

    EPA Pesticide Factsheets

    The Causal Analysis/Diagnosis Decision Information System (CADDIS) is a web-based system that provides technical support for states, tribes and other users of the Office of Water's Stressor Identification Guidance. The Stressor Identification Guidance provides a rigorous and scientifically defensible method for determining the causes of biological impairments of aquatic ecosystems. It is being used by states as part of the TMDL process and is being applied to other impaired ecosystems such as Superfund sites. However, because of the complexity of causal relationships in ecosystems, and because the guidance includes a strength-of-evidence analysis which uses multiple causal considerations, the process is complex and information intensive. CADDIS helps users deal with that inherent complexity. Increasingly, the regulatory, remedial, and restoration actions taken to manage impaired environments are based on measurement and analysis of the biotic community. When an aquatic assemblage has been identified as impaired, an accurate and defensible assessment of the cause can help ensure that appropriate actions are taken. The U.S. EPA's Stressor Identification Guidance describes a methodology for identifying the most likely causes of observed impairments in aquatic systems. Stressor identification requires extensive knowledge of the mechanisms, symptoms, and stressor-response relationships for various specific stressors as well as the ability to use that knowledge in a

  10. LWIR hyperspectral imaging application and detection of chemical precursors

    NASA Astrophysics Data System (ADS)

    Lavoie, Hugo; Thériault, Jean-Marc; Bouffard, François; Puckrin, Eldon; Dubé, Denis

    2012-10-01

    Detection and identification of Toxic industrial chemicals (TICs) represent a major challenge to protect and sustain first responder and public security. In this context, passive Hyperspectral Imaging (HSI) is a promising technology for the standoff detection and identification of chemical vapors emanating from a distant location. To investigate this method, the Department of National Defense and Public Safety Canada have mandated Defense Research and Development Canada (DRDC) - Valcartier to develop and test Very Long Wave Infrared (VLWIR) HSI sensors for standoff detection. The initial effort was focused to address the standoff detection and identification of toxic industrial chemicals (TICs), surrogates and precursors. Sensors such as the Improved Compact ATmospheric Sounding Interferometer (iCATSI) and the Multi-option Differential Detection and Imaging Fourier Spectrometer (MoDDIFS) were developed for this application. This paper presents the sensor developments and preliminary results of standoff detection and identification of TICs and precursors. The iCATSI and MoDDIFS sensors are based on the optical differential Fourier-transform infrared (FTIR) radiometric technology and are able to detect, spectrally resolve and identify small leak at ranges in excess of 1 km. Results from a series of trials in asymmetric threat type scenarios are reported. These results serve to establish the potential of passive standoff HSI detection of TICs, precursors and surrogates.

  11. 27 CFR 555.109 - Identification of explosive materials.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (5) If licensed manufacturers or licensed importers desire to use a coding system and omit printed... this section, they must file with ATF a letterhead application displaying the coding that they plan to... proposed coding can be used. (d) Exceptions—(1) Blasting caps. Licensed manufacturers or licensed importers...

  12. Klebsiella Species Infections in the Department of the Navy [DoN] and Department of Defense [DoD]: Annual Report 2014

    DTIC Science & Technology

    2016-03-14

    microbiology data from MHS facilities were used to identify all Klebsiella spp. isolates. The isolates were matched to three databases: (1) HL7...Klebsiella species infections among DON and DOD beneficiaries. HL7 formatted microbiology data that originated from the Composite Health Care System...and inpatient isolates as determined by the Medical Expense and Performance Reporting System (MEPRS) codes in microbiology data. A MEPRS code

  13. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  14. The Emerging Shield. The Air Force and the Evolution of Continental Air Defense 1945-1960

    DTIC Science & Technology

    1991-01-01

    flight plans other than those reported to the Presque Isle site. No one blamed the pilots; they had reported their changes in flighit to Canadian flight...monitor stations. Communications between the stations and ADC’s Presque Isle radar site had failed, and the course changes were not identified in the...Identification Zone: 134 "Pregnant Goose": 20 GOC on coast of: 156 Presque Isle , Maine: 170-71 Northw st emergency air defense for: Project CHARLEs: 145

  15. Validation of ICD-9-CM coding algorithm for improved identification of hypoglycemia visits.

    PubMed

    Ginde, Adit A; Blanc, Phillip G; Lieberman, Rebecca M; Camargo, Carlos A

    2008-04-01

    Accurate identification of hypoglycemia cases by International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) codes will help to describe epidemiology, monitor trends, and propose interventions for this important complication in patients with diabetes. Prior hypoglycemia studies utilized incomplete search strategies and may be methodologically flawed. We sought to validate a new ICD-9-CM coding algorithm for accurate identification of hypoglycemia visits. This was a multicenter, retrospective cohort study using a structured medical record review at three academic emergency departments from July 1, 2005 to June 30, 2006. We prospectively derived a coding algorithm to identify hypoglycemia visits using ICD-9-CM codes (250.3, 250.8, 251.0, 251.1, 251.2, 270.3, 775.0, 775.6, and 962.3). We confirmed hypoglycemia cases by chart review identified by candidate ICD-9-CM codes during the study period. The case definition for hypoglycemia was documented blood glucose 3.9 mmol/l or emergency physician charted diagnosis of hypoglycemia. We evaluated individual components and calculated the positive predictive value. We reviewed 636 charts identified by the candidate ICD-9-CM codes and confirmed 436 (64%) cases of hypoglycemia by chart review. Diabetes with other specified manifestations (250.8), often excluded in prior hypoglycemia analyses, identified 83% of hypoglycemia visits, and unspecified hypoglycemia (251.2) identified 13% of hypoglycemia visits. The absence of any predetermined co-diagnosis codes improved the positive predictive value of code 250.8 from 62% to 92%, while excluding only 10 (2%) true hypoglycemia visits. Although prior analyses included only the first-listed ICD-9 code, more than one-quarter of identified hypoglycemia visits were outside this primary diagnosis field. Overall, the proposed algorithm had 89% positive predictive value (95% confidence interval, 86-92) for detecting hypoglycemia visits. The proposed algorithm improves on prior strategies to identify hypoglycemia visits in administrative data sets and will enhance the ability to study the epidemiology and design interventions for this important complication of diabetes care.

  16. Long Non-Coding RNAs (lncRNAs) of Sea Cucumber: Large-Scale Prediction, Expression Profiling, Non-Coding Network Construction, and lncRNA-microRNA-Gene Interaction Analysis of lncRNAs in Apostichopus japonicus and Holothuria glaberrima During LPS Challenge and Radial Organ Complex Regeneration.

    PubMed

    Mu, Chuang; Wang, Ruijia; Li, Tianqi; Li, Yuqiang; Tian, Meilin; Jiao, Wenqian; Huang, Xiaoting; Zhang, Lingling; Hu, Xiaoli; Wang, Shi; Bao, Zhenmin

    2016-08-01

    Long non-coding RNA (lncRNA) structurally resembles mRNA but cannot be translated into protein. Although the systematic identification and characterization of lncRNAs have been increasingly reported in model species, information concerning non-model species is still lacking. Here, we report the first systematic identification and characterization of lncRNAs in two sea cucumber species: (1) Apostichopus japonicus during lipopolysaccharide (LPS) challenge and in heathy tissues and (2) Holothuria glaberrima during radial organ complex regeneration, using RNA-seq datasets and bioinformatics analysis. We identified A. japonicus and H. glaberrima lncRNAs that were differentially expressed during LPS challenge and radial organ complex regeneration, respectively. Notably, the predicted lncRNA-microRNA-gene trinities revealed that, in addition to targeting protein-coding transcripts, miRNAs might also target lncRNAs, thereby participating in a potential novel layer of regulatory interactions among non-coding RNA classes in echinoderms. Furthermore, the constructed coding-non-coding network implied the potential involvement of lncRNA-gene interactions during the regulation of several important genes (e.g., Toll-like receptor 1 [TLR1] and transglutaminase-1 [TGM1]) in response to LPS challenge and radial organ complex regeneration in sea cucumbers. Overall, this pioneer systematic identification, annotation, and characterization of lncRNAs in echinoderm pave the way for similar studies and future genetic, genomic, and evolutionary research in non-model species.

  17. 7 CFR 110.8 - Rules of practice.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... outline of the case or defense; (ii) The legal theories upon which the party will rely; (iii) A list of...) The exchange of copies of proposed exhibits; (vii) The identification of documents or matters of which...

  18. 7 CFR 110.8 - Rules of practice.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... outline of the case or defense; (ii) The legal theories upon which the party will rely; (iii) A list of...) The exchange of copies of proposed exhibits; (vii) The identification of documents or matters of which...

