WorldWideScience

Sample records for defense identification code

  1. Secure surface identification codes

    Science.gov (United States)

    Beekhof, F.; Voloshynovskiy, S.; Koval, O.; Villan, R.; Pun, T.

    2008-02-01

    This paper introduces an identification framework for random microstructures of material surfaces. These microstructures represent a kind of unique fingerprints that can be used to track and trace an item as well as for anti-counterfeiting. We first consider the architecture for mobile phone-based item identification and then introduce a practical identification algorithm enabling fast searching in large databases. The proposed algorithm is based on reference list decoding. The link to digital communications and robust perceptual hashing is shown. We consider a practical construction of reference list decoding, which comprizes computational complexity, security, memory storage and performance requirements. The efficiency of the proposed algorithm is demonstrated on experimental data obtained from natural paper surfaces.

  2. Mechanism and Defense on Malicious Code

    Institute of Scientific and Technical Information of China (English)

    WEN Wei-ping; QING Si-han

    2005-01-01

    With the explosive growth of network applications,the threat of the malicious code against network security becomes increasingly serious. In this paper we explore the mechanism of the malicious code by giving an attack model of the malicious code, and discuss the critical techniques of implementation and prevention against the malicious code. The remaining problems and emerging trends in this area are also addressed in the paper.

  3. 33 CFR 181.31 - Manufacturer identification code assignment.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Manufacturer identification code assignment. 181.31 Section 181.31 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... identification code assignment. (a) Each person required by § 181.23 to affix hull identifications numbers must...

  4. The CODE : A revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H.R; Olff, M.; Ursin, H

    1997-01-01

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal componen

  5. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

    Science.gov (United States)

    2010-10-01

    implementations of ISR, we could also use AES encryption with 128-bit blocks of code. We adopt a different approach to protect against key guessing...when downloading content. An attacker can perform SQL- injection using this variable, to retrieve all user passwords (e.g., by appending select pass...this problem by us- ing a stronger encryption algorithm such as AES or bit transposition for the randomization, possibly taking a performance hit. As we

  6. DNA Bar-Coding for Phytoplasma Identification

    DEFF Research Database (Denmark)

    Makarova, Olga; Contaldo, Nicoletta; Paltrinieri, Samanta

    2013-01-01

    Phytoplasma identi fi cation has proved dif fi cult due to their inability to be maintained in vitro. DNA barcoding is an identi fi cation method based on comparison of a short DNA sequence with known sequences from a database. A DNA barcoding tool has been developed for phytoplasma identi fi...... cation. While other sequencebased methods may be well adapted to identification of particular strains of phytoplasmas, often they cannot be used for the simultaneous identification of phytoplasmas from different groups. The phytoplasma DNA barcoding protocol in this chapter, based on the tuf and 16Sr...

  7. Optical encryption of personal identification information using orthogonal code

    Science.gov (United States)

    Islam, Mohammed N.; Alam, Mohammad S.

    2006-05-01

    Optical information processing techniques have been developed for information security and fraud deterrent applications. Several encryption methods have been proposed in the literature, which includes optical double random-phase encryption, polarization encoding, encryption and verification using a multiplexed minimum average correlation energy phase-encrypted filter. All these reports employed a pseudo-random number for the code. But as such numbers are not uncorrelated, the security is not guaranteed because a wrong code may also extract some of the features of the coded information. The objective of the paper is to develop an optical security system employing orthogonal code for protection of personal identification information. As the orthogonal codes have zero or minimum cross-correlation depending on the offset between the codes, a wrong code can not decrypt any information. Here a simple encryption technique is proposed in spatial domain, where the input images are first spread in one dimension using an optical lens and then multiplied by the respective code. Finally, the individual encrypted images are superimposed on a common spatial domain. The individual images can then be decrypted by correlating the received signal with the respective address code. Computer simulation results show that any information containing binary characters can be encrypted and then decrypted successfully. The encrypted images are found to be secure, because no unwanted reproduction is possible without having the appropriate code. The technique also offers an efficient use of the storage or transmission capacity. Therefore, the proposed optical encryption technique can be applied to securing personal identification or similar information.

  8. MURDER COMMITTED BY EXCEEDING THE LIMITS OF NECESSARY DEFENSE, AMENDMENTS PROPOSED TO IMPROVE THE RUSSIAN FEDERATION CRIMINAL CODE

    Directory of Open Access Journals (Sweden)

    Arseny Georgyevich BABICHEV

    2014-01-01

    Full Text Available The paper examined provisions of the current Criminal Code concerning the necessary defense, and considered the grounds for release of an accused, or for according mitigation in the seriousness of offence and the severity of sentence for crime committed in excess of the limits of necessary defense. The study cast light upon the specifics of the corpus delicti specified by the Russian Federation Criminal Code, Article 108, Part 1, and suggested amend-ments to improve legislation.

  9. A comparative test of the developmental, role-playing, and defensive explanations of offspring identification.

    Science.gov (United States)

    Sullivan, J L; Minns, D R

    1978-01-01

    Following Mussen and Distler (1959) and Bandura, Ross and Ross (1963), the developmental, defensive, and role-playing theories of identification are tested on high school seniors. Previous tests have supported the developmental and role-playing hypotheses about equally, while the defensive hypothesis lacks consistent empirical support. Questions are raised, however, about the merit of these tests. Data are presented on seniors in an Eastern suburban school and a Midwestern small town school which support the developmental (warmth) hypothesis but which are inconsistent with the defensive and role-playing hypotheses. Parental behavior is measured by the Bronfenbrenner Parent Behavior Questionnaire and identification is measured by the semantic differential.

  10. CRITICA: coding region identification tool invoking comparative analysis

    Science.gov (United States)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  11. CRITICA: coding region identification tool invoking comparative analysis

    Science.gov (United States)

    Badger, J. H.; Olsen, G. J.; Woese, C. R. (Principal Investigator)

    1999-01-01

    Gene recognition is essential to understanding existing and future DNA sequence data. CRITICA (Coding Region Identification Tool Invoking Comparative Analysis) is a suite of programs for identifying likely protein-coding sequences in DNA by combining comparative analysis of DNA sequences with more common noncomparative methods. In the comparative component of the analysis, regions of DNA are aligned with related sequences from the DNA databases; if the translation of the aligned sequences has greater amino acid identity than expected for the observed percentage nucleotide identity, this is interpreted as evidence for coding. CRITICA also incorporates noncomparative information derived from the relative frequencies of hexanucleotides in coding frames versus other contexts (i.e., dicodon bias). The dicodon usage information is derived by iterative analysis of the data, such that CRITICA is not dependent on the existence or accuracy of coding sequence annotations in the databases. This independence makes the method particularly well suited for the analysis of novel genomes. CRITICA was tested by analyzing the available Salmonella typhimurium DNA sequences. Its predictions were compared with the DNA sequence annotations and with the predictions of GenMark. CRITICA proved to be more accurate than GenMark, and moreover, many of its predictions that would seem to be errors instead reflect problems in the sequence databases. The source code of CRITICA is freely available by anonymous FTP (rdp.life.uiuc.edu in/pub/critica) and on the World Wide Web (http:/(/)rdpwww.life.uiuc.edu).

  12. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Identification of principal geographic code... § 228.03 Identification of principal geographic code numbers. The USAID Geographic Code Book sets forth the official description of all geographic codes used by USAID in authorizing or...

