CARDS: A blueprint and environment for domain-specific software reuse
NASA Technical Reports Server (NTRS)
Wallnau, Kurt C.; Solderitsch, Anne Costa; Smotherman, Catherine
1992-01-01
CARDS (Central Archive for Reusable Defense Software) exploits advances in domain analysis and domain modeling to identify, specify, develop, archive, retrieve, understand, and reuse domain-specific software components. An important element of CARDS is to provide visibility into the domain model artifacts produced by, and services provided by, commercial computer-aided software engineering (CASE) technology. The use of commercial CASE technology is important to provide rich, robust support for the varied roles involved in a reuse process. We refer to this kind of use of knowledge representation systems as supporting 'knowledge-based integration.'
Technical Concept Document. Central Archive for Reusable Defense Software (CARDS)
1994-02-28
FeNbry 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive for...February 1994 INFORMAL TECHNICAL REPORT For The SOFTWARE TECHNOLOGY FOR ADAPTABLE, RELIABLE SYSTEMS (STARS) Technical Concept Document Central Archive...accordance with the DFARS Special Works Clause Developed by: This document, developed under the Software Technology for Adaptable, Reliable Systems
Acquisition Handbook - Update. Comprehensive Approach to Reusable Defensive Software (CARDS)
1994-03-25
designs, and implementation components (source code, test plans, procedures and results, and system/software documentation). This handbook provides a...activities where software components are acquired, evaluated, tested and sometimes modified. In addition to serving as a facility for the acquisition and...systems from such components [1]. Implementation components are at the lowest level and consist of: specifications; detailed designs; code, test
1994-02-28
improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are...and Franchisees . A Potential User is an individual who requests a Library Account. A User Recruit has been sent a CARDS Library Account Registration
1994-01-29
other processes, but that he arrived at his results in a different manner. Batory didn’t start with idioms; he performed a domain analysis and...abstracted idioms. Through domain analysis and domain modeling, new idioms can be found and the form of architecture can be the same. It was also questioned...Programming 5. Consensus Definition of Architecture 6. Inductive Analysis of Current Exemplars 7. VHDL (Bailor) 8. Ontological Structuring 3.3.3
2010-03-01
submenus and toolbar with icon buttons 4. The IFOTA shall conform to Defense Information Infrastructure Common Operating Environment ( DII COE) and...him my business card , but it might come in the package we request via AFRL). PSYOP Instructor IWST is now called IWT (??) SME MD MD Instructor...Engineering and Software Engineering CTA Cognitive Task Analysis DII COE Defense Information Infrastructure Common Operating Environment EJB Enterprise Java
Library Development Handbook. Central Archive for Reusable Defense Software (CARDS)
1993-10-29
features. This feature benefits the individual not versed in the terminology of the domain. When class requirements become part of the domain criteria, they... franchisee - Group to whom a franchise is granted. generic architecture - A collection of high-level paradigms and constraints that characterize the
Training Plan. Central Archive for Reusable Defense Software (CARDS)
1994-01-29
Modeling Software Reuse Technology: Feature Oriented Domain Analysis ( FODA ). SEI, Carnegie Mellon University, May 1992. 8. Component Provider’s...events to the services of the domain. 4. Feature Oriented Domain Analysis ( FODA ) [COHEN92] The FODA method produces feature models. Feature models provide...Architecture FODA Feature-Oriented Domain Analysis GOTS Government-Off-The-Shelf Pap A-49 STARS-VC-B003/001/00 29 imaty 1994 MS Master of Science NEC
1994-03-25
metrics [DISA93b]. " The Software Engineering Institute (SET) has developed a domain analysis process (Feature-Oriented Domain Analysis - FODA ) and is...and expresses the range of variability of these decisions. 3.2.2.3 Feature Oriented Domain Analysis Feature Oriented Domain Analysis ( FODA ) is a domain...documents created in this phase. From a purely profit-oriented business point of view, a company may develop its own analysis of a government or commercial
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-19
... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 213 RIN 0750-AH07 Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card[supreg] and Aircraft Ground Services (DFARS Case 2009-D019) AGENCY: Defense Acquisition Regulations System, Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 213 RIN 0750-AH07 Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card[supreg] and Aircraft Ground Services (DFARS Case 2009-D019) AGENCY: Defense Acquisition Regulations System, Department of...
Franchise Plan. Central Archive for Reusable Defense Software (CARDS)
1994-02-28
learned To achieve maximum benefit from a reuse infrastructure and change the way the organization is doing business, management has to make a long...Purpose For an organization to fully comprehend the benefits of reuse, and to gauge the magnitude of change required to achieve the benefits , information...3.4.3 Identify Technology Infrastructure Rationale In order for an organization to fully comprehend the benefits of reuse and to gauge the magnitude of
Command Center Library Model Document. Comprehensive Approach to Reusable Defense Software (CARDS)
1992-05-31
system, and functionality for specifying the layout of the document. 3.7.16.1 FrameMaker FrameMaker is a Commercial Off The Shelf (COTS) component...facilitating WYSIWYG creation of formatted reports with embedded graphics. FrameMaker is an advanced publishing tool that integrates word processing...available for the component FrameMaker : * Product evaluation reports in ASCII and postscript formats • Product assessment on line in model 0 Product
A microprocessor card software server to support the Quebec health microprocessor card project.
Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P
1995-01-01
The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.
Engineer’s Handbook. Central Archive for Reusable Defense Software (CARDS)
1994-02-28
benefit frc- this reuse effort? Reuse should be done for a domain rather than just for a program. " Identify relationships between domains to facilitate... benefits to the government and its contractors. " Help provide guidelines to enable domain managers to do a trade-off study on requirements, e.g., does...libraries, if desired or required. This can only occur where the government domain growth matches, or can benefit from, the inclusion or incorporation of the
77 FR 23631 - Defense Federal Acquisition Regulation Supplement; Technical Amendments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-20
..., 217, 242, 245, and 252 Government procurement. Mary Overstreet, Editor, Defense Acquisition... ``Deputy Assistant Secretary of the Army (Procurement)'' in alphabetical order; 0 b. In the Army list by... purchase, travel, and fuel card programs is available in the ``Department of Defense Government Charge Card...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
CARD games between virus and host get a new player.
Johnson, Cynthia L; Gale, Michael
2006-01-01
A growing family of cellular proteins encoding the caspase activation and recruitment domain (CARD) has a crucial role in immunity by sensing virus infection and signaling antiviral immune defenses. Four independent studies have identified a novel CARD-containing protein, variously called IPS-1, MAVS, VISA and Cardif, which is an essential signaling adaptor of the host defense mediating CARD-CARD interactions with retinoic acid inducible gene-I (RIG-I) and melanoma differentiation-associated gene 5 (MDAS), sensors of virus infection. Disruption of this novel signaling pathway by hepatitis C virus (HCV) might provide a foundation for viral persistence.
Engineering software development with HyperCard
NASA Technical Reports Server (NTRS)
Darko, Robert J.
1990-01-01
The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.
Pettit performs the EPIC Card Testing and X2R10 Software Transition
2011-12-28
ISS030-E-022574 (28 Dec. 2011) -- NASA astronaut Don Pettit (foreground),Expedition 30 flight engineer, performs the Enhanced Processor and Integrated Communications (EPIC) card testing and X2R10 software transition. The software transition work will include EPIC card testing and card installations, and monitoring of the upgraded Multiplexer/ Demultiplexer (MDM) computers. Dan Burbank, Expedition 30 commander, is setting up a camcorder in the background.
Pettit performs the EPIC Card Testing and X2R10 Software Transition
2011-12-28
ISS030-E-022575 (28 Dec. 2011) -- NASA astronaut Don Pettit (foreground),Expedition 30 flight engineer, performs the Enhanced Processor and Integrated Communications (EPIC) card testing and X2R10 software transition. The software transition work will include EPIC card testing and card installations, and monitoring of the upgraded Multiplexer/ Demultiplexer (MDM) computers. Dan Burbank, Expedition 30 commander, is setting up a camcorder in the background.
ERIC Educational Resources Information Center
Aufdenspring, Gary; Aufdenspring, Deborah
1992-01-01
Describes how HyperCard software can be used to direct students to databases, applications, and explanations in an online environment. The use of HyperCard with other software is discussed; using HyperCard to set up tutorials is explained; and limitations are addressed, including the amount of memory needed and the speed of the hardware. (LRW)
Médicarte software developed for the Quebec microprocessor health card project.
Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P
1995-01-01
The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated)
48 CFR 213.270 - Use of the Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Use of the Governmentwide commercial purchase card. 213.270 Section 213.270 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Actions at or Below the...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., unless other instructions have been received from the bidder. (2) Credit cards. Approved credit cards may be accepted by a DoD Component for payment. (i) Before initiating any credit card transactions, the... credit cards are announced in Comptroller of the Department of Defense (C, DoD) memoranda or in changes...
Code of Federal Regulations, 2014 CFR
2014-07-01
..., unless other instructions have been received from the bidder. (2) Credit cards. Approved credit cards may be accepted by a DoD Component for payment. (i) Before initiating any credit card transactions, the... credit cards are announced in Comptroller of the Department of Defense (C, DoD) memoranda or in changes...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., unless other instructions have been received from the bidder. (2) Credit cards. Approved credit cards may be accepted by a DoD Component for payment. (i) Before initiating any credit card transactions, the... credit cards are announced in Comptroller of the Department of Defense (C, DoD) memoranda or in changes...
NASA Astrophysics Data System (ADS)
Baudin, Veronique; Gomez-Diaz, Teresa
2013-04-01
The PLUME open platform (https://www.projet-plume.org) has as first goal to share competences and to value the knowledge of software experts within the French higher education and research communities. The project proposes in its platform the access to more than 380 index cards describing useful and economic software for this community, with open access to everybody. The second goal of PLUME focuses on to improve the visibility of software produced by research laboratories within the higher education and research communities. The "development-ESR" index cards briefly describe the main features of the software, including references to research publications associated to it. The platform counts more than 300 cards describing research software, where 89 cards have an English version. In this talk we describe the theme classification and the taxonomy of the index cards and the evolution with new themes added to the project. We will also focus on the organisation of PLUME as an open project and its interests in the promotion of free/open source software from and for research, contributing to the creation of a community of shared knowledge.
78 FR 23866 - Airworthiness Directives; the Boeing Company
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-23
... operational software in the cabin management system, and loading new software into the mass memory card. The...-200 and -300 series airplanes. The proposed AD would have required installing new operational software in the cabin management system, and loading new software into the mass memory card. Since the...
ERIC Educational Resources Information Center
Marcus, Stephen
1989-01-01
Presents the second article in a two-part series on HyperCard materials (computer software used to build structures that create patterns and connections) designed for English and language arts classes. Suggests assignments for use with early HyperCard software that can be adapted to a variety of nonverbal "stackware." (MM)
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Applicability. 161.2 Section 161.2 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY IDENTIFICATION (ID) CARDS FOR... Applicability. This part applies to: (a) The Office of the Secretary of Defense (OSD), the Military Departments...
Defense Automation Resources Management Manual
1988-09-01
Electronic Command Signals Programmer, Plugboard Programmers Punch, Card Punch, Paper Tape Reader, Character Reader-Generator, Time Cards Reader...Multiplexor-Shift Register Group Multiplier Panel Control, Plugboard Panel, Interconnection, Digital Computer Panel, Meter-Attenuator, Tape Recorder PC Cards...Perforator, Tape Plug-In Unit Potentiometer, Coefficient, Analog Computer Programmer, Plugboard Punch, Paper Tape Racks Reader, Time Code Reader
HyperCard and Other Macintosh Applications in Astronomy Education
NASA Astrophysics Data System (ADS)
Meisel, D.
1992-12-01
For the past six years, Macintosh computers have been used in introductory astronomy classes and laboratories with HyperCard and other commercial Macintosh software. I will review some of the available software that has been found particularly useful in undergraduate situations. The review will start with HyperCard (a programmable "index card" system) since it is a mature multimedia platform for the Macintosh. Experiences with the Voyager, the TS-24, MathCad, NIH Image, and other programs as used by the author and George Mumford (Tufts University) in courses and workshops will be described.
Research on the SIM card implementing functions of transport card
NASA Astrophysics Data System (ADS)
Li, Yi; Wang, Lin
2015-12-01
This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.
Human Computer Interface Design Criteria. Volume 1. User Interface Requirements
2010-03-19
Television tuners, including tuner cards for use in computers, shall be equipped with secondary audio program playback circuitry. (c) All training...Shelf CSS Cascading Style Sheets DII Defense Information Infrastructure DISA Defense Information Systems Agency DoD Department of Defense
Multi-axis control based on movement control cards in NC systems
NASA Astrophysics Data System (ADS)
Jiang, Tingbiao; Wei, Yunquan
2005-12-01
Today most movement control cards need special control software of topper computers and are only suitable for fixed-axis controls. Consequently, the number of axes which can be controlled is limited. Advanced manufacture technology develops at a very high speed, and that development brings forth. New requirements for movement control in mechanisms and electronics. This paper introduces products of the 5th generation of movement control cards, PMAC 2A-PC/104, made by the Delta Tau Company in the USA. Based on an analysis of PMAC 2A-PC/104, this paper first describes two aspects relevant to the hardware structure of movement control cards and the interrelated software of the topper computers. Then, two methods are presented for solving these problems. The first method is to set limit switches on the movement control cards; all of them can be used to control each moving axis. The second method is to program applied software with existing programming language (for example, VC ++, Visual Basic, Delphi, and so forth). This program is much easier to operate and expand by its users. By using a limit switch, users can choose different axes in movement control cards. Also, users can change parts of the parameters in the control software of topper computers to realize different control axes. Combining these 2 methods proves to be convenient for realizing multi-axis control in numerical control systems.
HyperCard--A Science Teaching Tool.
ERIC Educational Resources Information Center
Parker, Carol
1992-01-01
Discussion of new technological resources available for science instruction focuses on the use of the HyperCard software for the Macintosh to design customized materials. Topics addressed include general features of HyperCard, designing HyperCard stacks, graphics, and designing buttons (i.e., links for moving through the stacks). Several sample…
75 FR 52313 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
.... Title, Form, and OMB Number: Application for Department of Defense Access Card--Defense Biometric... also submit comments, identified by docket number and title, by the following method: Federal e...
Modelling and Implementation of Catalogue Cards Using FreeMarker
ERIC Educational Resources Information Center
Radjenovic, Jelen; Milosavljevic, Branko; Surla, Dusan
2009-01-01
Purpose: The purpose of this paper is to report on a study involving the specification (using Unified Modelling Language (UML) 2.0) of information requirements and implementation of the software components for generating catalogue cards. The implementation in a Java environment is developed using the FreeMarker software.…
Using Malware Analysis to Tailor SQUARE for Mobile Platforms
2014-11-01
identification data (SIM card and International Mobile Station Equipment Identity Number [IMEI]) to duplicate the phone in another device so that it can...applications. Key logging software can be used to steal passwords for financial websites and credit card information [Sophos 2014]. Data theft...for consumption. Apple provides a limited set of APIs and provides the iTunes store as the only ave- nue to install new software. All software
32 CFR 161.11 - Benefits for National Guard and Reserve Members of the Uniformed Services.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Benefits for National Guard and Reserve Members of the Uniformed Services. 161.11 Section 161.11 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY IDENTIFICATION (ID) CARDS FOR MEMBERS OF THE UNIFORMED SERVICES, THEIR...
Design of transnational mobile e-payment application based on SIM card
NASA Astrophysics Data System (ADS)
Qian, Tang; Zhen, Li
2018-05-01
Facing the stronger demands of transnational mobile communications and internet-based mobile wireless value-added services, the interconnection and interworking of multiple communication operators and their win-win cooperations become a crucial target in the new round of mobile economic development. Previous researches showed that mobile communications and value-add services are not only technical problems, but also more economic problems.we design a general oncard operating system based on SIM card that could be responsible for coordinating and distributing card hardware and software resources. These applications such as transnational mobile payment, consumption management and many other supplemented functions share the API interfaces, hardware and software resources provided by the operation system, although they are independent of each other. The layer structure of SIM card design not only greatly reduces the complexity of COS development, but also saves the most tense card resources and extends SIM cards applications.
NASA Technical Reports Server (NTRS)
Wennersten, Miriam; Banes, Vince; Boegner, Greg; Clagnett, Charles; Dougherty, Lamar; Edwards, Bernard; Roman, Joe; Bauer, Frank H. (Technical Monitor)
2001-01-01
NASA Goddard Space Flight Center has built an open architecture, 24 channel spaceflight Global Positioning System (GPS) receiver. The compact PCI PiVoT GPS receiver card is based on the Mitel/GEC Plessey Builder 2 board. PiVoT uses two Plessey 2021 correlators to allow tracking of up to 24 separate GPS SV's on unique channels. Its four front ends can support four independent antennas, making it a useful card for hosting GPS attitude determination algorithms. It has been built using space quality, radiation tolerant parts. The PiVoT card works at a lower signal to noise ratio than the original Builder 2 board. It also hosts an improved clock oscillator. The PiVoT software is based on the original Piessey Builder 2 software ported to the Linux operating system. The software is posix compliant and can be easily converted to other posix operating systems. The software is open source to anyone with a licensing agreement with Plessey. Additional tasks can be added to the software to support GPS science experiments or attitude determination algorithms. The next generation PiVoT receiver will be a single radiation hardened compact PCI card containing the microprocessor and the GPS receiver optimized for use above the GPS constellation.
HyperCard for Educators. An Introduction.
ERIC Educational Resources Information Center
Bull, Glen L.; Harris, Judi
This guide is designed to provide a quick introduction to the basic elements of HyperCard for teachers who are familiar with other computer applications but may not have worked with hypermedia applications; previous familiarity with HyperCard or with Macintosh computers is not necessary. It is noted that HyperCard is a software construction…
Insights from human studies into the host defense against candidiasis.
Filler, Scott G
2012-04-01
Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.
32 CFR 728.13 - Application for care.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Duty § 728.13 Application for care. Possession of an ID card (a green colored DD 2 (with letter suffix... 32 National Defense 5 2010-07-01 2010-07-01 false Application for care. 728.13 Section 728.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL MEDICAL AND DENTAL CARE...
NASA Technical Reports Server (NTRS)
Wennersten, Miriam Dvorak; Banes, Anthony Vince; Boegner, Gregory J.; Dougherty, Lamar; Edwards, Bernard L.; Roman, Joseph; Bauer, Frank H. (Technical Monitor)
2001-01-01
NASA Goddard Space Flight Center has built an open architecture, 24 channel space flight GPS receiver. The CompactPCI PiVoT GPS receiver card is based on the Mitel/GEC Plessey Builder-2 board. PiVoT uses two Plessey 2021 correlators to allow tracking of up to 24 separate GPS SV's on unique channels. Its four front ends can support four independent antennas, making it a useful card for hosting GPS attitude determination algorithms. It has been built using space quality, radiation tolerant parts. The PiVoT card will track a weaker signal than the original Builder 2 board. It also hosts an improved clock oscillator. The PiVoT software is based on the original Plessey Builder 2 software ported to the Linux operating system. The software is POSIX complaint and can easily be converted to other POSIX operating systems. The software is open source to anyone with a licensing agreement with Plessey. Additional tasks can be added to the software to support GPS science experiments or attitude determination algorithms. The next generation PiVoT receiver will be a single radiation hardened CompactPCI card containing the microprocessor and the GPS receiver optimized for use above the GPS constellation. PiVoT was flown successfully on a balloon in July, 2001, for its first non-simulated flight.
DigiSeis—A software component for digitizing seismic signals using the PC sound card
NASA Astrophysics Data System (ADS)
Amin Khan, Khalid; Akhter, Gulraiz; Ahmad, Zulfiqar
2012-06-01
An innovative software-based approach to develop an inexpensive experimental seismic recorder is presented. This approach requires no hardware as the built-in PC sound card is used for digitization of seismic signals. DigiSeis, an ActiveX component is developed to capture the digitized seismic signals from the sound card and deliver them to applications for processing and display. A seismic recorder application software SeisWave is developed over this component, which provides real-time monitoring and display of seismic events picked by a pair of external geophones. This recorder can be used as an educational aid for conducting seismic experiments. It can also be connected with suitable seismic sensors to record earthquakes. The software application and the ActiveX component are available for download. This component can be used to develop seismic recording applications according to user specific requirements.
Swamydas, Muthulekha; Rodriguez, Carlos A.; Lim, Jean K.; Mendez, Laura M.; Fink, Danielle L.; Hsu, Amy P.; Zhai, Bing; Karauzum, Hatice; Mikelis, Constantinos M.; Rose, Stacey R.; Ferre, Elise M. N.; Yockey, Lynne; Lemberg, Kimberly; Kuehn, Hye Sun; Rosenzweig, Sergio D.; Lin, Xin; Chittiboina, Prashant; Datta, Sandip K.; Belhorn, Thomas H.; Weimer, Eric T.; Hernandez, Michelle L.; Hohl, Tobias M.; Kuhns, Douglas B.; Lionakis, Michail S.
2015-01-01
Candida is the most common human fungal pathogen and causes systemic infections that require neutrophils for effective host defense. Humans deficient in the C-type lectin pathway adaptor protein CARD9 develop spontaneous fungal disease that targets the central nervous system (CNS). However, how CARD9 promotes protective antifungal immunity in the CNS remains unclear. Here, we show that a patient with CARD9 deficiency had impaired neutrophil accumulation and induction of neutrophil-recruiting CXC chemokines in the cerebrospinal fluid despite uncontrolled CNS Candida infection. We phenocopied the human susceptibility in Card9 -/- mice, which develop uncontrolled brain candidiasis with diminished neutrophil accumulation. The induction of neutrophil-recruiting CXC chemokines is significantly impaired in infected Card9 -/- brains, from both myeloid and resident glial cellular sources, whereas cell-intrinsic neutrophil chemotaxis is Card9-independent. Taken together, our data highlight the critical role of CARD9-dependent neutrophil trafficking into the CNS and provide novel insight into the CNS fungal susceptibility of CARD9-deficient humans. PMID:26679537
NASA Technical Reports Server (NTRS)
Cramer, K. Elliott; Syed, Hazari I.
1995-01-01
This user's manual describes the installation and operation of TIA, the Thermal-Imaging acquisition and processing Application, developed by the Nondestructive Evaluation Sciences Branch at NASA Langley Research Center, Hampton, Virginia. TIA is a user friendly graphical interface application for the Macintosh 2 and higher series computers. The software has been developed to interface with the Perceptics/Westinghouse Pixelpipe(TM) and PixelStore(TM) NuBus cards and the GW Instruments MacADIOS(TM) input-output (I/O) card for the Macintosh for imaging thermal data. The software is also capable of performing generic image-processing functions.
A Tour of the Stacks--HyperCard for Libraries.
ERIC Educational Resources Information Center
Ertel, Monica; Oros, Jane
1989-01-01
Description of HyperCard, a software package that runs on Macintosh microcomputers, focuses on its use in the Apple Computer, Inc., Library as a user guide to the library. Examples of screen displays are given, and a list of resources is included to help use and understand HyperCard more completely. (LRW)
The Potential Role of Drexon LaserCards in Optical Publishing.
ERIC Educational Resources Information Center
Schwerin, Julie B.
1985-01-01
Describes Drexon LaserCard (credit card size format holding two megabytes of digital data that can be recorded at factory or by information distributors) as a viable option to rotating optical media for distribution of computer software, technical manuals, periodicals, and other document applications, and projects its future in optical publishing.…
Supplemental Fingerprint Card Data (SFCD) for NIST Special Database 9
National Institute of Standards and Technology Data Gateway
Supplemental Fingerprint Card Data (SFCD) for NIST Special Database 9 (Web, free access) NIST Special Database 10 (Supplemental Fingerprint Card Data for Special Database 9 - 8-Bit Gray Scale Images) provides a larger sample of fingerprint patterns that have a low natural frequency of occurrence and transitional fingerprint classes in NIST Special Database 9. The software is the same code used with NIST Special Database 4 and 9. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.
LabVIEW Interface for PCI-SpaceWire Interface Card
NASA Technical Reports Server (NTRS)
Lux, James; Loya, Frank; Bachmann, Alex
2005-01-01
This software provides a LabView interface to the NT drivers for the PCISpaceWire card, which is a peripheral component interface (PCI) bus interface that conforms to the IEEE-1355/ SpaceWire standard. As SpaceWire grows in popularity, the ability to use SpaceWire links within LabVIEW will be important to electronic ground support equipment vendors. In addition, there is a need for a high-level LabVIEW interface to the low-level device- driver software supplied with the card. The LabVIEW virtual instrument (VI) provides graphical interfaces to support all (1) SpaceWire link functions, including message handling and routing; (2) monitoring as a passive tap using specialized hardware; and (3) low-level access to satellite mission-control subsystem functions. The software is supplied in a zip file that contains LabVIEW VI files, which provide various functions of the PCI-SpaceWire card, as well as higher-link-level functions. The VIs are suitably named according to the matching function names in the driver manual. A number of test programs also are provided to exercise various functions.
Martinez, Fernando; Chandler, Laura J.; Reisner, Barbara S.; Woods, Gail L.
2001-01-01
The performance of Vitek cards GPS105 with software version VTK-R07.01 for detection of oxacillin resistance in coagulase-negative staphylococci (CoNS) was compared to disk diffusion and PCR detection for mecA. The sensitivity and specificity of the Vitek GPS105 method were 97.6 and 85.5%, respectively. PMID:11574604
Evaluation of a New Patient Record System Using the Optical Card
Brown, J.H.U.; Vallbona, Carlos; Shoda, Junji; Albin, Jean
1989-01-01
A new form of patient record has been devised in which a laser imprinted card is coupled to a p.c. for data input and output. Entry of data is simple and recall of any datum requires only a keystroke. Any part of the data can be readily accessed through a software system which encompasses a variety of screens and menus to summarize and combine data. The complete system has been under test in a community health clinic and at NASA and results to date are satisfactory. Preliminary evaluation indicates that the system has no hardware problems, that the software is suitable for the purpose, that patients carry the card and return with it at succeeding visits, that physicians accept that card for a medical record and are pleased with the speed of access and the organization of the data.
Development of multichannel analyzer using sound card ADC for nuclear spectroscopy system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Maslina Mohd; Yussup, Nolida; Lombigit, Lojius
This paper describes the development of Multi-Channel Analyzer (MCA) using sound card analogue to digital converter (ADC) for nuclear spectroscopy system. The system was divided into a hardware module and a software module. Hardware module consist of detector NaI (Tl) 2” by 2”, Pulse Shaping Amplifier (PSA) and a build in ADC chip from readily available in any computers’ sound system. The software module is divided into two parts which are a pre-processing of raw digital input and the development of the MCA software. Band-pass filter and baseline stabilization and correction were implemented for the pre-processing. For the MCA development,more » the pulse height analysis method was used to process the signal before displaying it using histogram technique. The development and tested result for using the sound card as an MCA are discussed.« less
2011-04-30
fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase
Handbook for Implementing Agile in Department of Defense Information Technology Acquisition
2010-12-15
Wire-frame Mockup of iTunes Cover Flow Feature (source: http://www.balsamiq.com/products/mockups/examples#mytunez...programming. The JOPES customer was included early in the development process in order to understand requirements management (story cards ), observe...transition by teaching the new members Agile processes, such as story card development, refactoring, and pair programming. Additionally, the team worked to
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bharoto,; Suparno, Nadi; Putra, Edy Giri Rachman
In 2005, the main computer for data acquisition and control system of Small-angle Neutron Scattering (SANS) BATAN Spectrometer (SMARTer) was replaced since it halted to operate the spectrometer. According to this replacement, the new software for data acquisition and control system has been developed in-house. Visual Basic programming language is used in developing the software. In the last two years, many developments have been made both in the hardware and also the software to conduct the experiment is more effective and efficient. Lately, the previous motor controller card (ISA Card) was replaced with the programmable motor controller card (PCI Card)more » for driving one motor of position sensitive detector (PSD), eight motors of four collimators, and six motors of six pinhole discs. This new control system software makes all motors can be moved simultaneously, then it reduces significantly the consuming time of setting up the instrument before running the experiment. Along with that development, the new data acquisition software under MS Windows operating system is also developed to drive a beam stopper in X-Y directions as well as to read the equipment status such as position of the collimators and PSD, to acquire neutron counts on monitor and PSD detectors, and also to manage 12 samples position automatically. A timer object which is set in one second to read the equipment status via serial port of the computer (RS232C), and general purpose interface board (GPIB) for reading the total counts of each pixel of the PSD from histogram memory was used in this new software. The experiment result displayed in real time on the main window, and the data is saved in the special format for further data reduction and analysis. The new software has been implemented and performed for experiment using a preset count or preset time mode for absolute scattering intensity method.« less
NASA Astrophysics Data System (ADS)
Bharoto, Suparno, Nadi; Putra, Edy Giri Rachman
2015-04-01
In 2005, the main computer for data acquisition and control system of Small-angle Neutron Scattering (SANS) BATAN Spectrometer (SMARTer) was replaced since it halted to operate the spectrometer. According to this replacement, the new software for data acquisition and control system has been developed in-house. Visual Basic programming language is used in developing the software. In the last two years, many developments have been made both in the hardware and also the software to conduct the experiment is more effective and efficient. Lately, the previous motor controller card (ISA Card) was replaced with the programmable motor controller card (PCI Card) for driving one motor of position sensitive detector (PSD), eight motors of four collimators, and six motors of six pinhole discs. This new control system software makes all motors can be moved simultaneously, then it reduces significantly the consuming time of setting up the instrument before running the experiment. Along with that development, the new data acquisition software under MS Windows operating system is also developed to drive a beam stopper in X-Y directions as well as to read the equipment status such as position of the collimators and PSD, to acquire neutron counts on monitor and PSD detectors, and also to manage 12 samples position automatically. A timer object which is set in one second to read the equipment status via serial port of the computer (RS232C), and general purpose interface board (GPIB) for reading the total counts of each pixel of the PSD from histogram memory was used in this new software. The experiment result displayed in real time on the main window, and the data is saved in the special format for further data reduction and analysis. The new software has been implemented and performed for experiment using a preset count or preset time mode for absolute scattering intensity method.
Report of the Defense Science Board Task Force on Defense Biometrics
2007-03-01
certificates, crypto variables, and encoded biometric indices. The Department of Defense has invested prestige and resources in its Common Access Card (CAC...in turn, could be used to unlock an otherwise secret key or crypto variable which would support the remote authentication. A new key variable...The PSA for biometrics should commission development of appropriate threat model(s) and assign responsibility for maintaining currency of the model
A Low-Cost Part-Task Flight Training System: An Application of a Head Mounted Display
1990-12-01
architecture. The task at hand was to develop a software emulation libary that would emulate the function calls used within the Flight and Dog programs. This...represented in two hexadecimal digits for each color. The format of the packed long integer looks like aaggbbrr with each color value representing a...Western Digital ethernet card as the cheapest compatible card available. Good fortune arrived, as I was calling to order the card, I saw an unused card
SuperState: a computer program for the control of operant behavioral experimentation.