  19. 7 CFR 110.8 - Rules of practice.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... outline of the case or defense; (ii) The legal theories upon which the party will rely; (iii) A list of...) The exchange of copies of proposed exhibits; (vii) The identification of documents or matters of which...

  20. 7 CFR 110.8 - Rules of practice.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... outline of the case or defense; (ii) The legal theories upon which the party will rely; (iii) A list of...) The exchange of copies of proposed exhibits; (vii) The identification of documents or matters of which...

  1. 7 CFR 110.8 - Rules of practice.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... outline of the case or defense; (ii) The legal theories upon which the party will rely; (iii) A list of...) The exchange of copies of proposed exhibits; (vii) The identification of documents or matters of which...

  2. Identification, characterization and expression analysis of pigeonpea miRNAs in response to Fusarium wilt.

    PubMed

    Hussain, Khalid; Mungikar, Kanak; Kulkarni, Abhijeet; Kamble, Avinash

    2018-05-05

    Upon confrontation with unfavourable conditions, plants invoke a very complex set of biochemical and physiological reactions and alter gene expression patterns to combat the situations. MicroRNAs (miRNAs), a class of small non-coding RNA, contribute extensively in regulation of gene expression through translation inhibition or degradation of their target mRNAs during such conditions. Therefore, identification of miRNAs and their targets holds importance in understanding the regulatory networks triggered during stress. Structure and sequence similarity based in silico prediction of miRNAs in Cajanus cajan L. (Pigeonpea) draft genome sequence has been carried out earlier. These annotations also appear in related GenBank genome sequence entries. However, there are no reports available on context dependent miRNA expression and their targets in pigeonpea. Therefore, in the present study we addressed these questions computationally, using pigeonpea EST sequence information. We identified five novel pigeonpea miRNA precursors, their mature forms and targets. Interestingly, only one of these miRNAs (miR169i-3p) was identified earlier in draft genome sequence. We then validated expression of these miRNAs, experimentally. It was also observed that these miRNAs show differential expression patterns in response to Fusarium inoculation indicating their biotic stress responsive nature. Overall these results will help towards better understanding the regulatory network of defense during pigeonpea -pathogen interactions and role of miRNAs in the process. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. San Antonio MICC and POM Personnel Properly Awarded and Administered the POM UESC, but Improved Procedures and Guidance Are Needed

    DTIC Science & Technology

    2016-04-08

    Defense F r a u d , W a s t e & A b u s e For more information about whistleblower protection, please see the inside back cover. I N T E G R I T Y  E...POM Presidio of Monterey UESC Utility Energy Services Contract U.S.C. United States Code Whistleblower Protection U.S. Department of Defense The... Whistleblower Protection Enhancement Act of 2012 requires the Inspector General to designate a Whistleblower Protection Ombudsman to educate agency

  4. Dynamic Pressure Impulse for Near-Ideal and Non-Ideal Blast Waves -- Height of Burst Charts. Supplement

    DTIC Science & Technology

    1983-12-31

    Law 79-565), 22 April 1967. Other requests shall be referred to Director, Defense Nuclear Agency, Washington, DC 20305- 10101. THIS WORK WAS SPONSORED...JPUMNTNYNOTATIO This work was sponsored by the Defense Nuclear Agency under RDT&E RMSS Code 8344082466 Y99QAXSGO0039 H25900. I?. cosASI comR I& SUISCI TM...displacement which a vehicle exposed to a blast wave sufers can be used as a measure of the dynamic pressure impulse it receives. ,hat is, the vehicle

  5. A Cost-Effectiveness Analysis of Alternative Guided Media for the Backbone Cable Plant Portion of the Base Information Transfer System

    DTIC Science & Technology

    1991-03-01

    Applications, Garland STPM Press, 1979. 60 INITIAL DISTRIBUTION LIST 1 . Defense Technical Information Center 2 Cameron Station Alexandria, Virginia...AD-A242 688 V, III II lIlIIlI III I I NAVAL POSTGRADUATE SCHOOL Monterey, California D I; D ’C,ST...,, Z i 1 3 i THESIS A COST-EFFECTIVENESS...author and do not reflect the official policy or position of the Depart- ment of Defense or the US Government. 17 COSATI CODES 18 SUBJECT TERMS

  6. The Acquisition of Drugs and Biologics for Chemical and Biological Warfare Defense. Department of Defense Interactions with the Food and Drug Administration

    DTIC Science & Technology

    2003-01-01

    implementing regulations in the Code of Federal Regulations Title 21 ( 21 CFR). We searched the literature for relevant documents, especially for the type...public health activity at the end of the 19th century . The Bio- logics Control Act of 1902 authorizes their regulation under the PHSA.4 From the end of...regulations are codified 21 CFR: Preclinical studies must be conducted according to Good Labo- ratory Practices (GLPs); clinical studies in accordance with

  7. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  8. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  9. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  10. 40 CFR 62.8102 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Mist Emissions from Existing Sulfuric Acid Plants § 62.8102 Identification of plan. (a) [Reserved] (b... Plants” of Title 6 of the New York Code of Rules and Regulations effective May 10, 1984. (2) Supplemental information submitted on March 29, 1985. (c) Identification of sources. The plan includes the following plants...

  11. The re-identification risk of Canadians from longitudinal demographics

    PubMed Central

    2011-01-01

    Background The public is less willing to allow their personal health information to be disclosed for research purposes if they do not trust researchers and how researchers manage their data. However, the public is more comfortable with their data being used for research if the risk of re-identification is low. There are few studies on the risk of re-identification of Canadians from their basic demographics, and no studies on their risk from their longitudinal data. Our objective was to estimate the risk of re-identification from the basic cross-sectional and longitudinal demographics of Canadians. Methods Uniqueness is a common measure of re-identification risk. Demographic data on a 25% random sample of the population of Montreal were analyzed to estimate population uniqueness on postal code, date of birth, and gender as well as their generalizations, for periods ranging from 1 year to 11 years. Results Almost 98% of the population was unique on full postal code, date of birth and gender: these three variables are effectively a unique identifier for Montrealers. Uniqueness increased for longitudinal data. Considerable generalization was required to reach acceptably low uniqueness levels, especially for longitudinal data. Detailed guidelines and disclosure policies on how to ensure that the re-identification risk is low are provided. Conclusions A large percentage of Montreal residents are unique on basic demographics. For non-longitudinal data sets, the three character postal code, gender, and month/year of birth represent sufficiently low re-identification risk. Data custodians need to generalize their demographic information further for longitudinal data sets. PMID:21696636

  12. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  13. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  14. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  15. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  16. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  17. 75 FR 80426 - Defense Federal Acquisition Regulation Supplement; Reporting of Government-Furnished Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-22

    ... number. (vii) Medium code; how the data is recorded, e.g., barcode, contact memory button. (viii) Value, e.g., actual text or data string that is recorded in its human-readable form. (ix) Set (used to...

  18. 32 CFR 169a.8 - Inventory and review schedule (Report Control Symbol DD-P&L(A)).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (DIA) Shall be submitted to the Assistant Secretary of Defense Production and Logistics) (ASD(P&L... to this part provides the codes and explanations for functional areas and Appendix B to this part...

  19. 32 CFR 169a.8 - Inventory and review schedule (Report Control Symbol DD-P&L(A)).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (DIA) Shall be submitted to the Assistant Secretary of Defense Production and Logistics) (ASD(P&L... to this part provides the codes and explanations for functional areas and Appendix B to this part...

  20. Federal Logistics Information Systems. FLIS Procedures Manual. Document Identifier Code Input/Output Formats (Variable Length). Volume 9.

    DTIC Science & Technology

    1997-04-01

    DATA COLLABORATORS 0001N B NQ 8380 NUMBER OF DATA RECEIVERS 0001N B NQ 2533 AUTHORIZED ITEM IDENTIFICATION DATA COLLABORATOR CODE 0002 ,X B 03 18 TD...01 NC 8268 DATA ELEMENT TERMINATOR CODE 000iX VT 9505 TYPE OF SCREENING CODE 0001A 01 NC 8268 DATA ELEMENT TERMINATOR CODE 000iX VT 4690 OUTPUT DATA... 9505 TYPE OF SCREENING CODE 0001A 2 89 2910 REFERENCE NUMBER CATEGORY CODE (RNCC) 0001X 2 89 4780 REFERENCE NUMBER VARIATION CODE (RNVC) 0001 N 2 89

  1. Radio Frequency Identification Applications in Pavements

    DOT National Transportation Integrated Search

    2014-08-01

    Radio frequency identification (RFID) technology is widely used for inventory control, tool and material tracking, and other similar applications where line-of-sight optical bar codes are inconvenient or impractical. Several applications of RFID tech...