  13. PIPI: PTM-Invariant Peptide Identification Using Coding Method.

    Science.gov (United States)

    Yu, Fengchao; Li, Ning; Yu, Weichuan

    2016-12-02

    In computational proteomics, the identification of peptides with an unlimited number of post-translational modification (PTM) types is a challenging task. The computational cost associated with database search increases exponentially with respect to the number of modified amino acids and linearly with respect to the number of potential PTM types at each amino acid. The problem becomes intractable very quickly if we want to enumerate all possible PTM patterns. To address this issue, one group of methods named restricted tools (including Mascot, Comet, and MS-GF+) only allow a small number of PTM types in database search process. Alternatively, the other group of methods named unrestricted tools (including MS-Alignment, ProteinProspector, and MODa) avoids enumerating PTM patterns with an alignment-based approach to localizing and characterizing modified amino acids. However, because of the large search space and PTM localization issue, the sensitivity of these unrestricted tools is low. This paper proposes a novel method named PIPI to achieve PTM-invariant peptide identification. PIPI belongs to the category of unrestricted tools. It first codes peptide sequences into Boolean vectors and codes experimental spectra into real-valued vectors. For each coded spectrum, it then searches the coded sequence database to find the top scored peptide sequences as candidates. After that, PIPI uses dynamic programming to localize and characterize modified amino acids in each candidate. We used simulation experiments and real data experiments to evaluate the performance in comparison with restricted tools (i.e., Mascot, Comet, and MS-GF+) and unrestricted tools (i.e., Mascot with error tolerant search, MS-Alignment, ProteinProspector, and MODa). Comparison with restricted tools shows that PIPI has a close sensitivity and running speed. Comparison with unrestricted tools shows that PIPI has the highest sensitivity except for Mascot with error tolerant search and Protein

  14. Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac

    CERN Document Server

    Le, Anh

    2011-01-01

    Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an intermediate node to verify if its received packets belong to a specific subspace, even if the subspace is expanding over time. Then, we use SpaceMac as a building block to design a cooperative scheme that provides complete defense against pollution attacks: (i) it can detect polluted packets early at intermediate nodes and (ii) it can identify the exact location of all, even colluding, attackers, thus making it possible to eliminate them. Our scheme is cooperative: parents and children of any node cooperate to detect any corrupted packets sent by the node, and nodes in the network cooperate with a central controller to identify the exact location of all attackers. We implement SpaceMac in both C/C++ and Java as a library, and we make the library available online. Our evaluation on both a PC and an Android device shows that (i) SpaceMac'...

  15. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology.

    Science.gov (United States)

    Baad, Rajendra K; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification.

  16. Identification of proteins binding coding and non-coding human RNAs using protein microarrays

    Directory of Open Access Journals (Sweden)

    Siprashvili Zurab

    2012-11-01

    Full Text Available Abstract Background The regulation and function of mammalian RNAs has been increasingly appreciated to operate via RNA-protein interactions. With the recent discovery of thousands of novel human RNA molecules by high-throughput RNA sequencing, efficient methods to uncover RNA-protein interactions are urgently required. Existing methods to study proteins associated with a given RNA are laborious and require substantial amounts of cell-derived starting material. To overcome these limitations, we have developed a rapid and large-scale approach to characterize binding of in vitro transcribed labeled RNA to ~9,400 human recombinant proteins spotted on protein microarrays. Results We have optimized methodology to probe human protein microarrays with full-length RNA molecules and have identified 137 RNA-protein interactions specific for 10 coding and non-coding RNAs. Those proteins showed strong enrichment for common human RNA binding domains such as RRM, RBD, as well as K homology and CCCH type zinc finger motifs. Previously unknown RNA-protein interactions were discovered using this technique, and these interactions were biochemically verified between TP53 mRNA and Staufen1 protein as well as between HRAS mRNA and CNBP protein. Functional characterization of the interaction between Staufen 1 protein and TP53 mRNA revealed a novel role for Staufen 1 in preserving TP53 RNA stability. Conclusions Our approach demonstrates a scalable methodology, allowing rapid and efficient identification of novel human RNA-protein interactions using RNA hybridization to human protein microarrays. Biochemical validation of newly identified interactions between TP53-Stau1 and HRAS-CNBP using reciprocal pull-down experiments, both in vitro and in vivo, demonstrates the utility of this approach to study uncharacterized RNA-protein interactions.

  17. Unique identification code for medical fundus images using blood vessel pattern for tele-ophthalmology applications.

    Science.gov (United States)

    Singh, Anushikha; Dutta, Malay Kishore; Sharma, Dilip Kumar

    2016-10-01

    Identification of fundus images during transmission and storage in database for tele-ophthalmology applications is an important issue in modern era. The proposed work presents a novel accurate method for generation of unique identification code for identification of fundus images for tele-ophthalmology applications and storage in databases. Unlike existing methods of steganography and watermarking, this method does not tamper the medical image as nothing is embedded in this approach and there is no loss of medical information. Strategic combination of unique blood vessel pattern and patient ID is considered for generation of unique identification code for the digital fundus images. Segmented blood vessel pattern near the optic disc is strategically combined with patient ID for generation of a unique identification code for the image. The proposed method of medical image identification is tested on the publically available DRIVE and MESSIDOR database of fundus image and results are encouraging. Experimental results indicate the uniqueness of identification code and lossless recovery of patient identity from unique identification code for integrity verification of fundus images. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Bar coding Biological Diversity: A New Micr ogenomic Identification Approach

    OpenAIRE

    Bazartseren Boldgiv

    2004-01-01

    Morphology-based taxonomy suffers from its inherent limitations, even though most of biological research depends on reliable identifications of species. A recent microgenomic identification approach, which is now being called the “DNA-barcoding,” presents a promising potential of developing into a real- time, on site tool for identification of organisms, especially animals and of providing an added insight into evolutionary history . For animals, the DNA-barcode seems...

  19. Identification of ICD Codes Suggestive of Child Maltreatment

    Science.gov (United States)

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  20. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    Directory of Open Access Journals (Sweden)

    Rajendra K Baad

    2015-01-01

    Full Text Available The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification.

  1. Report of the Defense Review Committee for the Code of Conduct. Volume 2. Supplement,

    Science.gov (United States)

    1976-01-01

    Hawthorne , Nevada, from May 1968 to July 1969. Lieutenant Colonel McLernan attended the Inter-American Defense College at Fort McNair, Washington, D.C...Vietnam Under the Standards of the Geneva Conventions of i 1949, National War College, Wash D.C., Mar 74, pp: 136. Kenyon, Nathaniel C., Col, JAGC; Davis

  2. Bar coding Biological Diversity: A New Micr ogenomic Identification Approach

    Directory of Open Access Journals (Sweden)

    Bazartseren Boldgiv

    2004-12-01

    Full Text Available Morphology-based taxonomy suffers from its inherent limitations, even though most of biological research depends on reliable identifications of species. A recent microgenomic identification approach, which is now being called the “DNA-barcoding,” presents a promising potential of developing into a real- time, on site tool for identification of organisms, especially animals and of providing an added insight into evolutionary history . For animals, the DNA-barcode seems to have been found in the mitochondrial genome and researchers are in quest of developing similar microgenomic DNA-barcoding systems for other domains of biological diversity . This article discusses the DNA-barcoding technique and considers some of the implications of this approach.