Zhang, Fuqiang
2006-09-15
Operant behavioral researches require precise control of experimental devices for delivering stimuli and monitoring behavioral responses. The author developed a software solution named SuperState for controlling hardware devices and running reinforcement schedules. The Microsoft Windows compatible software was written by use of an object-oriented programming language Borland Delphi 5.0, which has simplified the programming of the application. SuperState is a stand-alone easy-to-use green software, without the need for the experimenter to master any scripting languages. It features: (1) control of multiple operant cages running independent reinforcement schedules; (2) enough cage devices (16 digital inputs and 16 digital outputs for each cage) suitable for the need of most operant behavioral equipments; (3) control of most standard ISA-type digital interface cards including Med-Associates Super-port cards and a PCI-type card AC6412, and highly expandable to support other PCI-type interface cards; (4) high-resolution device control (1ms); (5) a built-in real-time cumulative recorder; (6) extensive data analyzing including event recorder, cumulative recorder, block analyzing; the summarized results can be transferred easily to Microsoft Excel spreadsheets through the Clipboard.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... Data and Computer Software AGENCY: Defense Acquisition Regulations System; Department of Defense (DoD... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information to...
Army Communicator. Volume 37, Number 2, Summer 2012
2012-01-01
solution will have to meet four criteria: FIPS 140-2 validated crypto; approved data-at-rest; Common Access Card enablement; and, enterprise management...Information Grid. Common Access Cards , Federal Information Processing Standard 140-2 certifications, and software compliance are just a few of the...and Evaluation Command BMC – Brigade Modernization Command CAC – Common Access Card FIPS – Federal Information Processing Standard GIG – Global
Data Analytics in Procurement Fraud Prevention
2014-06-01
access card COR contracting officer’s representative CPAR Contractor Performance Assessment Reporting System DCAA Defense Contract Audit Agency DOD...of this can be seen in a company using analytics to predict patterns occurring in known credit card fraud investigations to prevent future schemes...a website such as Amazon or iTunes . 10 4. Distributional Analytics Distributional analytics are used to detect anomalies within data. Through the
HLA Typing for Bone Marrow Transplantation
2011-07-21
Confirmatory Testing DC Donor Center DIY Do it yourself DNA Deoxyribonucleic Acid DOD Department of Defense D/R Donor/Recipient EBMT European...testing information is complete, thus allowing for report card analysis earlier in the process. • Deployed functionality to allow cord banks the ability...inventory was labeled with a new Report Card Status: “PreOrder Condition”). • Developed features to support Local IDs and International Society Blood
Big Memory Elegance: HyperCard Information Processing and Desktop Publishing.
ERIC Educational Resources Information Center
Bitter, Gary G.; Gerson, Charles W., Jr.
1991-01-01
Discusses hardware requirements, functions, and applications of five information processing and desktop publishing software packages for the Macintosh: HyperCard, PageMaker, Cricket Presents, Power Point, and Adobe illustrator. Benefits of these programs for schools are considered. (MES)
Nine Easy Steps to Avoiding Software Copyright Infringement.
ERIC Educational Resources Information Center
Gamble, Lanny R.; Anderson, Larry S.
1989-01-01
To avoid microcomputer software copyright infringement, administrators must be aware of the law, read the software agreements, maintain good records, submit all software registration cards, provide secure storage, post warnings, be consistent when establishing and enforcing policies, consider a site license, and ensure the legality of currently…
The Ruggedized STD Bus Microcomputer - A low cost computer suitable for Space Shuttle experiments
NASA Technical Reports Server (NTRS)
Budney, T. J.; Stone, R. W.
1982-01-01
Previous space flight computers have been costly in terms of both hardware and software. The Ruggedized STD Bus Microcomputer is based on the commercial Mostek/Pro-Log STD Bus. Ruggedized PC cards can be based on commercial cards from more than 60 manufacturers, reducing hardware cost and design time. Software costs are minimized by using standard 8-bit microprocessors and by debugging code using commercial versions of the ruggedized flight boards while the flight hardware is being fabricated.
Smart cards: a specific application in the hospital.
Güler, I; Zengin, R M; Sönmez, M
1998-12-01
Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.
Plain and Rolled Images from Paired Fingerprint Cards
National Institute of Standards and Technology Data Gateway
NIST Plain and Rolled Images from Paired Fingerprint Cards (Web, free access) NIST Special Database 29 is being distributed for use in development and testing fingerprint matching systems. The data consist of 216 ten-print fingerprint card pairs with both the rolled and plains (from a bottom of the fingerprint card) scanned at 19.7 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.
Design of a motion JPEG (M/JPEG) adapter card
NASA Astrophysics Data System (ADS)
Lee, D. H.; Sudharsanan, Subramania I.
1994-05-01
In this paper we describe a design of a high performance JPEG (Joint Photographic Experts Group) Micro Channel adapter card. The card, tested on a range of PS/2 platforms (models 50 to 95), can complete JPEG operations on a 640 by 240 pixel image within 1/60 of a second, thus enabling real-time capture and display of high quality digital video. The card accepts digital pixels for either a YUV 4:2:2 or an RGB 4:4:4 pixel bus and has been shown to handle up to 2.05 MBytes/second of compressed data. The compressed data is transmitted to a host memory area by Direct Memory Access operations. The card uses a single C-Cube's CL550 JPEG processor that complies with the baseline JPEG. We give broad descriptions of the hardware that controls the video interface, CL550, and the system interface. Some critical design points that enhance the overall performance of the M/JPEG systems are pointed out. The control of the adapter card is achieved by an interrupt driven software that runs under DOS. The software performs a variety of tasks that include change of color space (RGB or YUV), change of quantization and Huffman tables, odd and even field control and some diagnostic operations.
Optical Storage System For Small Software Package Distribution
NASA Astrophysics Data System (ADS)
Wehrenberg, Paul J.
1985-04-01
This paper describes an optical mass storage system being developed for extremely low cost distribution of small software packages. The structure of the media, design of the optical playback system, and some aspects of mastering and media production are discussed. This read only system is designed solely for the purpose of down loading code in a spooling fashion from the media to the host machine. The media is configured as a plastic card with dimensions 85 mm x 12 mm x 2mm. Each data region on a card is a rectangle 1.33 mm x 59.4 mm which carries up to 64 KB of user data. Cost estimates for production are 0.06 per card for the media and 38.00 for the playback device. The mastering process for the production tooling uses photolithography techniques and can provide production tooling within a few hours of software release. The playback mechanism is rugged and small, and does not require the use of any electromechanical servos.
Demonstration of Heavy Hybrid Diesel Fleet Vehicles
2016-03-01
Truck, Earth Auger/Digger Derrick 154 Hybrid Electric System Truck, Refuse 54 Hybrid Launch Assist Truck, Dump 921 Truck, Refrigerator 147 Truck, High...Hybrid Electric System Dump Truck 776 Naval Construction Force Truck 1,500 Engineer Tractor 2,942 Heavy Equipment Transporter (HET) 1,961...both trucks using Defense Logistics Agency (DLA) fuel management data. Card readers capture this data at the point of fueling using a specified card
Code of Federal Regulations, 2011 CFR
2011-10-01
... telephone bill. Remote Bidding Software $175.00 per package Payment to auction contractor by credit card or... contractor by credit card or check. (Public Notice will specify exact payment procedures.) [60 FR 38280, July...
The Ins and Outs of Access Control.
ERIC Educational Resources Information Center
Longworth, David
1999-01-01
Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…
Use of HyperCard to Simulate a Tissue Culture Laboratory.
ERIC Educational Resources Information Center
Nester, Bradley S.; Turney, Tully H.
1992-01-01
Describes the use of a Macintosh computer and HyperCard software to create an introduction to cell culture techniques that closely approximates a hands-on laboratory experiment. Highlights include data acquisition, data analysis, the generation of growth curves, and electronic modeling. (LRW)
A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.
Huang, Jyh-Win; Hou, Ting-Wei
2007-06-01
Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending).
NASA Technical Reports Server (NTRS)
Caplin, R. S.; Royer, E. R.
1977-01-01
Design analysis of a microbial load monitor system flight engineering model was presented. Checkout of the card taper and media pump system was fabricated as well as the final two incubating reading heads, the sample receiving and card loading device assembly, related sterility testing, and software. Progress in these areas was summarized.
2010 Department of Defense Chief Freedom of Information Act Officer Report
2010-03-19
of the Joint Chiefs of Staff (CJCS) has over 15,000 followers on Twitter and one of the most downloaded podcasts on the Pentagon Channel iTunes site...nutrition, recipes, and a link to ask a question of the DeCA Dietician; information concerning customer service, including patron councils, comment cards ...DFAS Financial Integrated Systems Services II contracts and the DFAS Impact Card Holder listing. IV. Steps Taken To Greater Utilize Technology
2014-06-01
Incentivized. The basic report card of a tra- ditional PM depends on management of cost and schedule deadlines, performance of the system and mitigation...from iTunes (iPad only). Document Viewer iBlueprint—With iBlueprint, you can create and export custom floor plans. It’s handy for homebuyers and real...create and manage punch list items, access contact data, share and store project photos, log time card entries and more. The Procore app can be used on
2016-07-01
CAC common access card DoD Department of Defense FOUO For Official Use Only GIS geographic information systems GUI graphical user interface HISA...as per requirements of this project, is UNCLASS/For Official Use Only (FOUO), with access re- stricted to DOD common access card (CAC) users. Key...Boko Haram Fuel Dump Discovered in Maiduguru.” Available: http://saharareporters.com/2015/10/01/another-boko-haram-fuel- dump - discovered-maiduguri
ERIC Educational Resources Information Center
Little, Dean K.
In a cooperative program with Defense Documentation Center Headquarters, Sylvania arranged for procurement of 70,000 unclassified-unlimited documents without DDC Form I cards and 30,000 unclassified-limited and classified documents with Form I's. This was done in order to overcome effects of an in-house documents inventory/selective destruction…
Mated Fingerprint Card Pairs (Volumes 1-5)
National Institute of Standards and Technology Data Gateway
NIST Mated Fingerprint Card Pairs (Volumes 1-5) (Web, free access) The NIST database of mated fingerprint card pairs (Special Database 9) consists of multiple volumes. Currently five volumes have been released. Each volume will be a 3-disk set with each CD-ROM containing 90 mated card pairs of segmented 8-bit gray scale fingerprint images (900 fingerprint image pairs per CD-ROM). A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.
ERIC Educational Resources Information Center
Miller, Anne, Ed.; Radziemski, Cathy, Ed.
1988-01-01
Three pieces of computer software are described and reviewed: HyperCard, to build and use varied applications; Iggy's Gnees, for problem solving with shapes in grades kindergarten-two; and Algebra Shop, for practicing skills and problem solving. (MNS)
ERIC Educational Resources Information Center
Anderson, Daniel K.
1996-01-01
Discusses theoretical backgrounds for training teachers to use the Internet, including: a history of the Internet, education reform, technology and education, teacher training, affective domains, learning styles, and evaluation. Instructional design considerations are described for developing the HyperCard Internet Primer, software introducing…
Evaluation of a proximity card authentication system for health care settings.
Fontaine, Jacqueline; Zheng, Kai; Van De Ven, Cosmas; Li, Huiyang; Hiner, James; Mitchell, Kathy; Gendler, Stephen; Hanauer, David A
2016-08-01
Multiple users access computer workstations in busy clinical settings, requiring many logins throughout the day as users switch from one computer to another. This can lead to workflow inefficiencies as well as security concerns resulting from users sharing login sessions to save time. Proximity cards and readers have the potential to improve efficiency and security by allowing users to access clinical workstations simply by bringing the card near the reader, without the need for manual entry of a username and password. To assess the perceived impact of proximity cards and readers for rapid user authentication to clinical workstations in the setting of an existing electronic health record with single sign-on software already installed. Questionnaires were administered to clinical faculty and staff five months before and three months after the installation of proximity card readers in an inpatient birthing center and an outpatient obstetrics clinic. Open-ended feedback was also collected and qualitatively analyzed. There were 71 and 33 responses to the pre- and post-implementation surveys, respectively. There was a significant increase in the perceived speed of login with the proximity cards, and a significant decrease in the self-reported occurrence of shared login sessions between users. Feedback regarding the system was mostly positive, although several caveats were noted, including minimal benefit when used with an obstetric application that did not support single sign-on. Proximity cards and readers, along with single sign-on software, have the potential to enhance workflow efficiency by allowing for faster login times and diminish security concerns by reducing shared logins on clinical workstations. The positive feedback was used by our health system leadership to support the expanded implementation of the proximity card readers throughout the clinical setting. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
The Software Design Document: More than a User's Manual.
ERIC Educational Resources Information Center
Bowers, Dennis
1989-01-01
Discusses the value of creating design documentation for computer software so that it may serve as a model for similar design efforts. Components of the software design document are described, including program flowcharts, graphic representation of screen displays, storyboards, and evaluation procedures. An example is given using HyperCard. (three…
Report of Investigation: Ronald F. Lewis, Major General, U.S. Army
2016-10-04
and away for a period of time and then get back to the grind of running the trips. Our investigation of travel -related allegations against MG Lewis...misused his government travel charge card (GTCC) for personal expenses; (2) made false official statements regarding his GTCC misuse; and (3) engaged in...and then as Senior Military Assistant (SMA) to the Secretary of Defense: (1) misused his government travel charge card (GTCC) for personal expenses
Hedonic Price Indices for Ground Vehicles
2015-05-01
I N S T I T U T E F O R D E F E N S E A N A L Y S E S Hedonic Price Indices for Ground Vehicles David M. Tate INSTITUTE FOR DEFENSE ANALYSES 4850... Hedonic Price Indices for Ground Vehicles David M. Tate Institute for Defense Analyses (CARD) 4850 Mark Center Dr., Alexandria, VA 22311 Ph...4 1. Basic Hedonic Regression
A New Patient Record System Using the Laser Card
Brown, J.H.U.; Vallbona, Carlos
1988-01-01
A method of handling medical data in the form of patient records including physical findings such as x-rays has been devised using a laser card coupled to a p.c. for data input and output. A satisfactory software system which encompasses a formalized medical record system dealing with events rather than chronological order of entry has been devised and is now under test in a community health clinic. Future directions of the card research are discussed and expanded upon. ImagesFig. 7
Environmental Containment Property Estimation Using QSARs in an Expert System
1993-01-15
2 megabytes of memory (RAM), with 1000 kBytes of memory allocated for HyperCard. PEP overview The PEP system currently consists of four HyperCard...BCF Universel I ’ mI Figure 6. TSA module card from PEP The TSA module is also designed to accept files generated by other hardware/software... allocated to 1500 MB. * Installation of PEP PEP is typically shipped on one 3.5 inch 1.44 Megabyte floppy disk. To install PEP: 1. Insert the PEP disk into
Design and implementation of a smart card based healthcare information system.
Kardas, Geylani; Tunali, E Turhan
2006-01-01
Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.
Newer Technologies for School Security. ERIC Digest Number 145.
ERIC Educational Resources Information Center
Schneider, Tod
This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…
Specificity of software cooperating with an optoelectronic sensor in the pulse oximeter system
NASA Astrophysics Data System (ADS)
Cysewska-Sobusiak, Anna; Wiczynski, Grzegorz; Jedwabny, Tomasz
1995-06-01
Specificity of a software package composed of two parts which control an optoelectronic sensor of the computer-aided system made to realize the noninvasive measurements of the arterial blood oxygen saturation as well as some parameters of the peripheral pulse waveform, has been described. Principles of the transmission variant of the one and only noninvasive measurement method, so-called pulse oximetry, has been utilized. The software co-ordinates the suitable cooperation of an IBM PC compatible microcomputer with the sensor and one specialized card. This novel card is a key part of the whole measuring system which some application fields are extended in comparison to pulse oximeters commonly attainable. The user-friendly MS Windows graphical environment which creates the system to be multitask and non-preemptive, has been used to design the specific part of the programming presented here. With this environment, sophisticated tasks of the software package can be performed without excessive complication.
The adaptor molecule CARD9 is essential for tuberculosis control
Dorhoi, Anca; Desel, Christiane; Yeremeev, Vladimir; Pradl, Lydia; Brinkmann, Volker; Mollenkopf, Hans-Joachim; Hanke, Karin; Gross, Olaf; Ruland, Jürgen
2010-01-01
The cross talk between host and pathogen starts with recognition of bacterial signatures through pattern recognition receptors (PRRs), which mobilize downstream signaling cascades. We investigated the role of the cytosolic adaptor caspase recruitment domain family, member 9 (CARD9) in tuberculosis. This adaptor was critical for full activation of innate immunity by converging signals downstream of multiple PRRs. Card9−/− mice succumbed early after aerosol infection, with higher mycobacterial burden, pyogranulomatous pneumonia, accelerated granulocyte recruitment, and higher abundance of proinflammatory cytokines and granulocyte colony-stimulating factor (G-CSF) in serum and lung. Neutralization of G-CSF and neutrophil depletion significantly prolonged survival, indicating that an exacerbated systemic inflammatory disease triggered lethality of Card9−/− mice. CARD9 deficiency had no apparent effect on T cell responses, but a marked impact on the hematopoietic compartment. Card9−/− granulocytes failed to produce IL-10 after Mycobaterium tuberculosis infection, suggesting that an absent antiinflammatory feedback loop accounted for granulocyte-dominated pathology, uncontrolled bacterial replication, and, ultimately, death of infected Card9−/− mice. Our data provide evidence that deregulated innate responses trigger excessive lung inflammation and demonstrate a pivotal role of CARD9 signaling in autonomous innate host defense against tuberculosis. PMID:20351059
PLUME-FEATHER, Referencing and Finding Software for Research and Education
NASA Astrophysics Data System (ADS)
Bénassy, O.; Caron, C.; Ferret-Canape, C.; Cheylus, A.; Courcelle, E.; Dantec, C.; Dayre, P.; Dostes, T.; Durand, A.; Facq, A.; Gambini, G.; Geahchan, E.; Helft, C.; Hoffmann, D.; Ingarao, M.; Joly, P.; Kieffer, J.; Larré, J.-M.; Libes, M.; Morris, F.; Parmentier, H.; Pérochon, L.; Porte, O.; Romier, G.; Rousse, D.; Tournoy, R.; Valeins, H.
2014-06-01
PLUME-FEATHER is a non-profit project created to Promote economicaL, Useful and Maintained softwarEFor theHigher Education And THE Research communities. The site references software, mainly Free/Libre Open Source Software (FLOSS) from French universities and national research organisations, (CNRS, INRA...), laboratories or departments as well as other FLOSS software used and evaluated by users within these institutions. Each software is represented by a reference card, which describes origin, aim, installation, cost (if applicable) and user experience from the point of view of an academic user for academic users. Presently over 1000 programs are referenced on PLUME by more than 900 contributors. Although the server is maintained by a French institution, it is open to international contributions in the academic domain. All contained and validated contents are visible to anonymous public, whereas (presently more than 2000) registered users can contribute, starting with comments on single software reference cards up to help with the organisation and presentation of the referenced software products. The project has been presented to the HEP community in 2012 for the first time [1]. This is an update of the status and a call for (further) contributions.
NASA Astrophysics Data System (ADS)
Noordmans, Herke Jan; de Roode, Rowland; Verdaasdonk, Rudolf
2007-03-01
Multi-spectral images of human tissue taken in-vivo often contain image alignment problems as patients have difficulty in retaining their posture during the acquisition time of 20 seconds. Previously, it has been attempted to correct motion errors with image registration software developed for MR or CT data but these algorithms have been proven to be too slow and erroneous for practical use with multi-spectral images. A new software package has been developed which allows the user to play a decisive role in the registration process as the user can monitor the progress of the registration continuously and force it in the right direction when it starts to fail. The software efficiently exploits videocard hardware to gain speed and to provide a perfect subvoxel correspondence between registration field and display. An 8 bit graphic card was used to efficiently register and resample 12 bit images using the hardware interpolation modes present on the graphic card. To show the feasibility of this new registration process, the software was applied in clinical practice evaluating the dosimetry for psoriasis and KTP laser treatment. The microscopic differences between images of normal skin and skin exposed to UV light proved that an affine registration step including zooming and slanting is critical for a subsequent elastic match to have success. The combination of user interactive registration software with optimal addressing the potentials of PC video card hardware greatly improves the speed of multi spectral image registration.
NASA Astrophysics Data System (ADS)
Noordmans, Herke J.; de Roode, Rowland; Verdaasdonk, Rudolf
2007-02-01
Multi-spectral images of human tissue taken in-vivo often contain image alignment problems as patients have difficulty in retaining their posture during the acquisition time of 20 seconds. Previously, it has been attempted to correct motion errors with image registration software developed for MR or CT data but these algorithms have been proven to be too slow and erroneous for practical use with multi-spectral images. A new software package has been developed which allows the user to play a decisive role in the registration process as the user can monitor the progress of the registration continuously and force it in the right direction when it starts to fail. The software efficiently exploits videocard hardware to gain speed and to provide a perfect subvoxel correspondence between registration field and display. An 8 bit graphic card was used to efficiently register and resample 12 bit images using the hardware interpolation modes present on the graphic card. To show the feasibility of this new registration process, the software was applied in clinical practice evaluating the dosimetry for psoriasis and KTP laser treatment. The microscopic differences between images of normal skin and skin exposed to UV light proved that an affine registration step including zooming and slanting is critical for a subsequent elastic match to have success. The combination of user interactive registration software with optimal addressing the potentials of PC video card hardware greatly improves the speed of multi spectral image registration.
Tools of the Courseware Trade: A Comparison of ToolBook 1.0 and HyperCard 2.0.
ERIC Educational Resources Information Center
Brader, Lorinda L.
1990-01-01
Compares two authoring tools that were developed to enable users without programing experience to create and modify software. HyperCard, designed for Macintosh microcomputers, and ToolBook, for microcomputers that run on MS-DOS, are compared in the areas of programing languages, graphics and printing capabilities, user interface, system…
ERIC Educational Resources Information Center
Schneider, Tod
This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…
United States Air Force High School Apprenticeship Program. 1990 Program Management Report. Volume 2
1991-04-18
49-3 documentation application. The demonstration was created with Apple Computer’s HyperCard using a flowchart -like format with which the user could...Software, Inc.,1989. F-1_6 A/B Avionic System Manual. Fort Worth, TX: General Dynamics, 1990.I 5HyperCard Beginners Guide: An Introduction to
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
...; Defense Federal Acquisition Regulation Supplement; Rights in Technical Data and Computer Software (OMB... 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and... rights in technical data and computer software. DoD needs this information to implement 10 U.S.C. 2320...
2005-01-01
developed a partnership with the Defense Acquisition University to in- tegrate DISA’s systems engineering processes, software , and network...in place, with processes being implemented: deployment management; systems engineering ; software engineering ; configuration man- agement; test and...CSS systems engineering is a transition partner with Carnegie Mellon University’s Software Engineering Insti- tute and its work on the capability
Gack, Michaela U.; Kirchhofer, Axel; Shin, Young C.; Inn, Kyung-Soo; Liang, Chengyu; Cui, Sheng; Myong, Sua; Ha, Taekjip; Hopfner, Karl-Peter; Jung, Jae U.
2008-01-01
The caspase recruitment domain (CARD) of intracellular adaptors and sensors plays a critical role in the assembly of signaling complexes involved in innate host defense against pathogens and in the regulation of inflammatory responses. The cytosolic receptor retinoic acid-inducible gene-I (RIG-I) recognizes viral RNA in a 5′-triphosphate-dependent manner and initiates an antiviral signaling cascade. Upon viral infection, the N-terminal CARDs of RIG-I undergo the K63-linked ubiquitination induced by tripartite motif protein 25 (TRIM25), critical for the interaction of RIG-I with its downstream signaling partner MAVS/VISA/IPS-1/Cardif. Here, we demonstrate the distinct roles of RIG-I first and second CARD in TRIM25-mediated RIG-I ubiquitination: TRIM25 binds the RIG-I first CARD and subsequently ubiquitinates its second CARD. The T55I mutation in RIG-I first CARD abolishes TRIM25 interaction, whereas the K172R mutation in the second CARD eliminates polyubiquitin attachment. The necessity of the intact tandem CARD for RIG-I function is further evidenced by a RIG-I splice variant (SV) whose expression is robustly up-regulated upon viral infection. The RIG-I SV carries a short deletion (amino acids 36–80) within the first CARD and thereby loses TRIM25 binding, CARD ubiquitination, and downstream signaling ability. Furthermore, because of its robust inhibition of virus-induced RIG-I multimerization and RIG-I-MAVS signaling complex formation, this SV effectively suppresses the RIG-I-mediated IFN-β production. This study not only elucidates the vital role of the intact tandem CARD for TRIM25-mediated RIG-I activation but also identifies the RIG-I SV as an off-switch regulator of its own signaling pathway. PMID:18948594
Gack, Michaela U; Kirchhofer, Axel; Shin, Young C; Inn, Kyung-Soo; Liang, Chengyu; Cui, Sheng; Myong, Sua; Ha, Taekjip; Hopfner, Karl-Peter; Jung, Jae U
2008-10-28
The caspase recruitment domain (CARD) of intracellular adaptors and sensors plays a critical role in the assembly of signaling complexes involved in innate host defense against pathogens and in the regulation of inflammatory responses. The cytosolic receptor retinoic acid-inducible gene-I (RIG-I) recognizes viral RNA in a 5'-triphosphate-dependent manner and initiates an antiviral signaling cascade. Upon viral infection, the N-terminal CARDs of RIG-I undergo the K(63)-linked ubiquitination induced by tripartite motif protein 25 (TRIM25), critical for the interaction of RIG-I with its downstream signaling partner MAVS/VISA/IPS-1/Cardif. Here, we demonstrate the distinct roles of RIG-I first and second CARD in TRIM25-mediated RIG-I ubiquitination: TRIM25 binds the RIG-I first CARD and subsequently ubiquitinates its second CARD. The T(55)I mutation in RIG-I first CARD abolishes TRIM25 interaction, whereas the K(172)R mutation in the second CARD eliminates polyubiquitin attachment. The necessity of the intact tandem CARD for RIG-I function is further evidenced by a RIG-I splice variant (SV) whose expression is robustly up-regulated upon viral infection. The RIG-I SV carries a short deletion (amino acids 36-80) within the first CARD and thereby loses TRIM25 binding, CARD ubiquitination, and downstream signaling ability. Furthermore, because of its robust inhibition of virus-induced RIG-I multimerization and RIG-I-MAVS signaling complex formation, this SV effectively suppresses the RIG-I-mediated IFN-beta production. This study not only elucidates the vital role of the intact tandem CARD for TRIM25-mediated RIG-I activation but also identifies the RIG-I SV as an off-switch regulator of its own signaling pathway.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-07
... 215, 234, 242, and 252 Defense Federal Acquisition Regulation Supplement; Cost and Software Data... Regulation Supplement (DFARS) to set forth DoD Cost and Software Data Reporting system requirements for major... set forth the DoD requirement for offerors to: Describe the standard Cost and Software Data Reporting...
Estimating Software Effort Hours for Major Defense Acquisition Programs
ERIC Educational Resources Information Center
Wallshein, Corinne C.
2010-01-01
Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…
Code of Federal Regulations, 2010 CFR
2010-01-01
...,” Woodson and Conover, pp. 2-166 through 2-169 published by the University of California Press, 2223 Fulton...Kade, published by U.S. Dept. of Defense, 1972, Library of Congress Card No. 72-600054, pp. 457-465. (d...
Code of Federal Regulations, 2014 CFR
2014-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2012 CFR
2012-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2011 CFR
2011-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Code of Federal Regulations, 2013 CFR
2013-10-01
... DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION Cost and Software Data Reporting 234.7100 Policy. (a) The cost and software data reporting (CSDR) requirement is mandatory for major defense... data reporting and software resources data reporting. (b) Prior to contract award, contracting officers...
Certified Binaries for Software Components
2007-09-01
is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored...by the U.S. Department of Defense. Copyright 2007 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING
ERIC Educational Resources Information Center
Summers, Edward G.; Hagen, Debra
1987-01-01
A computer software graphics/text program was used with a group of behavior-disordered and learning-disabled students (ages 10-13) to design and produce Christmas cards and related print products as a class project. Sample lesson plans and products, as well as sample order forms and price lists, are given. (JW)
NASA Astrophysics Data System (ADS)
Silva, Dilson; Cortez, Celia Martins
2015-12-01
In the present work we used a high-resolution, low-cost apparatus capable of detecting waves fit inside the sound bandwidth, and the software package GoldwaveTM for graphical display, processing and monitoring the signals, to study aspects of the electric heart activity of early avian embryos, specifically at the 18th Hamburger & Hamilton stage of the embryo development. The species used was the domestic chick (Gallus gallus), and we carried out 23 experiments in which cardiographic spectra of QRS complex waves representing the propagation of depolarization waves through ventricles was recorded using microprobes and reference electrodes directly on the embryos. The results show that technique using 16 bit audio card monitored by the GoldwaveTM software was efficient to study signal aspects of heart electric activity of early avian embryos.
Multi-stage learning aids applied to hands-on software training.
Rother, Kristian; Rother, Magdalena; Pleus, Alexandra; Upmeier zu Belzen, Annette
2010-11-01
Delivering hands-on tutorials on bioinformatics software and web applications is a challenging didactic scenario. The main reason is that trainees have heterogeneous backgrounds, different previous knowledge and vary in learning speed. In this article, we demonstrate how multi-stage learning aids can be used to allow all trainees to progress at a similar speed. In this technique, the trainees can utilize cards with hints and answers to guide themselves self-dependently through a complex task. We have successfully conducted a tutorial for the molecular viewer PyMOL using two sets of learning aid cards. The trainees responded positively, were able to complete the task, and the trainer had spare time to respond to individual questions. This encourages us to conclude that multi-stage learning aids overcome many disadvantages of established forms of hands-on software training.
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 9
2008-09-01
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson...SEP 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE CrossTalk: The Journal of Defense Software Engineering...The Journal of Defense Software Engineering September 2008 4 10 15 19 24 26 Securing Legacy C Applications Using Dynamic Data Flow Analysis This
Gerry, Alec C; Higginbotham, G E; Periera, L N; Lam, A; Shelton, C R
2011-06-01
Relative house fly, Musca domestica L., activity at three large dairies in central California was monitored during the peak fly activity period from June to August 2005 by using spot cards, fly tapes, bait traps, and Alsynite traps. Counts for all monitoring methods were significantly related at two of three dairies; with spot card counts significantly related to fly tape counts recorded the same week, and both spot card counts and fly tape counts significantly related to bait trap counts 1-2 wk later. Mean fly counts differed significantly between dairies, but a significant interaction between dairies sampled and monitoring methods used demonstrates that between-dairy comparisons are unwise. Estimate precision was determined by the coefficient of variability (CV) (or SE/mean). Using a CV = 0.15 as a desired level of estimate precision and assuming an integrate pest management (IPM) action threshold near the peak house fly activity measured by each monitoring method, house fly monitoring at a large dairy would require 12 spot cards placed in midafternoon shaded fly resting sites near cattle or seven bait traps placed in open areas near cattle. Software (FlySpotter; http://ucanr.org/ sites/FlySpotter/download/) using computer vision technology was developed to count fly spots on a scanned image of a spot card to dramatically reduce time invested in monitoring house flies. Counts provided by the FlySpotter software were highly correlated to visual counts. The use of spot cards for monitoring house flies is recommended for dairy IPM programs.
[Is it possible to train Achatina fulica using visual stimulation?].
Baĭkova, I B; Zhukov, V V
2001-01-01
The conditioned behavior to visual stimuli was obtained in Achatina fulica mollusk on the basis of its negative phototaxis. Directional moving of snails toward black cards was accompanied by the negative unconditioned stimulation (electric current). Learning was expressed in a statistically significant decrease in locomotor activity of animals and decrease in the rate of preference of sections with black cards. Learning developed within two daily training sessions with 30 trials in each of them. Learning traces were observed as defensive behavior at least during a month after reinforcement elimination.