  2. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  3. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  4. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  5. 21 CFR 206.10 - Code imprint required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Code imprint required. 206.10 Section 206.10 Food...: GENERAL IMPRINTING OF SOLID ORAL DOSAGE FORM DRUG PRODUCTS FOR HUMAN USE § 206.10 Code imprint required... imprint that, in conjunction with the product's size, shape, and color, permits the unique identification...

  6. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 5 2013-07-01 2013-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  7. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 5 2014-07-01 2014-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  8. 29 CFR 1910.144 - Safety color code for marking physical hazards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 5 2012-07-01 2012-07-01 false Safety color code for marking physical hazards. 1910.144... § 1910.144 Safety color code for marking physical hazards. (a) Color identification—(1) Red. Red shall be the basic color for the identification of: (i) Fire protection equipment and apparatus. [Reserved] (ii...

  9. 40 CFR 52.824 - Original identification of plan section.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... rules, “Iowa Administrative Code,” effective February 22, 1995. This revision approves new definitions... definition updates. (E) “Iowa Administrative Code,” section 567-31.1, effective February 22, 1995. This rule... Quality and replaced the Iowa air pollution control statute which appeared as Chapter 136B of the Code of...

  10. 40 CFR 52.824 - Original identification of plan section.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... rules, “Iowa Administrative Code,” effective February 22, 1995. This revision approves new definitions... definition updates. (E) “Iowa Administrative Code,” section 567-31.1, effective February 22, 1995. This rule... Quality and replaced the Iowa air pollution control statute which appeared as Chapter 136B of the Code of...

  11. 40 CFR 52.824 - Original identification of plan section.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... rules, “Iowa Administrative Code,” effective February 22, 1995. This revision approves new definitions... definition updates. (E) “Iowa Administrative Code,” section 567-31.1, effective February 22, 1995. This rule... Quality and replaced the Iowa air pollution control statute which appeared as Chapter 136B of the Code of...

  12. 40 CFR 52.824 - Original identification of plan section.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... rules, “Iowa Administrative Code,” effective February 22, 1995. This revision approves new definitions... definition updates. (E) “Iowa Administrative Code,” section 567-31.1, effective February 22, 1995. This rule... Quality and replaced the Iowa air pollution control statute which appeared as Chapter 136B of the Code of...

  13. Identification of ICD Codes Suggestive of Child Maltreatment

    ERIC Educational Resources Information Center

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  14. 40 CFR 52.1570 - Identification of plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... regulation, section 7:1-3.1 of New Jersey Air Pollution Control Code, submitted on November 20, 1973, by the... regulation, section 7:27-2.1 of the New Jersey Air Pollution Control Code, submitted on November 19, 1975, by... and Prohibition of Air Pollution by Volatile Organic Substances,” New Jersey Administrative Code (N.J...

  15. 40 CFR 52.1570 - Identification of plan.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... regulation, section 7:1-3.1 of New Jersey Air Pollution Control Code, submitted on November 20, 1973, by the... regulation, section 7:27-2.1 of the New Jersey Air Pollution Control Code, submitted on November 19, 1975, by... and Prohibition of Air Pollution by Volatile Organic Substances,” New Jersey Administrative Code (N.J...

  16. 40 CFR 52.1570 - Identification of plan.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... regulation, section 7:1-3.1 of New Jersey Air Pollution Control Code, submitted on November 20, 1973, by the... regulation, section 7:27-2.1 of the New Jersey Air Pollution Control Code, submitted on November 19, 1975, by... and Prohibition of Air Pollution by Volatile Organic Substances,” New Jersey Administrative Code (N.J...

  17. Identification of common, unique and polymorphic microsatellites among 73 cyanobacterial genomes.

    PubMed

    Kabra, Ritika; Kapil, Aditi; Attarwala, Kherunnisa; Rai, Piyush Kant; Shanker, Asheesh

    2016-04-01

    Microsatellites also known as Simple Sequence Repeats are short tandem repeats of 1-6 nucleotides. These repeats are found in coding as well as non-coding regions of both prokaryotic and eukaryotic genomes and play a significant role in the study of gene regulation, genetic mapping, DNA fingerprinting and evolutionary studies. The availability of 73 complete genome sequences of cyanobacteria enabled us to mine and statistically analyze microsatellites in these genomes. The cyanobacterial microsatellites identified through bioinformatics analysis were stored in a user-friendly database named CyanoSat, which is an efficient data representation and query system designed using ASP.net. The information in CyanoSat comprises of perfect, imperfect and compound microsatellites found in coding, non-coding and coding-non-coding regions. Moreover, it contains PCR primers with 200 nucleotides long flanking region. The mined cyanobacterial microsatellites can be freely accessed at www.compubio.in/CyanoSat/home.aspx. In addition to this 82 polymorphic, 13,866 unique and 2390 common microsatellites were also detected. These microsatellites will be useful in strain identification and genetic diversity studies of cyanobacteria.

  18. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Logistics Agency (DLA) or Department of Defense (DoD) destinations. Shipments shall be tagged in accordance with 48 CFR clause 252.211-7006. Shipments to GSA Distribution Centers with final destinations to DLA...

  19. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Logistics Agency (DLA) or Department of Defense (DoD) destinations. Shipments shall be tagged in accordance with 48 CFR clause 252.211-7006. Shipments to GSA Distribution Centers with final destinations to DLA...

  20. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Logistics Agency (DLA) or Department of Defense (DoD) destinations. Shipments shall be tagged in accordance with 48 CFR clause 252.211-7006. Shipments to GSA Distribution Centers with final destinations to DLA...

  1. Potential interventions by government and industry to minimize violations of temporary flight restrictions

    DOT National Transportation Integrated Search

    2005-09-30

    This document enumerates interventions to reduce the frequency of restricted airspace violations, particularly those associated with temporary flight restrictions (TFRs) and air defense identification zones (ADIZs), by more effectively providing pilo...

  2. 76 FR 58142 - Defense Federal Acquisition Regulation Supplement; Passive Radio Frequency Identification (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-20

    .... (6) Agricultural products such as seeds, grains, or animal feed. Case means either a MIL-STD-129... pharmaceuticals, biologicals, and reagents--suppliers should limit the mixing of excluded and non-excluded...

  3. Practical guide to bar coding for patient medication safety.

    PubMed

    Neuenschwander, Mark; Cohen, Michael R; Vaida, Allen J; Patchett, Jeffrey A; Kelly, Jamie; Trohimovich, Barbara

    2003-04-15

    Bar coding for the medication administration step of the drug-use process is discussed. FDA will propose a rule in 2003 that would require bar-code labels on all human drugs and biologicals. Even with an FDA mandate, manufacturer procrastination and possible shifts in product availability are likely to slow progress. Such delays should not preclude health systems from adopting bar-code-enabled point-of-care (BPOC) systems to achieve gains in patient safety. Bar-code technology is a replacement for traditional keyboard data entry. The elements of bar coding are content, which determines the meaning; data format, which refers to the embedded data and symbology, which describes the "font" in which the machine-readable code is written. For a BPOC system to deliver an acceptable level of patient protection, the hospital must first establish reliable processes for a patient identification band, caregiver badge, and medication bar coding. Medications can have either drug-specific or patient-specific bar codes. Both varieties result in the desired code that supports patient's five rights of drug administration. When medications are not available from the manufacturer in immediate-container bar-coded packaging, other means of applying the bar code must be devised, including the use of repackaging equipment, overwrapping, manual bar coding, and outsourcing. Virtually all medications should be bar coded, the bar code on the label should be easily readable, and appropriate policies, procedures, and checks should be in place. Bar coding has the potential to be not only cost-effective but to produce a return on investment. By bar coding patient identification tags, caregiver badges, and immediate-container medications, health systems can substantially increase patient safety during medication administration.