  3. Identification of Biomarkers for Defense Response to Plasmopara viticola in a Resistant Grape Variety

    Directory of Open Access Journals (Sweden)

    Giulia Chitarrini

    2017-09-01

    Full Text Available Downy mildew (Plasmopara viticola is one of the most destructive diseases of the cultivated species Vitis vinifera. The use of resistant varieties, originally derived from backcrosses of North American Vitis spp., is a promising solution to reduce disease damage in the vineyards. To shed light on the type and the timing of pathogen-triggered resistance, this work aimed at discovering biomarkers for the defense response in the resistant variety Bianca, using leaf discs after inoculation with a suspension of P. viticola. We investigated primary and secondary metabolism at 12, 24, 48, and 96 h post-inoculation (hpi. We used methods of identification and quantification for lipids (LC-MS/MS, phenols (LC-MS/MS, primary compounds (GC-MS, and semi-quantification for volatile compounds (GC-MS. We were able to identify and quantify or semi-quantify 176 metabolites, among which 53 were modulated in response to pathogen infection. The earliest changes occurred in primary metabolism at 24–48 hpi and involved lipid compounds, specifically unsaturated fatty acid and ceramide; amino acids, in particular proline; and some acids and sugars. At 48 hpi, we also found changes in volatile compounds and accumulation of benzaldehyde, a promoter of salicylic acid-mediated defense. Secondary metabolism was strongly induced only at later stages. The classes of compounds that increased at 96 hpi included phenylpropanoids, flavonols, stilbenes, and stilbenoids. Among stilbenoids we found an accumulation of ampelopsin H + vaticanol C, pallidol, ampelopsin D + quadrangularin A, Z-miyabenol C, and α-viniferin in inoculated samples. Some of these compounds are known as phytoalexins, while others are novel biomarkers for the defense response in Bianca. This work highlighted some important aspects of the host response to P. viticola in a commercial variety under controlled conditions, providing biomarkers for a better understanding of the mechanism of plant defense and a

  4. The Legal Basis of the People’s Republic of China’s East China Sea Air Defense Identification Zone

    Directory of Open Access Journals (Sweden)

    Ching Chang

    2016-04-01

    Full Text Available As the People’s Republic of China defined its East China Sea Air Defense Identification Zone (ADIZ on November 23, 2013, there were three legal decrees, the Law of the People’s Republic of China on National Defense established on March 14, 1997, the Law of the People’s Republic of China on Civil Aviation established on October 30, 1995, and the Basic Rules on Flight of the People’s Republic of China established on July 27, 2001, which have been quoted as the legal basis to define the airspace within the area enclosed by China’s outer limit of the territorial sea and another six geographical points specified by the statement as the PRC East China Sea ADIZ. Following the government statement, another announcement of the aircraft identification rules for the East China Sea Air Defense Identification Zone of the People’s Republic of China was immediately issued by the PRC Ministry of National Defense. The purpose of this paper is to explore various key legal issues to ascertain the legal basis of this East China Sea ADIZ. Besides, the paper will further compare the air defense identification zone with airspaces such as aerodrome flight airspace, airway, air route, prohibited area, restricted area and danger area as well as air corridor, fuel dumping area and temporary flight airspace defined by the previously mentioned PRC legal decrees in order to identify their differences and similarities. It may also be assessed by the factual consequences after establishing the air defense identification zone to decide whether treating the measures of defining air defense identification as the attempt of claiming sovereignty, expanding sovereign territory or sphere of influence, enlarging air defense region, increasing the coverage of air military activities or even using it to present national strength and establishing pride or to test the responses of other states around the disputed territories is eventually reasonable judgments or overstated

  5. Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation

    Science.gov (United States)

    2006-06-16

    Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline

  6. Identification of putative TAL effector targets of the citrus canker pathogens shows functional convergence underlying disease development and defense response.

    Science.gov (United States)

    Pereira, Andre L A; Carazzolle, Marcelo F; Abe, Valeria Y; de Oliveira, Maria L P; Domingues, Mariane N; Silva, Jaqueline C; Cernadas, Raul A; Benedetti, Celso E

    2014-02-25

    Transcriptional activator-like (TAL) effectors, formerly known as the AvrBs3/PthA protein family, are DNA-binding effectors broadly found in Xanthomonas spp. that transactivate host genes upon injection via the bacterial type three-secretion system. Biologically relevant targets of TAL effectors, i.e. host genes whose induction is vital to establish a compatible interaction, have been reported for xanthomonads that colonize rice and pepper; however, citrus genes modulated by the TAL effectors PthA"s" and PthC"s" of the citrus canker bacteria Xanthomonas citri (Xc) and Xanthomonas aurantifolii pathotype C (XaC), respectively, are poorly characterized. Of particular interest, XaC causes canker disease in its host lemon (Citrus aurantifolia), but triggers a defense response in sweet orange. Based on, 1) the TAL effector-DNA binding code, 2) gene expression data of Xc and XaC-infiltrated sweet orange leaves, and 3) citrus hypocotyls transformed with PthA2, PthA4 or PthC1, we have identified a collection of Citrus sinensis genes potentially targeted by Xc and XaC TAL effectors. Our results suggest that similar with other strains of Xanthomonas TAL effectors, PthA2 and PthA4, and PthC1 to some extent, functionally converge. In particular, towards induction of genes involved in the auxin and gibberellin synthesis and response, cell division, and defense response. We also present evidence indicating that the TAL effectors act as transcriptional repressors and that the best scoring predicted DNA targets of PthA"s" and PthC"s" in citrus promoters predominantly overlap with or localize near to TATA boxes of core promoters, supporting the idea that TAL effectors interact with the host basal transcriptional machinery to recruit the RNA pol II and start transcription. The identification of PthA"s" and PthC"s" targets, such as the LOB (lateral organ boundary) and CCNBS genes that we report here, is key for the understanding of the canker symptoms development during host

  7. Computational RNomics:Structure identification and functional prediction of non-coding RNAs in silico

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The eukaryotic genome contains varying numbers of non-coding RNA(ncRNA) genes."Computational RNomics" takes a multidisciplinary approach,like information science,to resolve the structure and function of ncRNAs.Here,we review the main issues in "Computational RNomics" of data storage and management,ncRNA gene identification and characterization,ncRNA target identification and functional prediction,and we summarize the main methods and current content of "computational RNomics".

  8. Environmental durability diagnostic for printed identification codes of polymer insulation for distribution pipelines

    Science.gov (United States)

    Zhuravleva, G. N.; Nagornova, I. V.; Kondratov, A. P.; Bablyuk, E. B.; Varepo, L. G.

    2017-08-01

    A research and modelling of weatherability and environmental durability of multilayer polymer insulation of both cable and pipelines with printed barcodes or color identification information were performed. It was proved that interlayer printing of identification codes in distribution pipelines insulation coatings provides high marking stability to light and atmospheric condensation. This allows to carry out their distant damage control. However, microbiological fouling of upper polymer layer hampers the distant damage pipelines identification. The color difference values and density changes of PE and PVC printed insolation due to weather and biological factors were defined.

  9. Identification of Thioredoxin Target Disulfides Using Isotope-Coded Affinity Tags

    DEFF Research Database (Denmark)

    Hägglund, Per; Bunkenborg, Jakob; Maeda, Kenji

    2014-01-01

    extracts is described. The procedure utilizes the isotope-coded affinity tag (ICAT) reagents containing a thiol reactive iodoacetamide group and a biotin affinity tag to target peptides containing reduced cysteine residues. The identification of substrates for Trx and the extent of target disulfide...

  10. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.12 What security controls must I use for identification codes and passwords? If you use electronic signatures based upon...

  11. Towards a spectrum-based bar code for identification of weakly fluorescent microparticles

    Science.gov (United States)

    Petrášek, Zdeněk; Wiedemann, Jens; Schwille, Petra

    2014-03-01

    Spectrally resolved detection of fluorescent probes can be used to identify multiple labeled target molecules in an unknown mixture. We study how the spectral shape, the experimental noise, and the number of spectral detection channels affect the success of identification of weakly fluorescent beads on basis of their emission spectra. The proposed formalism allows to estimate the performance of the spectral identification procedure with a given set of spectral codes on the basis of the reference spectra only. We constructed a simple prism-based setup for spectral detection and demonstrate that seven distinct but overlapping spectral codes realized by combining up to three fluorescent dyes bound to a single bead in a barcode-based manner can be reliably identified. The procedure allows correct identification even in the presence of known autofluorescence background stronger than the actual signal.