Chikkagoudar, Satish; Wang, Kai; Li, Mingyao
2011-05-26
Gene-gene interaction in genetic association studies is computationally intensive when a large number of SNPs are involved. Most of the latest Central Processing Units (CPUs) have multiple cores, whereas Graphics Processing Units (GPUs) also have hundreds of cores and have been recently used to implement faster scientific software. However, currently there are no genetic analysis software packages that allow users to fully utilize the computing power of these multi-core devices for genetic interaction analysis for binary traits. Here we present a novel software package GENIE, which utilizes the power of multiple GPU or CPU processor cores to parallelize the interaction analysis. GENIE reads an entire genetic association study dataset into memory and partitions the dataset into fragments with non-overlapping sets of SNPs. For each fragment, GENIE analyzes: 1) the interaction of SNPs within it in parallel, and 2) the interaction between the SNPs of the current fragment and other fragments in parallel. We tested GENIE on a large-scale candidate gene study on high-density lipoprotein cholesterol. Using an NVIDIA Tesla C1060 graphics card, the GPU mode of GENIE achieves a speedup of 27 times over its single-core CPU mode run. GENIE is open-source, economical, user-friendly, and scalable. Since the computing power and memory capacity of graphics cards are increasing rapidly while their cost is going down, we anticipate that GENIE will achieve greater speedups with faster GPU cards. Documentation, source code, and precompiled binaries can be downloaded from http://www.cceb.upenn.edu/~mli/software/GENIE/.
2011-01-01
Background Gene-gene interaction in genetic association studies is computationally intensive when a large number of SNPs are involved. Most of the latest Central Processing Units (CPUs) have multiple cores, whereas Graphics Processing Units (GPUs) also have hundreds of cores and have been recently used to implement faster scientific software. However, currently there are no genetic analysis software packages that allow users to fully utilize the computing power of these multi-core devices for genetic interaction analysis for binary traits. Findings Here we present a novel software package GENIE, which utilizes the power of multiple GPU or CPU processor cores to parallelize the interaction analysis. GENIE reads an entire genetic association study dataset into memory and partitions the dataset into fragments with non-overlapping sets of SNPs. For each fragment, GENIE analyzes: 1) the interaction of SNPs within it in parallel, and 2) the interaction between the SNPs of the current fragment and other fragments in parallel. We tested GENIE on a large-scale candidate gene study on high-density lipoprotein cholesterol. Using an NVIDIA Tesla C1060 graphics card, the GPU mode of GENIE achieves a speedup of 27 times over its single-core CPU mode run. Conclusions GENIE is open-source, economical, user-friendly, and scalable. Since the computing power and memory capacity of graphics cards are increasing rapidly while their cost is going down, we anticipate that GENIE will achieve greater speedups with faster GPU cards. Documentation, source code, and precompiled binaries can be downloaded from http://www.cceb.upenn.edu/~mli/software/GENIE/. PMID:21615923
Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J
2010-11-01
Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.
Telematics and smart cards in integrated health information system.
Sicurello, F; Nicolosi, A
1997-01-01
Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole network of services involved will be monitored for the duration of the project. The system users will also include general practitioners, social workers, physicians, health operators, pharmacists, laboratory workers and administrative personnel of the municipality and of the health structures concerned.
Isothermal thermogravimetric data acquisition analysis system
NASA Technical Reports Server (NTRS)
Cooper, Kenneth, Jr.
1991-01-01
The description of an Isothermal Thermogravimetric Analysis (TGA) Data Acquisition System is presented. The system consists of software and hardware to perform a wide variety of TGA experiments. The software is written in ANSI C using Borland's Turbo C++. The hardware consists of a 486/25 MHz machine with a Capital Equipment Corp. IEEE488 interface card. The interface is to a Hewlett Packard 3497A data acquisition system using two analog input cards and a digital actuator card. The system provides for 16 TGA rigs with weight and temperature measurements from each rig. Data collection is conducted in three phases. Acquisition is done at a rapid rate during initial startup, at a slower rate during extended data collection periods, and finally at a fast rate during shutdown. Parameters controlling the rate and duration of each phase are user programmable. Furnace control (raising and lowering) is also programmable. Provision is made for automatic restart in the event of power failure or other abnormal terminations. Initial trial runs were conducted to show system stability.
ERIC Educational Resources Information Center
Lieberth, Ann K.; Martin, Doug R.
1995-01-01
Because of the diversity of clients served by speech-language pathologists and audiologists, available commercial software may not meet all needs. Authoring programs allow the clinician to design software that can be customized for individual clients. This article describes an authoring program called HyperCard and its use in preparing hypermedia…
NAVAIR Information Technology Case Study
2010-09-01
straightforward procedure in which an authorized government credit card buyer can make the purchase. Since this price category covers a wide range of items...that employs approximately 35,000 people, with products such as iPod (portable music player), MAC computer, iTunes (music program), and MAC OS...for approval. After approval, the software can be purchased with a company credit card . To complete the transaction, a reimbursement is submitted
Falling PC Solitaire Cards: An Open-Inquiry Approach
ERIC Educational Resources Information Center
Gonzalez-Espada, Wilson J.
2012-01-01
Many of us have played the PC Solitaire game that comes as standard software in many computers. Although I am not a great player, occasionally I win a game or two. The game celebrates my accomplishment by pushing the cards forward, one at a time, falling gracefully in what appears to look like a parabolic path in a drag-free environment. One day,…
Suppressed anger, evaluative threat, and cardiovascular reactivity: a tripartite profile approach.
Jorgensen, Randall S; Kolodziej, Monika E
2007-11-01
Despite decades of theory and research implicating suppressed anger in the development of cardiovascular disorders involving cardiovascular reactivity (CVR), to date the theoretical components of low anger expression, guilt feelings over agonistic reactions, and defensive strivings to avoid social disapproval have not been used conjointly to profile suppressed anger for the prediction of CVR. The purpose of this study, then, was to cluster analyze measures of anger expression, hostility guilt, and social defensiveness to create a suppressed anger profile (low anger expression, high hostility guilt, high social defensiveness) and a non-suppressed profile from a sample of college males. Social evaluative threat may be a potent stressor for people who defensively suppress anger expression. Thus, to examine the combined effects of suppressed anger and social evaluative threat, participants, prior to telling a story to a Thematic Apperception Card (TAT), were randomly assigned to either a high-threat (story will be compared to stories created by the mentally ill) or a low-threat condition (story used to study effects of talking on cardiovascular responses). Blood pressure (BP) and heart rate (HR) were monitored during a rest period and the subsequent TAT card period. As predicted, suppressed anger males in the high-threat condition showed the highest levels of diastolic BP and HR change from the rest period. The suppressed anger group's systolic BP reactivity was independent of threat manipulation. Research implications are discussed.
Computer system for scanning tunneling microscope automation
NASA Astrophysics Data System (ADS)
Aguilar, M.; García, A.; Pascual, P. J.; Presa, J.; Santisteban, A.
1987-03-01
A computerized system for the automation of a scanning tunneling microscope is presented. It is based on an IBM personal computer (PC) either an XT or an AT, which performs the control, data acquisition and storage operations, displays the STM "images" in real time, and provides image processing tools for the restoration and analysis of data. It supports different data acquisition and control cards and image display cards. The software has been designed in a modular way to allow the replacement of these cards and other equipment improvements as well as the inclusion of user routines for data analysis.
76 FR 75875 - Defense Federal Acquisition Regulation Supplement; Open Source Software Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-05
... Regulation Supplement; Open Source Software Public Meeting AGENCY: Defense Acquisition Regulations System... initiate a dialogue with industry regarding the use of open source software in DoD contracts. DATES: Public... be held in the General Services Administration (GSA), Central Office Auditorium, 1800 F Street NW...
Quick Prototyping of Educational Software: An Object-Oriented Approach.
ERIC Educational Resources Information Center
Wong, Simon C-H
1994-01-01
Introduces and demonstrates a quick-prototyping model for educational software development that can be used by teachers developing their own courseware using an object-oriented programming system. Development of a courseware package called "The Match-Maker" is explained as an example that uses HyperCard for quick prototyping. (Contains…
ERIC Educational Resources Information Center
1972
Recent and expected developments in the computer industry are discussed in this 628-page yearbook, successor to "The Punched Card Annual." The first section of the report is an overview of current computer hardware and software and includes articles about future applications of mainframes, an analysis of the software industry, and a summary of the…
Barwise, Amelia; Garcia-Arguello, Lisbeth; Dong, Yue; Hulyalkar, Manasi; Vukoja, Marija; Schultz, Marcus J; Adhikari, Neill K J; Bonneton, Benjamin; Kilickaya, Oguz; Kashyap, Rahul; Gajic, Ognjen; Schmickl, Christopher N
2016-10-03
The Checklist for Early Recognition and Treatment of Acute Illness (CERTAIN) is an international collaborative project with the overall objective of standardizing the approach to the evaluation and treatment of critically ill patients world-wide, in accordance with best-practice principles. One of CERTAIN's key features is clinical decision support providing point-of-care information about common acute illness syndromes, procedures, and medications in an index card format. This paper describes 1) the process of developing and validating the content for point-of-care decision support, and 2) the content management system that facilitates frequent peer-review and allows rapid updates of content across different platforms (CERTAIN software, mobile apps, pdf-booklet) and different languages. Content was created based on survey results of acute care providers and validated using an open peer-review process. Over a 3 year period, CERTAIN content expanded to include 67 syndrome cards, 30 procedure cards, and 117 medication cards. 127 (59 %) cards have been peer-reviewed so far. Initially MS Word® and Dropbox® were used to create, store, and share content for peer-review. Recently Google Docs® was used to make the peer-review process more efficient. However, neither of these approaches met our security requirements nor has the capacity to instantly update the different CERTAIN platforms. Although we were able to successfully develop and validate a large inventory of clinical decision support cards in a short period of time, commercially available software solutions for content management are suboptimal. Novel custom solutions are necessary for efficient global point of care content system management.
Software Engineering Institute: Year in Review 2008
2008-01-01
security information they need. Now, new podcasts are uploaded every two weeks to the CERT website and iTunes . The series has become increasingly...reused throughout an organization— customer lookup, account lookup, and credit card validation are some examples. 2008 YEAR IN REVIEW...were charged in August 2008 with the theft of more than 40 million credit and debit card numbers from T.J. Maxx, Marshall’s, Barnes & Noble
Cross-Platform Mobile Application Development: A Pattern-Based Approach
2012-03-01
Additionally, developers should be aware of different hardware capabilities such as external SD cards and forward facing cameras. Finally, each...applications are written. Additionally, developers should be aware of different hardware capabilities such as external SD cards and forward facing cameras... iTunes library, allowing the user to update software and manage content on each device. However, in iOS5, the PC Free feature removes this constraint
Digital tape unit test facility software
NASA Technical Reports Server (NTRS)
Jackson, J. T.
1971-01-01
Two computer programs are described which are used for the collection and analysis of data from the digital tape unit test facility (DTUTF). The data are the recorded results of skew tests made on magnetic digital tapes which are used on computers as input/output media. The results of each tape test are keypunched onto an 80 column computer card. The format of the card is checked and the card image is stored on a master summary tape via the DTUTF card checking and tape updating system. The master summary tape containing the results of all the tape tests is then used for analysis as input to the DTUTF histogram generating system which produces a histogram of skew vs. date for selected data, followed by some statistical analysis of the data.
The Use of Personal Information Technology in Military Area of Operations
2013-04-19
Mauhew FlrDll Approved: .19. Fly. DiI !e:(c=i , . imes f ut T T a l nt (’J11 i 1 b s rscml i at i: llOl lY l ta " TTED LL E U · in Of(l l...more capable and enable Coast Guard members to access the network. The Defense department is testing Android and iOS devices with CAC card ...Access Card authorizes use on desktop computers.48 Another item of concern as the military attempts to move into the PIT realm is who is making the
CheMentor Software System by H. A. Peoples
NASA Astrophysics Data System (ADS)
Reid, Brian P.
1997-09-01
CheMentor Software System H. A. Peoples. Computerized Learning Enhancements: http://www.ecis.com/~clehap; email: clehap@ecis.com; 1996 - 1997. CheMentor is a series of software packages for introductory-level chemistry, which includes Practice Items (I), Stoichiometry (I), Calculating Chemical Formulae, and the CheMentor Toolkit. The first three packages provide practice problems for students and various types of help to solve them; the Toolkit includes "calculators" for determining chemical quantities as well as the Practice Items (I) set of problems. The set of software packages is designed so that each individual product acts as a module of a common CheMentor program. As the name CheMentor implies, the software is designed as a "mentor" for students learning introductory chemistry concepts and problems. The typical use of the software would be by individual students (or perhaps small groups) as an adjunct to lectures. CheMentor is a HyperCard application and the modules are HyperCard stacks. The requirements to run the packages include a Macintosh computer with at least 1 MB of RAM, a hard drive with several MB of available space depending upon the packages selected (10 MB were required for all the packages reviewed here), and the Mac operating system 6.0.5 or later.
NASA Technical Reports Server (NTRS)
Cecil, R. W.; White, R. A.; Szczur, M. R.
1972-01-01
The IDAMS Processor is a package of task routines and support software that performs convolution filtering, image expansion, fast Fourier transformation, and other operations on a digital image tape. A unique task control card for that program, together with any necessary parameter cards, selects each processing technique to be applied to the input image. A variable number of tasks can be selected for execution by including the proper task and parameter cards in the input deck. An executive maintains control of the run; it initiates execution of each task in turn and handles any necessary error processing.
2010-09-01
cards and software in almost any computer can communicate with each other seamlessly. The cable modem protocol is another example of competing...streaming: it means that special client software applications known as podcatchers (such as Apple Inc.’s iTunes or Nullsoft’s Winamp) can automatically
Four Pillars of Service-Oriented Architecture
2007-09-01
ic A lig n m e n t Figure 1: Pillars of SOA-Based Systems Development Service -Oriented Architectures 12 CROSSTALK The Journal of Defense Software ...et al. “On the Business Value and Technical Challenges of Adopting Web Services .” Journal of Software Maintenance and Evolution 16 (2004): 16, 31-50...10 CROSSTALK The Journal of Defense Software Engineering September 2007 Acornerstone of DoD policy forfuture software and systems policy is the
2011-01-01
industries as credit cards , health maintenance organizations (HMOs), travel reservations, video games, container shipping, music, and (remarkably) cement... iTunes . It is a software platform that is replacing the (nonplatform) strategy of selling CDs in retail stores. In other words, a platform-mediated...boundar- ies. Brokerage, mortgage, checking, savings, and credit cards are inte- grated around a major platform. This banking platform is even pen
Evaluating and Mitigating Software Supply Chain Security Risks
2010-05-01
is returned for all employees. The risk associated with this defect is high; variants of it have been used in attacks that caused credit card data to...via Common Access Card (CAC) readers). 29 | CMU/SEI-2010-TN-016 4.2.1 Supplier Capability Because the project is already in development, the...ClearCase, Windows, Linux and Solaris, network administration, TCP/IP, X/Motif, DII COE, Simple Net- work Management Protocol (SNMP), Agent Technology
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired...
Holler, Ernst; Rogler, Gerhard; Brenmoehl, Julia; Hahn, Joachim; Herfarth, Hans; Greinix, Hildegard; Dickinson, Anne M; Socié, Gerard; Wolff, Daniel; Fischer, Gottfried; Jackson, Graham; Rocha, Vanderson; Steiner, Beate; Eissner, Guenther; Marienhagen, Jeorg; Schoelmerich, Juergen; Andreesen, Reinhard
2006-05-15
To assess the role of NOD2/CARD15 variants on the long-term outcome of allogeneic stem cell transplantation in a genetically homogeneous group, we extended our previous study (cohort I, n = 78) and typed DNA for NOD2/CARD15 single nucleotide polymorphisms (SNPs) from an additional 225 recipients and their HLA-identical sibling donors (cohort II) treated at four other European centers. Results of genotyping were compared with clinical outcome. The strong association of NOD2/CARD15 variants with transplantation-related mortality (TRM) was confirmed in univariate and multivariate analysis; TRM increased from 20% in cohort I/22% in cohort II in recipient/donor pairs without any NOD2/CARD15 variants to 47% in cohort I/32% in cohort II in the presence of one variant in either donor or recipient and further to 57% in cohort I/74% in cohort II in the presence of 2 or more variants (P < .002 in both cohorts). NOD2/CARD15 SNPs were not associated with relapse rate but had a strong impact on overall survival. In an analysis of center effects, the type of gastrointestinal decontamination was the only factor interfering with the prognostic significance of NOD2/CARD15 SNPs. Our data further support an interaction between gastrointestinal defense mechanisms, activation of the innate immune system, and specific transplant-related complications.
ERIC Educational Resources Information Center
Miley, David W.
Many reference librarians still rely on manual searches to access vertical files, ready reference files, and other information stored in card files, drawers, and notebooks scattered around the reference department. Automated access to these materials via microcomputers using database management software may speed up the process. This study focuses…
Bedard, B; Kennedy, B S; Weimer, A C
2014-12-01
In 2011, from August to November, the Monroe County Department of Public Health (MCDPH) investigated 47 salmonellosis cases. Geographical information software (GIS) was used to map the address locations of these cases. The resulting GIS analysis and culture information indicated that there were two distinct clusters of Salmonella that were geographically different. Pulsed-field gel electrophoresis (PFGE) testing was run at the New York State Department of Health Wadsworth Laboratory and identified S. Enteritidis (23 cases) and S. Typhimurium (10 cases). The epidemiological investigation identified Turkish pine nuts as the link between ill S. Enteritidis cases. Pine nut samples sent for laboratory testing were a PFGE match to human isolates with S. Enteritidis. A national recall of Turkish pine nuts ensued. A multistate outbreak was identified as a result of the initial investigation of MCDPH, in which 43 people were infected with the outbreak strain from five states. GIS software and shopper card data provided important tools in the epidemiological investigation.
2010-03-01
to a graphics card , and not the redesign of XML. The justification is that if XML is going to be prevalent, special optimized hardware is...the answer, similar to the specialized functions of a video card . Given the Moore’s law that processing power doubles every few years, let the...and numerous multimedia players such as iTunes from Apple. These applications are free to use, but the source is restricted by software licenses
Execute-Only Attacks against Execute-Only Defenses
2016-02-18
and network cards , do not undergo translation by the MMU and are unaffected by EPT permission. The idea of exploiting systems via DMA is well studied... dump . There are two ways an attacker can gain access to a file opened using O_DIRECT. In the most straightforward scenario, the victim process may
Dual Resolution Images from Paired Fingerprint Cards
National Institute of Standards and Technology Data Gateway
NIST Dual Resolution Images from Paired Fingerprint Cards (Web, free access) NIST Special Database 30 is being distributed for use in development and testing of fingerprint compression and fingerprint matching systems. The database allows the user to develop and evaluate data compression algorithms for fingerprint images scanned at both 19.7 ppmm (500 dpi) and 39.4 ppmm (1000 dpi). The data consist of 36 ten-print paired cards with both the rolled and plain images scanned at 19.7 and 39.4 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.
78 FR 45515 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
...] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has... Supplement (DFARS) Subpart 227.71, Rights in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and clauses of the Defense Federal...
MST radar transmitter control and monitor system
NASA Technical Reports Server (NTRS)
Brosnahan, J. W.
1983-01-01
A generalized transmitter control and monitor card was developed using the Intel 8031 (8051 family) microprocessor. The design was generalized so that this card can be utilized for virtually any control application with only firmware changes. The block diagram appears in Figure 2. The card provides for local control using a 16 key keypad (up to 64 keys are supported). The local display is four digits of 7 segment LEDs. The display can indicate the status of all major system parameters and provide voltage readout for the analog signal inputs. The card can be populated with only the chips required for a given application. Fully populated, the card has two RS-232 serial ports for computer communications. It has a total of 48 TTL parallel lines that can define as either inputs or outputs in groups of four. A total of 32 analog inputs with a 0-5 volt range are supported. In addition, a real-time clock/calendar is available if required. A total of 16 k bytes of ROM and 16 k bytes of RAM is available for programming. This card can be the basis of virtually any monitor or control system with appropriate software.
NASA Technical Reports Server (NTRS)
De Luca, Gianluca; De Luca, Carlo J.; Bergman, Per
2004-01-01
A portable electronic apparatus records electromyographic (EMG) signals in as many as 16 channels at a sampling rate of 1,024 Hz in each channel. The apparatus (see figure) includes 16 differential EMG electrodes (each electrode corresponding to one channel) with cables and attachment hardware, reference electrodes, an input/output-and-power-adapter unit, a 16-bit analog-to-digital converter, and a hand-held computer that contains a removable 256-MB flash memory card. When all 16 EMG electrodes are in use, full-bandwidth data can be recorded in each channel for as long as 8 hours. The apparatus is powered by a battery and is small enough that it can be carried in a waist pouch. The computer is equipped with a small screen that can be used to display the incoming signals on each channel. Amplitude and time adjustments of this display can be made easily by use of touch buttons on the screen. The user can also set up a data-acquisition schedule to conform to experimental protocols or to manage battery energy and memory efficiently. Once the EMG data have been recorded, the flash memory card is removed from the EMG apparatus and placed in a flash-memory- card-reading external drive unit connected to a personal computer (PC). The PC can then read the data recorded in the 16 channels. Preferably, before further analysis, the data should be stored in the hard drive of the PC. The data files are opened and viewed on the PC by use of special- purpose software. The software for operation of the apparatus resides in a random-access memory (RAM), with backup power supplied by a small internal lithium cell. A backup copy of this software resides on the flash memory card. In the event of loss of both main and backup battery power and consequent loss of this software, the backup copy can be used to restore the RAM copy after power has been restored. Accessories for this device are also available. These include goniometers, accelerometers, foot switches, and force gauges.
NASA Technical Reports Server (NTRS)
Alkhatib, Hasan S.
1991-01-01
The hardware and the software architecture of the TurboLAN Intelligent Network Adapter Card (TINAC) are described. A high level as well as detailed treatment of the workings of various components of the TINAC are presented. The TINAC is divided into the following four major functional units: (1) the network access unit (NAU); (2) the buffer management unit; (3) the host interface unit; and (4) the node processor unit.
Managing Information On Technical Requirements
NASA Technical Reports Server (NTRS)
Mauldin, Lemuel E., III; Hammond, Dana P.
1993-01-01
Technical Requirements Analysis and Control Systems/Initial Operating Capability (TRACS/IOC) computer program provides supplemental software tools for analysis, control, and interchange of project requirements so qualified project members have access to pertinent project information, even if in different locations. Enables users to analyze and control requirements, serves as focal point for project requirements, and integrates system supporting efficient and consistent operations. TRACS/IOC is HyperCard stack for use on Macintosh computers running HyperCard 1.2 or later and Oracle 1.2 or later.
Mated Fingerprint Card Pairs 2 (MFCP2)
National Institute of Standards and Technology Data Gateway
NIST Mated Fingerprint Card Pairs 2 (MFCP2) (Web, free access) NIST Special Database 14 is being distributed for use in development and testing of automated fingerprint classification and matching systems on a set of images which approximate a natural horizontal distribution of the National Crime Information Center (NCIC) fingerprint classes. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.
Modified timing module for Loran-C receiver
NASA Technical Reports Server (NTRS)
Lilley, R. W.
1983-01-01
Full hardware documentation is provided for the circuit card implementing the Loran-C timing loop, and the receiver event-mark and re-track functions. This documentation is to be combined with overall receiver drawings to form the as-built record for this device. Computer software to support this module is integrated with the remainder of the receiver software, in the LORPROM program.
ERIC Educational Resources Information Center
Nieuwenhuysen, Paul
1997-01-01
Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…
Alkasab, Tarik K; Bizzo, Bernardo C; Berland, Lincoln L; Nair, Sujith; Pandharipande, Pari V; Harvey, H Benjamin
2017-09-01
Decreasing unnecessary variation in radiology reporting and producing guideline-concordant reports is fundamental to radiology's success in value-based payment models and good for patient care. In this article, we present an open authoring system for point-of-care clinical decision support tools integrated into the radiologist reporting environment referred to as the computer-assisted reporting and decision support (CAR/DS) framework. The CAR/DS authoring system, described herein, includes: (1) a definition format for representing radiology clinical guidelines as structured, machine-readable Extensible Markup Language documents and (2) a user-friendly reference implementation to test the fidelity of the created definition files with the clinical guideline. The proposed definition format and reference implementation will enable content creators to develop CAR/DS tools that voice recognition software (VRS) vendors can use to extend the commercial tools currently in use. In making the definition format and reference implementation software freely available, we hope to empower individual radiologists, expert groups such as the ACR, and VRS vendors to develop a robust ecosystem of CAR/DS tools that can further improve the quality and efficiency of the patient care that our field provides. We hope that this initial effort can serve as the basis for a community-owned open standard for guideline definition that the imaging informatics and VRS vendor communities will embrace and strengthen. To this end, the ACR Assist™ initiative is intended to make the College's clinical content, including the Incidental Findings Committee White Papers, available for decision support tool creation based upon the herein described CAR/DS framework. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.
1999-08-27
firms Infiltrate social events, like exchanging business cards at microbrewery festivals, art fairs, home & garden shows Assign candidates an in-house...E-2 Table 6. Sampling Plan for IA Data Call...F-7 Table 19. Planning and Implementation (3C3X1) ................................................................F-7
Department of Defense High Performance Computing Modernization Program. 2008 Annual Report
2009-04-01
place to another on the network. Without it, a computer could only talk to itself - no email, no web browsing, and no iTunes . Most of the Internet...Your SecurID Card ), Ken Renard Secure Wireless, Rob Scott and Stephen Bowman Securing Today’s Networks, Rich Whittney, Juniper Networks, Federal
About Us Contact Us Tell Us pentlib logo Pentagon Digital Library Pentagon 703.695.1992 | 703.695.1997 | PLC2 Mark Center 571.372.3613 | Room B1-D13 Ask A Librarian I Need a Library Card Renew WHS 1155 Defense Pentagon Washington DC 20301-1155 Search the Library Intranet Catalog Journals
Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M
1997-01-01
The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and safe. In the configuration we tested, it cannot substitute a dedicated ECG equipment: from this point of view, a smaller PCMCIA-type card with a battery-operated notebook PC will be more suitable for clinical uses. Nevertheless, the possibility to log and track ECG records, integrated into the department informative system, may provide a valuable tool for improving access to medical information.
SDI (Strategic Defense Initiative) Software Technology Program Plan
1987-06-01
station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass
FASEA: A FPGA Acquisition System and Software Event Analysis for liquid scintillation counting
NASA Astrophysics Data System (ADS)
Steele, T.; Mo, L.; Bignell, L.; Smith, M.; Alexiev, D.
2009-10-01
The FASEA (FPGA based Acquisition and Software Event Analysis) system has been developed to replace the MAC3 for coincidence pulse processing. The system uses a National Instruments Virtex 5 FPGA card (PXI-7842R) for data acquisition and a purpose developed data analysis software for data analysis. Initial comparisons to the MAC3 unit are included based on measurements of 89Sr and 3H, confirming that the system is able to accurately emulate the behaviour of the MAC3 unit.
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 3
2006-03-01
Humphreys & Associates, Inc., 2002. 3. Humphrey , Watts S . PSP : A Self- Improvement Process for...sanderfer.html>. 5. Humphrey , Watts S . A Discipline for Software Engineering. Addison- Wesley, 1995. 6. Tuma, David, and David R. Webb. “Personal Earned Value: Why...o u r c e li n e s o f c o d e ) Figure 3: Differences for Highest Degree Attained PSP /TSP 12 CROSSTALK The Journal of Defense Software
Development of a Unix/VME data acquisition system
NASA Astrophysics Data System (ADS)
Miller, M. C.; Ahern, S.; Clark, S. M.
1992-01-01
The current status of a Unix-based VME data acquisition development project is described. It is planned to use existing Fortran data collection software to drive the existing CAMAC electronics via a VME CAMAC branch driver card and associated Daresbury Unix driving software. The first usable Unix driver has been written and produces single-action CAMAC cycles from test software. The data acquisition code has been implemented in test mode under Unix with few problems and effort is now being directed toward finalizing calls to the CAMAC-driving software and ultimate evaluation of the complete system.
DIABCARD a smart card for patients with chronic diseases.
Engelbrecht, R; Hildebrand, C
1997-01-01
Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.
2001-09-01
Oriented Discrete Event Simulation,” Master’s Thesis in Operations Research, Naval Postgraduate School Monterey, CA, 1996. 12. Arntzen , A., “Software...Dependent Hit Probabilities”, Naval Research Logistics, Vol. 31, pp. 363-371, 1984. 3 Arntzen , A., “Software Components for Air Defense Planning
beta-Aminoalcohols as Potential Reactivators of Aged Sarin-/Soman-Inhibited Acetylcholinesterase
2017-02-08
This approach includes high - quality quantum mechanical/molecular mechanical calcula- tions, providing reliable reactivation steps and energetics...I. V. Khavrutskii Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced...b] Dr. A. Wallqvist Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced
Air Force and the Cyberspace Mission: Defending the Air Force’s Computer Network in the Future
2007-12-01
computers, their operating systems and software purchased by the Air Force are commercial off-the-shelf (COTS) components, often manufactured abroad due...crystal clear 2003 information security report: “The U.S. Department of Defense (DOD) relies too much on commercial software , doesn’t know who is...creating the software , and faces other significant cybersecurity problems.”11 This paper explores the topic of defense of the cyberspace domain by
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 215, 234, 242, and 252... System (DFARS Case 2008-D027) AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... 1921-2, Progress Curve Report Comment: A respondent noted that DD Form 1921-2 Progress Curve Report...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
...; competition; jobs; the environment; public health or safety; or State, local, or Tribal governments or... part 161 does not contain a Federal mandate that may result in expenditure by State, local and Tribal... sleeves to Defense Manpower Data Center (DMDC). (7) Protect cardstock and consumables in accordance with...
2016-02-01
from the tools being used. For example, while Coq proves properties it does not dump an explanation of the proofs in any currently supported form. The...Distribution Unlimited 5 Hotel room locks and card keys use a simple protocol to manage the transition of rooms from one guest to the next. The lock...retains that guest key’s code. A new guest checks in and gets a card with a new current code, and the previous code set to the previous guest’s current
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 4, July/August 2010
2010-08-01
Anita Carleton, Del Kellogg, and Jeff Schwalb Building Critical Systems as a Cyborg As outrageous as it may seem, adapting cybernetics to defense...software is a real possibility in building complex software systems. Ball discusses the history of cybernetics, what a “ cyborg ” really is, and how...What Is a Cyborg ? We want both kinds of the behavior that I’ve talked about, with predictable systems that follow established rules and proce- dures
Tidball, Ronald R.; Bartsch-Winkler, S. B.
1995-01-01
This Compact Disc-Read Only Memory (CD-ROM) contains a program illustrating the geology and mineral and energy resources of the Roswell Resource Area, an administrative unit of the U.S. Bureau of Land Management in east-central New Mexico. The program enables the user to access information on the geology, geochemistry, geophysics, mining history, metallic and industrial mineral commodities, hydrocarbons, and assessments of the area. The program was created with the display software, SuperCard, version 1.5, by Aldus. The program will run only on a Macintosh personal computer. This CD-ROM was produced in accordance with Macintosh HFS standards. The program was developed on a Macintosh II-series computer with system 7.0.1. The program is a compiled, executable form that is nonproprietary and does not require the presence of the SuperCard software.
Solutions for acceleration measurement in vehicle crash tests
NASA Astrophysics Data System (ADS)
Dima, D. S.; Covaciu, D.