  4. Comparative Genomics and Host Resistance against Infectious Diseases

    PubMed Central

    Qureshi, Salman T.; Skamene, Emil

    1999-01-01

    The large size and complexity of the human genome have limited the identification and functional characterization of components of the innate immune system that play a critical role in front-line defense against invading microorganisms. However, advances in genome analysis (including the development of comprehensive sets of informative genetic markers, improved physical mapping methods, and novel techniques for transcript identification) have reduced the obstacles to discovery of novel host resistance genes. Study of the genomic organization and content of widely divergent vertebrate species has shown a remarkable degree of evolutionary conservation and enables meaningful cross-species comparison and analysis of newly discovered genes. Application of comparative genomics to host resistance will rapidly expand our understanding of human immune defense by facilitating the translation of knowledge acquired through the study of model organisms. We review the rationale and resources for comparative genomic analysis and describe three examples of host resistance genes successfully identified by this approach. PMID:10081670

  5. Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. March-April 2008

    DTIC Science & Technology

    2008-04-01

    actions. However, if the effects synchronization division were not added to the lineup , just the teaming of joint fires division and IO division still...ADAFCO would be the liaison between the two Services who coordinates fires and facilitates track identification thus preventing fratricide. Joint...decisions to be made based on current air users versus planned control measures. Interoperability. Identification is a key feature that enables AC2 nodes

  6. Annual Review of Progress in Applied Computational Electromagnetics (4th), Held in Monterey, California on March 22-24, 1988

    DTIC Science & Technology

    1988-03-24

    1430-1445 BREAK 1445-1645 EM CODE USERS PANEL DISCUSSION. Chaired by Wkn Breakal of LLNL. User community sugqestlons on needed enhancemento for EM Codes...I -"FINITE DIFFERENCE & FINITE ELEMENT METHC"S" Moderator: David E . Stein The LTV Aerospace and Defense Company "A Firite Element Analysis of...conduction (resulting from charge movement) or displacement ( e ,0 E /Wt) terms. The sum of these current densities are referred to as the Maxwell current

  7. Defense Advanced Research Projects Agency (DARPA) Agent Markup Language Computer Aided Knowledge Acquisition

    DTIC Science & Technology

    2005-06-01

    34> <rdfs:subClassOf rdf:resource="#Condition"/> <rdfs:label>Economic Self -Sufficiency Class</rdfs:label> <cnd:categoryCode>C</cnd:categoryCode...cnd:index>3.3.4.1</cnd:index> <cnd:title>Economic Self -Sufficiency</cnd:title> <cnd:definition>The ability of a nation to...34#International_Economic_Position"/> <cnd:subCategory rdf:resource="# Self -Sufficiency_In_Food"/> <cnd:subCategory rdf:resource="# Self

  8. Agreement Between the United States Secret Service and the Department of Defense Concerning Protection of the President and Other Officials

    DTIC Science & Technology

    1986-09-17

    States Secret Service, in accordance with the responsibilities of the Secret Service as authorized by Section 3056, Title 18, U.S. Code; and Section 202 of...Title 3, U.S. Code. II. General Responsibilities Subject to the direction of the Secretary of the Treasury, the Secret Service is authorized to... the Secret Service, other than those persons or positions specifically identified under "II General Responsibilities" in this agreement, will be

  9. Admissibility of Evidence from Compelled Mental Examinations: MRE 302 and Beyond

    DTIC Science & Technology

    1988-04-01

    antisocial and paranoid personality disorder. He was subsequently apprehended for possession of marihuana and another assault. He was again referred to the...acts. Mental disease or defect does not otherwise constitute a defense. Uniform Code of Military Justice art . 50a, 10 U.S.C.A. § 859a (1987 Supp...UCMJ art . 5a (bW. 4 RCM 716k (3)(A). 5 "No problem in the drafting of a penal code presents larger intrinsic difficulties than that of determining when

  10. A Turnover Analysis for Department of Defense Physicians

    DTIC Science & Technology

    1988-06-01

    uRIIY CLASSIFiCArtON ZIR0,CLASSIiFVNIMiFr E5 SAME AS RPT DTI( U(SRS Unclassifi ed 22a NAME OF RESPONAiLk IND VL)UAL 220 TELEPHONE lnxiudt Aula Code...8217u.u oun e ed El Just ifloatil 16 Dist ribution/ S Avallability Codes Avail are or ist Specia! I - I TABLE OF CONTENTS a. I. INTRODUCTION AND...consideration when choosing between a military or civilian career it is not the only factor. Other factors such as benefits, education, esprit de corps

  11. Acquisition of a Thermophoresis Instrument for Molecular Association Thermodynamic Studies

    DTIC Science & Technology

    2015-05-20

    using NAMD.27 Crystallographic structures of C3d ( PDB code 1C3D) and C3d-CR2 ( PDB code 3OED) were obtained from the protein data bank ( PDB ).28 Missing...This project is funded by DTRA (Defense Threat Reduction Agency) and aims to develop new multienzyme structures for the controlled destruction of...enable detection. Pharmacophore models were developed based on known C3d-ligand interactions and information from computational analysis of structural

  12. CrossTalk: The Journal of Defense Software Engineering. Volume 25, Number 4, July/August 2012

    DTIC Science & Technology

    2012-08-01

    understand the interface between various code components. For example, consider a situation in which handwrit - ten code produced by one team generates an...conclusively say that a division by zero will not occur. The abstract interpretation concept can be generalized as a tool set that can be used to determine...word what makes a good manager, I would say decisiveness. You can use the fan- ciest computers to gather the numbers, but in the end you have to set

  13. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  14. Numerical approach to reference identification of Staphylococcus, Stomatococcus, and Micrococcus spp.

    PubMed

    Rhoden, D L; Hancock, G A; Miller, J M

    1993-03-01

    A numerical-code system for the reference identification of Staphylococcus species, Stomatococcus mucilaginosus, and Micrococcus species was established by using a selected panel of conventional biochemicals. Results from 824 cultures (289 eye isolate cultures, 147 reference strains, and 388 known control strains) were used to generate a list of 354 identification code numbers. Each six-digit code number was based on results from 18 conventional biochemical reactions. Seven milliliters of purple agar base with 1% sterile carbohydrate solution added was poured into 60-mm-diameter agar plates. All biochemical tests were inoculated with 1 drop of a heavy broth suspension, incubated at 35 degrees C, and read daily for 3 days. All reactions were read and interpreted by the method of Kloos et al. (G. A. Hebert, C. G. Crowder, G. A. Hancock, W. R. Jarvis, and C. Thornsberry, J. Clin. Microbiol. 26:1939-1949, 1988; W. E. Kloos and D. W. Lambe, Jr., P. 222-237, in A. Balows, W. J. Hansler, Jr., K. L. Herrmann, H. D. Isenberg, and H. J. Shadomy, ed., Manual of Clinical Microbiology, 5th ed., 1991). This modified reference identification method was 96 to 98% accurate and could have value in reference and public health laboratory settings.

  15. Intellectual system of identification of Arabic graphics

    NASA Astrophysics Data System (ADS)

    Abdoullayeva, Gulchin G.; Aliyev, Telman A.; Gurbanova, Nazakat G.

    2001-08-01

    The studies made by using the domain of graphic images allowed creating facilities of the artificial intelligence for letters, letter combinations etc. for various graphics and prints. The work proposes a system of recognition and identification of symbols of the Arabic graphics, which has its own specificity as compared to Latin and Cyrillic ones. The starting stage of the recognition and the identification is coding with further entry of information into a computer. Here the problem of entry is one of the essentials. For entry of a large volume of information in the unit of time a scanner is usually employed. Along with the scanner the authors suggest their elaboration of technical facilities for effective input and coding of the information. For refinement of symbols not identified from the scanner mostly for a small bulk of information the developed coding devices are used directly in the process of writing. The functional design of the software is elaborated on the basis of the heuristic model of the creative activity of a researcher and experts in the description and estimation of states of the weakly formalizable systems on the strength of the methods of identification and of selection of geometric features.

  16. 5 CFR 9.1 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Code, but does not include the Federal Bureau of Investigation, the Central Intelligence Agency, the Defense Intelligence Agency, the National Imagery and Mapping Agency, the National Security Agency, and... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE RULES WORKFORCE INFORMATION (RULE IX) § 9.1...

  17. 32 CFR 223.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...

  18. 32 CFR 223.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...

  19. 5 CFR 752.401 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... title 38, United States Code; and (9) An employee of the Government Printing Office. (d) Employees... employee of the Central Intelligence Agency or the General Accounting Office; (8) An employee of the..., the Defense Intelligence Agency, or an intelligence activity of a military department covered under...

  20. Suture Coding: A Novel Educational Guide for Suture Patterns.

    PubMed

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good approach to the construction of an infrastructure of surgical suture science and the facilitation of the understanding and learning of suture pattern techniques. Copyright © 2015 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  1. The Rationalization of Unethical Research: Revisionist Accounts of the Tuskegee Syphilis Study and the New Zealand "Unfortunate Experiment".