  12. One-time collision arbitration algorithm in radio-frequency identification based on the Manchester code

    Science.gov (United States)

    Liu, Chen-Chung; Chan, Yin-Tsung

    2011-02-01

    In radio-requency identification (RFID) systems, when multiple tags transmit data to a reader simultaneously, these data may collide and create unsuccessful identifications; hence, anticollision algorithms are needed to reduce collisions (collision cycles) to improve the tag identification speed. We propose a one-time collision arbitration algorithm to reduce both the number of collisions and the time consumption for tags' identification in RFID. The proposed algorithm uses Manchester coding to detect the locations of collided bits, uses the divide-and-conquer strategy to find the structure of colliding bits to generate 96-bit query strings as the 96-bit candidate query strings (96BCQSs), and uses query-tree anticollision schemes with 96BCQSs to identify tags. The performance analysis and experimental results show that the proposed algorithm has three advantages: (i) reducing the number of collisions to only one, so that the time complexity of tag identification is the simplest O(1), (ii) storing identified identification numbers (IDs) and the 96BCQSs in a register to save the used memory, and (iii) resulting in the number of bits transmitted by both the reader and tags being evidently less than the other algorithms in one-tag identification or in all tags identification.

  13. Cancer intelligence acquired (CIA): tumor glycosylation and sialylation codes dismantling antitumor defense.

    Science.gov (United States)

    Boligan, Kayluz Frias; Mesa, Circe; Fernandez, Luis Enrique; von Gunten, Stephan

    2015-04-01

    Aberrant glycosylation is a key feature of malignant transformation and reflects epigenetic and genetic anomalies among the multitude of molecules involved in glycan biosynthesis. Although glycan biosynthesis is not template bound, altered tumor glycosylation is not random, but associated with common glycosylation patterns. Evidence suggests that acquisition of distinct glycosylation patterns evolves from a 'microevolutionary' process conferring advantages in terms of tumor growth, tumor dissemination, and immune escape. Such glycosylation modifications also involve xeno- and hypersialylation. Xeno-autoantigens such as Neu5Gc-gangliosides provide potential targets for immunotherapy. Hypersialylation may display 'enhanced self' to escape immunosurveillance and involves several not mutually exclusive inhibitory pathways that all rely on protein-glycan interactions. A better understanding of tumor 'glycan codes' as deciphered by lectins, such as siglecs, selectins, C-type lectins and galectins, may lead to novel treatment strategies, not only in cancer, but also in autoimmune disease or transplantation.

  14. Predicting and Classifying User Identification Code System Based on Support Vector Machines

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (U ID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID,which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2-class UID codes. The trained classifications will be the models used for identifying unreadable UID codes.Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images and to keep track of users to prevent collaborative piracies.

  15. Malnutrition: The Importance of Identification, Documentation, and Coding in the Acute Care Setting

    Science.gov (United States)

    Kyle, Greg; Itsiopoulos, Catherine; Naunton, Mark; Luff, Narelle

    2016-01-01

    Malnutrition is a significant issue in the hospital setting. This cross-sectional, observational study determined the prevalence of malnutrition amongst 189 adult inpatients in a teaching hospital using the Patient-Generated Subjective Global Assessment tool and compared data to control groups for coding of malnutrition to determine the estimated unclaimed financial reimbursement associated with this comorbidity. Fifty-three percent of inpatients were classified as malnourished. Significant associations were found between malnutrition and increasing age, decreasing body mass index, and increased length of stay. Ninety-eight percent of malnourished patients were coded as malnourished in medical records. The results of the medical history audit of patients in control groups showed that between 0.9 and 5.4% of patients were coded as malnourished which is remarkably lower than the 52% of patients who were coded as malnourished from the point prevalence study data. This is most likely to be primarily due to lack of identification. The estimated unclaimed annual financial reimbursement due to undiagnosed or undocumented malnutrition based on the point prevalence study was AU$8,536,200. The study found that half the patients were malnourished, with older adults being particularly vulnerable. It is imperative that malnutrition is diagnosed and accurately documented and coded, so appropriate coding, funding reimbursement, and treatment can occur. PMID:27774317

  16. Identification of Aedes aegypti Long Intergenic Non-coding RNAs and Their Association with Wolbachia and Dengue Virus Infection.

    Directory of Open Access Journals (Sweden)

    Kayvan Etebari

    2016-10-01

    Full Text Available Long intergenic non-coding RNAs (lincRNAs are appearing as an important class of regulatory RNAs with a variety of biological functions. The aim of this study was to identify the lincRNA profile in the dengue vector Aedes aegypti and evaluate their potential role in host-pathogen interaction. The majority of previous RNA-Seq transcriptome studies in Ae. aegypti have focused on the expression pattern of annotated protein coding genes under different biological conditions. Here, we used 35 publically available RNA-Seq datasets with relatively high depth to screen the Ae. aegypti genome for lincRNA discovery. This led to the identification of 3,482 putative lincRNAs. These lincRNA genes displayed a slightly lower GC content and shorter transcript lengths compared to protein-encoding genes. Ae. aegypti lincRNAs also demonstrate low evolutionary sequence conservation even among closely related species such as Culex quinquefasciatus and Anopheles gambiae. We examined their expression in dengue virus serotype 2 (DENV-2 and Wolbachia infected and non-infected adult mosquitoes and Aa20 cells. The results revealed that DENV-2 infection increased the abundance of a number of host lincRNAs, from which some suppress viral replication in mosquito cells. RNAi-mediated silencing of lincRNA_1317 led to enhancement in viral replication, which possibly indicates its potential involvement in the host anti-viral defense. A number of lincRNAs were also differentially expressed in Wolbachia-infected mosquitoes. The results will facilitate future studies to unravel the function of lncRNAs in insects and may prove to be beneficial in developing new ways to control vectors or inhibit replication of viruses in them.

  17. Identification of Aedes aegypti Long Intergenic Non-coding RNAs and Their Association with Wolbachia and Dengue Virus Infection

    Science.gov (United States)

    Etebari, Kayvan; Asad, Sultan; Zhang, Guangmei; Asgari, Sassan

    2016-01-01

    Long intergenic non-coding RNAs (lincRNAs) are appearing as an important class of regulatory RNAs with a variety of biological functions. The aim of this study was to identify the lincRNA profile in the dengue vector Aedes aegypti and evaluate their potential role in host-pathogen interaction. The majority of previous RNA-Seq transcriptome studies in Ae. aegypti have focused on the expression pattern of annotated protein coding genes under different biological conditions. Here, we used 35 publically available RNA-Seq datasets with relatively high depth to screen the Ae. aegypti genome for lincRNA discovery. This led to the identification of 3,482 putative lincRNAs. These lincRNA genes displayed a slightly lower GC content and shorter transcript lengths compared to protein-encoding genes. Ae. aegypti lincRNAs also demonstrate low evolutionary sequence conservation even among closely related species such as Culex quinquefasciatus and Anopheles gambiae. We examined their expression in dengue virus serotype 2 (DENV-2) and Wolbachia infected and non-infected adult mosquitoes and Aa20 cells. The results revealed that DENV-2 infection increased the abundance of a number of host lincRNAs, from which some suppress viral replication in mosquito cells. RNAi-mediated silencing of lincRNA_1317 led to enhancement in viral replication, which possibly indicates its potential involvement in the host anti-viral defense. A number of lincRNAs were also differentially expressed in Wolbachia-infected mosquitoes. The results will facilitate future studies to unravel the function of lncRNAs in insects and may prove to be beneficial in developing new ways to control vectors or inhibit replication of viruses in them. PMID:27760142

  18. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Directory of Open Access Journals (Sweden)

    Ai-bing Zhang

    Full Text Available Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish and two representing non-coding ITS barcodes (rust fungi and brown algae. Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ and Maximum likelihood (ML methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40% for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37% for 1094 brown algae queries, both using ITS barcodes.