2017-10-01
Crash tests are useful for validating computer simulations of road traffic accidents. One of the most important parameters measured is the acceleration. The evolution of acceleration versus time, during a crash test, form a crash pulse. The correctness of the crash pulse determination depends on the data acquisition system used. Recommendations regarding the instrumentation for impact tests are given in standards, which are focused on the use of accelerometers as impact sensors. The goal of this paper is to present the device and software developed by authors for data acquisition and processing. The system includes two accelerometers with different input ranges, a processing unit based on a 32-bit microcontroller and a data logging unit with SD card. Data collected on card, as text files, is processed with a dedicated software running on personal computers. The processing is based on diagrams and includes the digital filters recommended in standards.
Gack, Michaela Ulrike; Albrecht, Randy Allen; Urano, Tomohiko; Inn, Kyung-Soo; Huang, I-Chueh; Carnero, Elena; Farzan, Michael; Inoue, Satoshi; Jung, Jae Ung; García-Sastre, Adolfo
2009-05-08
The ubiquitin ligase TRIM25 mediates Lysine 63-linked ubiquitination of the N-terminal CARD domains of the viral RNA sensor RIG-I to facilitate type I interferon (IFN) production and antiviral immunity. Here, we report that the influenza A virus nonstructural protein 1 (NS1) specifically inhibits TRIM25-mediated RIG-I CARD ubiquitination, thereby suppressing RIG-I signal transduction. A novel domain in NS1 comprising E96/E97 residues mediates its interaction with the coiled-coil domain of TRIM25, thus blocking TRIM25 multimerization and RIG-I CARD domain ubiquitination. Furthermore, a recombinant influenza A virus expressing an E96A/E97A NS1 mutant is defective in blocking TRIM25-mediated antiviral IFN response and loses virulence in mice. Our findings reveal a mechanism by which influenza virus inhibits host IFN response and also emphasize the vital role of TRIM25 in modulating antiviral defenses.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
48 CFR 208.7400 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... commercial software and software maintenance, including software and software maintenance that is acquired— (a) As part of a system or system upgrade, where practicable; (b) Under a service contract; (c) Under...
NASA Astrophysics Data System (ADS)
Buford, James A., Jr.; Cosby, David; Bunfield, Dennis H.; Mayhall, Anthony J.; Trimble, Darian E.
2007-04-01
AMRDEC has successfully tested hardware and software for Real-Time Scene Generation for IR and SAL Sensors on COTS PC based hardware and video cards. AMRDEC personnel worked with nVidia and Concurrent Computer Corporation to develop a Scene Generation system capable of frame rates of at least 120Hz while frame locked to an external source (such as a missile seeker) with no dropped frames. Latency measurements and image validation were performed using COTS and in-house developed hardware and software. Software for the Scene Generation system was developed using OpenSceneGraph.
NASA Astrophysics Data System (ADS)
Hejtmánek, M.; Neue, G.; Voleš, P.
2015-06-01
This article is devoted to the software design and development of a high-speed readout application used for interfacing particle detectors via the CoaXPress communication standard. The CoaXPress provides an asymmetric high-speed serial connection over a single coaxial cable. It uses a widely available 75 Ω BNC standard and can operate in various modes with a data throughput ranging from 1.25 Gbps up to 25 Gbps. Moreover, it supports a low speed uplink with a fixed bit rate of 20.833 Mbps, which can be used to control and upload configuration data to the particle detector. The CoaXPress interface is an upcoming standard in medical imaging, therefore its usage promises long-term compatibility and versatility. This work presents an example of how to develop DAQ system for a pixel detector. For this purpose, a flexible DAQ card was developed using the XILINX Spartan 6 FPGA. The DAQ card is connected to the framegrabber FireBird CXP6 Quad, which is plugged in the PCI Express bus of the standard PC. The data transmission was performed between the FPGA and framegrabber card via the standard coaxial cable in communication mode with a bit rate of 3.125 Gbps. Using the Medipix2 Quad pixel detector, the framerate of 100 fps was achieved. The front-end application makes use of the FireBird framegrabber software development kit and is suitable for data acquisition as well as control of the detector through the registers implemented in the FPGA.
Open-source meteor detection software for low-cost single-board computers
NASA Astrophysics Data System (ADS)
Vida, D.; Zubović, D.; Šegon, D.; Gural, P.; Cupec, R.
2016-01-01
This work aims to overcome the current price threshold of meteor stations which can sometimes deter meteor enthusiasts from owning one. In recent years small card-sized computers became widely available and are used for numerous applications. To utilize such computers for meteor work, software which can run on them is needed. In this paper we present a detailed description of newly-developed open-source software for fireball and meteor detection optimized for running on low-cost single board computers. Furthermore, an update on the development of automated open-source software which will handle video capture, fireball and meteor detection, astrometry and photometry is given.
Access Control Is More than Security.
ERIC Educational Resources Information Center
Fickes, Michael
2002-01-01
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Code of Federal Regulations, 2012 CFR
2012-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2014 CFR
2014-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. (1) Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2011 CFR
2011-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
Code of Federal Regulations, 2013 CFR
2013-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7402 General. Departments and agencies shall fulfill requirements for commercial software and related services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software... a contract that is used to acquire designated commercial software or related services such as... Officer to develop processes for DoD-wide software asset management. Software maintenance means services...
High-Rate Data-Capture for an Airborne Lidar System
NASA Technical Reports Server (NTRS)
Valett, Susan; Hicks, Edward; Dabney, Philip; Harding, David
2012-01-01
A high-rate data system was required to capture the data for an airborne lidar system. A data system was developed that achieved up to 22 million (64-bit) events per second sustained data rate (1408 million bits per second), as well as short bursts (less than 4 s) at higher rates. All hardware used for the system was off the shelf, but carefully selected to achieve these rates. The system was used to capture laser fire, single-photon detection, and GPS data for the Slope Imaging Multi-polarization Photo-counting Lidar (SIMPL). However, the system has applications for other laser altimeter systems (waveform-recording), mass spectroscopy, xray radiometry imaging, high-background- rate ranging lidar, and other similar areas where very high-speed data capture is needed. The data capture software was used for the SIMPL instrument that employs a micropulse, single-photon ranging measurement approach and has 16 data channels. The detected single photons are from two sources those reflected from the target and solar background photons. The instrument is non-gated, so background photons are acquired for a range window of 13 km and can comprise many times the number of target photons. The highest background rate occurs when the atmosphere is clear, the Sun is high, and the target is a highly reflective surface such as snow. Under these conditions, the total data rate for the 16 channels combined is expected to be approximately 22 million events per second. For each photon detection event, the data capture software reads the relative time of receipt, with respect to a one-per-second absolute time pulse from a GPS receiver, from an event timer card with 0.1-ns precision, and records that information to a RAID (Redundant Array of Independent Disks) storage device. The relative time of laser pulse firings must also be read and recorded with the same precision. Each of the four event timer cards handles the throughput from four of the channels. For each detection event, a flag is recorded that indicates the source channel. To accommodate the expected maximum count rate and also handle the other extreme of very low rates occurring during nighttime operations, the software requests a set amount of data from each of the event timer cards and buffers the data. The software notes if any of the cards did not return all the data requested and then accommodates that lower rate. The data is buffered to minimize the I/O overhead of writing the data to storage. Care was taken to optimize the reads from the cards, the speed of the I/O bus, and RAID configuration.
Design process of a photonics network for military platforms
NASA Astrophysics Data System (ADS)
Nelson, George F.; Rao, Nagarajan M.; Krawczak, John A.; Stevens, Rick C.
1999-02-01
Technology development in photonics is rapidly progressing. The concept of a Unified Network will provide re- configurable network access to platform sensors, Vehicle Management Systems, Stores and avionics. The re-configurable taps into the network will accommodate present interface standards and provide scaleability for the insertion of future interfaces. Significant to this development is the design and test of the Optical Backplane Interconnect System funded by Naval Air Systems Command and developed by Lockheed Martin Tactical Defense Systems - Eagan. OBIS results in the merging of the electrical backplane and the optical backplane, with interconnect fabric and card edge connectors finally providing adequate electrical and optical card access. Presently OBIS will support 1.2 Gb/s per fiber over multiples of 12 fibers per ribbon cable.
Navy Littoral Combat Ship (LCS)/Frigate Program: Background and Issues for Congress
2016-04-18
each shipyard will deliver an LCS, on average, every six months for the remainder of the block buy. LCS 5 and 6 delivered with the fewest trial cards ...News (http://news.usni.org), April 9, 2014; Mike McCarthy, “LCS Program Dumping Griffin Missile In Favor Of Army’s Longbow,” Defense Daily, April 10
NASA Technical Reports Server (NTRS)
1992-01-01
The highlights of the 1992 Malcolm Baldrige National Quality Award winners - AT and T Network Systems Group, Transmission Systems Business Unit; Texas Instrument Defense Systems and Electronics Group; AT and T Universal Card Services; The Ritz Hotel CO; and The Granite Rock Company are presented, along with brief information about the company and their beliefs and business and production strategies for quality manufacturing and products.
Enhancing Defense Support of Civil Authorities within the National Capital Region
2011-04-04
tenorist organizations center of gravity, critical capabilities, critical requirements, and critical vulnerabilities. For example, to execute the...London Underground bombings ( critical capability), the group (center of gravity) needed money ( critical requirement! critical vulnerability). 8 Usually...the movement of large amounts of money through banks, the internet, or via credit cards creates a critical vulnerability because law enforcement
Defense Threat Reduction Agency > Careers > Onboarding > Your Reporting Day
Your Reporting Day Senior Executive Service Special Programs On your first day at DTRA, you will be reporting for your first day, you are required to provide proof of citizenship; therefore, you must bring a When reporting for your first day of duty, you are required to have your Common Access Card (CAC
Ballistic Missile Defense System (BMDS)
2015-12-01
Assessment and Program Evaluation CARD - Cost Analysis Requirements Description CDD - Capability Development Document CLIN - Contract Line Item Number CPD...Estimate RDT&E - Research, Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...BMDS December 2015 SAR March 23, 2016 16:29:09 UNCLASSIFIED 5 Mission and Description Mission and Description To develop, test, and field a layered
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
Code of Federal Regulations, 2010 CFR
2010-10-01
... DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208... services, such as software maintenance, in accordance with the DoD Enterprise Software Initiative (ESI... software and related services. ESI does not dictate the products or services to be acquired. ...
ERIC Educational Resources Information Center
Shalvoy, Mary Lee
1985-01-01
Describes range of options and features in gradebook programs and reviews most popular and readily available software for organizing, calculating, and updating grades: Master Grades, EA Gradebook, Gradeaid, Grader, Graphic Gradebook, Classic Plus Gradekeeping System, Records, Gradecalc, Grade Master, Report Card, Electronic Gradebook for…
Making a Comeback in the New Century.
ERIC Educational Resources Information Center
Sturgeon, Julie
2001-01-01
Reveals how Ohio's Central State University avoided state closure with a bold mission to rebuild both the academic programs and the facilities. What the new century holds for maintenance, software, card systems, contract services, and security and online purchasing are discussed. (GR)
Sight-Word Practice in a Flash!
ERIC Educational Resources Information Center
Erwin, Robin W., Jr.
2016-01-01
For learners who need sight-word practice, including young students and struggling readers, digital flash cards may promote automatic word recognition when used as a supplemental activity to regular reading instruction. A novel use of common presentation software efficiently supports this practice strategy.
Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P
2005-08-01
The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2011 CFR
2011-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2013 CFR
2013-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2012 CFR
2012-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2014 CFR
2014-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
48 CFR 212.7003 - Technical data and computer software.
Code of Federal Regulations, 2010 CFR
2010-10-01
... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...
Internal Review of the Washington Navy Yard Shooting. A Report to the Secretary of Defense
2013-11-20
the following: • Biometrically enabled background security screening • Identification card security features • Identity -proofing and vetting...claimed identities vetted through mandatory databases such as NCIC and TSDB. This occurred in attempts to reduce access costs. OMB memorandum 05-24...other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for
NPS Government Purchase Card Program: An Analysis of Internal Controls
2014-03-18
Management Division CH Cardholder COSO Committee of Sponsoring Organization of the Treadway Commission CNO Chief of Naval Operations DAU Defense...2). To minimize risks , the management and internal controls should have support from higher levels, expect integrity and ethical behavior from...Financial Executives International (FEI); The Institute of Management Accountants (IMA); and the Institute of Internal Auditors (IIA; COSO , n.d.-b
ERIC Educational Resources Information Center
Miller, Faith G.; Crovello, Nicholas J.; Chafouleas, Sandra M.
2017-01-01
Direct Behavior Rating-Single Item Scales (DBR-SIS) have been advanced as a promising, systematic, behavioral, progress-monitoring method that is flexible, efficient, and defensible. This study aimed to extend existing literature on the use of DBR-SIS in elementary and secondary settings, and to examine methods of monitoring student progress in…
Code of Federal Regulations, 2010 CFR
2010-01-01
... make loans, from time to time, directly from the creditor or indirectly by use of a credit card, check... open end consumer credit contracts before November 1, 1977 from requirements of § 433.2(a). 433.3... CONSUMERS' CLAIMS AND DEFENSES § 433.3 Exemption of sellers taking or receiving open end consumer credit...
2007-06-01
data repository that will create a metadata card for each message for use by the federated search catalog as a reference. c. Joint DMS Core Product...yet. Once resolved, NREMS can move forward afloat. The AMHS in concert with NCES will be updated with the federated search capability. AMHS
U.S. Army Student Detachment Student Handbook
1991-06-06
submit a thesis or do a major research project to meet graduation requirements, you must submit copies of the final product to the DTIC system to give...34 Identification Cards .......................................... 34 DEERS (Defense Eligibility Enrollment Report System ...USASD has access to a CONUS-wide telephone system . Therefore, no collect calls will be accepted. 4. If you do not have access to an AUTOVON, you may
Otto-Karg, Ines; Jandl, Stefanie; Müller, Tobias; Stirzel, Beate; Frosch, Matthias; Hebestreit, Helge; Abele-Horn, Marianne
2009-01-01
Accurate identification and antimicrobial susceptibility testing (AST) of nonfermenters from cystic fibrosis patients are essential for appropriate antimicrobial treatment. This study examined the ability of the newly designed Vitek 2 nonfermenting gram-negative card (NGNC) (new gram-negative identification card; bioMérieux, Marcy-l'Ètoile, France) to identify nonfermenting gram-negative rods from cystic fibrosis patients in comparison to reference methods and the accuracy of the new Vitek 2 version 4.02 software for AST compared to the broth microdilution method. Two hundred twenty-four strains for identification and 138 strains for AST were investigated. The Vitek 2 NGNC identified 211 (94.1%) of the nonfermenters correctly. Among morphologically atypical microorganisms, five strains were misidentified and eight strains were determined with low discrimination, requiring additional tests which raised the correct identification rate to 97.8%. Regarding AST, the overall essential agreement of Vitek 2 was 97.6%, and the overall categorical agreement was 92.9%. Minor errors were found in 5.1% of strains, and major and very major errors were found in 1.6% and 0.3% of strains, respectively. In conclusion, the Vitek NGNC appears to be a reliable method for identification of morphologically typical nonfermenters and is an improvement over the API NE system and the Vitek 2 GNC database version 4.01. However, classification in morphologically atypical nonfermenters must be interpreted with care to avoid misidentification. Moreover, the new Vitek 2 version 4.02 software showed good results for AST and is suitable for routine clinical use. More work is needed for the reliable testing of strains whose MICs are close to the breakpoints. PMID:19710272
Maheshkumar, K; Dilara, K; Maruthy, K N; Sundareswaren, L
2016-07-01
Heart rate variability (HRV) analysis is a simple and noninvasive technique capable of assessing autonomic nervous system modulation on heart rate (HR) in healthy as well as disease conditions. The aim of the present study was to compare (validate) the HRV using a temporal series of electrocardiograms (ECG) obtained by simple analog amplifier with PC-based sound card (audacity) and Biopac MP36 module. Based on the inclusion criteria, 120 healthy participants, including 72 males and 48 females, participated in the present study. Following standard protocol, 5-min ECG was recorded after 10 min of supine rest by Portable simple analog amplifier PC-based sound card as well as by Biopac module with surface electrodes in Leads II position simultaneously. All the ECG data was visually screened and was found to be free of ectopic beats and noise. RR intervals from both ECG recordings were analyzed separately in Kubios software. Short-term HRV indexes in both time and frequency domain were used. The unpaired Student's t-test and Pearson correlation coefficient test were used for the analysis using the R statistical software. No statistically significant differences were observed when comparing the values analyzed by means of the two devices for HRV. Correlation analysis revealed perfect positive correlation (r = 0.99, P < 0.001) between the values in time and frequency domain obtained by the devices. On the basis of the results of the present study, we suggest that the calculation of HRV values in the time and frequency domains by RR series obtained from the PC-based sound card is probably as reliable as those obtained by the gold standard Biopac MP36.
General purpose PDP-11 interface processor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purtilo, J.
1982-10-01
The Z80 interface card, which for simplicity we refer to as the Zcard, is a general purpose microprocessor which is directly interfaced to the Whaley multiplexor, itself implemented on PDP-11 series computers at the University of Illinois. The Zcard provides two serial ports at EAI interface levels and contains up to 16K of local memory. The principle function of the Zcard is to serve as an interface in which the user might alter protocols, change interface characteristics (e.g. baud rate, hardware echo, or flow control), or switch between synchronous and asynchronous modes all under software control. In addition, the Zcardmore » provides extra lines for control of external devices (e.g. modem) and input of status data. In the simpliest use, the Zcard runs a program, downloaded from the PDP-11, which emulates the level EIAFB card (previously developed for the Whaley Multiplexor) for serial communication with terminals. Using no flow control, Zcard performance seems superior to that of the EIAFB card in that no characters are lost under normal use (due to the much larger buffer which the Zcard can provide). The Zcard can further distinguish itself from the EIAFB card in that flow control can be enabled by software. A more sophisticated application of the Zcard might include linking several Zcards (using a synchronous option and both of the provided ports) into a network. In this capacity, a ring topology suggests itself as the most immediate choice, although many alternate connection schemes can be envisioned. This report is intended to summarize the project as well as provide an outline for those intending to modify or program the Zcard.« less
Assessing Survivability Using Software Fault Injection
2001-04-01
UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO10875 TITLE: Assessing Survivability Using Software Fault Injection...Esc to exit .......................................................................... = 11-1 Assessing Survivability Using Software Fault Injection...Jeffrey Voas Reliable Software Technologies 21351 Ridgetop Circle, #400 Dulles, VA 20166 jmvoas@rstcorp.crom Abstract approved sources have the
Activation of duck RIG-I by TRIM25 is independent of anchored ubiquitin.
Miranzo-Navarro, Domingo; Magor, Katharine E
2014-01-01
Retinoic acid inducible gene I (RIG-I) is a viral RNA sensor crucial in defense against several viruses including measles, influenza A and hepatitis C. RIG-I activates type-I interferon signalling through the adaptor for mitochondrial antiviral signaling (MAVS). The E3 ubiquitin ligase, tripartite motif containing protein 25 (TRIM25), activates human RIG-I through generation of anchored K63-linked polyubiquitin chains attached to lysine 172, or alternatively, through the generation of unanchored K63-linked polyubiquitin chains that interact non-covalently with RIG-I CARD domains. Previously, we identified RIG-I of ducks, of interest because ducks are the host and natural reservoir of influenza viruses, and showed it initiates innate immune signaling leading to production of interferon-beta (IFN-β). We noted that K172 is not conserved in RIG-I of ducks and other avian species, or mouse. Because K172 is important for both mechanisms of activation of human RIG-I, we investigated whether duck RIG-I was activated by TRIM25, and if other residues were the sites for attachment of ubiquitin. Here we show duck RIG-I CARD domains are ubiquitinated for activation, and ubiquitination depends on interaction with TRIM25, as a splice variant that cannot interact with TRIM25 is not ubiquitinated, and cannot be activated. We expressed GST-fusion proteins of duck CARD domains and characterized TRIM25 modifications of CARD domains by mass spectrometry. We identified two sites that are ubiquitinated in duck CARD domains, K167 and K193, and detected K63 linked polyubiquitin chains. Site directed mutagenesis of each site alone, does not alter the ubiquitination profile of the duck CARD domains. However, mutation of both sites resulted in loss of all attached ubiquitin and polyubiquitin chains. Remarkably, the double mutant duck RIG-I CARD still interacts with TRIM25, and can still be activated. Our results demonstrate that anchored ubiquitin chains are not necessary for TRIM25 activation of duck RIG-I.
Are You Listening to Your Computer?
ERIC Educational Resources Information Center
Shugg, Alan
1992-01-01
Accepting the great motivational value of computers in second-language learning, this article describes ways to use authentic language recorded on a computer with HyperCard. Graphics, sound, and hardware/software requirements are noted, along with brief descriptions of programing with sound and specific programs. (LB)
Why Students Should Use Multimedia.
ERIC Educational Resources Information Center
Bucher, Katherine
1995-01-01
Examines benefits of multimedia presentation software for teachers, librarians, and elementary and secondary school students. Discusses an example of two school library media specialists working with an English class using the library's reference collection (print and CD-ROM) and HyperCard. Suggests presentation assignments for various subjects.…
Maintaining Research Documents with Database Management Software.
ERIC Educational Resources Information Center
Harrington, Stuart A.
1999-01-01
Discusses taking notes for research projects and organizing them into card files; reviews the literature on personal filing systems; introduces the basic process of database management; and offers a plan for managing research notes. Describes field groups and field definitions, data entry, and creating reports. (LRW)
Exploiting current-generation graphics hardware for synthetic-scene generation
NASA Astrophysics Data System (ADS)
Tanner, Michael A.; Keen, Wayne A.
2010-04-01
Increasing seeker frame rate and pixel count, as well as the demand for higher levels of scene fidelity, have driven scene generation software for hardware-in-the-loop (HWIL) and software-in-the-loop (SWIL) testing to higher levels of parallelization. Because modern PC graphics cards provide multiple computational cores (240 shader cores for a current NVIDIA Corporation GeForce and Quadro cards), implementation of phenomenology codes on graphics processing units (GPUs) offers significant potential for simultaneous enhancement of simulation frame rate and fidelity. To take advantage of this potential requires algorithm implementation that is structured to minimize data transfers between the central processing unit (CPU) and the GPU. In this paper, preliminary methodologies developed at the Kinetic Hardware In-The-Loop Simulator (KHILS) will be presented. Included in this paper will be various language tradeoffs between conventional shader programming, Compute Unified Device Architecture (CUDA) and Open Computing Language (OpenCL), including performance trades and possible pathways for future tool development.
Tuple spaces in hardware for accelerated implicit routing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baker, Zachary Kent; Tripp, Justin
2010-12-01
Organizing and optimizing data objects on networks with support for data migration and failing nodes is a complicated problem to handle as systems grow. The goal of this work is to demonstrate that high levels of speedup can be achieved by moving responsibility for finding, fetching, and staging data into an FPGA-based network card. We present a system for implicit routing of data via FPGA-based network cards. In this system, data structures are requested by name, and the network of FPGAs finds the data within the network and relays the structure to the requester. This is acheived through successive examinationmore » of hardware hash tables implemented in the FPGA. By avoiding software stacks between nodes, the data is quickly fetched entirely through FPGA-FPGA interaction. The performance of this system is orders of magnitude faster than software implementations due to the improved speed of the hash tables and lowered latency between the network nodes.« less
Excimer PRK testing in the clinic
NASA Astrophysics Data System (ADS)
Forrest, Gary T.
1994-06-01
Testing of the excimer lasers used in PRK requires special considerations in terms of ease of use, day-to-day reliability, and high resolution to see details of beam interference effects. SensorPhysics employs a patented photochromic material on a polyester substrate to record permanent, instant records of the laser and laser system output. Since each SensorCard is used only once concerns about detection device deterioration are not an issue. The SensorCards have a demonstrated resolving power on the order of 0.1 micrometers . A small, portable reading device is used to convert the SensorCard optical density to a mJ/cm2 value. Special software also measures beam uniformity to +/- 1% to provide both qualitative and quantitative analysis. Results of use in clinic environments will be presented. In particular detection of exposure `islands' will be demonstrated. The techniques employed are similar to those we developed for UV laser micromachining and lithography four years ago.
2010-01-01
offshoring, or producing major software components overseas (Defense Science Board, 2009). These trends raise concerns about the level of trust that...7 Software Complexity...7 Increasing Software Vulnerabilities and Malware Population . . . . . . . . . . . . . . . . 9 Limitations of
RTSPM: real-time Linux control software for scanning probe microscopy.
Chandrasekhar, V; Mehta, M M
2013-01-01
Real time computer control is an essential feature of scanning probe microscopes, which have become important tools for the characterization and investigation of nanometer scale samples. Most commercial (and some open-source) scanning probe data acquisition software uses digital signal processors to handle the real time data processing and control, which adds to the expense and complexity of the control software. We describe here scan control software that uses a single computer and a data acquisition card to acquire scan data. The computer runs an open-source real time Linux kernel, which permits fast acquisition and control while maintaining a responsive graphical user interface. Images from a simulated tuning-fork based microscope as well as a standard topographical sample are also presented, showing some of the capabilities of the software.
77 FR 40863 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2012-OS-0085] Privacy Act of 1974... Register Liaison Officer, Department of Defense. QNRO-31 System name: Software Security Risk Evaluations... the Department of Defense; DoDD 5240.2, DoD Counterintelligence (CI); DoDI 5240.8, Security...
Software for visualization, analysis, and manipulation of laser scan images
NASA Astrophysics Data System (ADS)
Burnsides, Dennis B.
1997-03-01
The recent introduction of laser surface scanning to scientific applications presents a challenge to computer scientists and engineers. Full utilization of this two- dimensional (2-D) and three-dimensional (3-D) data requires advances in techniques and methods for data processing and visualization. This paper explores the development of software to support the visualization, analysis and manipulation of laser scan images. Specific examples presented are from on-going efforts at the Air Force Computerized Anthropometric Research and Design (CARD) Laboratory.
Strategy for a DOD Software Initiative. Volume 2. Appendices
1983-10-01
Druffel 9 PERFORMING ORGANIZATION NAME AND ADDRESS 1 10 . PROGRAM ELEMENT. PROJECT. TASK AREA 6 WORK UN17 NUMBERS Office of Under Secretary of Defense...New Approach j Lwering DoD Software Costs, Honeywell Aerospace and Defense Group, March 1982. 3 10 p - -q Recognizing that the opportunities and needs...Epstein, M. Fallon, R. A. Farrar, B. L. Fischer, Herman Fisher, Dave Fowler, Northrup, III Fox, Joseph Frager, David S. Frank, Geoffrey A. Fredette
Extending Team Software Process (TSP) to Systems Engineering: A NAVAIR Experience Report
2010-03-01
instrumental in formulating the concepts and approaches presented in this report: Dan Burton, Anita Carleton, Timothy Chick, Mike Fehring, Watts Humphrey ...Senate,” GAO-04-393, Defense Acquisitions, 2004. http://www.gao.gov/new.items/d04393.pdf [ Humphrey 06] W. S . Humphrey , TSP: Leading a Development... Humphrey 08] W. S . Humphrey , “The Process Revolution,” CrossTalk The Journal of Defense Software Engineering, August 2008, Volume 28 Number 8
A HyperCard Program for Business German.
ERIC Educational Resources Information Center
Paulsell, Patricia R.
Although the use of computer-assisted language instruction software has been mainly limited to grammatical/syntactical drills, the increasing number of language professionals with programming skills is leading to the development of more sophisticated language education programs. This report describes the generation of such a program using the…
47 CFR 73.9006 - Add-in covered demodulator products.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Section 73.9006 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES... passed to an output (e.g., where a demodulator add-in card in a personal computer passes such content to an associated software application installed in the same computer), it shall pass such content: (1...
Database Software for the 1990s.
ERIC Educational Resources Information Center
Beiser, Karl
1990-01-01
Examines trends in the design of database management systems for microcomputers and predicts developments that may occur in the next decade. Possible developments are discussed in the areas of user interfaces, database programing, library systems, the use of MARC data, CD-ROM applications, artificial intelligence features, HyperCard, and…
A Computer Program for the Management of Prescription-Based Problems.
ERIC Educational Resources Information Center
Cotter, Patricia M.; Gumtow, Robert H.
1991-01-01
The Prescription Management Program, a software program using Apple's HyperCard on a MacIntosh, was developed to simplify the creation, storage, modification, and general management of prescription-based problems. Pharmacy instructors may customize the program to serve their individual teaching needs. (Author/DB)
Serendipity and Holism: The Beauty of OPACs.
ERIC Educational Resources Information Center
Rice, James
1988-01-01
Identifies factors which may account for user dissatisfaction with online public access catalogs (OPACs) and discusses some advantages of OPACs over card catalogs: (1) design for subject searching; (2) flexibility; (3) browsing capability; (4) precision; (5) availability of status information; and (6) development of microcomputer software to…
Software Master Plan. Volume 2. Background (Annexes A-G)
1990-02-09
AFLC is also responsible for the support of the Avionics Integration Support Facilities, the pilot training systems support and the Automatic Test ...Deputy Director of Defense Research and Engineering ( Test & Evaluation) ..... ............ A.1.1.3 Office of the Deputy Director of Defense Research and...Department of Defense .... ........ 3 A.3 Operational Test & Evaluation ........ ................. 4 A.4 Office of the Assistant Secretary of Defense
SOFTWARE ENGINEERING INSTITUTE (SEI)
The Software Engineering Institute (SEI) is a federally funded research and development center established in 1984 by the U.S. Department of Defense and operated by Carnegie Mellon University. SEI has a broad charter to provide leadership in the practice of software engineering t...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 227.7201 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
48 CFR 208.7401 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7401 Definitions. As used in this subpart— Enterprise software agreement means an agreement or a contract that is used to acquire designated commercial software or related services such as...
1994-06-27
the amount of dilution air . Conditioned house- compressed air was used as the diluent. The conditioning procedure consisted of passing the house air ...unsymmetrical dlmethylhydrazine (UDMI-) in air has been developed. The dosimeter consists of a replaceable dosimeter card and a reusable...Department of Defense and NASA require air monitoring for hydrazines in areas where they are handled and/or stored. A real-time dosimeter using vanillin
Department of Defense Technology Transfer (T2) Program
2014-04-08
January February (1st Monday) Disposal System Performance Spec Production Representative Articles CARD – Cost Analysis Requirements Description CCE...Supportability Objectives Exit Criteria Met APB MTA FMECA FTA LORA RCM MS B Threshold/objective tradeoffs – Revised Performance Attributes MS C MS A...Evaluation FTA – Failure Tree Analysis IOT&E – Initial Operational Test & Evaluation ISR – In-Service Review ISP – Information Support Plan ITR – Initial
37th Training Wing > Units > Inter-American Air Forces Academy
37th Training Wing 37th Training Wing Join the Air Force Home News Commentaries Features Photos Art Information CAC/ID Card Information Units 37th Training Group 341st Training Squadron 344th Training Squadron 37th Training Wing Staff Agency 737th Training Group Defense Language Institute English Language Center
2011-04-18
Treadway Commission ( Whittington & Pany, 2012). Furthermore, the Chief Finanical Officers Act (1990) noted that billions of dollars were being lost...The components of the internal control framework include the following ( Whittington & Pany, 2012): 1. The Control Environment, 2. Risk Assessment...approaches to fraud deterrence. Journal of Accountancy, 197(2), 72–76. Whittington , O. R., & Pany, K. (2012). Principles of auditing and other
Software Graphics Processing Unit (sGPU) for Deep Space Applications
NASA Technical Reports Server (NTRS)
McCabe, Mary; Salazar, George; Steele, Glen
2015-01-01
A graphics processing capability will be required for deep space missions and must include a range of applications, from safety-critical vehicle health status to telemedicine for crew health. However, preliminary radiation testing of commercial graphics processing cards suggest they cannot operate in the deep space radiation environment. Investigation into an Software Graphics Processing Unit (sGPU)comprised of commercial-equivalent radiation hardened/tolerant single board computers, field programmable gate arrays, and safety-critical display software shows promising results. Preliminary performance of approximately 30 frames per second (FPS) has been achieved. Use of multi-core processors may provide a significant increase in performance.