    PubMed

    Paul, Charlotte; Brookes, Barbara

    2015-10-01

    Two studies, widely condemned in the 1970s and 1980s-the Tuskegee study of men with untreated syphilis and the New Zealand study of women with untreated carcinoma in situ of the cervix-received new defenses in the 21st century. We noted remarkable similarities in both the studies and their defenses. Here we evaluate the scientific, political, and moral claims of the defenders. The scientific claims are largely based on incomplete or misinterpreted evidence and exaggeration of the uncertainties of science. The defenders' political arguments mistakenly claim that identity politics clouded the original critiques; in fact such politics opened the eyes of the public to exploitation. The moral defenses demonstrate an overreliance on codes of conduct and have implications for research ethics today.

  2. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6300 Implantable... identification code is used to access patient identity and corresponding health information stored in a database...

  3. 47 CFR 95.119 - Station identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... station identification is the call sign assigned to the GMRS station or system. (c) A unit number may be...: (1) Voice in the English language; or (2) International Morse code telegraphy. (e) A station need not...

  4. Literal readout of identification signals in Morse code

    NASA Technical Reports Server (NTRS)

    Meissner, C. W., Jr.

    1969-01-01

    Instrument, designed for mounting in aircraft instrument panels, decodes identification signals received in Morse from VOR or ILS transmitters as they are received and displays the literal equivalent. Without elaboration it cannot decode numbers.

  5. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  6. DoD Electronic Data Interchange (EDI) Convention: ASC X12 Transaction Set 836 Contract Award (Version 003010)

    DTIC Science & Technology

    1993-01-01

    upon designation of DoD Activity Address Code (DoDAAC) or other code coordinated with the value-added network (VAN). Mandatory ISA06 106 Interc.ange...coordinated with the value-added network (VAN). Non-DoD activities use identification code qualified by ISA05 and coordinated with the VAN. Mandatory...designation of DoD Activity Address Code (DoDAAC) or other code coordinated with the value-added network (VAN). Mandatory ISA08 107 Interchange Receiver

  7. Meteor Shower Identification and Characterization with Python

    NASA Technical Reports Server (NTRS)

    Moorhead, Althea

    2015-01-01

    The short development time associated with Python and the number of astronomical packages available have led to increased usage within NASA. The Meteoroid Environment Office in particular uses the Python language for a number of applications, including daily meteor shower activity reporting, searches for potential parent bodies of meteor showers, and short dynamical simulations. We present our development of a meteor shower identification code that identifies statistically significant groups of meteors on similar orbits. This code overcomes several challenging characteristics of meteor showers such as drastic differences in uncertainties between meteors and between the orbital elements of a single meteor, and the variation of shower characteristics such as duration with age or planetary perturbations. This code has been proven to successfully and quickly identify unusual meteor activity such as the 2014 kappa Cygnid outburst. We present our algorithm along with these successes and discuss our plans for further code development.

  8. Individually Identifiable Surface Acoustic Wave Sensors, Tags and Systems

    NASA Technical Reports Server (NTRS)

    Hines, Jacqueline H. (Inventor); Solie, Leland P. (Inventor); Tucker, Dana Y. G. (Inventor); Hines, Andrew T. (Inventor)

    2017-01-01

    A surface-launched acoustic wave sensor tag system for remotely sensing and/or providing identification information using sets of surface acoustic wave (SAW) sensor tag devices is characterized by acoustic wave device embodiments that include coding and other diversity techniques to produce groups of sensors that interact minimally, reducing or alleviating code collision problems typical of prior art coded SAW sensors and tags, and specific device embodiments of said coded SAW sensor tags and systems. These sensor/tag devices operate in a system which consists of one or more uniquely identifiable sensor/tag devices and a wireless interrogator. The sensor device incorporates an antenna for receiving incident RF energy and re-radiating the tag identification information and the sensor measured parameter(s). Since there is no power source in or connected to the sensor, it is a passive sensor. The device is wirelessly interrogated by the interrogator.

  9. 33 CFR Appendix C to Part 273 - Information Requirements for Aquatic Plant Control Program Environmental Impact Statements

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE AQUATIC PLANT CONTROL Pt.... History of infestation. Discuss obvious development as established. e. Criteria for identification of the...

  10. 33 CFR Appendix C to Part 273 - Information Requirements for Aquatic Plant Control Program Environmental Impact Statements

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE AQUATIC PLANT CONTROL Pt.... History of infestation. Discuss obvious development as established. e. Criteria for identification of the...

  11. 33 CFR Appendix C to Part 273 - Information Requirements for Aquatic Plant Control Program Environmental Impact Statements

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE AQUATIC PLANT CONTROL Pt.... History of infestation. Discuss obvious development as established. e. Criteria for identification of the...

  12. 33 CFR Appendix C to Part 273 - Information Requirements for Aquatic Plant Control Program Environmental Impact Statements

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE AQUATIC PLANT CONTROL Pt.... History of infestation. Discuss obvious development as established. e. Criteria for identification of the...

  13. Review of defense display research programs

    NASA Astrophysics Data System (ADS)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  14. Identification of beer-spoilage bacteria using matrix-assisted laser desorption/ionization time-of-flight mass spectrometry.

    PubMed

    Wieme, Anneleen D; Spitaels, Freek; Aerts, Maarten; De Bruyne, Katrien; Van Landschoot, Anita; Vandamme, Peter

    2014-08-18

    Applicability of matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) for identification of beer-spoilage bacteria was examined. To achieve this, an extensive identification database was constructed comprising more than 4200 mass spectra, including biological and technical replicates derived from 273 acetic acid bacteria (AAB) and lactic acid bacteria (LAB), covering a total of 52 species, grown on at least three growth media. Sequence analysis of protein coding genes was used to verify aberrant MALDI-TOF MS identification results and confirmed the earlier misidentification of 34 AAB and LAB strains. In total, 348 isolates were collected from culture media inoculated with 14 spoiled beer and brewery samples. Peak-based numerical analysis of MALDI-TOF MS spectra allowed a straightforward species identification of 327 (94.0%) isolates. The remaining isolates clustered separately and were assigned through sequence analysis of protein coding genes either to species not known as beer-spoilage bacteria, and thus not present in the database, or to novel AAB species. An alternative, classifier-based approach for the identification of spoilage bacteria was evaluated by combining the identification results obtained through peak-based cluster analysis and sequence analysis of protein coding genes as a standard. In total, 263 out of 348 isolates (75.6%) were correctly identified at species level and 24 isolates (6.9%) were misidentified. In addition, the identification results of 50 isolates (14.4%) were considered unreliable, and 11 isolates (3.2%) could not be identified. The present study demonstrated that MALDI-TOF MS is well-suited for the rapid, high-throughput and accurate identification of bacteria isolated from spoiled beer and brewery samples, which makes the technique appropriate for routine microbial quality control in the brewing industry. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. DNA barcode goes two-dimensions: DNA QR code web server.

    PubMed

    Liu, Chang; Shi, Linchun; Xu, Xiaolan; Li, Huan; Xing, Hang; Liang, Dong; Jiang, Kun; Pang, Xiaohui; Song, Jingyuan; Chen, Shilin

    2012-01-01

    The DNA barcoding technology uses a standard region of DNA sequence for species identification and discovery. At present, "DNA barcode" actually refers to DNA sequences, which are not amenable to information storage, recognition, and retrieval. Our aim is to identify the best symbology that can represent DNA barcode sequences in practical applications. A comprehensive set of sequences for five DNA barcode markers ITS2, rbcL, matK, psbA-trnH, and CO1 was used as the test data. Fifty-three different types of one-dimensional and ten two-dimensional barcode symbologies were compared based on different criteria, such as coding capacity, compression efficiency, and error detection ability. The quick response (QR) code was found to have the largest coding capacity and relatively high compression ratio. To facilitate the further usage of QR code-based DNA barcodes, a web server was developed and is accessible at http://qrfordna.dnsalias.org. The web server allows users to retrieve the QR code for a species of interests, convert a DNA sequence to and from a QR code, and perform species identification based on local and global sequence similarities. In summary, the first comprehensive evaluation of various barcode symbologies has been carried out. The QR code has been found to be the most appropriate symbology for DNA barcode sequences. A web server has also been constructed to allow biologists to utilize QR codes in practical DNA barcoding applications.