  19. Wind turbine control systems: Dynamic model development using system identification and the fast structural dynamics code

    Energy Technology Data Exchange (ETDEWEB)

    Stuart, J.G.; Wright, A.D.; Butterfield, C.P.

    1996-10-01

    Mitigating the effects of damaging wind turbine loads and responses extends the lifetime of the turbine and, consequently, reduces the associated Cost of Energy (COE). Active control of aerodynamic devices is one option for achieving wind turbine load mitigation. Generally speaking, control system design and analysis requires a reasonable dynamic model of {open_quotes}plant,{close_quotes} (i.e., the system being controlled). This paper extends the wind turbine aileron control research, previously conducted at the National Wind Technology Center (NWTC), by presenting a more detailed development of the wind turbine dynamic model. In prior research, active aileron control designs were implemented in an existing wind turbine structural dynamics code, FAST (Fatigue, Aerodynamics, Structures, and Turbulence). In this paper, the FAST code is used, in conjunction with system identification, to generate a wind turbine dynamic model for use in active aileron control system design. The FAST code is described and an overview of the system identification technique is presented. An aileron control case study is used to demonstrate this modeling technique. The results of the case study are then used to propose ideas for generalizing this technique for creating dynamic models for other wind turbine control applications.

  20. Nonlinear System Identification with a Real–Coded Genetic Algorithm (RCGA

    Directory of Open Access Journals (Sweden)

    Cherif Imen

    2015-12-01

    Full Text Available This paper is devoted to the blind identification problem of a special class of nonlinear systems, namely, Volterra models, using a real-coded genetic algorithm (RCGA. The model input is assumed to be a stationary Gaussian sequence or an independent identically distributed (i.i.d. process. The order of the Volterra series is assumed to be known. The fitness function is defined as the difference between the calculated cumulant values and analytical equations in which the kernels and the input variances are considered. Simulation results and a comparative study for the proposed method and some existing techniques are given. They clearly show that the RCGA identification method performs better in terms of precision, time of convergence and simplicity of programming.

  1. Identification of minority resistance mutations in the HIV-1 integrase coding region using next generation sequencing

    DEFF Research Database (Denmark)

    Fonager, Jannik; Larsson, Jonas T; Hussing, Christian

    2015-01-01

    BACKGROUND: The current widely applied standard method to screen for HIV-1 genotypic resistance is based on Sanger population sequencing (Sseq), which does not allow for the identification of minority variants (MVs) below the limit of detection for the Sseq-method in patients receiving integrase......: raltegravir (RAL), elvitegravir (EVG) and dolutegravir (DTG). STUDY DESIGN: NGS and Sseq were used to analyze RT-PCR products of the HIV-1 integrase coding region from six patients and in serial samples from two patients. NGS sequences were assembled and analyzed using the low frequency variant detection...

  2. Computational identification of human long intergenic non-coding RNAs using a GA-SVM algorithm.

    Science.gov (United States)

    Wang, Yanqiu; Li, Yang; Wang, Qi; Lv, Yingli; Wang, Shiyuan; Chen, Xi; Yu, Xuexin; Jiang, Wei; Li, Xia

    2014-01-01

    Long intergenic non-coding RNAs (lincRNAs) are a new type of non-coding RNAs and are closely related with the occurrence and development of diseases. In previous studies, most lincRNAs have been identified through next-generation sequencing. Because lincRNAs exhibit tissue-specific expression, the reproducibility of lincRNA discovery in different studies is very poor. In this study, not including lincRNA expression, we used the sequence, structural and protein-coding potential features as potential features to construct a classifier that can be used to distinguish lincRNAs from non-lincRNAs. The GA-SVM algorithm was performed to extract the optimized feature subset. Compared with several feature subsets, the five-fold cross validation results showed that this optimized feature subset exhibited the best performance for the identification of human lincRNAs. Moreover, the LincRNA Classifier based on Selected Features (linc-SF) was constructed by support vector machine (SVM) based on the optimized feature subset. The performance of this classifier was further evaluated by predicting lincRNAs from two independent lincRNA sets. Because the recognition rates for the two lincRNA sets were 100% and 99.8%, the linc-SF was found to be effective for the prediction of human lincRNAs.

  3. Transcriptional response of bronchial epithelial cells to Pseudomonas aeruginosa: identification of early mediators of host defense.

    NARCIS (Netherlands)

    Vos, J.B.; Sterkenburg, M.A. van; Rabe, K.F.; Schalkwijk, J.; Hiemstra, P.S.; Datson, N.A.

    2005-01-01

    The airway epithelium responds to microbial exposure by altering expression of a variety of genes to increase innate host defense. We aimed to delineate the early transcriptional response in human primary bronchial epithelial cells exposed for 6 h to a mixture of IL-1beta and TNF-alpha or heat-inact

  4. WISCOD: A Statistical Web-Enabled Tool for the Identification of Significant Protein Coding Regions

    Directory of Open Access Journals (Sweden)

    Mireia Vilardell

    2014-01-01

    Full Text Available Classically, gene prediction programs are based on detecting signals such as boundary sites (splice sites, starts, and stops and coding regions in the DNA sequence in order to build potential exons and join them into a gene structure. Although nowadays it is possible to improve their performance with additional information from related species or/and cDNA databases, further improvement at any step could help to obtain better predictions. Here, we present WISCOD, a web-enabled tool for the identification of significant protein coding regions, a novel software tool that tackles the exon prediction problem in eukaryotic genomes. WISCOD has the capacity to detect real exons from large lists of potential exons, and it provides an easy way to use global P value called expected probability of being a false exon (EPFE that is useful for ranking potential exons in a probabilistic framework, without additional computational costs. The advantage of our approach is that it significantly increases the specificity and sensitivity (both between 80% and 90% in comparison to other ab initio methods (where they are in the range of 70–75%. WISCOD is written in JAVA and R and is available to download and to run in a local mode on Linux and Windows platforms.

  5. Genome-wide identification of non-coding RNAs interacted with microRNAs in soybean

    Directory of Open Access Journals (Sweden)

    Chuyu eYe

    2014-12-01

    Full Text Available A wide range of RNA species interacting with microRNAs (miRNAs form a complex gene regulation network and play vital roles in diverse biological processes. In this study, we performed a genome-wide identification of endogenous target mimics (eTMs for miRNAs and phased-siRNA-producing loci (PHAS in soybean with a focus on those involved in lipid metabolism. The results showed that a large number of eTMs and PHAS genes could be found in soybean. Additionally, we found that lipid metabolism related genes were potentially regulated by 28 miRNAs, and nine of them were potentially further regulated by a number of eTMs with expression evidence. Thirty-three miRNAs were found to trigger production of phasiRNAs from 49 PHAS genes, which were able to target lipid metabolism related genes. Degradome data supported miRNA- and/or phasiRNA-mediated cleavage of genes involved in lipid metabolism. Most eTMs for miRNAs involved in lipid metabolism and phasiRNAs targeting lipid metabolism related genes showed a tissue-specific expression pattern. Our bioinformatical evidences suggested that lipid metabolism in soybean is potentially regulated by a complex non-coding network, including miRNAs, eTMs and phasiRNAs, and the results extended our knowledge on functions of non-coding RNAs.