Chart Card: Feasibility of a Tool for Improving Emergency Department Care in Sickle Cell Disease
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C.; Paulukonis, Susan; Vichinsky, Elliott P.; Treadwell, Marsha J.
2016-01-01
Background Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card–sized Chart Card was designed. Objective To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. Methods One-half of 44 adults (aged ~18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Results Fifty-two percent of patients were female (mean age, 18.8 ± 15.6); 61% had SCD SS. Adults visited an emergency department 4.2 ± 4.0 times in the year prior to enrollment vs 2.7 ± 3.7 (p = .06) visits for children, most commonly for pain. Patient emergency department care ratings of very good or excellent increased from 47% to 66% (p < .05), and ratings of staff knowledge improved. Qualitative data reflected positive comments about patient and staff experiences with the Chart Card. Conclusion Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings. PMID:21141289
ERIC Educational Resources Information Center
Haley, M.
2013-01-01
The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…
Reusable Ada Software for Command and Control Workstation Map Manipulation
1992-06-18
h-.. I.. b 1 .. hm . T.... ~ N -k.L A..-bt ... ~ 4.g -np ft. Figure 15. The Main Display Storyboard (final iteration) are other panels not shown which...Defense, October 1988. 18. Defense Mapping Agency, Products Catalog, Digitizing The Future, 3d ed., Department of Defense, No Date. 183 19. Deitel , H
48 CFR 227.7207 - Contractor data repositories.
Code of Federal Regulations, 2010 CFR
2010-10-01
... repositories. 227.7207 Section 227.7207 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Computer Software and Computer Software Documentation 227.7207 Contractor data repositories. Follow 227.7108 when it is in the Government's interests to have a data repository include computer software or to...
Su, TzuFen; Lin, Shu-Hua
2014-01-01
This study was conducted in an attempt to investigate the effectiveness of an educational card game we developed for learning human immunology. Two semesters of evaluation were included to examine the impact of the game on students’ understanding and perceptions of the game-based instruction. Ninety-nine senior high school students (11th graders) were recruited for the first evaluation, and the second-semester group consisted of 72 students (also 11th graders). The results obtained indicate that students did learn from the educational card game. Moreover, students who learned from playing the game significantly outperformed their counterparts in terms of their understanding of the processes and connections among different lines of immunological defense (first semester: t = 2.92, p < 0.01; second semester: t = 3.45, p < 0.01) according to the qualitative analysis of an open-ended question. They generally had positive perceptions toward the game-based instruction and its learning efficiency, and they felt the game-based instruction was much more interesting than traditional didactic lectures (first semester: t = 2.79, p < 0.01; second semester: t = 2.41, p < 0.05). This finding is evidence that the educational card game has potential to facilitate students’ learning of how the immune system works. The implications and suggestions for future work are further discussed. PMID:25185233
Using Commercial Off-the-Shelf Software Tools for Space Shuttle Scientific Software
NASA Technical Reports Server (NTRS)
Groleau, Nicolas; Friedland, Peter (Technical Monitor)
1994-01-01
In October 1993, the Astronaut Science Advisor (ASA) was on board the STS-58 flight of the space shuttle. ASA is an interactive system providing data acquisition and analysis, experiment step re-scheduling, and various other forms of reasoning. As fielded, the system runs on a single Macintosh PowerBook 170, which hosts the six ASA modules. There is one other piece of hardware, an external (GW Instruments, Sommerville, Massachusetts) analog-to-digital converter connected to the PowerBook's SCSI port. Three main software tools were used: LabVIEW, CLIPS, and HyperCard: First, a module written in LabVIEW (National Instruments, Austin, Texas) controls the A/D conversion and stores the resulting data in appropriate arrays. This module also analyzes the numerical data to produce a small set of characteristic numbers or symbols describing the results of an experiment trial. Second, a forward-chaining inference system written in CLIPS (NASA) uses the symbolic information provided by the first stage with a static rule base to infer decisions about the experiment. This expert system shell is used by the system for diagnosis. The third component of the system is the user interface, written in HyperCard (Claris Inc. and Apple Inc., both in Cupertino, California).
Dealing Your Own Hands with Hypercard.
ERIC Educational Resources Information Center
Larsen, Mark D.
1988-01-01
Extensively reviews Hypercard, a multifaceted software package for the Macintosh. HyperCard uses a language called "hypertext" which was patterned after everyday language and designed to allow flexibility in the linking and manipulation of text, graphics, and sounds. Describes one use for Hypercard in an advanced course on Latin American…
Interactive Video and Informal Learning Environments.
ERIC Educational Resources Information Center
Morrissey, Kristine A.
The Michigan State University Museum used an interactive videodisc (IVD) as an introduction to a special exhibit, "Birds in Trouble in Michigan." The hardware components included a videodisc player, a microcomputer, a video monitor, and a mouse. Software included a HyperCard program and the videodisc "Audubon Society's VideoGuide to…
Examination of the Open Market Corridor
2003-12-01
105 D. BENEFITS OF THE PURCHASE CARD PROGRAM ..........................107 1. List of Benefits ...107 2. Additional Benefits and How OMC Can Increase the Benefits ...107 E. WEAKNESSES OF...software licenses and support services. Estimated life-cycle costs for FY 1995 through FY 2005 are $3.7 billion. Operational benefits from SPS are
The Soil Stack: An Interactive Computer Program Describing Basic Soil Science and Soil Degradation.
ERIC Educational Resources Information Center
Cattle, S. R.; And Others
1995-01-01
A computer program dealing with numerous aspects of soil degradation has a target audience of high school and university students (16-20 year olds), and is presented in a series of cards grouped together as stacks. Describes use of the software in Australia. (LZ)
Lawrence, Daphne
2009-08-01
Though patient satisfaction initiatives exist in healthcare, they rarely fall under the CRM moniker. Some subscription software can help hospitals track patient demographics. Building brand loyalty begins with improving patient experience. Report cards are often used to measure and improve the patient experience.
Neural network applications in telecommunications
NASA Technical Reports Server (NTRS)
Alspector, Joshua
1994-01-01
Neural network capabilities include automatic and organized handling of complex information, quick adaptation to continuously changing environments, nonlinear modeling, and parallel implementation. This viewgraph presentation presents Bellcore work on applications, learning chip computational function, learning system block diagram, neural network equalization, broadband access control, calling-card fraud detection, software reliability prediction, and conclusions.
BioAir: Bio-Inspired Airborne Infrastructure Reconfiguration
2016-01-01
PI minicomputer powered by a different supply. The ODROID and Raspberry PI communicate via an Ethernet connection through a software interface named...HardKernel, an Atheros Wi-Fi card connected to it, and a dedicated power pack developed by RavPower. The hexarotor’s autopilot runs on a separate Raspberry
Generating a Professional Portfolio in the Writing Center: A Hypertext Tutor.
ERIC Educational Resources Information Center
Cullen, Roxanne; Balkema, Sandra
1995-01-01
Notes that Ferris State University's writing center uses HyperCard software in the Macintosh environment to assist students in technical/professional programs to develop professional portfolios. Suggests that this approach offers consistent instruction and equal access to content information as approved by faculty in specified disciplines in a…
NASA Astrophysics Data System (ADS)
Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.
2018-01-01
Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.
Emerging Technologies for Software-Reliant Systems
2011-02-24
needs • Loose coupling • Global distribution of hardware, software and people • Horizontal integration and convergence • Virtualization...Webinar– February 2011 © 2011 Carnegie Mellon University Global Distribution of Hardware, Software and People Globalization is an essential part of...University Required Software Engineering Emphasis Due to Emerging Technologies (2) Defensive Programming • Security • Auto-adaptation • Globalization
Automated Software Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
Demonstration of Heavy Hybrid Diesel Fleet Vehicles Final Report Version 2
2016-03-29
Rescue 215 Truck, Earth Auger/Digger Derrick 154 Hybrid Electric System Truck, Refuse 54 Hybrid Launch Assist Truck, Dump 921 Truck, Refrigerator...5,013 In-Progress; Hybrid Electric System Dump Truck 776 Naval Construction Force Truck 1,500 Engineer Tractor 2,942 Heavy Equipment Transporter...fuel consumed by both trucks using Defense Logistics Agency (DLA) fuel management data. Card readers capture this data at the point of fueling using a
Defense AR Journal. Volume 17, Number 3, Issue 55, July 2010. Managing the Unknown
2010-07-01
you to submit your final draft of the manuscript, especially citations (endnotes instead of footnotes), in the format specified in two specific style ...6th Edition) and the Chicago Manual of Style (15th Edition). Contributors are encouraged to seek the advice of a reference librarian in completing...official training , purchases made from “nonpreferential” sources, and lack of timely reconciliation and spending activity to card charges. In
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 252.204-7008 - Export-Controlled Items.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Defense items, defined in the Arms Export Control Act, 22 U.S.C. 2778(j)(4)(A), as defense articles, defense services, and related technical data, and further defined in the ITAR, 22 CFR part 120. (2) Items, defined in the EAR as “commodities, software, and technology,” terms that are also defined in the EAR, 15...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2012 CFR
2012-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2013 CFR
2013-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2010 CFR
2010-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2011 CFR
2011-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
48 CFR 227.7106 - Contracts for special works.
Code of Federal Regulations, 2014 CFR
2014-10-01
... works. 227.7106 Section 227.7106 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in... software documentation, scripts, soundtracks, musical compositions, and adaptations; histories of...
NASA Technical Reports Server (NTRS)
Caplin, R. S.; Royer, E. R.
1978-01-01
Attempts are made to provide a total design of a Microbial Load Monitor (MLM) system flight engineering model. Activities include assembly and testing of Sample Receiving and Card Loading Devices (SRCLDs), operator related software, and testing of biological samples in the MLM. Progress was made in assembling SRCLDs with minimal leaks and which operate reliably in the Sample Loading System. Seven operator commands are used to control various aspects of the MLM such as calibrating and reading the incubating reading head, setting the clock and reading time, and status of Card. Testing of the instrument, both in hardware and biologically, was performed. Hardware testing concentrated on SRCLDs. Biological testing covered 66 clinical and seeded samples. Tentative thresholds were set and media performance listed.
A UNIX SVR4-OS 9 distributed data acquisition for high energy physics
NASA Astrophysics Data System (ADS)
Drouhin, F.; Schwaller, B.; Fontaine, J. C.; Charles, F.; Pallares, A.; Huss, D.
1998-08-01
The distributed data acquisition (DAQ) system developed by the GRPHE (Groupe de Recherche en Physique des Hautes Energies) group is a combination of hardware and software dedicated to high energy physics. The system described here is used in the beam tests of the CMS tracker. The central processor of the system is a RISC CPU hosted in a VME card, running a POSIX compliant UNIX system. Specialized real-time OS9 VME cards perform the instrumentation control. The main data flow goes over a deterministic high speed network. The UNIX system manages a list of OS9 front-end systems with a synchronisation protocol running over a TCP/IP layer.
Automatic Rotational Sky Quality Meter (R-SQM) Design and Software for Astronomical Observatories
NASA Astrophysics Data System (ADS)
Dogan, E.; Ozbaldan, E. E.; Shameoni, Niaei M.; Yesilyaprak, C.
2016-12-01
We have presented the new design of Sky Quality Meter (SQM) device that is an automatic rotational model of sky quality meter (R-SQM) carried out by DAG (Eastern Anatolia Observatory) Technical Team. R-SQM is required for determining the long-term changes of sky quality of an astronomical observatory and consists of four SQM devices mounted on a rotating shaft with different angles for scanning all sky. This system is controlled by a Raspberry Pi control card and a step motor with its driver and a special software.
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 1
2008-01-01
project manage- ment and the individual components of the software life-cycle model ; it will be awarded for...software professionals that had been formally educated in software project manage- ment. The study indicated that our industry is lacking in program managers...soft- ware developments get bigger, more complicated, and more dependent on senior software pro- fessionals to get the project on the right path
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 9
2005-09-01
2004. 12. Humphrey , Watts . Introduction to the Personal Software Process SM. Addison- Wesley 1997. 13. Humphrey , Watts . Introduction to the Team...Personal Software ProcessSM (PSPSM)is a software development process orig- inated by Watts Humphrey at the Software Engineering Institute (SEI) in the...meets its commitments and bring a sense of control and predictability into an apparently chaotic project.u References 1. Humphrey , Watts . Coaching
Linking Different Cultures by Computers: A Study of Computer-Assisted Music Notation Instruction.
ERIC Educational Resources Information Center
Chen, Steve Shihong; Dennis, J. Richard
1993-01-01
Describes a study that investigated the feasibility of using computers to teach music notation systems to Chinese students, as well as to help Western educators study Chinese music and its number notation system. Topics discussed include students' learning sequences; HyperCard software; hypermedia and graphic hypertext indexing; and the…
Graphics with Special Interfaces for Disabled People.
ERIC Educational Resources Information Center
Tronconi, A.; And Others
The paper describes new software and special input devices to allow physically impaired children to utilize the graphic capabilities of personal computers. Special input devices for computer graphics access--the voice recognition card, the single switch, or the mouse emulator--can be used either singly or in combination by the disabled to control…
Design, testing, and delivery of an interactive graphics display subsystem
NASA Technical Reports Server (NTRS)
Holmes, B.
1973-01-01
An interactive graphics display system was designed to be used in locating components on a printed circuit card and outputting data concerning their thermal values. The manner in which this was accomplished in terms of both hardware and software is described. An analysis of the accuracy of this approach is also included.
Digitizing the Past: A History Book on CD-ROM.
ERIC Educational Resources Information Center
Rosenzweig, Roy
1993-01-01
Describes the development of an American history book with interactive CD-ROM technology that includes text, pictures, graphs and charts, audio, and film. Topics discussed include the use of HyperCard software to link information; access to primary sources of information; greater student control over learning; and the concept of collaborative…
Your Computerized Classroom: Using Computers with Hearing Impaired Students.
ERIC Educational Resources Information Center
Abrams, Mary, Ed.
Thirteen papers submitted to a proposed conference (1986) at Gallaudet College on using computers to teach hearing impaired students are collected in this book. Many papers emphasize the use of word processing software to build language skills. Papers have the following titles and authors: "The Business of Writing: The Special Kids Card Company"…
The Data Collector: A Qualitative Research Tool.
ERIC Educational Resources Information Center
Handler, Marianne G.; Turner, Sandra V.
Computer software that is intended to assist the qualitative researcher in the analysis of textual data is relatively new. One such program, the Data Collector, is a HyperCard computer program designed for use on the Macintosh computer. A tool for organizing and analyzing textual data obtained from observations, interviews, surveys, and other…
A High-Resolution Stopwatch for Cents
ERIC Educational Resources Information Center
Gingl, Z.; Kopasz, K.
2011-01-01
A very low-cost, easy-to-make stopwatch is presented to support various experiments in mechanics. The high-resolution stopwatch is based on two photodetectors connected directly to the microphone input of a sound card. Dedicated free open-source software has been developed and made available to download. The efficiency is demonstrated by a free…
Activation of Duck RIG-I by TRIM25 Is Independent of Anchored Ubiquitin
Miranzo-Navarro, Domingo; Magor, Katharine E.
2014-01-01
Retinoic acid inducible gene I (RIG-I) is a viral RNA sensor crucial in defense against several viruses including measles, influenza A and hepatitis C. RIG-I activates type-I interferon signalling through the adaptor for mitochondrial antiviral signaling (MAVS). The E3 ubiquitin ligase, tripartite motif containing protein 25 (TRIM25), activates human RIG-I through generation of anchored K63-linked polyubiquitin chains attached to lysine 172, or alternatively, through the generation of unanchored K63-linked polyubiquitin chains that interact non-covalently with RIG-I CARD domains. Previously, we identified RIG-I of ducks, of interest because ducks are the host and natural reservoir of influenza viruses, and showed it initiates innate immune signaling leading to production of interferon-beta (IFN-β). We noted that K172 is not conserved in RIG-I of ducks and other avian species, or mouse. Because K172 is important for both mechanisms of activation of human RIG-I, we investigated whether duck RIG-I was activated by TRIM25, and if other residues were the sites for attachment of ubiquitin. Here we show duck RIG-I CARD domains are ubiquitinated for activation, and ubiquitination depends on interaction with TRIM25, as a splice variant that cannot interact with TRIM25 is not ubiquitinated, and cannot be activated. We expressed GST-fusion proteins of duck CARD domains and characterized TRIM25 modifications of CARD domains by mass spectrometry. We identified two sites that are ubiquitinated in duck CARD domains, K167 and K193, and detected K63 linked polyubiquitin chains. Site directed mutagenesis of each site alone, does not alter the ubiquitination profile of the duck CARD domains. However, mutation of both sites resulted in loss of all attached ubiquitin and polyubiquitin chains. Remarkably, the double mutant duck RIG-I CARD still interacts with TRIM25, and can still be activated. Our results demonstrate that anchored ubiquitin chains are not necessary for TRIM25 activation of duck RIG-I. PMID:24466302
West Europe Report Tables of Contents JPRS-WER-86-064, 2 July 1986 JPRS-WER-86-124, 31 Dec 1986.
1987-03-30
Exercise (Lars Porne ; SVENSKA DAGBLADET, 13 May 86) 59 Defense Research Institute To Study Officer Drain Causes (Richard Aschberg; SVENSKA DAGBLADET...DAGENS NYHETER, 8 Jun 86) 67 Entire Harsfjarden To Be Blocked With Nets To Halt Subs (Lars Porne ; SVENSKA DAGBLADET, 30 May 86) 72 Private Group...Fundamentalists Abroad Disagree on Ideology (HURRIYET, 20 Aug 86) 49 Fundamentalist Propaganda in Greeting Cards, Videos (HURRIYET, 16 Aug 86
CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 6. November/December 2011
2011-11-01
Software Development.” Software Quality Professional Journal, American Society for Quality (ASQ), (March 2010) 4-14. 3. Nair, Gopalakrishnan T.R...Inspection Performance Metric”. Software Quality Professional Journal, American Society for Quality (ASQ), Volume 13, Issue 2, (March 2011) 14-26...the discovery process and are marketed by compa- nies such as Black Duck Software, OpenLogic, Palamida, and Protecode, among others.7 A number of open
Pi-Sat: A Low Cost Small Satellite and Distributed Spacecraft Mission System Test Platform
NASA Technical Reports Server (NTRS)
Cudmore, Alan
2015-01-01
Current technology and budget trends indicate a shift in satellite architectures from large, expensive single satellite missions, to small, low cost distributed spacecraft missions. At the center of this shift is the SmallSatCubesat architecture. The primary goal of the Pi-Sat project is to create a low cost, and easy to use Distributed Spacecraft Mission (DSM) test bed to facilitate the research and development of next-generation DSM technologies and concepts. This test bed also serves as a realistic software development platform for Small Satellite and Cubesat architectures. The Pi-Sat is based on the popular $35 Raspberry Pi single board computer featuring a 700Mhz ARM processor, 512MB of RAM, a flash memory card, and a wealth of IO options. The Raspberry Pi runs the Linux operating system and can easily run Code 582s Core Flight System flight software architecture. The low cost and high availability of the Raspberry Pi make it an ideal platform for a Distributed Spacecraft Mission and Cubesat software development. The Pi-Sat models currently include a Pi-Sat 1U Cube, a Pi-Sat Wireless Node, and a Pi-Sat Cubesat processor card.The Pi-Sat project takes advantage of many popular trends in the Maker community including low cost electronics, 3d printing, and rapid prototyping in order to provide a realistic platform for flight software testing, training, and technology development. The Pi-Sat has also provided fantastic hands on training opportunities for NASA summer interns and Pathways students.
OSI for hardware/software interoperability
NASA Astrophysics Data System (ADS)
Wood, Richard J.; Harvey, Donald L.; Linderman, Richard W.; Gardener, Gary A.; Capraro, Gerard T.
1994-03-01
There is a need in public safety for real-time data collection and transmission from one or more sensors. The Rome Laboratory and the Ballistic Missile Defense Organization are pursuing an effort to bring the benefits of Open System Architectures (OSA) to embedded systems within the Department of Defense. When developed properly OSA provides interoperability, commonality, graceful upgradeability, survivability and hardware/software transportability to greatly minimize life cycle costs, integration and supportability. Architecture flexibility can be achieved to take advantage of commercial accomplishments by basing these developments on vendor-neutral commercially accepted standards and protocols.
1986-09-01
point here Is that the capital cost of design and development (including the cost of software tools and/or CAD/CAM programs which aided in the development...and capitalization , software Is in many ways more Ike a hardware component than it is Ike the tech- nical documentation which supports the hardware...Invoked, the owner of intelectual property rights in software may attach appropriate copyright notices to software delivered under this contract. 2.2.2
48 CFR 208.7403 - Acquisition procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Enterprise Software Agreements 208.7403 Acquisition procedures. Follow the procedures at PGI 208.7403 when acquiring commercial software and related services. [71 FR 39005, July 11, 2006] ...
Canes Implementation: Analysis of Budgetary, Business, and Policy Challenges
2014-12-01
Concept of Operations COTS Commercial Off the Shelf DAG Defense Acquisitions Guidebook DAS Defense Acquisitions System DOD Department of Defense...and Integration NSS National Security Strategy OA Open Architecture OCO Overseas Contingency Operations OEF Operation Enduring Freedom OIF...and software and civilian-type open architecture ( OA ) presents a series of challenges. The purpose of this report is to provide the Navy with a
Errata: Response Analysis and Error Diagnosis Tools.
ERIC Educational Resources Information Center
Hart, Robert S.
This guide to ERRATA, a set of HyperCard-based tools for response analysis and error diagnosis in language testing, is intended as a user manual and general reference and designed to be used with the software (not included here). It has three parts. The first is a brief survey of computational techniques available for dealing with student test…
Zhou, Yu; Ren, Jie
2011-04-01
We put forward a new concept of software oversampling mapping system for electrocardiogram (ECG) to assist the research of the ECG inverse problem to improve the generality of mapping system and the quality of mapping signals. We then developed a conceptual system based on the traditional ECG detecting circuit, Labview and DAQ card produced by National Instruments, and at the same time combined the newly-developed oversampling method into the system. The results indicated that the system could map ECG signals accurately and the quality of the signals was good. The improvement of hardware and enhancement of software made the system suitable for mapping in different situations. So the primary development of the software for oversampling mapping system was successful and further research and development can make the system a powerful tool for researching ECG inverse problem.
OpenCL Implementation of NeuroIsing
NASA Astrophysics Data System (ADS)
Zapart, C. A.
Recent advances in graphics card hardware combined with anintroduction of the OpenCL standard promise to accelerate numerical simulations across diverse scientific disciplines. One such field benefiting from new hardware/software paradigms is econophysics. The paper describes an OpenCL implementation of a selected econophysics model: NeuroIsing, which has been designed to execute in parallel on a vendor-independent graphics card. Originally introduced in the paper [C.~A.~Zapart, ``Econophysics in Financial Time Series Prediction'', PhD thesis, Graduate University for Advanced Studies, Japan (2009)], at first it was implemented on a CELL processor running inside a SONY PS3 games console. The NeuroIsing framework can be applied to predicting and trading foreign exchange as well as stock market index futures.
A Unix SVR-4-OS9 distributed data acquisition for high energy physics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drouhin, F.; Schwaller, B.; Fontaine, J.C.
1998-08-01
The distributed data acquisition (DAQ) system developed by the GRPHE (Groupe de Recherche en Physique des Hautes Energies) group is a combination of hardware and software dedicated to high energy physics. The system described here is used in the beam tests of the CMs tracker. The central processor of the system is a RISC CPU hosted in a VME card, running a POSIX compliant UNIX system. Specialized real-time OS9 VME cards perform the instrumentation control. The main data flow goes over a deterministic high speed network. The Unix system manages a list of OS9 front-end systems with a synchronization protocolmore » running over a TCP/IP layer.« less
NASA Astrophysics Data System (ADS)
Anderson, J.; Bauer, K.; Borga, A.; Boterenbrood, H.; Chen, H.; Chen, K.; Drake, G.; Dönszelmann, M.; Francis, D.; Guest, D.; Gorini, B.; Joos, M.; Lanni, F.; Lehmann Miotto, G.; Levinson, L.; Narevicius, J.; Panduro Vazquez, W.; Roich, A.; Ryu, S.; Schreuder, F.; Schumacher, J.; Vandelli, W.; Vermeulen, J.; Whiteson, D.; Wu, W.; Zhang, J.
2016-12-01
The ATLAS Phase-I upgrade (2019) requires a Trigger and Data Acquisition (TDAQ) system able to trigger and record data from up to three times the nominal LHC instantaneous luminosity. The Front-End LInk eXchange (FELIX) system provides an infrastructure to achieve this in a scalable, detector agnostic and easily upgradeable way. It is a PC-based gateway, interfacing custom radiation tolerant optical links from front-end electronics, via PCIe Gen3 cards, to a commodity switched Ethernet or InfiniBand network. FELIX enables reducing custom electronics in favour of software running on commercial servers. The FELIX system, the design of the PCIe prototype card and the integration test results are presented in this paper.
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION...
48 CFR 227.7206 - Contracts for architect-engineer services.
Code of Federal Regulations, 2010 CFR
2010-10-01
...-engineer services. 227.7206 Section 227.7206 Federal Acquisition Regulations System DEFENSE ACQUISITION... Rights in Computer Software and Computer Software Documentation 227.7206 Contracts for architect-engineer services. Follow 227.7107 when contracting for architect-engineer services. ...
Computer-Aided Process and Tools for Mobile Software Acquisition
2013-04-01
Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani Naval Postgraduate School Published April 1, 2013 Approved for public...ManTech International Corporation Computer-Aided Process and Tools for Mobile Software Acquisition Christopher Bonine , Man-Tak Shing, and Thomas W. Otani...Mobile Software Acquisition Christopher Bonine — Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense
Common Misconceptions About Service-Oriented Architecture
2007-11-01
addition, the architect(s) must make decisions on how services are implemented. Service implementations may involve developing new software , wrapping a...legacy software system, incor- porating services provided by third par- ties, or a combination of these options. Information about the quality attrib...temperature. However, there 28 CROSSTALK The Journal of Defense Software Engineering November 2007 Common Misconceptions About Service -Oriented
2009-04-22
bandwidth and response times. Forrester Research uses the analogy of a consumer using an automated teller machine to explain how technical SLAs should...be crafted. “It’s not enough that you put your card and Personal Identification Number (PIN) [in the machine ] and request to withdraw cash...IRR) Net Present Value (NPV) Other Relevant Metrics Payback Period Cost/Benefit Ratio Cost, Economic, and/or Financial Analysis Yes Yes Yes
2002-09-01
employed by the supermarket industry in 1973. Other common linear bar code symbologies are Code 39, pioneered by the defense and automotive industries...Teller Machine ( ATM ) cards are one of the prominent uses of this technology, but to a lesser extent, the technology has been used for shop floor...additional power is transmitted to it through the probe, extending its charge. There is a risk of data loss if the CMB is not accessed from time to time
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Hein, Sascha; Zangl, Michael
2016-01-01
The aim of this in vitro study was to investigate the color changes of human teeth caused by five different diffuser materials commonly used in dental photography, as well as software influence, and to confirm whether the use of a standardized gray reference card is effective in correcting these color changes during digital postproduction. Forty extracted human teeth were obtained from a specialized oral surgery practice in Cham, Germany. Five commonly used diffuser materials were chosen to be investigated, which included: polyethylene (PET), White Frost photographic paper, LumiQuest polyamide (nylon) material, 80 gsm white printing paper, and 3M linear polarizing filter sheet used for cross polarization. A digital single-lens reflex camera (Canon EOS 5D MKII) was used, together with a twin flash suitable for macrophotography (Canon MT-24EX Macro Twin Lite). Images were tethered into Adobe Lightroom CC using the RAW format. A standardized gray reference card (WhiBal, Michael Tapes Design) was used for exposure calibration and white balancing. Classic Color Me- ter software (Ricci Adams, version 1.6 (122)) was used to obtain CIE L*a*b* values of the specimens before and after white balancing and exposure correction. All diffusers caused visually perceivable color changes on the extracted teeth: White Frost (ΔE* 1.24; sd 0.47), 80 gsm printing paper (ΔE* 2.94; sd 0.35), LumiQuest polyamide (ΔE* 3.68; sd 0.54), PET (ΔE* 6.55; sd 0.41), and 3M linear polarizing filter sheet (ΔE* 7.58; sd 1.00). The use of a standardized gray reference card (WhiBal) could correct these values below the visually perceivable threshold: White Frost (ΔE* 0.58; sd 0.36), 80 gsm printing paper (ΔE* 0.93; sd 0.54), LumiQuest polyamide (ΔE* 0.66; sd 0.58), PET (ΔE* 0.59; sd 0.33), and 3M linear polarizing filter sheet (ΔE* 0.53; sd 0.42). The use of a standardized gray reference card with specified CIE L*a*b* values should be considered when diffusers are used in dental photography in order to reveal the color of preoperative situations (ie, shade documentation) and document postoperative results accurately.
The Use of Massive Multiplayer Online Games to Evaluate C4I Systems
2004-03-01
popularity in the gaming industry , the public and the Department of Defense. Improvements to computer technology and the increased data transfer rate...Multiplayer Online Games (MMOG) have gained in popularity in the gaming industry , the public and the Department of Defense. Improvements to...have gained in popularity in the gaming industry , the public and the Department of Defense. These networked virtual environments are “a software
Bravo, Paco E; Chien, David; Javadi, Mehrbod; Merrill, Jennifer; Bengel, Frank M
2010-06-01
Electrocardiographic gating is increasingly used for (82)Rb cardiac PET/CT, but reference ranges for global functional parameters are not well defined. We sought to establish reference values for left ventricular ejection fraction (LVEF), end systolic volume (ESV), and end diastolic volume (EDV) using 4 different commercial software packages. Additionally, we compared 2 different approaches for the definition of a healthy individual. Sixty-two subjects (mean age +/- SD, 49 +/- 9 y; 85% women; mean body mass index +/- SD, 34 +/- 10 kg/m(2)) who underwent (82)Rb-gated myocardial perfusion PET/CT were evaluated. All subjects had normal myocardial perfusion and no history of coronary artery disease (CAD) or cardiomyopathy. Subgroup 1 consisted of 34 individuals with low pretest probability of CAD (<10%), and subgroup 2 comprised 28 subjects who had no atherosclerosis on a coronary CT angiogram obtained concurrently during the PET/CT session. LVEF, ESV, and EDV were calculated at rest and during dipyridamole-induced stress, using CardIQ Physio (a dedicated PET software) and the 3 major SPECT software packages (Emory Cardiac Toolbox, Quantitative Gated SPECT, and 4DM-SPECT). Mean LVEF was significantly different among all 4 software packages. LVEF was most comparable between CardIQ Physio (62% +/- 6% and 54% +/- 7% at stress and rest, respectively) and 4DM-SPECT (64% +/- 7% and 56% +/- 8%, respectively), whereas Emory Cardiac Toolbox yielded higher values (71% +/- 6% and 65% +/- 6%, respectively, P < 0.001) and Quantitated Gated SPECT lower values (56% +/- 8% and 50% +/- 8%, respectively, P < 0.001). Subgroup 1 (low likelihood) demonstrated higher LVEF values than did subgroup 2 (normal CT angiography findings), using all software packages (P < 0.05). However, mean ESV and EDV at stress and rest were comparable between both subgroups (p = NS). Intra- and interobserver agreement were excellent for all methods. The reference range of LVEF and LV volumes from gated (82)Rb PET/CT varies significantly among available software programs and therefore cannot be used interchangeably. LVEF results were higher when healthy subjects were defined by a low pretest probability of CAD than by normal CT angiography results.