  16. Problems of Air Defense - and - Appedicies. Volumes I-III

    DTIC Science & Technology

    1951-08-01

    have tee3.essarily involved sctiutiny of isuch areas as Fleet problems ancd air defense of forward bases, the major emphasisuof the study has been on ...identification procedures, in the period until the first attack, is that taey be pePrf ect to anout one : case in .100,000 in dits ’not_- friend fromn...t oniust dietto its alternaite ai-rporlt. Mn any case , "’ilthin. a sotinterva1 ^4 C t týuv I (a pendimt on the speed of data Process~ig - erh-ns

  17. Identification and Validation of Established and Novel Biomarkers for Infections in Burns

    DTIC Science & Technology

    2015-10-01

    W81XWH-15-1-0143 (PI: Branski, Ludwik ) 07/01/15-06/30/19 5% Dept of Defense $384,660 " Growth Hormone Therapy for Muscle Regeneration...recombinant human growth hormone (rhGH) supplementation on body composition, such as lean body mass loss and bone mineral content, and to assess if...of 34 ***New award on 7/1/2015.*** W81XWH-15-1-0143 (PI: Branski, Ludwik ) 07/01/15-06/30/19 1% Dept of Defense $384,660 " Growth Hormone

  18. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, J.F.; Ng, L.C.

    1998-03-17

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching. 35 figs.

  19. Speech coding, reconstruction and recognition using acoustics and electromagnetic waves

    DOEpatents

    Holzrichter, John F.; Ng, Lawrence C.

    1998-01-01

    The use of EM radiation in conjunction with simultaneously recorded acoustic speech information enables a complete mathematical coding of acoustic speech. The methods include the forming of a feature vector for each pitch period of voiced speech and the forming of feature vectors for each time frame of unvoiced, as well as for combined voiced and unvoiced speech. The methods include how to deconvolve the speech excitation function from the acoustic speech output to describe the transfer function each time frame. The formation of feature vectors defining all acoustic speech units over well defined time frames can be used for purposes of speech coding, speech compression, speaker identification, language-of-speech identification, speech recognition, speech synthesis, speech translation, speech telephony, and speech teaching.

  20. New Opportunities of Low-Cost Photogrammetry for Culture Heritage Preservation

    NASA Astrophysics Data System (ADS)

    Shults, R.

    2017-05-01

    In the paper, the questions of using the technologies of low-cost photogrammetry in combination with the additional capabilities of modern smartphones are considered. The research was carried out on the example of documenting the historical construction of the II World War - the Kiev Fortified Region. Brief historical information about the object of research is given. The possibilities of using modern smartphones as measuring instruments are considered. To get high-quality results, the camera of the smartphone was calibrated. The calibration results were used in the future to perform 3D modeling of defense facilities. Photographing of three defense structures in a different state: destroyed, partially destroyed and operating was carried out. Based on the results of photography using code targets, 3D object models were constructed. To verify the accuracy of the 3D modelling, control measurements of the lines between the code targets at the objects were performed. The obtained results are satisfying, and the technology considered in the paper can be recommended for use in performing archaeological and historical studies.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meseda, Clement A.; Srinivasan, Kumar; Wise, Jasen

    Highlights: • Heme oxygenase-1 (HO-1) induction inhibited vaccinia virus infection of macrophages. • Reduced infectivity inversely correlated with increased expression of non-coding RNAs. • The regulation of HO-1 and ncRNAs suggests a novel host defense response against vaccinia virus infection. - Abstract: Small nuclear RNAs (snRNAs) are <200 nucleotide non-coding uridylate-rich RNAs. Although the functions of many snRNAs remain undetermined, a population of snRNAs is produced during the early phase of infection of cells by vaccinia virus. In the present study, we demonstrate a direct correlation between expression of the cytoprotective enzyme heme oxygenase-1 (HO-1), suppression of selective snRNA expression,more » and inhibition of vaccinia virus infection of macrophages. Hemin induced HO-1 expression, completely reversed virus-induced host snRNA expression, and suppressed vaccinia virus infection. This involvement of specific virus-induced snRNAs and associated gene clusters suggests a novel HO-1-dependent host-defense pathway in poxvirus infection.« less

  2. MMPI-2 validity, clinical and content scales, and the Fake Bad Scale for personal injury litigants claiming idiopathic environmental intolerance.

    PubMed

    Staudenmayer, Herman; Phillips, Scott

    2007-01-01

    Idiopathic environmental intolerance (IEI) is a descriptor for nonspecific complaints that are attributed to environmental exposure. The Minnesota Multiphasic Personality Inventory 2 (MMPI-2) was administered to 50 female and 20 male personal injury litigants alleging IEI. The validity scales indicated no overreporting of psychopathology. Half of the cases had elevated scores on validity scales suggesting defensiveness, and a large number had elevations on Fake Bad Scale (FBS) suggesting overreporting of unauthenticated symptoms. The average T-score profile for females was defined by the two-point code type 3-1 (Hysteria-Hypochondriasis), and the average T-score profile for males was defined by the three-point code type 3-1-2 (Hysteria, Hypochondriasis-Depression). On the content scales, Health Concerns (HEA) scale was significantly elevated. Idiopathic environmental intolerance litigants (a) are more defensive about expressing psychopathology, (b) express distress through somatization, (c) use a self-serving misrepresentation of exaggerated health concerns, and (d) may exaggerate unauthenticated symptoms suggesting malingering.

  3. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  4. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  5. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  6. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  7. MicroRNA regulated defense responses in Triticum aestivum L. during Puccinia graminis f.sp. tritici infection.

    PubMed

    Gupta, Om Prakash; Permar, Vipin; Koundal, Vikas; Singh, Uday Dhari; Praveen, Shelly

    2012-02-01

    Plants have evolved diverse mechanism to recognize pathogen attack and triggers defense responses. These defense responses alter host cellular function regulated by endogenous, small, non-coding miRNAs. To understand the mechanism of miRNAs regulated cellular functions during stem rust infection in wheat, we investigated eight different miRNAs viz. miR159, miR164, miR167, miR171, miR444, miR408, miR1129 and miR1138, involved in three different independent cellular defense response to infection. The investigation reveals that at the initiation of disease, accumulation of miRNAs might be playing a key role in hypersensitive response (HR) from host, which diminishes at the maturation stage. This suggests a possible host-fungal synergistic relation leading to susceptibility. Differential expression of these miRNAs in presence and absence of R gene provides a probable explanation of miRNA regulated R gene mediated independent pathways.

  8. Joint Forward Area Air Defense Test Program Definition.

    DTIC Science & Technology

    1984-03-30

    Visibility Conditions 23 CHAPTER 6. ACRONYMS LIST 24 . CHAPTER 7. REFERENCE 26 APPENDIX A. IDENTIFICATION ISSUE ANALAYSIS PLAN A-1 to A-17 B. C3...and kill ratios between single and multiple pass aircraft. A " multivariate analysis" will be performed to determine if there is any significant...killed will be compared for each set of identification procedure". A " multivariate analysis" will be performed on the number of hostile and friendly

  9. The disclosure of diagnosis codes can breach research participants' privacy.

    PubMed

    Loukides, Grigorios; Denny, Joshua C; Malin, Bradley

    2010-01-01

    De-identified clinical data in standardized form (eg, diagnosis codes), derived from electronic medical records, are increasingly combined with research data (eg, DNA sequences) and disseminated to enable scientific investigations. This study examines whether released data can be linked with identified clinical records that are accessible via various resources to jeopardize patients' anonymity, and the ability of popular privacy protection methodologies to prevent such an attack. The study experimentally evaluates the re-identification risk of a de-identified sample of Vanderbilt's patient records involved in a genome-wide association study. It also measures the level of protection from re-identification, and data utility, provided by suppression and generalization. Privacy protection is quantified using the probability of re-identifying a patient in a larger population through diagnosis codes. Data utility is measured at a dataset level, using the percentage of retained information, as well as its description, and at a patient level, using two metrics based on the difference between the distribution of Internal Classification of Disease (ICD) version 9 codes before and after applying privacy protection. More than 96% of 2800 patients' records are shown to be uniquely identified by their diagnosis codes with respect to a population of 1.2 million patients. Generalization is shown to reduce further the percentage of de-identified records by less than 2%, and over 99% of the three-digit ICD-9 codes need to be suppressed to prevent re-identification. Popular privacy protection methods are inadequate to deliver a sufficiently protected and useful result when sharing data derived from complex clinical systems. The development of alternative privacy protection models is thus required.

  10. Accuracy of Administrative Billing Codes to Detect Urinary Tract Infection Hospitalizations

    PubMed Central

    Hall, Matthew; Auger, Katherine A.; Hain, Paul D.; Jerardi, Karen E.; Myers, Angela L.; Rahman, Suraiya S.; Williams, Derek J.; Shah, Samir S.