  6. Identification and Role of Regulatory Non-Coding RNAs in Listeria monocytogenes

    Directory of Open Access Journals (Sweden)

    Mobarak Abu Mraheil

    2011-08-01

    Full Text Available Bacterial regulatory non-coding RNAs control numerous mRNA targets that direct a plethora of biological processes, such as the adaption to environmental changes, growth and virulence. Recently developed high-throughput techniques, such as genomic tiling arrays and RNA-Seq have allowed investigating prokaryotic cis- and trans-acting regulatory RNAs, including sRNAs, asRNAs, untranslated regions (UTR and riboswitches. As a result, we obtained a more comprehensive view on the complexity and plasticity of the prokaryotic genome biology. Listeria monocytogenes was utilized as a model system for intracellular pathogenic bacteria in several studies, which revealed the presence of about 180 regulatory RNAs in the listerial genome. A regulatory role of non-coding RNAs in survival, virulence and adaptation mechanisms of L. monocytogenes was confirmed in subsequent experiments, thus, providing insight into a multifaceted modulatory function of RNA/mRNA interference. In this review, we discuss the identification of regulatory RNAs by high-throughput techniques and in their functional role in L. monocytogenes.

  7. Identification and Role of Regulatory Non-Coding RNAs in Listeria monocytogenes

    Science.gov (United States)

    Izar, Benjamin; Mraheil, Mobarak Abu; Hain, Torsten

    2011-01-01

    Bacterial regulatory non-coding RNAs control numerous mRNA targets that direct a plethora of biological processes, such as the adaption to environmental changes, growth and virulence. Recently developed high-throughput techniques, such as genomic tiling arrays and RNA-Seq have allowed investigating prokaryotic cis- and trans-acting regulatory RNAs, including sRNAs, asRNAs, untranslated regions (UTR) and riboswitches. As a result, we obtained a more comprehensive view on the complexity and plasticity of the prokaryotic genome biology. Listeria monocytogenes was utilized as a model system for intracellular pathogenic bacteria in several studies, which revealed the presence of about 180 regulatory RNAs in the listerial genome. A regulatory role of non-coding RNAs in survival, virulence and adaptation mechanisms of L. monocytogenes was confirmed in subsequent experiments, thus, providing insight into a multifaceted modulatory function of RNA/mRNA interference. In this review, we discuss the identification of regulatory RNAs by high-throughput techniques and in their functional role in L. monocytogenes. PMID:21954346

  8. Codes for the identification of aquifer names and geologic units in the United States and the Caribbean outlying areas

    Science.gov (United States)

    ,

    1988-01-01

    This standard provides codes to be used for the identification of aquifer names and geologic units in the United States, the Caribbean and other outlying areas. Outlying areas include Puerto Rico, the Virgin Islands, American Samoa, the Midway Islands, Trust Territories of the Pacific Islands, and miscellaneous Pacific Islands. Each code identifies an aquifer or rock-stratigraphic unit and its age designation. The codes provide a standardized base for use by organizations in the storage, retrieval, and exchange of ground-water data; the indexing and inventory of ground-water data and information; the cataloging of ground-water data acquisition activities; and a variety of other applications.

  9. Stealth proteins: in silico identification of a novel protein family rendering bacterial pathogens invisible to host immune defense.

    Directory of Open Access Journals (Sweden)

    Peter Sperisen

    2005-11-01

    Full Text Available There are a variety of bacterial defense strategies to survive in a hostile environment. Generation of extracellular polysaccharides has proved to be a simple but effective strategy against the host's innate immune system. A comparative genomics approach led us to identify a new protein family termed Stealth, most likely involved in the synthesis of extracellular polysaccharides. This protein family is characterized by a series of domains conserved across phylogeny from bacteria to eukaryotes. In bacteria, Stealth (previously characterized as SacB, XcbA, or WefC is encoded by subsets of strains mainly colonizing multicellular organisms, with evidence for a protective effect against the host innate immune defense. More specifically, integrating all the available information about Stealth proteins in bacteria, we propose that Stealth is a D-hexose-1-phosphoryl transferase involved in the synthesis of polysaccharides. In the animal kingdom, Stealth is strongly conserved across evolution from social amoebas to simple and complex multicellular organisms, such as Dictyostelium discoideum, hydra, and human. Based on the occurrence of Stealth in most Eukaryotes and a subset of Prokaryotes together with its potential role in extracellular polysaccharide synthesis, we propose that metazoan Stealth functions to regulate the innate immune system. Moreover, there is good reason to speculate that the acquisition and spread of Stealth could be responsible for future epidemic outbreaks of infectious diseases caused by a large variety of eubacterial pathogens. Our in silico identification of a homologous protein in the human host will help to elucidate the causes of Stealth-dependent virulence. At a more basic level, the characterization of the molecular and cellular function of Stealth proteins may shed light on fundamental mechanisms of innate immune defense against microbial invasion.

  10. Stealth Proteins: In Silico Identification of a Novel Protein Family Rendering Bacterial Pathogens Invisible to Host Immune Defense.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available There are a variety of bacterial defense strategies to survive in a hostile environment. Generation of extracellular polysaccharides has proved to be a simple but effective strategy against the host's innate immune system. A comparative genomics approach led us to identify a new protein family termed Stealth, most likely involved in the synthesis of extracellular polysaccharides. This protein family is characterized by a series of domains conserved across phylogeny from bacteria to eukaryotes. In bacteria, Stealth (previously characterized as SacB, XcbA, or WefC is encoded by subsets of strains mainly colonizing multicellular organisms, with evidence for a protective effect against the host innate immune defense. More specifically, integrating all the available information about Stealth proteins in bacteria, we propose that Stealth is a D-hexose-1-phosphoryl transferase involved in the synthesis of polysaccharides. In the animal kingdom, Stealth is strongly conserved across evolution from social amoebas to simple and complex multicellular organisms, such as Dictyostelium discoideum, hydra, and human. Based on the occurrence of Stealth in most Eukaryotes and a subset of Prokaryotes together with its potential role in extracellular polysaccharide synthesis, we propose that metazoan Stealth functions to regulate the innate immune system. Moreover, there is good reason to speculate that the acquisition and spread of Stealth could be responsible for future epidemic outbreaks of infectious diseases caused by a large variety of eubacterial pathogens. Our in silico identification of a homologous protein in the human host will help to elucidate the causes of Stealth-dependent virulence. At a more basic level, the characterization of the molecular and cellular function of Stealth proteins may shed light on fundamental mechanisms of innate immune defense against microbial invasion.

  11. Stealth proteins: in silico identification of a novel protein family rendering bacterial pathogens invisible to host immune defense.

    Directory of Open Access Journals (Sweden)

    Peter Sperisen

    2005-11-01

    Full Text Available There are a variety of bacterial defense strategies to survive in a hostile environment. Generation of extracellular polysaccharides has proved to be a simple but effective strategy against the host's innate immune system. A comparative genomics approach led us to identify a new protein family termed Stealth, most likely involved in the synthesis of extracellular polysaccharides. This protein family is characterized by a series of domains conserved across phylogeny from bacteria to eukaryotes. In bacteria, Stealth (previously characterized as SacB, XcbA, or WefC is encoded by subsets of strains mainly colonizing multicellular organisms, with evidence for a protective effect against the host innate immune defense. More specifically, integrating all the available information about Stealth proteins in bacteria, we propose that Stealth is a D-hexose-1-phosphoryl transferase involved in the synthesis of polysaccharides. In the animal kingdom, Stealth is strongly conserved across evolution from social amoebas to simple and complex multicellular organisms, such as Dictyostelium discoideum, hydra, and human. Based on the occurrence of Stealth in most Eukaryotes and a subset of Prokaryotes together with its potential role in extracellular polysaccharide synthesis, we propose that metazoan Stealth functions to regulate the innate immune system. Moreover, there is good reason to speculate that the acquisition and spread of Stealth could be responsible for future epidemic outbreaks of infectious diseases caused by a large variety of eubacterial pathogens. Our in silico identification of a homologous protein in the human host will help to elucidate the causes of Stealth-dependent virulence. At a more basic level, the characterization of the molecular and cellular function of Stealth proteins may shed light on fundamental mechanisms of innate immune defense against microbial invasion.