Cyber Warfare: Protecting Military Systems
2000-01-01
Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.
Survey of Software Assurance Techniques for Highly Reliable Systems
NASA Technical Reports Server (NTRS)
Nelson, Stacy
2004-01-01
This document provides a survey of software assurance techniques for highly reliable systems including a discussion of relevant safety standards for various industries in the United States and Europe, as well as examples of methods used during software development projects. It contains one section for each industry surveyed: Aerospace, Defense, Nuclear Power, Medical Devices and Transportation. Each section provides an overview of applicable standards and examples of a mission or software development project, software assurance techniques used and reliability achieved.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 11
2005-11-01
languages. Our discipline of software engineering has really experienced phenomenal growth right before our eyes. A sign that software design has...approach on a high level of abstraction. The main emphasis is on the identification and allocation of a needed functionality (e.g., a target tracker ), rather...messaging software that is the backbone of teenage culture. As increasing security constraints will increase the cost of developing and main- taining any
CrossTalk. The Journal of Defense Software Engineering. Volume 13, Number 6, June 2000
2000-06-01
Techniques for Efficiently Generating and Testing Software This paper presents a proven process that uses advanced tools to design, develop and test... optimal software. by Keith R. Wegner Large Software Systems—Back to Basics Development methods that work on small problems seem to not scale well to...Ability Requirements for Teamwork: Implications for Human Resource Management, Journal of Management, Vol. 20, No. 2, 1994. 11. Ferguson, Pat, Watts S
Intelligent editor/printer enhancements
NASA Technical Reports Server (NTRS)
Woodfill, M. C.; Pheanis, D. C.
1983-01-01
Microprocessor support hardware, software, and cross assemblers relating to the Motorola 6800 and 6809 process systems were developed. Pinter controller and intelligent CRT development are discussed. The user's manual, design specifications for the MC6809 version of the intelligent printer controller card, and a 132-character by 64-line intelligent CRT display system using a Motorola 6809 MPU, and a one-line assembler and disassembler are provided.
Do-It-Yourself Learning Games: Software That Lets You Pick the Questions--and Answers.
ERIC Educational Resources Information Center
Hively, Wells
1984-01-01
Reviews user-adaptable learning games that can be customized for any subject, including Tic Tac Show and the Game Show from Computer Advanced Ideas, which are question-answer learning programs based on game shows, and Master Match from Computer Advanced Ideas and Square Pairs from Scholastic Inc., which are based on the card game Concentration.…
Using a Computer Microphone Port to Study Circular Motion: Proposal of a Secondary School Experiment
ERIC Educational Resources Information Center
Soares, A. A.; Borcsik, F. S.
2016-01-01
In this work we present an inexpensive experiment proposal to study the kinematics of uniform circular motion in a secondary school. We used a PC sound card to connect a homemade simple sensor to a computer and used the free sound analysis software "Audacity" to record experimental data. We obtained quite good results even in comparison…
77 FR 65185 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... million Total $60 million (iii) Description and Quantity or Quantities of Articles or Services under... Technology Contained in the Defense Article or Defense Services Proposed to be Sold: See Annex attached... integrate the Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the...
78 FR 62600 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... million Total $68 million (iii) Description and Quantity or Quantities of Articles or Services Under... Technology Contained in the Defense Article or Defense Services Proposed To Be Sold: See Annex attached... integrate the Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the...
Gaining Control and Predictability of Software-Intensive Systems Development and Sustainment
2015-02-04
implementation of the baselines, audits , and technical reviews within an overarching systems engineering process (SEP; Defense Acquisition University...warfighters’ needs. This management and metrics effort supplements and supports the system’s technical development through the baselines, audits and...other areas that could be researched and added into the nine-tier model. Areas including software metrics, quality assurance , software-oriented
National Software Reference Library (NSRL)
National Institute of Standards and Technology Data Gateway
National Software Reference Library (NSRL) (PC database for purchase) A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.
An Analysis of Botnet Vulnerabilities
2007-06-01
Definition Currently, the primary defense against botnets is prompt patching of vulnerable systems and antivirus software . Network monitoring can identify...IRCd software , none were identified during this effort. AFIT iv For my wife, for her caring and support throughout the course of this...are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online
NASA Astrophysics Data System (ADS)
Spitznagel, J. A.; Wood, Susan
1988-08-01
The Software Engineering institute is a federally funded research and development center sponsored by the Department of Defense (DOD). It was chartered by the Undersecretary of Defense for Research and Engineering on June 15, 1984. The SEI was established and is operated by Carnegie Mellon University (CUM) under contract F19628-C-0003, which was competitively awarded on December 28, 1984, by the Air Force Electronic Systems Division. The mission of the SEI is to provide the means to bring the ablest minds and the most effective technology to bear on the rapid improvement of the quality of operational software in mission-critical computer systems; to accelerate the reduction to practice of modern software engineering techniques and methods; to promulgate the use of modern techniques and methods throughout the mission-critical systems community; and to establish standards of excellence for the practice of software engineering. This report provides a summary of the programs and projects, staff, facilities, and service accomplishments of the Software Engineering Institute during 1987.
NOD2, an Intracellular Innate Immune Sensor Involved in Host Defense and Crohn's Disease
Strober, Warren; Watanabe, Tomohiro
2013-01-01
Nucleotide binding oligomerization domain 2 (NOD2) is an intracellular sensor for small peptides derived from the bacterial cell wall component, peptidoglycan. Recent studies have uncovered unexpected functions of NOD2 in innate immune responses such as induction of type I IFN and facilitation of autophagy; moreover, they have disclosed extensive cross-talk between NOD2 and Toll-like receptors which plays an indispensable role both in host defense against microbial infection and in the development of autoimmunity. Of particular interest, polymorphisms of CARD15 encoding NOD2 are associated with Crohn's disease and other autoimmune states such as graft versus host disease. In this review, we summarize recent findings regarding normal functions of NOD2 and discuss the mechanisms by which NOD2 polymorphisms associated with Crohn's disease lead to intestinal inflammation. PMID:21750585
NASA Astrophysics Data System (ADS)
Zoller, Christian; Hohmann, Ansgar; Ertl, Thomas; Kienle, Alwin
2017-07-01
The Monte Carlo method is often referred as the gold standard to calculate the light propagation in turbid media [1]. Especially for complex shaped geometries where no analytical solutions are available the Monte Carlo method becomes very important [1, 2]. In this work a Monte Carlo software is presented, to simulate the light propagation in complex shaped geometries. To improve the simulation time the code is based on OpenCL such that graphics cards can be used as well as other computing devices. Within the software an illumination concept is presented to realize easily all kinds of light sources, like spatial frequency domain (SFD), optical fibers or Gaussian beam profiles. Moreover different objects, which are not connected to each other, can be considered simultaneously, without any additional preprocessing. This Monte Carlo software can be used for many applications. In this work the transmission spectrum of a tooth and the color reconstruction of a virtual object are shown, using results from the Monte Carlo software.
NASA Astrophysics Data System (ADS)
Laracuente, Nicholas; Grossman, Carl
2013-03-01
We developed an algorithm and software to calculate autocorrelation functions from real-time photon-counting data using the fast, parallel capabilities of graphical processor units (GPUs). Recent developments in hardware and software have allowed for general purpose computing with inexpensive GPU hardware. These devices are more suited for emulating hardware autocorrelators than traditional CPU-based software applications by emphasizing parallel throughput over sequential speed. Incoming data are binned in a standard multi-tau scheme with configurable points-per-bin size and are mapped into a GPU memory pattern to reduce time-expensive memory access. Applications include dynamic light scattering (DLS) and fluorescence correlation spectroscopy (FCS) experiments. We ran the software on a 64-core graphics pci card in a 3.2 GHz Intel i5 CPU based computer running Linux. FCS measurements were made on Alexa-546 and Texas Red dyes in a standard buffer (PBS). Software correlations were compared to hardware correlator measurements on the same signals. Supported by HHMI and Swarthmore College
Wide-bandwidth high-resolution search for extraterrestrial intelligence
NASA Technical Reports Server (NTRS)
Horowitz, Paul
1993-01-01
A third antenna was added to the system. It is a terrestrial low-gain feed, to act as a veto for local interference. The 3-chip design for a 4 megapoint complex FFT was reduced to finished working hardware. The 4-Megachannel circuit board contains 36 MByte of DRAM, 5 CPLDs, the three large FFT ASICs, and 74 ICs in all. The Austek FDP-based Spectrometer/Power Accumulator (SPA) has now been implemented as a 4-layer printed circuit. A PC interface board has been designed and together with its associated user interface and control software allows an IBM compatible computer to control the SPA board, and facilitates the transfer of spectra to the PC for display, processing, and storage. The Feature Recognizer Array cards receive the stream of modulus words from the 4M FFT cards, and forward a greatly thinned set of reports to the PC's in whose backplane they reside. In particular, a powerful ROM-based state-machine architecture has been adopted, and DRAM has been added to permit integration modes when tracking or reobserving source candidates. The general purpose (GP) array consists of twenty '486 PC class computers, each of which receives and processes the data from a feature extractor/correlator board set. The array performs a first analysis on the provided 'features' and then passes this information on to the workstation. The core workstation software is now written. That is, the communication channels between the user interface, the backend monitor program and the PC's have working software.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, J.; Bauer, K.; Borga, A.
The ATLAS Phase-I upgrade (2019) requires a Trigger and Data Acquisition (TDAQ) system able to trigger and record data from up to three times the nominal LHC instantaneous luminosity. Furthermore, the Front-End LInk eXchange (FELIX) system provides an infrastructure to achieve this in a scalable, detector agnostic and easily upgradeable way. It is a PC-based gateway, interfacing custom radiation tolerant optical links from front-end electronics, via PCIe Gen3 cards, to a commodity switched Ethernet or InfiniBand network. FELIX enables reducing custom electronics in favour of software running on commercial servers. Here, the FELIX system, the design of the PCIe prototypemore » card and the integration test results are presented.« less
Anderson, J.; Bauer, K.; Borga, A.; ...
2016-12-13
The ATLAS Phase-I upgrade (2019) requires a Trigger and Data Acquisition (TDAQ) system able to trigger and record data from up to three times the nominal LHC instantaneous luminosity. Furthermore, the Front-End LInk eXchange (FELIX) system provides an infrastructure to achieve this in a scalable, detector agnostic and easily upgradeable way. It is a PC-based gateway, interfacing custom radiation tolerant optical links from front-end electronics, via PCIe Gen3 cards, to a commodity switched Ethernet or InfiniBand network. FELIX enables reducing custom electronics in favour of software running on commercial servers. Here, the FELIX system, the design of the PCIe prototypemore » card and the integration test results are presented.« less
On-line content creation for photo products: understanding what the user wants
NASA Astrophysics Data System (ADS)
Fageth, Reiner
2015-03-01
This paper describes how videos can be implemented into printed photo books and greeting cards. We will show that - surprisingly or not- pictures from videos are similarly used such as classical images to tell compelling stories. Videos can be taken with nearly every camera, digital point and shoot cameras, DSLRs as well as smartphones and more and more with so-called action cameras mounted on sports devices. The implementation of videos while generating QR codes and relevant pictures out of the video stream via a software implementation was contents in last years' paper. This year we present first data about what contents is displayed and how the users represent their videos in printed products, e.g. CEWE PHOTOBOOKS and greeting cards. We report the share of the different video formats used.
1992-12-01
provide program 5 managers some level of confidence that their software will operate at an acceptable level of risk. A number of structured safety...safety within the constraints of operational effectiveness, schedule, and cost through timely application of system safety management and engineering...Master of Science in Software Systems Management Peter W. Colan, B.S.E. Robert W. Prouhet, B.S. Captain, USAF Captain, USAF December 1992 Approved for
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 6, June 2007
2007-06-01
California. He has co-authored the book Software Cost Estimation With COCOMO II with Barry Boehm and others. Clark helped define the COCOMO II model...Software Engineering at the University of Southern California. She worked with Barry Boehm and Chris Abts to develop and calibrate a cost-estimation...2003/02/ schorsch.html>. 2. See “Software Engineering, A Practitioners Approach” by Roger Pressman for a good description of coupling, cohesion
Defense Acquisition Research Journal. Volume 22, Number 4, Issue 75, October 2015
2015-10-01
forma nce pa ra meters ba sed on operational requirements related to the mission. These thresholds will inform the develop- ment of KPPs, KSAs...success of a software development project. 400 Defense ARJ, October 2015, Vol. 22 No. 4 : 394–415 A Publication of the Defense Acquisition University...define when development is complete (Resnick et al., 2011), and when a story is added to a sprint the acceptance criteria can be adjusted. This is
’Pushing a Big Rock Up a Steep Hill’: Acquisition Lessons Learned from DoD Applications Storefront
2014-04-30
software patches, web applications, widgets, and mobile application packages. The envisioned application store will deliver software from a central...automated delivery of software patches, web applications, widgets, and mobile application packages. The envisioned application store will deliver... mobile technologies, hoping to enhance warfighter situational awareness and access to information. Unfortunately, the Defense Acquisition System has not
Repository-based software engineering program
NASA Technical Reports Server (NTRS)
Wilson, James
1992-01-01
The activities performed during September 1992 in support of Tasks 01 and 02 of the Repository-Based Software Engineering Program are outlined. The recommendations and implementation strategy defined at the September 9-10 meeting of the Reuse Acquisition Action Team (RAAT) are attached along with the viewgraphs and reference information presented at the Institute for Defense Analyses brief on legal and patent issues related to software reuse.
Accelerated Adaptive MGS Phase Retrieval
NASA Technical Reports Server (NTRS)
Lam, Raymond K.; Ohara, Catherine M.; Green, Joseph J.; Bikkannavar, Siddarayappa A.; Basinger, Scott A.; Redding, David C.; Shi, Fang
2011-01-01
The Modified Gerchberg-Saxton (MGS) algorithm is an image-based wavefront-sensing method that can turn any science instrument focal plane into a wavefront sensor. MGS characterizes optical systems by estimating the wavefront errors in the exit pupil using only intensity images of a star or other point source of light. This innovative implementation of MGS significantly accelerates the MGS phase retrieval algorithm by using stream-processing hardware on conventional graphics cards. Stream processing is a relatively new, yet powerful, paradigm to allow parallel processing of certain applications that apply single instructions to multiple data (SIMD). These stream processors are designed specifically to support large-scale parallel computing on a single graphics chip. Computationally intensive algorithms, such as the Fast Fourier Transform (FFT), are particularly well suited for this computing environment. This high-speed version of MGS exploits commercially available hardware to accomplish the same objective in a fraction of the original time. The exploit involves performing matrix calculations in nVidia graphic cards. The graphical processor unit (GPU) is hardware that is specialized for computationally intensive, highly parallel computation. From the software perspective, a parallel programming model is used, called CUDA, to transparently scale multicore parallelism in hardware. This technology gives computationally intensive applications access to the processing power of the nVidia GPUs through a C/C++ programming interface. The AAMGS (Accelerated Adaptive MGS) software takes advantage of these advanced technologies, to accelerate the optical phase error characterization. With a single PC that contains four nVidia GTX-280 graphic cards, the new implementation can process four images simultaneously to produce a JWST (James Webb Space Telescope) wavefront measurement 60 times faster than the previous code.
Taming the Viper: Software Upgrade for VFAUser and Viper
DOE Office of Scientific and Technical Information (OSTI.GOV)
DORIN,RANDALL T.; MOSER III,JOHN C.
2000-08-08
This report describes the procedure and properties of the software upgrade for the Vibration Performance Recorder. The upgrade will check the 20 memory cards for proper read/write operation. The upgrade was successfully installed and uploaded into the Viper and the field laptop. The memory checking routine must run overnight to complete the test, although the laptop need only be connected to the Viper unit until the downloading routine is finished. The routine has limited ability to recognize incomplete or corrupt header and footer files. The routine requires 400 Megabytes of free hard disk space. There is one minor technical flawmore » detailed in the conclusion.« less
CrossTalk. The Journal of Defense Software Engineering. Volume 27, Number 2. March/April 2014
2014-04-01
Consequently, it is no wonder that we subconsciously and consciously expect that same level of consistency to hold in the cyber domains, though...including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum compilers. He is currently a co-PI for a DARPA-funded
76 FR 72180 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
...) Description and Quantity or Quantities of Articles or Services under Consideration for Purchase: 20 AIM-9X-2.... (vii) Sensitivity of Technology Contained in the Defense Article or Defense Services Proposed to be... Helmet Mounted Cueing System. The software algorithms are the most sensitive portion of the AIM-9X-2...
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
CrossTalk: The Journal of Defense Software Engineering. Volume 26, Number 4
2013-07-01
quality of most software explode into the broader consciousness . This awareness came thanks to the coincidence of the rise of universal Internet...facilitates the accomplishment of stage 4, Continuous Improvement. A quantum advance for project management is readily avail- able through the
Automatic system for ionization chamber current measurements.
Brancaccio, Franco; Dias, Mauro S; Koskinas, Marina F
2004-12-01
The present work describes an automatic system developed for current integration measurements at the Laboratório de Metrologia Nuclear of Instituto de Pesquisas Energéticas e Nucleares. This system includes software (graphic user interface and control) and a module connected to a microcomputer, by means of a commercial data acquisition card. Measurements were performed in order to check the performance and for validating the proposed design.
Code of Federal Regulations, 2014 CFR
2014-04-01
... display the following: (i) The purchase or wager amount; (ii) Game results; and (iii) Any player credit balance. (2) Between plays of any game and until the start of the next play, or until the player selects a new game option such as purchase or wager amount or card selection, whichever is earlier, if not...
Code of Federal Regulations, 2013 CFR
2013-04-01
... display the following: (i) The purchase or wager amount; (ii) Game results; and (iii) Any player credit balance. (2) Between plays of any game and until the start of the next play, or until the player selects a new game option such as purchase or wager amount or card selection, whichever is earlier, if not...
Hardware Acceleration for Cyber Security
2010-11-01
perform different approaches. It includes behavioral analysis, by means of NetFlow monitoring, as well as packet content analysis, so called Deep...Interface (API). The example of such application is NetFlow exporter described in [5]. • We provide modified libpcap library using libsze2 API. This...cards. The software applications using NIFIC include FlowMon NetFlow /IPFIX generator, Wireshark packet analyzer, iptables - Linux kernel firewall, deep
Effects of Gain/Loss Framing in Cyber Defense Decision-Making
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bos, Nathan; Paul, Celeste; Gersh, John
Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one ofmore » two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.« less
Validation of a Quality Management Metric
2000-09-01
quality management metric (QMM) was used to measure the performance of ten software managers on Department of Defense (DoD) software development programs. Informal verification and validation of the metric compared the QMM score to an overall program success score for the entire program and yielded positive correlation. The results of applying the QMM can be used to characterize the quality of software management and can serve as a template to improve software management performance. Future work includes further refining the QMM, applying the QMM scores to provide feedback
Optical Verification Laboratory Demonstration System for High Security Identification Cards
NASA Technical Reports Server (NTRS)
Javidi, Bahram
1997-01-01
Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.
Information technology in the foxhole.
Eyestone, S M
1995-08-01
The importance of digital data capture at the point of health care service within the military environment is highlighted. Current paper-based data capture does not allow for efficient data reuse throughout the medical support information domain. A simple, high-level process and data flow model is used to demonstrate the importance of data capture at point of service. The Department of Defense is developing a personal digital assistant, called MEDTAG, that accomplishes point of service data capture in the field using a prototype smart card as a data store in austere environments.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
... technical data package, in cases where the Government may have funded only a small portion of the... subcontractor's asserted restrictions on technical data and computer software. DATES: Effective date: September... data and computer software. More specifically, the final rule affects these validation procedures in...
2-Player Game With Uncertainty to Protect Mission Critical Information Over Blue Networks
2009-04-01
Eclipse 233MHz 512MB 700MB JAVA 6 166MHz 64MB 98MB Key Focus Sensor Honeypot 1.5 GHz 512MB 500MB Distributed Data Pastry JAVA...defense, Pastry , run. JAVA 6 is an added plug-in that helps Eclipse software. There are many defenses that can be used to help alongside this project but...each defense to be used. Encryption : Steganos Privacy Suite 2008 Honeypots : Key Focus Sensor Distributed Data: Pastry 7 Table 2 Domain
2016-09-01
BEHAVIORAL MODELING OF SYSTEM- AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS by Monica F. Farah-Stapleton...AND SOFTWARE- ARCHITECTURE SPECIFICATIONS TO INFORM RESOURCING DECISIONS 5. FUNDING NUMBERS 6. AUTHOR(S) Monica F. Farah-Stapleton 7. PERFORMING...this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB number
Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0
2008-11-05
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9150 Approved for public release; distribution is unlimited. Software ...collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for...THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design Description for the Polar Ice Prediction System (PIPS) Version 3.0 Pamela G
Software Design Description for the Tidal Open-boundary Prediction System (TOPS)
2010-05-04
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--10-9209 Approved for public release; distribution is unlimited. Software ...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite...RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (include area code) b. ABSTRACT c. THIS PAGE 18. NUMBER OF PAGES 17. LIMITATION OF ABSTRACT Software Design
Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0
2008-12-31
Naval Research Laboratory Stennis Space Center, MS 39529-5004 NRL/MR/7320--08-9149 Approved for public release; distribution is unlimited. Software ...suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704...LIMITATION OF ABSTRACT Software Design Description for the Navy Coastal Ocean Model (NCOM) Version 4.0 Paul Martin, Charlie N. Barron, Lucy F
Project Robot: A Software Simulation for Systems Engineering Education
ERIC Educational Resources Information Center
Arnold, Ross D.; Wade, Jon P.
2017-01-01
The U.S. defense industry spends billions of dollars each year developing defense systems to keep the nation and allies secure. However, the failure rate of system development is notoriously high. Even when development efforts do succeed, they often do so with cost overruns and compromises in system performance. As a result, large amounts of money…
USDA-ARS?s Scientific Manuscript database
Accurate and timely surveillance of bed bug infestations is critical for development of effective control strategies. While the bed bug produced volatiles (E)-2-hexenal and (E)-2-octenal are considered defensive secretions, through use of EthoVision® video-tracking software we demonstrate that low ...
Su, TzuFen; Cheng, Meng-Tzu; Lin, Shu-Hua
2014-01-01
This study was conducted in an attempt to investigate the effectiveness of an educational card game we developed for learning human immunology. Two semesters of evaluation were included to examine the impact of the game on students' understanding and perceptions of the game-based instruction. Ninety-nine senior high school students (11th graders) were recruited for the first evaluation, and the second-semester group consisted of 72 students (also 11th graders). The results obtained indicate that students did learn from the educational card game. Moreover, students who learned from playing the game significantly outperformed their counterparts in terms of their understanding of the processes and connections among different lines of immunological defense (first semester: t = 2.92, p < 0.01; second semester: t = 3.45, p < 0.01) according to the qualitative analysis of an open-ended question. They generally had positive perceptions toward the game-based instruction and its learning efficiency, and they felt the game-based instruction was much more interesting than traditional didactic lectures (first semester: t = 2.79, p < 0.01; second semester: t = 2.41, p < 0.05). This finding is evidence that the educational card game has potential to facilitate students' learning of how the immune system works. The implications and suggestions for future work are further discussed. © 2014 T. Su et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).
Fiacco, P. A.; Rice, W. H.
1991-01-01
Computerized medical record systems require structured database architectures for information processing. However, the data must be able to be transferred across heterogeneous platform and software systems. Client-Server architecture allows for distributive processing of information among networked computers and provides the flexibility needed to link diverse systems together effectively. We have incorporated this client-server model with a graphical user interface into an outpatient medical record system, known as SuperChart, for the Department of Family Medicine at SUNY Health Science Center at Syracuse. SuperChart was developed using SuperCard and Oracle SuperCard uses modern object-oriented programming to support a hypermedia environment. Oracle is a powerful relational database management system that incorporates a client-server architecture. This provides both a distributed database and distributed processing which improves performance. PMID:1807732
Schauer, Stephen G; April, Michael D; Naylor, Jason F; Oliver, Joshua J; Cunningham, Cord W; Fisher, Andrew D; Kotwal, Russ S
2017-01-01
The active battlefield is an environment of chaos and confusion. Depending on the scale of combat, the chaos and confusion often extend into the prehospital combat setting with multiple personnel and units involved in the chain of care of casualties. The chaos of the prehospital combat setting has led to limitations in the availability of data for performance improvement and research. The Department of Defense (DoD) Joint Trauma System (JTS) Prehospital Trauma Registry (PHTR) was developed in conjunction with the updated Tactical Combat Casualty Care (TCCC) card and a TCCC after action report (AAR), and currently serves as the prehospital repository and module of the DoD Trauma Registry (DoDTR). We conducted a descriptive analysis of data from the DoDTR PHTR. The JTS collected trauma-associated data which comprise the PHTR are consolidated from TCCC cards and TCCC AARs. Where possible (requires 2 patient identifiers), JTS linked data from the PHTR module to other modules in the DoDTR to maximize availability of prehospital data and gain additional information regarding clinical outcomes. From January 2013 through September 2014, there were 705 patients available for research, of which 94.8% (668/705) had data from TCCC AARs, 3.3% (23/705) had data from TCCC cards, and 2.0% (14/705) had data available from DoDTR collection forms. There were one or more of the following data points per subject: pulse rate (77.4%, n=546), blood pressure (75.9%, n=535), respiratory rate (76.5%, n=539), pulse oximetry (61.8%, n=436), mental status (96.0%, n=677) and pain score (24.5%, n=173). Only 42.4% (647/1,527) of vital sign metrics had an associated time stamp. Documented interventions included limb tourniquets, of which only 27.3% (113/414) had an associated documentation of application time. Only 27.0% (190/705) of patients in the PHTR could be linked to the DoDTR due to missing identifiers. The PHTR data capture was suboptimal with many patients lacking documentation of vital signs and procedural details. Future efforts to improve prehospital data capture will require ownership and enforcement by unit leadership.
Computer soundcard as an AC signal generator and oscilloscope for the physics laboratory
NASA Astrophysics Data System (ADS)
Sinlapanuntakul, Jinda; Kijamnajsuk, Puchong; Jetjamnong, Chanthawut; Chotikaprakhan, Sutharat
2018-01-01
The purpose of this paper is to develop both an AC signal generator and a dual-channel oscilloscope based on standard personal computer equipped with sound card as parts of the laboratory of the fundamental physics and the introduction to electronics classes. The setup turns the computer into the two channel measured device which can provides sample rate, simultaneous sampling, frequency range, filters and others essential capabilities required to perform amplitude, phase and frequency measurements of AC signal. The AC signal also generate from the same computer sound card output simultaneously in any waveform such as sine, square, triangle, saw-toothed pulsed, swept sine and white noise etc. These can convert an inexpensive PC sound card into powerful device, which allows the students to measure physical phenomena with their own PCs either at home or at university attendance. A graphic user interface software was developed for control and analysis, including facilities for data recording, signal processing and real time measurement display. The result is expanded utility of self-learning for the students in the field of electronics both AC and DC circuits, including the sound and vibration experiments.
1996-01-01
Automated Teller Machine networks malfunction in Georgia 2000 May 20 CNN off air for 12 minutes; issues special report 2000 May 20 worm...password combinations, social security and credit card numbers, account information, health status, and innumerable other sensitive information...as follows: TW/AA Issues Recommended Technical Response Possible Implementation Obstacles 1. (re Tactical Warning) • Place automated software
PC/AT-based architecture for shared telerobotic control
NASA Astrophysics Data System (ADS)
Schinstock, Dale E.; Faddis, Terry N.; Barr, Bill G.
1993-03-01
A telerobotic control system must include teleoperational, shared, and autonomous modes of control in order to provide a robot platform for incorporating the rapid advances that are occurring in telerobotics and associated technologies. These modes along with the ability to modify the control algorithms are especially beneficial for telerobotic control systems used for research purposes. The paper describes an application of the PC/AT platform to the control system of a telerobotic test cell. The paper provides a discussion of the suitability of the PC/AT as a platform for a telerobotic control system. The discussion is based on the many factors affecting the choice of a computer platform for a real time control system. The factors include I/O capabilities, simplicity, popularity, computational performance, and communication with external systems. The paper also includes a description of the actuation, measurement, and sensor hardware of both the master manipulator and the slave robot. It also includes a description of the PC-Bus interface cards. These cards were developed by the researchers in the KAT Laboratory, specifically for interfacing to the master manipulator and slave robot. Finally, a few different versions of the low level telerobotic control software are presented. This software incorporates shared control by supervisory systems and the human operator and traded control between supervisory systems and the human operator.
Taylor, Philip D; Brzustowski, John M; Matkovich, Carolyn; Peckford, Michael L; Wilson, Dave
2010-10-26
Radar has been used for decades to study movement of insects, birds and bats. In spite of this, there are few readily available software tools for the acquisition, storage and processing of such data. Program radR was developed to solve this problem. Program radR is an open source software tool for the acquisition, storage and analysis of data from marine radars operating in surveillance mode. radR takes time series data with a two-dimensional spatial component as input from some source (typically a radar digitizing card) and extracts and retains information of biological relevance (i.e. moving targets). Low-level data processing is implemented in "C" code, but user-defined functions written in the "R" statistical programming language can be called at pre-defined steps in the calculations. Output data formats are designed to allow for future inclusion of additional data items without requiring change to C code. Two brands of radar digitizing card are currently supported as data sources. We also provide an overview of the basic considerations of setting up and running a biological radar study. Program radR provides a convenient, open source platform for the acquisition and analysis of radar data of biological targets.
2010-01-01
Background Radar has been used for decades to study movement of insects, birds and bats. In spite of this, there are few readily available software tools for the acquisition, storage and processing of such data. Program radR was developed to solve this problem. Results Program radR is an open source software tool for the acquisition, storage and analysis of data from marine radars operating in surveillance mode. radR takes time series data with a two-dimensional spatial component as input from some source (typically a radar digitizing card) and extracts and retains information of biological relevance (i.e. moving targets). Low-level data processing is implemented in "C" code, but user-defined functions written in the "R" statistical programming language can be called at pre-defined steps in the calculations. Output data formats are designed to allow for future inclusion of additional data items without requiring change to C code. Two brands of radar digitizing card are currently supported as data sources. We also provide an overview of the basic considerations of setting up and running a biological radar study. Conclusions Program radR provides a convenient, open source platform for the acquisition and analysis of radar data of biological targets. PMID:20977735
2012-03-13
Legacy Maintenance and Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level...NDI)-intensive systems Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This...be furnished by NDI components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software
2009-09-01
NII)/CIO Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer CMMI Capability Maturity Model...a Web-based portal to share knowledge about software process-related methodologies, such as the SEI’s Capability Maturity Model Integration ( CMMI ...19 SEI’s IDEALSM model, and Lean Six Sigma.20 For example, the portal features content areas such as software acquisition management, the SEI CMMI
CrossTalk. The Journal of Defense Software Engineering. Volume 23, Number 6, Nov/Dec 2010
2010-11-01
Model of archi- tectural design. It guides developers to apply effort to their software architecture commensurate with the risks faced by...Driven Model is the promotion of risk to prominence. It is possible to apply the Risk-Driven Model to essentially any software development process...succeed without any planned architecture work, while many high-risk projects would fail without it . The Risk-Driven Model walks a middle path
1997-09-01
program include the ACEIT software training and the combination of Department of Defense (DOD) application, regression, and statistics. The weaknesses...and Integrated Tools ( ACEIT ) software and training could not be praised enough. AFIT vs. Civilian Institutions. The GCA program provides a Department...very useful to the graduates and beneficial to their careers. The main strengths of the program include the ACEIT software training and the combination
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 4
2005-04-01
older automated cost- estimating tools are no longer being actively marketed but are still in use such as CheckPoint, COCOMO, ESTIMACS, REVIC, and SPQR ...estimation tools: SPQR /20, Checkpoint, and Knowl- edgePlan. These software estimation tools pioneered the use of function point metrics for sizing and
78 FR 703 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-04
... Value: Major Defense Equipment $110 million Other $30 million Total $140 million * as defined in Section... Cueing System. The software algorithms are the most sensitive portion of the AIM-9X-2 missile. The software continues to be modified via a pre- planned product improvement (P\\3\\I) program in order to...