    2011-01-01

    BACKGROUND: Hospital billing data are frequently used for quality measures and research, but the accuracy of the use of discharge codes to identify urinary tract infections (UTIs) is unknown. OBJECTIVE: To determine the accuracy of International Classification of Diseases, 9th revision (ICD-9) discharge codes to identify children hospitalized with UTIs. METHODS: This multicenter study conducted in 5 children's hospitals included children aged 3 days to 18 years who had been admitted to the hospital, undergone a urinalysis or urine culture, and discharged from the hospital. Data were obtained from the pediatric health information system database and medical record review. With the use of 2 gold-standard methods, the positive predictive value (PPV) was calculated for individual and combined UTI codes and for common UTI identification strategies. PPV was measured for all groupings for which the UTI code was the principal discharge diagnosis. RESULTS: There were 833 patients in the study. The PPV was 50.3% with the use of the gold standard of laboratory-confirmed UTIs but increased to 85% with provider confirmation. Restriction of the study cohort to patients with a principle diagnosis of UTI improved the PPV for laboratory-confirmed UTI (61.2%) and provider-confirmed UTI (93.2%), as well as the ability to benchmark performance. Other common identification strategies did not markedly affect the PPV. CONCLUSIONS: ICD-9 codes can be used to identify patients with UTIs but are most accurate when UTI is the principal discharge diagnosis. The identification strategies reported in this study can be used to improve the accuracy and applicability of benchmarking measures. PMID:21768320

  11. Towards a Research Agenda for Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less

  12. Mst1 shuts off cytosolic antiviral defense through IRF3 phosphorylation

    PubMed Central

    Meng, Fansen; Zhou, Ruyuan; Wu, Shiying; Zhang, Qian; Jin, Qiuheng; Zhou, Yao; Plouffe, Steven W.; Liu, Shengduo; Song, Hai; Xia, Zongping; Zhao, Bin; Ye, Sheng; Feng, Xin-Hua; Guan, Kun-Liang; Zou, Jian

    2016-01-01

    Cytosolic RNA/DNA sensing elicits primary defense against viral pathogens. Interferon regulatory factor 3 (IRF3), a key signal mediator/transcriptional factor of the antiviral-sensing pathway, is indispensible for interferon production and antiviral defense. However, how the status of IRF3 activation is controlled remains elusive. Through a functional screen of the human kinome, we found that mammalian sterile 20-like kinase 1 (Mst1), but not Mst2, profoundly inhibited cytosolic nucleic acid sensing. Mst1 associated with IRF3 and directly phosphorylated IRF3 at Thr75 and Thr253. This Mst1-mediated phosphorylation abolished activated IRF3 homodimerization, its occupancy on chromatin, and subsequent IRF3-mediated transcriptional responses. In addition, Mst1 also impeded virus-induced activation of TANK-binding kinase 1 (TBK1), further attenuating IRF3 activation. As a result, Mst1 depletion or ablation enabled an enhanced antiviral response and defense in cells and mice. Therefore, the identification of Mst1 as a novel physiological negative regulator of IRF3 activation provides mechanistic insights into innate antiviral defense and potential antiviral prevention strategies. PMID:27125670

  13. Oil and gas field code master list, 1993

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  14. Terrorism 2002-2005

    DTIC Science & Technology

    2005-01-01

    Nations Observer Badges, Defense Intelligence Agency identification, and a Federal Concealed Weapons Permit—to Edward Feltus , a member of the New...federal weap- ons charges, and in May 2004 were sentenced to 135 months and 57 months in federal custody, respectively. Feltus pled guilty to

  15. 78 FR 14272 - Department of Defense Task Force on the Care, Management, and Transition of Recovering Wounded...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    .... EDT each day. ADDRESSES: DoubleTree by Hilton Hotel Washington DC-Crystal City, 300 Army Navy Drive... submitted for an oral presentation by the person making the submission. Identification information must be...

  16. 78 FR 59918 - Department of Defense Task Force on the Care, Management, and Transition of Recovering Wounded...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-30

    .... EDT. ADDRESSES: DoubleTree by Hilton Hotel Washington DC-Crystal City, 300 Army Navy Drive, Arlington... submitted for an oral presentation by the person making the submission. Identification information must be...

  17. VizieR Online Data Catalog: Catalog of Suspected Nearby Young Stars (Riedel+, 2017)

    NASA Astrophysics Data System (ADS)

    Riedel, A. R.; Blunt, S. C.; Lambrides, E. L.; Rice, E. L.; Cruz, K. L.; Faherty, J. K.

    2018-04-01

    LocAting Constituent mEmbers In Nearby Groups (LACEwING) is a frequentist observation space kinematic moving group identification code. Using the spatial and kinematic information available about a target object (α, δ, Dist, μα, μδ, and γ), it determines the probability that the object is a member of each of the known nearby young moving groups (NYMGs). As with other moving group identification codes, LACEwING is capable of estimating memberships for stars with incomplete kinematic and spatial information. (2 data files).

  18. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    EPA Science Inventory

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  19. The effects of potato virus Y-derived virus small interfering RNAs of three biologically distinct strains on potato (Solanum tuberosum) transcriptome.

    PubMed

    Moyo, Lindani; Ramesh, Shunmugiah V; Kappagantu, Madhu; Mitter, Neena; Sathuvalli, Vidyasagar; Pappu, Hanu R

    2017-07-17

    Potato virus Y (PVY) is one of the most economically important pathogen of potato that is present as biologically distinct strains. The virus-derived small interfering RNAs (vsiRNAs) from potato cv. Russet Burbank individually infected with PVY-N, PVY-NTN and PVY-O strains were recently characterized. Plant defense RNA-silencing mechanisms deployed against viruses produce vsiRNAs to degrade homologous viral transcripts. Based on sequence complementarity, the vsiRNAs can potentially degrade host RNA transcripts raising the prospect of vsiRNAs as pathogenicity determinants in virus-host interactions. This study investigated the global effects of PVY vsiRNAs on the host potato transcriptome. The strain-specific vsiRNAs of PVY, expressed in high copy number, were analyzed in silico for their proclivity to target potato coding and non-coding RNAs using psRobot and psRNATarget algorithms. Functional annotation of target coding transcripts was carried out to predict physiological effects of the vsiRNAs on the potato cv. Russet Burbank. The downregulation of selected target coding transcripts was further validated using qRT-PCR. The vsiRNAs derived from biologically distinct strains of PVY displayed diversity in terms of absolute number, copy number and hotspots for siRNAs on their respective genomes. The vsiRNAs populations were derived with a high frequency from 6 K1, P1 and Hc-Pro for PVY-N, P1, Hc-Pro and P3 for PVY-NTN, and P1, 3' UTR and NIa for PVY-O genomic regions. The number of vsiRNAs that displayed interaction with potato coding transcripts and number of putative coding target transcripts were comparable between PVY-N and PVY-O, and were relatively higher for PVY-NTN. The most abundant target non-coding RNA transcripts for the strain specific PVY-derived vsiRNAs were found to be MIR821, 28S rRNA,18S rRNA, snoR71, tRNA-Met and U5. Functional annotation and qRT-PCR validation suggested that the vsiRNAs target genes involved in plant hormone signaling, genetic information processing, plant-pathogen interactions, plant defense and stress response processes in potato. The findings suggested that the PVY-derived vsiRNAs could act as a pathogenicity determinant and as a counter-defense strategy to host RNA silencing in PVY-potato interactions. The broad range of host genes targeted by PVY vsiRNAs in infected potato suggests a diverse role for vsiRNAs that includes suppression of host stress responses and developmental processes. The interactome scenario is the first report on the interaction between one of the most important Potyvirus genome-derived siRNAs and the potato transcripts.

  20. 14 CFR 13.21 - Military personnel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 1 2011-01-01 2011-01-01 false Military personnel. 13.21 Section 13.21 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PROCEDURAL RULES... civilian employee of the Department of Defense who is subject to the Uniform Code of Military Justice (10 U...

  1. 14 CFR 13.21 - Military personnel.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 1 2013-01-01 2013-01-01 false Military personnel. 13.21 Section 13.21 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PROCEDURAL RULES... civilian employee of the Department of Defense who is subject to the Uniform Code of Military Justice (10 U...

  2. 14 CFR 13.21 - Military personnel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 1 2012-01-01 2012-01-01 false Military personnel. 13.21 Section 13.21 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PROCEDURAL RULES... civilian employee of the Department of Defense who is subject to the Uniform Code of Military Justice (10 U...

  3. 32 CFR 842.16 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Definitions. 842.16 Section 842.16 National... CLAIMS Claims Under Article 139, Uniform Code of Military Justice (UCMJ) (10 U.S.C. 939) § 842.16 Definitions. (a) Appointing commander. The commander exercising special court-martial jurisdiction over the...

  4. 32 CFR 842.16 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Definitions. 842.16 Section 842.16 National... CLAIMS Claims Under Article 139, Uniform Code of Military Justice (UCMJ) (10 U.S.C. 939) § 842.16 Definitions. (a) Appointing commander. The commander exercising special court-martial jurisdiction over the...