  12. Evidence for a Nest Defense Pheromone in Bald-Faced Hornets, Dolichovespula Maculata, and Identification of Components.

    Science.gov (United States)

    Jimenez, Sebastian Ibarra; Gries, Regine; Zhai, Huimin; Derstine, Nathan; McCann, Sean; Gries, Gerhard

    2016-05-01

    In eusocial insects like Bald-faced hornets, Dolichovespula maculata, nest defense is essential because nests contain a large number of protein-rich larvae and pupae, and thus are attractive to nest predators. Our objectives were to investigate whether D. maculata exhibit pheromone-mediated nest defense, and to identify and field test any pheromone components. We tested for pheromone-mediated nest defense behavior of D. maculata by placing a paired box-apparatus near the entrance of D. maculata nests, and treating both boxes with a solvent control, or one of the two boxes with a solvent control and the other with either venom sac extract, the putative source of nest defense pheromone, or synthetic pheromone. The sound impulses caused by nest mates attempting to sting or strike the boxes were recorded for 3 min. Compared to the double-control treatment, the number of strikes increased 27-fold when one of the two boxes was treated with venom sac extract, providing evidence for an alarm response. The box treated with venom sac extract also induced a significantly greater proportion of strikes than the corresponding control box, providing evidence for a target-oriented response. Analyzing venom sac extract by gas chromatographic-electroantennographic detection (GC-EAD) and GC-mass spectrometry resulted in the identification of seven candidate pheromone components: (a) dimethylaminoethanol, (b) dimethylamino ethyl acetate, (c) 2,5-dimethylpyrazine, (d) N-3-methylbutylacetamide, (e) 2-heptadecanone, (f) (Z)-8-heptadecen-2-one, and (g) (Z)-10-nonadecen-2-one. Testing in paired-box bioassays blends of the nitrogen-containing volatile components a-d, the less volatile ketones e-g, or both (a-g), indicated that a-d primarily have an alarm function. The ketones e-g, in contrast, induced target-oriented responses, possibly marking the box, or potential nest predators, for guided and concerted attacks, or enhancing the alarm-inducing effect of the volatile pheromone components

  13. 代码重用攻击与防御机制综述%A Survey of Code Reuse Attack and Defense Mechanisms

    Institute of Scientific and Technical Information of China (English)

    柳童; 史岗; 孟丹

    2016-01-01

    Due to the wide existence of vulnerabilities in computer programs such as C and C++, computer systems is vulnerable to be tampered by adversary changing the original running states. Researchers have made great efforts and take some effective protection mechanisms, for instance, Data Execution Prevention and Address Space Layout Randomization. These security mechanisms have a great effect against the primitive attack patterns like code-injection attack. However, the security of computer system is still not optimistic. Though the adversary could not inject their own codes into the memory then run them ever again, they began to use the original benign codes in the memory, manipulate them to achieve mali-cious purpose by changing their order of operating, which is called code-reuse attack. And it is able to bypass a variety of security mechanisms of commodity computer systems, thus it has become a major threat and the main pattern of hacking. For this reason, researches about code-reuse attack have been taken up in recent years. This paper illustrates the origin of code-reuse attack and achieved way of attack, summarizes the existing defense mechanisms and simply evaluates these defense mechanisms systematically. Meanwhile, this paper analyzes briefly the basic reason of code reuse attack and puts forward an new idea of defense mechanism designing.%由于C与C++等计算机程序中广泛存在的漏洞,攻击者可以通过这些漏洞读取或篡改内存中的数据,改变计算机程序原有的执行状态达到破坏的目的。为此研究者进行了不懈地努力并采取了一些卓有成效的保护机制,例如数据不可执行与内存布局随机化,这些防御机制对于早期的代码注入攻击起到了极好的防御效果,然而计算机系统的安全性依然不容乐观。攻击者在无法通过向内存中注入自己的代码并执行的方式完成攻击后,开始利用内存中原有的代码,通过控制它们执行的

  14. Mycoplasma non-coding RNA: identification of small RNAs and targets

    Directory of Open Access Journals (Sweden)

    Franciele Maboni Siqueira

    2016-10-01

    Full Text Available Abstract Background Bacterial non-coding RNAs act by base-pairing as regulatory elements in crucial biological processes. We performed the identification of trans-encoded small RNAs (sRNA from the genomes of Mycoplama hyopneumoniae, Mycoplasma flocculare and Mycoplasma hyorhinis, which are Mycoplasma species that have been identified in the porcine respiratory system. Results A total of 47, 15 and 11 putative sRNAs were predicted in M. hyopneumoniae, M. flocculare and M. hyorhinis, respectively. A comparative genomic analysis revealed the presence of species or lineage specific sRNA candidates. Furthermore, the expression profile of some M. hyopneumoniae sRNAs was determined by a reverse transcription amplification approach, in three different culture conditions. All tested sRNAs were transcribed in at least one condition. A detailed investigation revealed a differential expression profile for two M. hyopneumoniae sRNAs in response to oxidative and heat shock stress conditions, suggesting that their expression is influenced by environmental signals. Moreover, we analyzed sRNA-mRNA hybrids and accessed putative target genes for the novel sRNA candidates. The majority of the sRNAs showed interaction with multiple target genes, some of which could be linked to pathogenesis and cell homeostasis activity. Conclusion This study contributes to our knowledge of Mycoplasma sRNAs and their response to environmental changes. Furthermore, the mRNA target prediction provides a perspective for the characterization and comprehension of the function of the sRNA regulatory mechanisms.

  15. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Defense Microelectronics Activity (DMEA)

    Science.gov (United States)

    2011-12-01

    process must be considered. Whereas barcodes are read upon direct interaction with a scanner , RFID tags transmit sometimes indiscriminately. This can...grouped in the category of automatic identification technologies, along with barcodes , magnetic stripes, smart cards and biometrics. RFID uses...DISADVANTAGES The main rival technology to RFID is barcoding , which is very cheap, easy to use, and can have a high return on investment if the

  16. Identification and validation of reference genes for transcript normalization in strawberry (Fragaria × ananassa) defense responses.

    Science.gov (United States)

    Amil-Ruiz, Francisco; Garrido-Gala, José; Blanco-Portales, Rosario; Folta, Kevin M; Muñoz-Blanco, Juan; Caballero, José L

    2013-01-01

    Strawberry (Fragaria spp) is an emerging model for the development of basic genomics and recombinant DNA studies among rosaceous crops. Functional genomic and molecular studies involve relative quantification of gene expression under experimental conditions of interest. Accuracy and reliability are dependent upon the choice of an optimal reference control transcript. There is no information available on validated endogenous reference genes for use in studies testing strawberry-pathogen interactions. Thirteen potential pre-selected strawberry reference genes were tested against different tissues, strawberry cultivars, biotic stresses, ripening and senescent conditions, and SA/JA treatments. Evaluation of reference candidate's suitability was analyzed by five different methodologies, and information was merged to identify best reference transcripts. A combination of all five methods was used for selective classification of reference genes. The resulting superior reference genes, FaRIB413, FaACTIN, FaEF1α and FaGAPDH2 are strongly recommended as control genes for relative quantification of gene expression in strawberry. This report constitutes the first systematic study to identify and validate optimal reference genes for accurate normalization of gene expression in strawberry plant defense response studies.