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 11
2006-11-01
8>. 7. Wallace, Delores R. Practical Soft- ware Reliability Modeling. Proc. of the 26th Annual NASA Goddard Software Engineering Workshop, Nov. 2001...STAR WARS TO STAR TREK To Request Back Issues on Topics Not Listed Above, Please Contact <stsc. customerservice@hill.af.mil>. About the Authors Kym
Advanced Chemistry Collection, 2nd Edition
NASA Astrophysics Data System (ADS)
2001-11-01
Software requirements are given in Table 3. Some programs have additional special requirements. Please see the individual program abstracts at JCE Online or the documentation included on the CD-ROM for more specific information. Table 3. General software requirements for the Advanced Chemistry Collection.
| Computer | System | Other Software(Required by one or more programs) |
| Mac OS compatible | System 7.6.1 or higher | Acrobat Reader (included)Mathcad; Mathematica;MacMolecule2; QuickTime 4; HyperCard Player |
| Windows Compatible | Windows 2000, 98, 95, NT 4 | Acrobat Reader (included)Mathcad; Mathematica;PCMolecule2; QuickTime 4;HyperChem; Excel |
PScan 1.0: flexible software framework for polygon based multiphoton microscopy
NASA Astrophysics Data System (ADS)
Li, Yongxiao; Lee, Woei Ming
2016-12-01
Multiphoton laser scanning microscopes exhibit highly localized nonlinear optical excitation and are powerful instruments for in-vivo deep tissue imaging. Customized multiphoton microscopy has a significantly superior performance for in-vivo imaging because of precise control over the scanning and detection system. To date, there have been several flexible software platforms catered to custom built microscopy systems i.e. ScanImage, HelioScan, MicroManager, that perform at imaging speeds of 30-100fps. In this paper, we describe a flexible software framework for high speed imaging systems capable of operating from 5 fps to 1600 fps. The software is based on the MATLAB image processing toolbox. It has the capability to communicate directly with a high performing imaging card (Matrox Solios eA/XA), thus retaining high speed acquisition. The program is also designed to communicate with LabVIEW and Fiji for instrument control and image processing. Pscan 1.0 can handle high imaging rates and contains sufficient flexibility for users to adapt to their high speed imaging systems.
NASA Technical Reports Server (NTRS)
Maples, A. L.
1981-01-01
The operation of solidification Model 2 is described and documentation of the software associated with the model is provided. Model 2 calculates the macrosegregation in a rectangular ingot of a binary alloy as a result of unsteady horizontal axisymmetric bidirectional solidification. The solidification program allows interactive modification of calculation parameters as well as selection of graphical and tabular output. In batch mode, parameter values are input in card image form and output consists of printed tables of solidification functions. The operational aspects of Model 2 that differ substantially from Model 1 are described. The global flow diagrams and data structures of Model 2 are included. The primary program documentation is the code itself.
Near-Earth object intercept trajectory design for planetary defense
NASA Astrophysics Data System (ADS)
Vardaxis, George; Wie, Bong
2014-08-01
Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.
1977-05-01
C31) programs; (4) simulator/ trainer programs ; and (5) automatic test equipment software. Each of these five types of software represents a problem...coded in the same source language, say JOVIAL, then source—language statements would be a better measure, since that would automatically compensate...whether done at no (visible) cost or by renegotiation of the contract. Fig. 2.3 illustrates these with solid lines. It is conjec- tured that the change
2012-03-13
Brownfield Development 6.6.6 Agile and Kanban Development 6.6.7 Putting It All Together at the Large-Project or Enterprise Level 6.7 References 7...Ultrahigh software system assurance; Legacy maintenance and brownfield development; and Agile and kanban development. This chapter summarizes each...components or may need to be developed for special systems. Legacy Maintenance and Brownfield Development Fewer and fewer software-intensive systems have
2009-11-01
interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a...an interesting conti- nuum between how many different requirements a program must satisfy: the more complex and diverse the requirements, the more... Gender differences in approaches to end-user software development have also been reported in debugging feature usage [1] and in end-user web programming
CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 3. May/June 2014
2014-06-01
field of software engineering. by Delores M. Etter, Jennifer Webb, and John Howard The Problem of Prolific Process What is the optimal amount and...Programming Will Never Be Obsolete The creativity of software developers will always be needed to solve problems of the future and to then translate those...utilized to address some of the complex problems associated with biometric database construction. 1. A Next Generation Multispectral Iris Biometric
2004-09-01
protection. Firewalls, Intrusion Detection Systems (IDS’s), Anti-Virus (AV) software , and routers are such tools used. In recent years, computer security...associated with operating systems, application software , and computing hardware. When IDS’s are utilized on a host computer or network, there are two...primary approaches to detecting and / or preventing attacks. Traditional IDS’s, like most AV software , rely on known “signatures” to detect attacks
NASA Astrophysics Data System (ADS)
Keshet, Aviv; Ketterle, Wolfgang
2013-01-01
Atomic physics experiments often require a complex sequence of precisely timed computer controlled events. This paper describes a distributed graphical user interface-based control system designed with such experiments in mind, which makes use of off-the-shelf output hardware from National Instruments. The software makes use of a client-server separation between a user interface for sequence design and a set of output hardware servers. Output hardware servers are designed to use standard National Instruments output cards, but the client-server nature should allow this to be extended to other output hardware. Output sequences running on multiple servers and output cards can be synchronized using a shared clock. By using a field programmable gate array-generated variable frequency clock, redundant buffers can be dramatically shortened, and a time resolution of 100 ns achieved over effectively arbitrary sequence lengths.
Keshet, Aviv; Ketterle, Wolfgang
2013-01-01
Atomic physics experiments often require a complex sequence of precisely timed computer controlled events. This paper describes a distributed graphical user interface-based control system designed with such experiments in mind, which makes use of off-the-shelf output hardware from National Instruments. The software makes use of a client-server separation between a user interface for sequence design and a set of output hardware servers. Output hardware servers are designed to use standard National Instruments output cards, but the client-server nature should allow this to be extended to other output hardware. Output sequences running on multiple servers and output cards can be synchronized using a shared clock. By using a field programmable gate array-generated variable frequency clock, redundant buffers can be dramatically shortened, and a time resolution of 100 ns achieved over effectively arbitrary sequence lengths.
NASA Astrophysics Data System (ADS)
Lightstone, P. C.; Davidson, W. M.
1982-04-01
The military detection assessment laboratory houses an experimental field system which assesses different alarm indicators such as fence disturbance sensors, MILES cables, and microwave Racons. A speech synthesis board which could be interfaced, by means of a computer, to an alarm logger making verbal acknowledgement of alarms possible was purchased. Different products and different types of voice synthesis were analyzed before a linear predictive code device produced by Telesensory Speech Systems of Palo Alto, California was chosen. This device is called the Speech 1000 Board and has a dedicated 8085 processor. A multiplexer card was designed and the Sp 1000 interfaced through the card into a TMS 990/100M Texas Instrument microcomputer. It was also necessary to design the software with the capability of recognizing and flagging an alarm on any 1 of 32 possible lines. The experimental field system was then packaged with a dc power supply, LED indicators, speakers, and switches, and deployed in the field performing reliably.
Time Delay Measurements of Key Generation Process on Smart Cards
2015-03-01
random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase
1992-12-01
36 V.33. Coe ncint of De minstioi ........................ 37 V3A. F-Raio .................................... 37 V3.5... de ations. Instructions ae defined as lines of code or card images. Thus, a line containin two or mome souce statements counts as one instruction; a...understand the productivity paradox, recall de concept of virtual machines. When a higher level machine groups ogether many instructm of a lower level
Guaranteeing Spoof-Resilient Multi-Robot Networks
2016-02-12
key-distribution. Our core contribution is a novel al- gorithm implemented on commercial Wi - Fi radios that can “sense” spoofers using the physics of...encrypted key exchange, but rather a commercial Wi - Fi card and software to implement our so- lution. Our virtual sensor leverages the rich physical...cheap commodity Wi - Fi radios, unlike hardware-based solutions [46, 48]. (3) It is robust to client mobility and power-scaling at- tacks. Finally, our
NASA Technical Reports Server (NTRS)
Butler, C. M.; Hogge, J. E.
1978-01-01
Air quality sampling was conducted. Data for air quality parameters, recorded on written forms, punched cards or magnetic tape, are available for 1972 through 1975. Computer software was developed to (1) calculate several daily statistical measures of location, (2) plot time histories of data or the calculated daily statistics, (3) calculate simple correlation coefficients, and (4) plot scatter diagrams. Computer software was developed for processing air quality data to include time series analysis and goodness of fit tests. Computer software was developed to (1) calculate a larger number of daily statistical measures of location, and a number of daily monthly and yearly measures of location, dispersion, skewness and kurtosis, (2) decompose the extended time series model and (3) perform some goodness of fit tests. The computer program is described, documented and illustrated by examples. Recommendations are made for continuation of the development of research on processing air quality data.
An Embedded Reconfigurable Logic Module
NASA Technical Reports Server (NTRS)
Tucker, Jerry H.; Klenke, Robert H.; Shams, Qamar A. (Technical Monitor)
2002-01-01
A Miniature Embedded Reconfigurable Computer and Logic (MERCAL) module has been developed and verified. MERCAL was designed to be a general-purpose, universal module that that can provide significant hardware and software resources to meet the requirements of many of today's complex embedded applications. This is accomplished in the MERCAL module by combining a sub credit card size PC in a DIMM form factor with a XILINX Spartan I1 FPGA. The PC has the ability to download program files to the FPGA to configure it for different hardware functions and to transfer data to and from the FPGA via the PC's ISA bus during run time. The MERCAL module combines, in a compact package, the computational power of a 133 MHz PC with up to 150,000 gate equivalents of digital logic that can be reconfigured by software. The general architecture and functionality of the MERCAL hardware and system software are described.
1987-06-01
Facilitator Robert Voss, Esq. Private Consultant, Honeywell, Inc. Institute for Defense Analyses Robert Adams , Esq. Naval Training Systems Center Mr...Systems Command Leonard Rawlcz, Esq. Skadden, Arps, Slate, Meagher & Flom Ansel Schwartz, Esq. Reed Smith Shaw & McClay Michael Yatsko, Esq
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009
2009-12-01
an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210
Design and Acquisition of Software for Defense Systems
2018-02-14
enterprise business systems and related information technology (IT) services, the role software plays in enabling and enhancing weapons systems often...3 The information in this chart was compiled from Christian Hagen, Jeff Sorenson, Steven Hurt...understanding to make an informed choice of final architecture. The Task Force found commercial practice starts with several competing architectures and
Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples
2010-04-01
are never Software CTE candidates 19 Algorithm Example: Filters • Definitions – Filters in Signal Processing • A filter is a mathematical algorithm...Segment Segment • SOA as a CTE? – Google produced 40 million (!) hits in 0.2 sec for “SOA”. Even if we discount hits on the Society of Actuaries and
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-07
... asserted restrictions on technical data and computer software. DATES: Comments on the proposed rule should... restrictions on technical data and computer software. More specifically, the proposed rule affects these...) items (as defined at 41 U.S.C. 431(c)). Since COTS items are a subtype of commercial items, this change...
1988-04-21
Layton Senior Software Engineer Martin Marietta Denver Aerospace MS L0425 P.O. Box 179 Denver, CO 80201 Larry L. Lehman Integrated Systems Inc. 2500...Mission College Road Santa Clara, CA 95054 Eric Leighninger Dynamics Research 60 Frontage Road Andover, MA 01810 . Peter Lempp Software Products and
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 7
2007-07-01
away from the current Global Command and Control System family of systems, this effort will also require a significant change in both mindset and...which complicate the already significant logistic problems in austere environ- ments. Several efforts are beginning to produce rapidly deployable...currency, and applicability to keep pace with the changing environment and address significant challenges they face. Defense Information Systems Agency
NASA Technical Reports Server (NTRS)
Hill, R. W.
1994-01-01
The integration of CLIPS into HyperCard combines the intuitive, interactive user interface of the Macintosh with the powerful symbolic computation of an expert system interpreter. HyperCard is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. In order to understand the benefit of integrating HyperCard and CLIPS, consider the following: HyperCard is an information storage and retrieval system which exploits the use of the graphics and user interface capabilities of the Apple Macintosh computer. The user can easily define buttons, dialog boxes, information templates, pictures, and graphic displays through the use of the HyperCard tools and scripting language. What is generally lacking in this environment is a powerful reasoning engine for complex problem solving, and this is where CLIPS plays a role. CLIPS 5.0 (C Language Integrated Production System, v5.0) was developed at the Johnson Space Center Software Technology Branch to allow artificial intelligence research, development, and delivery on conventional computers. CLIPS 5.0 supports forward chaining rule systems, object-oriented language, and procedural programming for the construction of expert systems. It features incremental reset, seven conflict resolution stategies, truth maintenance, and user-defined external functions. Since CLIPS is implemented in the C language it is highly portable; in addition, it is embeddable as a callable routine from a program written in another language such as Ada or Fortran. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of applications: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems and intelligent control of hypertext processes, to name a few. HyperCLIPS 2.0 is written in C-Language (54%) and Pascal (46%) for Apple Macintosh computers running Macintosh System 6.0.2 or greater. HyperCLIPS requires HyperCard 1.2 or higher and at least 2Mb of RAM are recommended to run. An executable is provided. To compile the source code, the Macintosh Programmer's Workshop (MPW) version 3.0, CLIPS 5.0 (MSC-21927), and the MPW C-Language compiler are also required. NOTE: Installing this program under Macintosh System 7 requires HyperCard v2.1. This program is distributed on a 3.5 inch Macintosh format diskette. A copy of the program documentation is included on the diskette, but may be purchased separately. HyperCLIPS was developed in 1990 and version 2.0 was released in 1991. HyperCLIPS is a copyrighted work with all copyright vested in NASA. Apple, Macintosh, MPW, and HyperCard are registered trademarks of Apple Computer, Inc.
Simple solution to the medical instrumentation software problem
NASA Astrophysics Data System (ADS)
Leif, Robert C.; Leif, Suzanne B.; Leif, Stephanie H.; Bingue, E.
1995-04-01
Medical devices now include a substantial software component, which is both difficult and expensive to produce and maintain. Medical software must be developed according to `Good Manufacturing Practices', GMP. Good Manufacturing Practices as specified by the FDA and ISO requires the definition and compliance to a software processes which ensures quality products by specifying a detailed method of software construction. The software process should be based on accepted standards. US Department of Defense software standards and technology can both facilitate the development and improve the quality of medical systems. We describe the advantages of employing Mil-Std-498, Software Development and Documentation, and the Ada programming language. Ada provides the very broad range of functionalities, from embedded real-time to management information systems required by many medical devices. It also includes advanced facilities for object oriented programming and software engineering.
Signal processing for smart cards
NASA Astrophysics Data System (ADS)
Quisquater, Jean-Jacques; Samyde, David
2003-06-01
In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight the same results can be obtained with only one smart card, but this idea is not completely true because the statistical properties of the signal are not the same. As the two smart cards are submitted to the same external noise during the measurement, it is more easy to reduce the influence of perturbations. This paper shows the importance of accurate countermeasures against differential analysis.
Vaccination coverage survey in Dhaka District.
Khan, M N A; Rahman, M L; Awal Miah, A; Islam, M S; Musa, S A J M; Tofail, F
2005-08-01
A survey was conducted in Dhaka District to measure the level of routine immunization coverage of children (12-23 months), to assess the tetanus toxoid (TT) immunization coverage among mothers of children (12-23 month), to evaluate EPI program continuity (dropout rates) and quality (percent of Invalid doses, vaccination card availability etc.) For this purpose, a thirty cluster cross-sectional survey was conducted in October 2002 to assess the immunization coverage in Dhaka. In this survey 30 clusters were randomly selected from a list of villages in 63 Unions of Dhaka following probability proportion to size (PPS) sampling procedure. A total of 210 children was studied using pre-tested structured questionnaire. Descriptive statistics was employed using software SPSS package for data analysis. The study showed that the routine immunization coverage in Dhaka among children by 12 months of age by card + history was 97% for BCG, 97% for Diphtheria, Pertussis Tetanus (DPT 1) and Oral Polio Vaccine (OPV 1), 75% for DPT3 and OPV3 and 67% for measles. Sixty six percent of all children surveyed had received valid doses of all vaccines by 12 months (fully immunized child). Programme access as measured by crude DPT1 coverage was better in Keranigonj (97%). Vaccination cards retention rate for children was 84%. Invalid DPT (1,2 or 3) doses were given to 25% of vaccinated children; 18% of measles doses were invalid. Surprisingly, major cause for invalid doses were not due to early immunizations or due to card lost but for giving tick in the card, instead of writing a valid date. DPT1 and DPT3 and DPT1- Measles drop out rates were 5% and 13% respectively. Major reason parents gave for never vaccinating their children (zero dose children) was (43%), major reasons for incomplete vaccination was lack of knowledge regarding subsequent doses (46%). TT surveys were also conducted for mothers of the children surveyed for vaccination coverage (mothers between 15-49 year old). Valid TT 1-5 coverage by card+ history was 97%, 55%, 44%, 24% and 11%, respectively. Card retention rate for TT was 67%. The findings of this study revealed that access to child and TT immunizations were good. But high dropouts and invalid doses reduced these percentages of fully immunized child to 66%. Programmatic strategy must be undertaken to reduce the existing high dropout rate in both child and TT immunizations.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 2
2005-02-01
Richard J. Adams , Sergio Alvarado, Suellen Eslinger, and Joanne Tagami all with The Aerospace Corporation, and Scott A. Whitmire at ODS Software...Kiczales, G., and M. Kersten . “Show Me the Structure.” Software Develop- ment Apr. 2000. Notes 1. Please note that the M1-M11 number- ing of concepts did...VA: Integrated Computer Engineering, Inc., 2 Aug. 2000 (http://www.spmn.com). 3 Adams , Richard J., Suellen Eslinger, Karen L. Owens, and Mary A. Rich
Physician use of updated anti-virus software in a tertiary Nigerian hospital.
Laabes, E P; Nyango, D D; Ayedima, M M; Ladep, N G
2010-01-01
While physicians are becoming increasingly dependent on computers and the internet, highly lethal malware continue to be loaded into cyberspace. We sought to assess the proportion of physicians with updated anti-virus software in Jos University Teaching Hospital Nigeria and to determine perceived barriers to getting updates. We used a pre-tested semi-structured self-administered questionnaire to conduct a cross-sectional survey among 118 physicians. The mean age (+/- SD) of subjects was 34 (+/- 4) years, with 94 male and 24 female physicians. Forty-two (36.5%) of 115 physicians with anti-virus software used an updated program (95% Cl: 27, 45). The top-three antivirus software were: McAfee 40 (33.9%), AVG 37 (31.4%) and Norton 17 (14.4%). Common infections were: Trojan horse 22 (29.7%), Brontok worm 8 (10.8%), and Ravmonlog.exe 5 (6.8%). Internet browsing with a firewall was an independent determinant for use of updated anti-virus software [OR 4.3, 95% CI, 1.86, 10.02; P < 0.001]. Busy schedule, 40 (33.9%) and lack of credit card 39 (33.1%) were perceived barriers to updating antivirus software. The use of regularly updated anti-virus software is sub-optimal among physicians implying vulnerability to computer viruses. Physicians should be careful with flash drives and should avoid being victims of the raging arms race between malware producers and anti-virus software developers.
[Integrated Development of Full-automatic Fluorescence Analyzer].
Zhang, Mei; Lin, Zhibo; Yuan, Peng; Yao, Zhifeng; Hu, Yueming
2015-10-01
In view of the fact that medical inspection equipment sold in the domestic market is mainly imported from abroad and very expensive, we developed a full-automatic fluorescence analyzer in our center, presented in this paper. The present paper introduces the hardware architecture design of FPGA/DSP motion controlling card+PC+ STM32 embedded micro processing unit, software system based on C# multi thread, design and implementation of double-unit communication in detail. By simplifying the hardware structure, selecting hardware legitimately and adopting control system software to object-oriented technology, we have improved the precision and velocity of the control system significantly. Finally, the performance test showed that the control system could meet the needs of automated fluorescence analyzer on the functionality, performance and cost.
A Requirement Specification Language for AADL
2016-06-01
008 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release; Distribution is Unlimited...Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No...FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Defense AT and L. Volume 42, Number 1
2013-02-01
Agnish The U.S. Army late last year began equipping brigade combat teams with its first package of radios, satellite systems, software applications...Army’s first package of radios, satellite systems, software applications, smartphone-like devices, and other network components that provide integrated... satellite communications, intelligence, mission command applications, and the integration of C4ISR equip- ment onto various vehicle platforms. This
Measuring Cyber Operations Effectiveness
2014-11-01
are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10
2005-10-01
1: Disciplines Contributing to Software Assurance When a natural disaster strikes, a cor-poration normally places a disaster recovery plan into effect...survivability, and contrasts survivability with the traditional disaster recovery and business continuity disciplines . A system survivability design...specialty engi- neering disciplines and their requirements. These disciplines include availability, reliabil- ity, maintainability, and accountability as
NASA Technical Reports Server (NTRS)
Hanley, Lionel
1989-01-01
The Ada Software Repository is a public-domain collection of Ada software and information. The Ada Software Repository is one of several repositories located on the SIMTEL20 Defense Data Network host computer at White Sands Missile Range, and available to any host computer on the network since 26 November 1984. This repository provides a free source for Ada programs and information. The Ada Software Repository is divided into several subdirectories. These directories are organized by topic, and their names and a brief overview of their topics are contained. The Ada Software Repository on SIMTEL20 serves two basic roles: to promote the exchange and use (reusability) of Ada programs and tools (including components) and to promote Ada education.
Quantum Monte Carlo: Faster, More Reliable, And More Accurate
NASA Astrophysics Data System (ADS)
Anderson, Amos Gerald
2010-06-01
The Schrodinger Equation has been available for about 83 years, but today, we still strain to apply it accurately to molecules of interest. The difficulty is not theoretical in nature, but practical, since we're held back by lack of sufficient computing power. Consequently, effort is applied to find acceptable approximations to facilitate real time solutions. In the meantime, computer technology has begun rapidly advancing and changing the way we think about efficient algorithms. For those who can reorganize their formulas to take advantage of these changes and thereby lift some approximations, incredible new opportunities await. Over the last decade, we've seen the emergence of a new kind of computer processor, the graphics card. Designed to accelerate computer games by optimizing quantity instead of quality in processor, they have become of sufficient quality to be useful to some scientists. In this thesis, we explore the first known use of a graphics card to computational chemistry by rewriting our Quantum Monte Carlo software into the requisite "data parallel" formalism. We find that notwithstanding precision considerations, we are able to speed up our software by about a factor of 6. The success of a Quantum Monte Carlo calculation depends on more than just processing power. It also requires the scientist to carefully design the trial wavefunction used to guide simulated electrons. We have studied the use of Generalized Valence Bond wavefunctions to simply, and yet effectively, captured the essential static correlation in atoms and molecules. Furthermore, we have developed significantly improved two particle correlation functions, designed with both flexibility and simplicity considerations, representing an effective and reliable way to add the necessary dynamic correlation. Lastly, we present our method for stabilizing the statistical nature of the calculation, by manipulating configuration weights, thus facilitating efficient and robust calculations. Our combination of Generalized Valence Bond wavefunctions, improved correlation functions, and stabilized weighting techniques for calculations run on graphics cards, represents a new way for using Quantum Monte Carlo to study arbitrarily sized molecules.
A Measurement & Analysis Training Solution Supporting CMMI & Six Sigma Transition
2004-10-01
product” • Designing an integrated training solution • Illustration(s) © 2004 by Carnegie Mellon University Version 1.0 page 5 Carnegie Mellon S...12207 Score- card EIA 632 ISO 9000 ITIL COBIT PSM GQIM © 2004 by Carnegie Mellon University Version 1.0 page 7 Carnegie Mellon S oftware Engineer ing...several Capability Maturity Models, reflects Crosby’s 5 maturity levels • Focuses on infrastructure and process maturity • Intended for software and
A modular and programmable development platform for capsule endoscopy system.
Khan, Tareq Hasan; Shrestha, Ravi; Wahid, Khan A
2014-06-01
The state-of-the-art capsule endoscopy (CE) technology offers painless examination for the patients and the ability to examine the interior of the gastrointestinal tract by a noninvasive procedure for the gastroenterologists. In this work, a modular and flexible CE development system platform consisting of a miniature field programmable gate array (FPGA) based electronic capsule, a microcontroller based portable data recorder unit and computer software is designed and developed. Due to the flexible and reprogrammable nature of the system, various image processing and compression algorithms can be tested in the design without requiring any hardware change. The designed capsule prototype supports various imaging modes including white light imaging (WLI) and narrow band imaging (NBI), and communicates with the data recorder in full duplex fashion, which enables configuring the image size and imaging mode in real time during examination. A low complexity image compressor based on a novel color-space is implemented inside the capsule to reduce the amount of RF transmission data. The data recorder contains graphical LCD for real time image viewing and SD cards for storing image data. Data can be uploaded to a computer or Smartphone by SD card, USB interface or by wireless Bluetooth link. Computer software is developed that decompresses and reconstructs images. The fabricated capsule PCBs have a diameter of 16 mm. An ex-vivo animal testing has also been conducted to validate the results.
Interactive 2D to 3D stereoscopic image synthesis
NASA Astrophysics Data System (ADS)
Feldman, Mark H.; Lipton, Lenny
2005-03-01
Advances in stereoscopic display technologies, graphic card devices, and digital imaging algorithms have opened up new possibilities in synthesizing stereoscopic images. The power of today"s DirectX/OpenGL optimized graphics cards together with adapting new and creative imaging tools found in software products such as Adobe Photoshop, provide a powerful environment for converting planar drawings and photographs into stereoscopic images. The basis for such a creative process is the focus of this paper. This article presents a novel technique, which uses advanced imaging features and custom Windows-based software that utilizes the Direct X 9 API to provide the user with an interactive stereo image synthesizer. By creating an accurate and interactive world scene with moveable and flexible depth map altered textured surfaces, perspective stereoscopic cameras with both visible frustums and zero parallax planes, a user can precisely model a virtual three-dimensional representation of a real-world scene. Current versions of Adobe Photoshop provide a creative user with a rich assortment of tools needed to highlight elements of a 2D image, simulate hidden areas, and creatively shape them for a 3D scene representation. The technique described has been implemented as a Photoshop plug-in and thus allows for a seamless transition of these 2D image elements into 3D surfaces, which are subsequently rendered to create stereoscopic views.
2001-12-01
defense profits become excessive. Sorenson uses the Capital Asset Pricing Model ( CAPM ) to compare the risk-reward relationship for defense...firms. THEORETICAL, NORMATIVE, EMPIRICAL, INDUCTIVE [58] “A Comment on Using the Capital Asset Pricing ...combination asset revaluation, pensions, post-retirement health benefits, software capitalization , Material Management and Accounting System (MMAS), cost
Technical Basis for Evaluating Software-Related Common-Cause Failures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muhlheim, Michael David; Wood, Richard
2016-04-01
The instrumentation and control (I&C) system architecture at a nuclear power plant (NPP) incorporates protections against common-cause failures (CCFs) through the use of diversity and defense-in-depth. Even for well-established analog-based I&C system designs, the potential for CCFs of multiple systems (or redundancies within a system) constitutes a credible threat to defeating the defense-in-depth provisions within the I&C system architectures. The integration of digital technologies into the I&C systems provides many advantages compared to the aging analog systems with respect to reliability, maintenance, operability, and cost effectiveness. However, maintaining the diversity and defense-in-depth for both the hardware and software within themore » digital system is challenging. In fact, the introduction of digital technologies may actually increase the potential for CCF vulnerabilities because of the introduction of undetected systematic faults. These systematic faults are defined as a “design fault located in a software component” and at a high level, are predominately the result of (1) errors in the requirement specification, (2) inadequate provisions to account for design limits (e.g., environmental stress), or (3) technical faults incorporated in the internal system (or architectural) design or implementation. Other technology-neutral CCF concerns include hardware design errors, equipment qualification deficiencies, installation or maintenance errors, instrument loop scaling and setpoint mistakes.« less
Open Architecture SDR for Space
NASA Technical Reports Server (NTRS)
Smith, Carl; Long, Chris; Liebetreu, John; Reinhart, Richard C.
2005-01-01
This paper describes an open-architecture SDR (software defined radio) infrastructure that is suitable for space-based operations (Space-SDR). SDR technologies will endow space and planetary exploration systems with dramatically increased capability, reduced power consumption, and significantly less mass than conventional systems, at costs reduced by vigorous competition, hardware commonality, dense integration, reduced obsolescence, interoperability, and software re-use. Significant progress has been recorded on developments like the Joint Tactical Radio System (JSTRS) Software Communication Architecture (SCA), which is oriented toward reconfigurable radios for defense forces operating in multiple theaters of engagement. The JTRS-SCA presents a consistent software interface for waveform development, and facilitates interoperability, waveform portability, software re-use, and technology evolution.
Data Collection with Linux in the Undergraduate Physics Lab
NASA Astrophysics Data System (ADS)
Ramey, R. Dwayne
2004-11-01
Electronic data devices such as photogates can greatly facilitate data collection in the undergraduate physics laboratory. Unfortunately, these devices have several practical drawbacks. While the photogates themselves are not particularly expensive, manufacturers of these devices have created intermediary hardware devices for data buffering and manipulation. These devices, while useful in some contexts, greatly increase the overall price of data collection and, through the use of proprietary software, limit the ability of the enduser to customize the software. As an alternative, I outline the procedure for establishing a computer-based data collection system that consists of opensource software and user constructed connections. The data collection system consists of the wiring needed to connect a data device to a computer and the software needed to collect and manipulate data. Data devices can be connected to a computer through either through the USB port or the gameport of a sound card. Software capable of collecting and manipulating the data from a photogate type device on a Linux system has been developed and will be discrussed. Results for typical undergraduate photogate based experiments will be shown, error limits and data collect rates will be discussed for both the gameport and USB connections.