  5. 32 CFR 842.16 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Definitions. 842.16 Section 842.16 National... CLAIMS Claims Under Article 139, Uniform Code of Military Justice (UCMJ) (10 U.S.C. 939) § 842.16 Definitions. (a) Appointing commander. The commander exercising special court-martial jurisdiction over the...

  6. 32 CFR 842.16 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Definitions. 842.16 Section 842.16 National... CLAIMS Claims Under Article 139, Uniform Code of Military Justice (UCMJ) (10 U.S.C. 939) § 842.16 Definitions. (a) Appointing commander. The commander exercising special court-martial jurisdiction over the...

  7. 32 CFR 842.16 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Definitions. 842.16 Section 842.16 National... CLAIMS Claims Under Article 139, Uniform Code of Military Justice (UCMJ) (10 U.S.C. 939) § 842.16 Definitions. (a) Appointing commander. The commander exercising special court-martial jurisdiction over the...

  8. Institute for Defense Analysis. Annual Report 1995.

    DTIC Science & Technology

    1995-01-01

    staff have been involved in the community-wide development of MPI as well as in its application to specific NSA problems. 35 Parallel Groebner ...Basis Code — Symbolic Computing on Parallel Machines The Groebner basis method is a set of algorithms for reformulating very complex algebraic expres

  9. Malnutrition: The Importance of Identification, Documentation, and Coding in the Acute Care Setting

    PubMed Central

    Kyle, Greg; Itsiopoulos, Catherine; Naunton, Mark; Luff, Narelle

    2016-01-01

    Malnutrition is a significant issue in the hospital setting. This cross-sectional, observational study determined the prevalence of malnutrition amongst 189 adult inpatients in a teaching hospital using the Patient-Generated Subjective Global Assessment tool and compared data to control groups for coding of malnutrition to determine the estimated unclaimed financial reimbursement associated with this comorbidity. Fifty-three percent of inpatients were classified as malnourished. Significant associations were found between malnutrition and increasing age, decreasing body mass index, and increased length of stay. Ninety-eight percent of malnourished patients were coded as malnourished in medical records. The results of the medical history audit of patients in control groups showed that between 0.9 and 5.4% of patients were coded as malnourished which is remarkably lower than the 52% of patients who were coded as malnourished from the point prevalence study data. This is most likely to be primarily due to lack of identification. The estimated unclaimed annual financial reimbursement due to undiagnosed or undocumented malnutrition based on the point prevalence study was AU$8,536,200. The study found that half the patients were malnourished, with older adults being particularly vulnerable. It is imperative that malnutrition is diagnosed and accurately documented and coded, so appropriate coding, funding reimbursement, and treatment can occur. PMID:27774317

  10. The Rationalization of Unethical Research: Revisionist Accounts of the Tuskegee Syphilis Study and the New Zealand “Unfortunate Experiment”

    PubMed Central

    Brookes, Barbara

    2015-01-01

    Two studies, widely condemned in the 1970s and 1980s—the Tuskegee study of men with untreated syphilis and the New Zealand study of women with untreated carcinoma in situ of the cervix—received new defenses in the 21st century. We noted remarkable similarities in both the studies and their defenses. Here we evaluate the scientific, political, and moral claims of the defenders. The scientific claims are largely based on incomplete or misinterpreted evidence and exaggeration of the uncertainties of science. The defenders’ political arguments mistakenly claim that identity politics clouded the original critiques; in fact such politics opened the eyes of the public to exploitation. The moral defenses demonstrate an overreliance on codes of conduct and have implications for research ethics today. PMID:26270295

  11. Raman scattering spectroscopy for explosives identification

    NASA Astrophysics Data System (ADS)

    Nagli, L.; Gaft, M.

    2007-04-01

    Real time detection and identification of explosives at a standoff distance is a major issue in efforts to develop defense against so-called Improvised Explosive Devices (IED). It is recognized that the only technique, which is potentially capable to standoff detection of minimal amounts of explosives is laser-based spectroscopy. LDS technique belongs to trace detection, namely to its micro-particles variety. We applied gated Raman and time-resolved luminescence spectroscopy for detection of main explosive materials, both factory and homemade. Raman system was developed and tested by LDS for field remote detection and identification of minimal amounts of explosives on relevant surfaces at a distance of up to 30 meters.

  12. Force Identification from Structural Response

    DTIC Science & Technology

    1999-12-01

    STUDENT AT (If applicable) AFIT/CIA Univ of New Mexico A 6c. ADDRESS (City, State, and ZIP Code ) 7b. ADDRESS (City, State, and ZIP Code ) Wright...ADDRESS (City, State, and ZIP Code ) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (h,,clude...FOR PUBLIC RELEASE IAW AFR 190-1 ERNEST A. HAYGOOD, 1st Lt, USAF Executive Officer, Civilian Institution Programs 17. COSATI CODES 18. SUBJECT TERMS

  13. ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite

    PubMed Central

    2010-01-01

    Background Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents, experimental techniques, and data analysis software. Using isotopically-coded ("heavy and light") versions of the crosslinker and cleavable crosslinking reagents is analytically advantageous for mass spectrometric applications and provides a "handle" that can be used to distinguish crosslinked peptides of different types, and to increase the confidence of the identification of the crosslinks. Results Here, we describe a program suite designed for the analysis of mass spectrometric data obtained with isotopically-coded cleavable crosslinkers. The suite contains three programs called: DX, DXDX, and DXMSMS. DX searches the mass spectra for the presence of ion signal doublets resulting from the light and heavy isotopic forms of the isotopically-coded crosslinking reagent used. DXDX searches for possible mass matches between cleaved and uncleaved isotopically-coded crosslinks based on the established chemistry of the cleavage reaction for a given crosslinking reagent. DXMSMS assigns the crosslinks to the known protein sequences, based on the isotopically-coded and un-coded MS/MS fragmentation data of uncleaved and cleaved peptide crosslinks. Conclusion The combination of these three programs, which are tailored to the analytical features of the specific isotopically-coded cleavable crosslinking reagents used, represents a powerful software tool for automated high-accuracy peptide crosslink identification. See: http://www.creativemolecules.com/CM_Software.htm PMID:20109223

  14. Coding Accuracy of the Ambulatory Data System: A Study of Coding Accuracy Within the General Internal Medicine Clinic, Walter Reed Army Medical Center

    DTIC Science & Technology

    1998-04-17

    concerns center around its ultimate goal to maximize appropriate care and minimize or eliminate inappropriate care (DoD UM Policy , 1996). While the...uasp cncd . GCK Tobacco taw disorder tr’O: Anemia ID: Acute bronchial ID: A«Jtt]ihiir<rtiK*i» 10: Acute refft iafection ID: Acute xinucm ID...181-187. Department of Defense (DoD) Ultilization Management Policy for the Direct Care System (Draft) (1996). Duncan, D.G. & Servais, C.S., (1996

  15. IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award 2016: Raytheon Integrated Defense Systems Design for Six Sigma Team

    DTIC Science & Technology

    2017-04-01

    notice for non -US Government use and distribution. External use: This material may be reproduced in its entirety, without modification, and freely...Combinatorial Design Methods 4 2.1 Identification of Significant Improvement Opportunity 4 2.2 Methodology Development 4 2.3 Piloting...11 3 Process Performance Modeling and Analysis 13 3.1 Identification of Significant Improvement Opportunity 13 3.2 Methodology Development 13 3.3

  16. 10 CFR 1017.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... minimum restrictions needed to protect the health and safety of the public or the common defense and... (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION General Overview § 1017.3 Policy. The Department of Energy (DOE) strives to make information publicly available to...

  17. 10 CFR 1017.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... minimum restrictions needed to protect the health and safety of the public or the common defense and... (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION General Overview § 1017.3 Policy. The Department of Energy (DOE) strives to make information publicly available to...

  18. 10 CFR 1017.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... minimum restrictions needed to protect the health and safety of the public or the common defense and... (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION General Overview § 1017.3 Policy. The Department of Energy (DOE) strives to make information publicly available to...

  19. 10 CFR 1017.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... minimum restrictions needed to protect the health and safety of the public or the common defense and... (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION General Overview § 1017.3 Policy. The Department of Energy (DOE) strives to make information publicly available to...

  20. 32 CFR 2001.22 - Derivative classification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Derivative classification. 2001.22 Section 2001... Identification and Markings § 2001.22 Derivative classification. (a) General. Information classified derivatively on the basis of source documents or classification guides shall bear all markings prescribed in...

Top