Oxygen Generation System Laptop Bus Controller Flight Software
NASA Technical Reports Server (NTRS)
Rowe, Chad; Panter, Donna
2009-01-01
The Oxygen Generation System Laptop Bus Controller Flight Software was developed to allow the International Space Station (ISS) program to activate specific components of the Oxygen Generation System (OGS) to perform a checkout of key hardware operation in a microgravity environment, as well as to perform preventative maintenance operations of system valves during a long period of what would otherwise be hardware dormancy. The software provides direct connectivity to the OGS Firmware Controller with pre-programmed tasks operated by on-orbit astronauts to exercise OGS valves and motors. The software is used to manipulate the pump, separator, and valves to alleviate the concerns of hardware problems due to long-term inactivity and to allow for operational verification of microgravity-sensitive components early enough so that, if problems are found, they can be addressed before the hardware is required for operation on-orbit. The decision was made to use existing on-orbit IBM ThinkPad A31p laptops and MIL-STD-1553B interface cards as the hardware configuration. The software at the time of this reporting was developed and tested for use under the Windows 2000 Professional operating system to ensure compatibility with the existing on-orbit computer systems.
Lott, Gus K; Johnson, Bruce R; Bonow, Robert H; Land, Bruce R; Hoy, Ronald R
2009-01-01
We present g-PRIME, a software based tool for physiology data acquisition, analysis, and stimulus generation in education and research. This software was developed in an undergraduate neurophysiology course and strongly influenced by instructor and student feedback. g-PRIME is a free, stand-alone, windows application coded and "compiled" in Matlab (does not require a Matlab license). g-PRIME supports many data acquisition interfaces from the PC sound card to expensive high throughput calibrated equipment. The program is designed as a software oscilloscope with standard trigger modes, multi-channel visualization controls, and data logging features. Extensive analysis options allow real time and offline filtering of signals, multi-parameter threshold-and-window based event detection, and two-dimensional display of a variety of parameters including event time, energy density, maximum FFT frequency component, max/min amplitudes, and inter-event rate and intervals. The software also correlates detected events with another simultaneously acquired source (event triggered average) in real time or offline. g-PRIME supports parameter histogram production and a variety of elegant publication quality graphics outputs. A major goal of this software is to merge powerful engineering acquisition and analysis tools with a biological approach to studies of nervous system function.
Near-real-time biplanar fluoroscopic tracking system for the video tumor fighter
NASA Astrophysics Data System (ADS)
Lawson, Michael A.; Wika, Kevin G.; Gilles, George T.; Ritter, Rogers C.
1991-06-01
We have developed software capable of the three-dimensional tracking of objects in the brain volume, and the subsequent overlaying of an image of the object onto previously obtained MR or CT scans. This software has been developed for use with the Magnetic Stereotaxis System (MSS), also called the 'Video Tumor Fighter' (VTF). The software was written for a Sun 4/110 SPARC workstation with an ANDROX ICS-400 image processing card installed to manage this task. At present, the system uses input from two orthogonally-oriented, visible- light cameras and a simulated scene to determine the three-dimensional position of the object of interest. The coordinates are then transformed into MR or CT coordinates and an image of the object is displayed in the appropriate intersecting MR slice on a computer screen. This paper describes the tracking algorithm and discusses how it was implemented in software. The system's hardware is also described. The limitations of the present system are discussed and plans for incorporating bi-planar, x-ray fluoroscopy are presented.
Defensive Practice as ‘Fear-Based’ Practice: Social Work's Open Secret?
Whittaker, Andrew; Havard, Tirion
2016-01-01
Defensive practice has received attention through the Munro review of child protection, which has identified that current organisational cultures increase the likelihood of defensive practice. Whilst the wider socio-political climate that gives rise to defensive practice has been explored within the literature, little attention has been paid to the everyday realities of defensive practice. This paper reports the findings of a study into final year social work students' attitudes towards defensive practice within social work. Three focus groups were completed with a total of ninety final-year students that collected qualitative and quantitative data using interactive software. This paper examines how participants perceived defensive practice, both in general and when faced with real-life vignettes. Participants distinguished between pro-active behaviour (sins of commission) and passive behaviour (sins of omission), generally regarding the latter as less serious because it was less tangible and easier to attribute to more positive motives. Whilst the literature identifies defensive practice as deliberate behaviour, the focus group discussions suggest that it is a subtler and less conscious process. Whilst there was there was a general consensus about the nature of defensive practice, there was considerable disagreement about specific vignettes and several competing explanations are explored. PMID:27559220
Department of Defense High Performance Computing Modernization Program. 2006 Annual Report
2007-03-01
Department. We successfully completed several software development projects that introduced parallel, scalable production software now in use across the...imagined. They are developing and deploying weather and ocean models that allow our soldiers, sailors, marines and airmen to plan missions more effectively...and to navigate adverse environments safely. They are modeling molecular interactions leading to the development of higher energy fuels, munitions
ERIC Educational Resources Information Center
Ols, John M., Jr.
Under current federal copyright law (17 U.S.C. 105), federal agencies cannot copyright and license their computer software. Officials at the Departments of Agriculture, Commerce, and Defense, the Environmental Protection Agency, the National Aeronautics and Space Administration, and the National Institutes of Health state that a significant…
A Proven Methodology for Developing Secure Software and Applying It to Ground Systems
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2016-01-01
Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?
Funding for Life: When to Spend the Acquisition Pot
2010-05-01
Private Military Sector Software Requirements for OA Spiral Development Strategy for Defense Acquisition Research The Software, Hardware...qb=p`elli= Capital Budgeting for the DoD Energy Saving Contracts/DoD Mobile Assets Financing DoD Budget via PPPs Lessons from Private Sector ...the endeavor can, in part, be related to the stability of the aims and contributory components. Economic growth has been driven by globalisation
Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense
2016-12-08
in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully
Large Scale Portability of Hospital Information System Software
Munnecke, Thomas H.; Kuhn, Ingeborg M.
1986-01-01
As part of its Decentralized Hospital Computer Program (DHCP) the Veterans Administration installed new hospital information systems in 169 of its facilities during 1984 and 1985. The application software for these systems is based on the ANS MUMPS language, is public domain, and is designed to be operating system and hardware independent. The software, developed by VA employees, is built upon a layered approach, where application packages layer on a common data dictionary which is supported by a Kernel of software. Communications between facilities are based on public domain Department of Defense ARPA net standards for domain naming, mail transfer protocols, and message formats, layered on a variety of communications technologies.
Multispectral image fusion using neural networks
NASA Technical Reports Server (NTRS)
Kagel, J. H.; Platt, C. A.; Donaven, T. W.; Samstad, E. A.
1990-01-01
A prototype system is being developed to demonstrate the use of neural network hardware to fuse multispectral imagery. This system consists of a neural network IC on a motherboard, a circuit card assembly, and a set of software routines hosted by a PC-class computer. Research in support of this consists of neural network simulations fusing 4 to 7 bands of Landsat imagery and fusing (separately) multiple bands of synthetic imagery. The simulations, results, and a description of the prototype system are presented.
Wang, Wen-Bin; Li, Jang-Yuan; Wu, Qi-Jun
2007-01-01
A LabVIEW-based self-constructed chemical virtual instrument (VI) has been developed for determining temperatures and pressures. It can be put together easily and quickly by selecting hardware modules, such as the PCI-DAQ card or serial port method, different kinds of sensors, signal-conditioning circuits or finished chemical instruments, and software modules such as data acquisition, saving, proceeding. The VI system provides individual and extremely flexible solutions for automatic measurements in physical chemistry research.
Wang, Wen-Bin; Li, Jang-Yuan; Wu, Qi-Jun
2007-01-01
A LabVIEW-based self-constructed chemical virtual instrument (VI) has been developed for determining temperatures and pressures. It can be put together easily and quickly by selecting hardware modules, such as the PCI-DAQ card or serial port method, different kinds of sensors, signal-conditioning circuits or finished chemical instruments, and software modules such as data acquisition, saving, proceeding. The VI system provides individual and extremely flexible solutions for automatic measurements in physical chemistry research. PMID:17671611
ASV3 dial-in interface recommendation for the Repository Based Software Engineering (RBSE) program
NASA Technical Reports Server (NTRS)
1992-01-01
The purpose of this report is to provide insight into the approach and design of the Cooperative User Interface (CUI). The CUI is being developed based on Hypercard technology and will provide the same look and feel as is provided by the NASA Electronic Library System (NELS) X-Window interface. The interaction between the user and ASCII-LIB is presented as well as the set of Hypercard Cards with which the user will work.
A Clock Fingerprints-Based Approach for Wireless Transmitter Identification
NASA Astrophysics Data System (ADS)
Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan
Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.
APEX 3: a multi-purpose test platform for auditory psychophysical experiments.
Francart, Tom; van Wieringen, Astrid; Wouters, Jan
2008-07-30
APEX 3 is a software test platform for auditory behavioral experiments. It provides a generic means of setting up experiments without any programming. The supported output devices include sound cards and cochlear implants from Cochlear Corporation and Advanced Bionics Corporation. Many psychophysical procedures are provided and there is an interface to add custom procedures. Plug-in interfaces are provided for data filters and external controllers. APEX 3 is supported under Linux and Windows and is available free of charge.
Engineering Safety- and Security-Related Requirements for Software-Intensive Systems
2007-05-31
University Very Large New Zoo Parking Lots Zoo Back Lots Restaurants and Shops Tropical Rainforest African SavannaChildren’s Petting Area Monkeys Great Apes...decide to ride to the Great Apes and Monkeys taxi station near the central shops and restaurants area. Mr. Smith then swipes his zoo taxi travel card...taxi station on their right, circles around the central area, and soon pulls off the Zoo Loop Line to enter the inner Great Apes and Monkeys taxi
ERIC Educational Resources Information Center
Bernstein, Allison; Baule, Steve; Farmer, Lesley S. J.; Anderson, Cyndee; Barringer, Crystal; Buchanan, Peggy; Fullner, Sheryl Kindle; Knop, Kathi; Larson, Chris
2002-01-01
Includes eight articles that address issues related to budgeting and finances in secondary school libraries. Topics include limited budgets; budget proposals; administering grants; writing grants; using Microsoft's Excel software for budgeting; using credit cards for library purchases; offering prizes for donating books; and offering coffee and…
48 CFR 208.002 - Priorities for use of Government supply sources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES 208... Acquisition, and Subpart 208.74, Enterprise Software Agreements. [71 FR 39004, July 11, 2006] ...
Data-Acquisition Software for PSP/TSP Wind-Tunnel Cameras
NASA Technical Reports Server (NTRS)
Amer, Tahani R.; Goad, William K.
2005-01-01
Wing-Viewer is a computer program for acquisition and reduction of image data acquired by any of five different scientificgrade commercial electronic cameras used at Langley Research center to observe wind-tunnel models coated with pressure or temperature-sensitive paints (PSP/TSP). Wing-Viewer provides full automation of camera operation and acquisition of image data, and has limited data-preprocessing capability for quick viewing of the results of PSP/TSP test images. Wing- Viewer satisfies a requirement for a standard interface between all the cameras and a single personal computer: Written by use of Microsoft Visual C++ and the Microsoft Foundation Class Library as a framework, Wing-Viewer has the ability to communicate with the C/C++ software libraries that run on the controller circuit cards of all five cameras.
NASA Astrophysics Data System (ADS)
Buckman, S. M.; Ius, D.
1996-02-01
This paper reports on the development of a digital coincidence-counting system which comprises a custom-built data acquisition card and associated PC software. The system has been designed to digitise the pulse-trains from two radiation detectors at a rate of 20 MSamples/s with 12-bit resolution. Through hardware compression of the data, the system can continuously record both individual pulse-shapes and the time intervals between pulses. Software-based circuits are used to process the stored pulse trains. These circuits are constructed simply by linking together icons representing various components such as coincidence mixers, time delays, single-channel analysers, deadtimes and scalers. This system enables a pair of pulse trains to be processed repeatedly using any number of different methods. Some preliminary results are presented in order to demonstrate the versatility and efficiency of this new method.
Technology collaboration by means of an open source government
NASA Astrophysics Data System (ADS)
Berardi, Steven M.
2009-05-01
The idea of open source software originally began in the early 1980s, but it never gained widespread support until recently, largely due to the explosive growth of the Internet. Only the Internet has made this kind of concept possible, bringing together millions of software developers from around the world to pool their knowledge. The tremendous success of open source software has prompted many corporations to adopt the culture of open source and thus share information they previously held secret. The government, and specifically the Department of Defense (DoD), could also benefit from adopting an open source culture. In acquiring satellite systems, the DoD often builds walls between program offices, but installing doors between programs can promote collaboration and information sharing. This paper addresses the challenges and consequences of adopting an open source culture to facilitate technology collaboration for DoD space acquisitions. DISCLAIMER: The views presented here are the views of the author, and do not represent the views of the United States Government, United States Air Force, or the Missile Defense Agency.
Detection and classification of human body odor using an electronic nose.
Wongchoosuk, Chatchawal; Lutz, Mario; Kerdcharoen, Teerakiat
2009-01-01
An electronic nose (E-nose) has been designed and equipped with software that can detect and classify human armpit body odor. An array of metal oxide sensors was used for detecting volatile organic compounds. The measurement circuit employs a voltage divider resistor to measure the sensitivity of each sensor. This E-nose was controlled by in-house developed software through a portable USB data acquisition card with a principle component analysis (PCA) algorithm implemented for pattern recognition and classification. Because gas sensor sensitivity in the detection of armpit odor samples is affected by humidity, we propose a new method and algorithms combining hardware/software for the correction of the humidity noise. After the humidity correction, the E-nose showed the capability of detecting human body odor and distinguishing the body odors from two persons in a relative manner. The E-nose is still able to recognize people, even after application of deodorant. In conclusion, this is the first report of the application of an E-nose for armpit odor recognition.
Detection and Classification of Human Body Odor Using an Electronic Nose
Wongchoosuk, Chatchawal; Lutz, Mario; Kerdcharoen, Teerakiat
2009-01-01
An electronic nose (E-nose) has been designed and equipped with software that can detect and classify human armpit body odor. An array of metal oxide sensors was used for detecting volatile organic compounds. The measurement circuit employs a voltage divider resistor to measure the sensitivity of each sensor. This E-nose was controlled by in-house developed software through a portable USB data acquisition card with a principle component analysis (PCA) algorithm implemented for pattern recognition and classification. Because gas sensor sensitivity in the detection of armpit odor samples is affected by humidity, we propose a new method and algorithms combining hardware/software for the correction of the humidity noise. After the humidity correction, the E-nose showed the capability of detecting human body odor and distinguishing the body odors from two persons in a relative manner. The E-nose is still able to recognize people, even after application of deodorant. In conclusion, this is the first report of the application of an E-nose for armpit odor recognition. PMID:22399995
NASA Astrophysics Data System (ADS)
Bernier, Jean D.
1991-09-01
The imaging in real time of infrared background scenes with the Naval Postgraduate School Infrared Search and Target Designation (NPS-IRSTD) System was achieved through extensive software developments in protected mode assembly language on an Intel 80386 33 MHz computer. The new software processes the 512 by 480 pixel images directly in the extended memory area of the computer where the DT-2861 frame grabber memory buffers are mapped. Direct interfacing, through a JDR-PR10 prototype card, between the frame grabber and the host computer AT bus enables each load of the frame grabber memory buffers to be effected under software control. The protected mode assembly language program can refresh the display of a six degree pseudo-color sector in the scanner rotation within the two second period of the scanner. A study of the imaging properties of the NPS-IRSTD is presented with preliminary work on image analysis and contrast enhancement of infrared background scenes.
High speed multiphoton imaging
NASA Astrophysics Data System (ADS)
Li, Yongxiao; Brustle, Anne; Gautam, Vini; Cockburn, Ian; Gillespie, Cathy; Gaus, Katharina; Lee, Woei Ming
2016-12-01
Intravital multiphoton microscopy has emerged as a powerful technique to visualize cellular processes in-vivo. Real time processes revealed through live imaging provided many opportunities to capture cellular activities in living animals. The typical parameters that determine the performance of multiphoton microscopy are speed, field of view, 3D imaging and imaging depth; many of these are important to achieving data from in-vivo. Here, we provide a full exposition of the flexible polygon mirror based high speed laser scanning multiphoton imaging system, PCI-6110 card (National Instruments) and high speed analog frame grabber card (Matrox Solios eA/XA), which allows for rapid adjustments between frame rates i.e. 5 Hz to 50 Hz with 512 × 512 pixels. Furthermore, a motion correction algorithm is also used to mitigate motion artifacts. A customized control software called Pscan 1.0 is developed for the system. This is then followed by calibration of the imaging performance of the system and a series of quantitative in-vitro and in-vivo imaging in neuronal tissues and mice.
Study on Parallel 2-DOF Rotation Machanism in Radar
NASA Astrophysics Data System (ADS)
Jiang, Ming; Hu, Xuelong; Liu, Lei; Yu, Yunfei
The spherical parallel machine has become the world's academic and industrial focus of the field in recent years due to its simple and economical manufacture as well as its structural compactness especially suitable for areas where space gesture changes. This paper dwells upon its present research and development home and abroad. The newer machine (RGRR-II) can rotate around the axis z within 360° and the axis y1 from -90° to +90°. It has the advantages such as less moving parts (only 3 parts), larger ratio of work space to machine size, zero mechanic coupling, no singularity. Constructing rotation machine with spherical parallel 2-DOF rotation join (RGRR-II) may realize semispherical movement with zero dead point and extent the range. Control card (PA8000NT Series CNC) is installed in the computer. The card can run the corresponding software which realizes radar movement control. The machine meets the need of radars in plane and satellite which require larger detection range, lighter weight and compacter structure.
A Separate Compilation Extension to Standard ML (Revised and Expanded)
2006-09-17
repetition of interfaces. The language is given a formal semantics, and we argue that this semantics is implementable in a variety of compilers. This...material is based on work supported in part by the National Science Foundation under grant 0121633 Language Technology for Trustless Software...Dissemination and by the Defense Advanced Research Projects Agency under contracts F196268-95-C-0050 The Fox Project: Advanced Languages for Systems Software
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7
2006-07-01
public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto
2007-09-01
Findings______________________________________________________________________ Chinese hackers forced one of its bureaus to cut off Internet access and discard virus -infected...Vulnerability ( IAV ) Management (IAVM) process was created to prepare and rapidly disseminate mitigating actions for potentially critical software...vulnerabilities to DoD Components. IAVM notices have three criticality levels: • IAV Alert (IAVA) – most critical – a vulnerability posing an immediate
Applying the Goal-Question-Indicator-Metric (GQIM) Method to Perform Military Situational Analysis
2016-05-11
www.sei.cmu.edu CMU/SEI-2016-TN-003 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release...Distribution is Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of...Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally
Defense Facility Condition: Revised Guidance Needed to Improve Oversight of Assessments and Ratings
2016-06-01
are to implement the standardized process in part by assessing the condition of buildings, pavement , and rail using the same set of software tools...facility to current standards; costs for labor, equipment, materials, and currency exchange rates overseas; costs for project planning and design ...example, the services are to assess the condition of buildings, pavement , and rail using Sustainment Management System software tools developed by the
CrossTalk: The Journal of Defense Software Engineering. Volume 23, Number 2, March/April 2010
2010-04-01
SDLC phase. 4. Developing secure software depends on understanding the operational con- text in which it will be used. This con- text includes... its development . BSI leverages the Common Weakness Enumeration (CWE) and the Common Attack Pattern Enumeration and Classification (CAPEC) efforts. To...system integrators providing sys- tems (both IT and warfighting) to the Concept Refinement Technology Development System Development and
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 6, September/October 2009
2009-10-01
software to improve the reliability, sustainability, and responsiveness of our warfighting capability. Subscriptions: Send correspondence concerning...endorsed by, the U.S. government, the DoD, the co-sponsors, or the STSC.All product names referenced in this issue are trademarks of their companies...Authors will use this section to share evidence of a demonstrative return on investment, process improvement , quality improvement , reductions to schedule
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 6
2006-06-01
improvement methods. The total volume of projects studied now exceeds 12,000. Software Productivity Research, LLC Phone: (877) 570-5459 (973) 273-5829...While performing quality con- sulting, Olson has helped organizations measurably improve quality and productivity , save millions of dollars in costs of...This article draws parallels between the outrageous events on the Jerry Springer Show and problems faced by process improvement programs. by Paul
Optimizing the Remotely Piloted Aircraft Pilot Career Field
2011-10-01
Katana light aircraft trainers, receiving 30 to 38 hours of introductory, night, cross country and solo ...Power Journal 33, no. 2 (Summer 2009): 5-10. 51. Steve Lohr. "Software Progress Beats Moore’s Law." bits.blogs.nytimes.com. March 07, 2011. http...bits.blogs.nytimes.com/2011/03/07/software-progress- beats -moores-law/ 52. US Department of Defense. "United States Air Force Unmanned Aircraft
1992-01-01
perturbations and nonstationary interference effects so as to reduce decoding 13 DARPA SBIR PHASE I AWARDS errors for spread spectrum communications...potential applications - Utilization of spread spectrum techniques by DoD and others is increasing because ot robusines, to interference and fading...Mirror Devices ( DMD ) illuminated by a low power laser diode or led will be considered as a source. Commercial optical software in conjunction with in
1985-06-01
Z2~1 31DTIC TAR 31 Unaflnonc.-d Successful The S N wDefense Challenge: Distribul Systems Spare Parts Availability Dr. Joniathian D. Kaplan Lieutenant...Developing Human Perform- hardware software has not been ing that the resulting design be capable ance Specifications ( Kaplan & Crooks, developed at this...design to perform at the components: MOS-characteristics specified criteria. Although the map, analysis-characteristics map, and E Dr. Kaplan is a
2017-03-23
performance computing resources made available by the US Department of Defense High Performance Computing Modernization Program at the Air Force...1Department of Defense Biotechnology High Performance Computing Software Applications Institute, Telemedicine and Advanced Technology Research Center, United...States Army Medical Research and Materiel Command, Fort Detrick, Maryland, USA Full list of author information is available at the end of the article
2006-02-01
technology for cost and risk reduction of products, software, and processes; long-term, multi-Service needs; and disruptive technologies , both...initiatives and for disruptive technologies , the Office of the Secretary of Defense (OSD) can better promote the importance and value of the program...multi- Service programs, research in “ disruptive ” technologies , and SBIR programs. Balance current, near term, and future needs as well as small and
NASA Technical Reports Server (NTRS)
Tamayo, Tak Chai
1987-01-01
Quality of software not only is vital to the successful operation of the space station, it is also an important factor in establishing testing requirements, time needed for software verification and integration as well as launching schedules for the space station. Defense of management decisions can be greatly strengthened by combining engineering judgments with statistical analysis. Unlike hardware, software has the characteristics of no wearout and costly redundancies, thus making traditional statistical analysis not suitable in evaluating reliability of software. A statistical model was developed to provide a representation of the number as well as types of failures occur during software testing and verification. From this model, quantitative measure of software reliability based on failure history during testing are derived. Criteria to terminate testing based on reliability objectives and methods to estimate the expected number of fixings required are also presented.
Portable electrocardiogram device using Android smartphone.
Brucal, S G E; Clamor, G K D; Pasiliao, L A O; Soriano, J P F; Varilla, L P M
2016-08-01
Portable electrocardiogram (ECG) capturing device can be interfaced to a smart phone installed with an android-based application (app). This app processes and analyses the data sent by the device to provide an interpretation of the patient/user's heart current condition (e.g.: beats per minute, heart signal waveform, R-R interval). The ECG recorded by the app is stored in the smart phone's Secure Digital (SD) card and cloud storage which can be accessed remotely by a physician to aid in providing medical diagnosis. The project aims to help patients living at a far distance from hospitals and experience difficulty in consulting their physician for regular check-ups, and assist doctors in regularly monitoring their patient's heart condition. The hardware data acquisition device and software application were subjected to trials in a clinic with volunteer-patients to measure the ECG and heart rate, data saving speed on the SD card, success rate of the saved data and uploaded file. Different ECG tests using the project prototype were done for 12 patients/users and yielded a reading difference of 7.61% in an R-R interval reading and 5.35% in heart rate reading as compared with the cardiologist's conventional 12-electrode ECG machine. Using the developed ECG device, it took less than 5 seconds to save ECG reading using SD card and approximately 2 minutes to upload via cloud.
Applying formal methods and object-oriented analysis to existing flight software
NASA Technical Reports Server (NTRS)
Cheng, Betty H. C.; Auernheimer, Brent
1993-01-01
Correctness is paramount for safety-critical software control systems. Critical software failures in medical radiation treatment, communications, and defense are familiar to the public. The significant quantity of software malfunctions regularly reported to the software engineering community, the laws concerning liability, and a recent NRC Aeronautics and Space Engineering Board report additionally motivate the use of error-reducing and defect detection software development techniques. The benefits of formal methods in requirements driven software development ('forward engineering') is well documented. One advantage of rigorously engineering software is that formal notations are precise, verifiable, and facilitate automated processing. This paper describes the application of formal methods to reverse engineering, where formal specifications are developed for a portion of the shuttle on-orbit digital autopilot (DAP). Three objectives of the project were to: demonstrate the use of formal methods on a shuttle application, facilitate the incorporation and validation of new requirements for the system, and verify the safety-critical properties to be exhibited by the software.
NASA Astrophysics Data System (ADS)
Baart, F.; Donchyts, G.; van Dam, A.; Plieger, M.
2015-12-01
The emergence of interactive art has blurred the line between electronic, computer graphics and art. Here we apply this art form to numerical models. Here we show how the transformation of a numerical model into an interactive painting can both provide insights and solve real world problems. The cases that are used as an example include forensic reconstructions, dredging optimization, barrier design. The system can be fed using any source of time varying vector fields, such as hydrodynamic models. The cases used here, the Indian Ocean (HYCOM), the Wadden Sea (Delft3D Curvilinear), San Francisco Bay (3Di subgrid and Delft3D Flexible Mesh), show that the method used is suitable for different time and spatial scales. High resolution numerical models become interactive paintings by exchanging their velocity fields with a high resolution (>=1M cells) image based flow visualization that runs in a html5 compatible web browser. The image based flow visualization combines three images into a new image: the current image, a drawing, and a uv + mask field. The advection scheme that computes the resultant image is executed in the graphics card using WebGL, allowing for 1M grid cells at 60Hz performance on mediocre graphic cards. The software is provided as open source software. By using different sources for a drawing one can gain insight into several aspects of the velocity fields. These aspects include not only the commonly represented magnitude and direction, but also divergence, topology and turbulence .
Software architecture and engineering for patient records: current and future.
Weng, Chunhua; Levine, Betty A; Mun, Seong K
2009-05-01
During the "The National Forum on the Future of the Defense Health Information System," a track focusing on "Systems Architecture and Software Engineering" included eight presenters. These presenters identified three key areas of interest in this field, which include the need for open enterprise architecture and a federated database design, net centrality based on service-oriented architecture, and the need for focus on software usability and reusability. The eight panelists provided recommendations related to the suitability of service-oriented architecture and the enabling technologies of grid computing and Web 2.0 for building health services research centers and federated data warehouses to facilitate large-scale collaborative health care and research. Finally, they discussed the need to leverage industry best practices for software engineering to facilitate rapid software development, testing, and deployment.
Computer-Aided Process and Tools for Mobile Software Acquisition
2013-07-30
moldo^j= pmlkploba=obmloq=pbofbp= Computer-Aided Process and Tools for Mobile Software Acquisition 30 July 2013 LT Christopher Bonine , USN, Dr...Christopher Bonine is a lieutenant in the United States Navy. He is currently assigned to the Navy Cyber Defense Operations Command in Norfolk, VA. He has...interests are in development and implementation of cyber security policy. Bonine has a master’s in computer science from the Naval Postgraduate School
Exploring the Cost and Functionality of MEDCOM Web Services
2005-10-24
Software Name 24. What backend database software supports your intranet/Internet content? (check all that apply)-. o Oracle o Microsoft SQL Server E0...Department of Defense (DoD) service branches, which funded and deployed an Internet portal, TRICARE Online, to serve as an information conduit between the...public website, the information contained on the intranet is traditionally limited to the members of the hosting command. The local information serves as
Glossary: Defense Acquisition Acronyms and Terms. 4th Edition
1989-10-01
Appropriations Committee R HARDMAN Manpower Planning for Hardware (Navy/USMC) HASC House Armed Services Committee 11 HBC House Budget Committee R HCA Head of...Logistics Review Group (Navy) LRIP Low Rate Initial Production LRP Low Rate Production LRRDAP Long Range Research, Development and Acquisition Plan...Software User’s Manual R SUPSHIPS Superintendent of Shipbuilding S/V Survivability/Vulnerability SVR Shop Visit Rate R SW or S/W Software SX Systems
Department of Defense Software Factbook
2017-07-07
parameters, these rules of thumb may not provide a lot of value to project managers estimating their software efforts. To get the information useful to them...organization determine the total cost of a particular project , but it is a useful metric to technical managers when they are required to submit an annual...outcome. It is most likely a combination of engineering, management , and funding factors. Although a project may resist planning a schedule slip, this
2015-04-30
mobile devices used within academic, business , or government enterprises. Acquisition personnel in such enterprises will increasingly be called on to...Graduate School of Business & Public Policy at the Naval Postgraduate School. To request defense acquisition research, to become a research sponsor, or to...address challenges in the acquisition of software systems for Web-based or mobile devices used within academic, business , or government enterprises
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 9
2006-09-01
it does. Several freely down- loadable methodologies have emerged to support the developer in modeling threats to applications and other soft...SECURIS. Model -Driven Develop - ment and Analysis of Secure Information Systems <www.sintef.no/ content/page1_1824.aspx>. 10. The SECURIS Project ...By applying these methods to the SDLC , we can actively reduce the number of known vulnerabilities in software as it is developed . For
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007
2007-03-01
Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO
Fault Tolerant Hardware/Software Architecture for Flight Critical Function
1985-09-01
Applications Studies Programme. The results of AGARD work are reported to the member nations and the NATO Authorities through the AGARD series of...systems, and is being advocated as a defense against design deficiencies which can plague software. - -- -- z--mm-L ___ K A critical application area for...day of the lecture series concludes with part I of a paper on the ;use of the Ada programming language In flight critical applications . Ada has been
Program Manager: Journal of the Defense Systems Management College, Volume 17, Number 3
1988-06-01
34 modernizing plants and processes, We have established a network with What does "quality" mean? First, the streamlining management, pooling trade associations...pant an opportunity to reflect on the - Network building may be the first opportunity for some organizational climate and hierarchical managers to...s devop slom p se result of the soaring cost of soft -Software Performance Testing. 3 ware enhancements. This difference in hardware and software
Agile Software Development in Defense Acquisition: A Mission Assurance Perspective
2012-03-23
based information retrieval system, we might say that this program works like a hive of bees , going out for pollen and bringing it back to the hive...developers ® Six Siqma is reqistered in the U. S. Patent and Trademark Office by Motorola ^_ 33 @ AEROSPACE Major Areas in a Typical Software...requirements - Capturing and evaluating quality metrics, identifying common problem areas **» Despite its positive impact on quality, pair programming
1983-11-01
INSTRUMENTATION ;(U) FORKLIFT VEHICLES ;(U) EXPERIMENTAL DATA IDENTIFIERS: OBJECTIVE: (U) SUPPORT INHOUSE RESEARCH FOR- ACQUISITION AND ANALYSIS OF...ROBOTIC RECONNAISSANCE VEHICLE DEMONSTRATOR WITH TERRAIN ANALYSIS . THIS WORK WILL SPECIFY THE BASE LINE HARDWARE, SOFTWARE, DATA BASE, AND SYSTEM...THE DATA ANALYSIS . THIS IS ALSO TRUE OF INFLIGMT DATA THAT THE PILOT IS REQUIRED TO ANALYZE. THIS RESEARCH IS CONCERNED WITH THE REPORT NO. CX7419