  17. Systematic Identification and Characterization of Long Non-Coding RNAs in the Silkworm, Bombyx mori.

    Science.gov (United States)

    Wu, Yuqian; Cheng, Tingcai; Liu, Chun; Liu, Duolian; Zhang, Quan; Long, Renwen; Zhao, Ping; Xia, Qingyou

    2016-01-01

    Long noncoding RNAs (lncRNAs) are emerging as important regulators in various biological processes. However, to date, no systematic characterization of lncRNAs has been reported in the silkworm Bombyx mori. In the present study, we generated eighteen RNA-seq datasets with relatively high depth. Using an in-house designed lncRNA identification pipeline, 11,810 lncRNAs were identified for 5,556 loci. Among these lncRNAs, 474 transcripts were intronic lncRNAs (ilncRNAs), 6,250 transcripts were intergenic lncRNAs (lincRNAs), and 5,086 were natural antisense lncRNAs (lncNATs). Compared with protein-coding mRNAs, silkworm lncRNAs are shorter in terms of full length but longer in terms of exon and intron length. In addition, lncRNAs exhibit a lower level of sequence conservation, more repeat sequences overlapped and higher tissue specificity than protein-coding mRNAs in the silkworm. We found that 69 lncRNA transcripts from 33 gene loci may function as miRNA precursors, and 104 lncRNA transcripts from 72 gene loci may act as competing endogenous RNAs (ceRNAs). In total, 49.47% of all gene loci (2,749/5,556) for which lncRNAs were identified showed sex-biased expression. Co-expression network analysis resulted in 19 modules, 12 of which revealed relatively high tissue specificity. The highlighted darkgoldenrod module was specifically associated with middle and posterior silk glands, and the hub lncRNAs within this module were co-expressed with proteins involved in translation, translocation, and secretory processes, suggesting that these hub lncRNAs may function as regulators of the biosynthesis, translocation, and secretion of silk proteins. This study presents the first comprehensive genome-wide analysis of silkworm lncRNAs and provides an invaluable resource for genetic, evolutionary, and genomic studies of B. mori.

  18. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry

    Science.gov (United States)

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems. PMID:25616408

  19. Identification of genetic loci required for Campylobacter resistance to fowlicidin-1, a chicken host defense peptide

    Directory of Open Access Journals (Sweden)

    Ky Van Hoang

    2012-03-01

    Full Text Available Antimicrobial peptides (AMPs are critical components of host defense limiting bacterial infections at the gastrointestinal mucosal surface. Bacterial pathogens have co-evolved with host innate immunity and developed means to counteract the effect of endogenous AMPs. However, molecular mechanisms of AMP resistance in Campylobacter, an important human food borne pathogen with poultry as a major reservoir, are still largely unknown. In this study, random transposon mutagenesis and targeted site-directed mutagenesis approaches were used to identify genetic loci contributing Campylobacter resistance to fowlicidin-1, a chicken AMP belonging to cathelicidin family. An efficient transposon mutagenesis approach (EZ::TNTM Transposome in conjunction with a microtiter plate screening identified three mutants whose susceptibilities to fowlicidin-1 were significantly increased. Backcrossing of the transposon mutations into parent strain confirmed that the AMP-sensitive phenotype in each mutant was linked to the specific transposon insertion. Direct sequencing showed that these mutants have transposon inserted in the genes encoding two-component regulator CbrR, transporter CjaB, and putative trigger factor Tig. Genomic analysis also revealed an operon (Cj1580c-1584c that is homologous to sapABCDF, an operon conferring resistance to AMP in other pathogens. Insertional inactivation of Cj1583c (sapB significantly increased susceptibility of Campylobacter to fowlicidin-1. The sapB as well as tig and cjaB mutants were significantly impaired in their ability to compete with their wild-type strain 81-176 to colonize the chicken cecum. Together, this study identified four genetic loci in Campylobacter that will be useful for characterizing molecular basis of Campylobacter resistance to AMPs, a significant knowledge gap in Campylobacter pathogenesis.

  20. CSTminer: a web tool for the identification of coding and noncoding conserved sequence tags through cross-species genome comparison.

    Science.gov (United States)

    Castrignanò, Tiziana; Canali, Alessandro; Grillo, Giorgio; Liuni, Sabino; Mignone, Flavio; Pesole, Graziano

    2004-07-01

    The identification and characterization of genome tracts that are highly conserved across species during evolution may contribute significantly to the functional annotation of whole-genome sequences. Indeed, such sequences are likely to correspond to known or unknown coding exons or regulatory motifs. Here, we present a web server implementing a previously developed algorithm that, by comparing user-submitted genome sequences, is able to identify statistically significant conserved blocks and assess their coding or noncoding nature through the measure of a coding potential score. The web tool, available at http://www.caspur.it/CSTminer/, is dynamically interconnected with the Ensembl genome resources and produces a graphical output showing a map of detected conserved sequences and annotated gene features.

  1. Object Identification and Aspect Mining in Procedural Object-Oriented Code

    OpenAIRE

    Bhatti, Muhammad Usman

    2009-01-01

    In this dissertation, we present Procedural Object-Oriented Code (POC). POC is the aftermath of the software development activity that involves state of the art object-oriented languages, without employing object-oriented analysis and design. Huge classes, absence of abstractions for domain entities, and shallow inheritance hierarchies are hallmark design defects of procedural object-oriented code. POC also consists of scattered code appearing not only due to the absence of aspects, but it al...

  2. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    Energy Technology Data Exchange (ETDEWEB)

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  3. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    Energy Technology Data Exchange (ETDEWEB)

    Dickens, J.K.

    1981-03-01

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given.

  4. Identification of novel non-coding small RNAs from Streptococcus pneumoniae TIGR4 using high-resolution genome tiling arrays

    Directory of Open Access Journals (Sweden)

    Swiatlo Edwin

    2010-06-01

    Full Text Available Abstract Background The identification of non-coding transcripts in human, mouse, and Escherichia coli has revealed their widespread occurrence and functional importance in both eukaryotic and prokaryotic life. In prokaryotes, studies have shown that non-coding transcripts participate in a broad range of cellular functions like gene regulation, stress and virulence. However, very little is known about non-coding transcripts in Streptococcus pneumoniae (pneumococcus, an obligate human respiratory pathogen responsible for significant worldwide morbidity and mortality. Tiling microarrays enable genome wide mRNA profiling as well as identification of novel transcripts at a high-resolution. Results Here, we describe a high-resolution transcription map of the S. pneumoniae clinical isolate TIGR4 using genomic tiling arrays. Our results indicate that approximately 66% of the genome is expressed under our experimental conditions. We identified a total of 50 non-coding small RNAs (sRNAs from the intergenic regions, of which 36 had no predicted function. Half of the identified sRNA sequences were found to be unique to S. pneumoniae genome. We identified eight overrepresented sequence motifs among sRNA sequences that correspond to sRNAs in different functional categories. Tiling arrays also identified approximately 202 operon structures in the genome. Conclusions In summary, the pneumococcal operon structures and novel sRNAs identified in this study enhance our understanding of the complexity and extent of the pneumococcal 'expressed' genome. Furthermore, the results of this study open up new avenues of research for understanding the complex RNA regulatory network governing S. pneumoniae physiology and virulence.

  5. Validity of ICD-9-CM codes for the identification of complications related to central venous catheterization.

    Science.gov (United States)

    Tukey, Melissa H; Borzecki, Ann M; Wiener, Renda Soylemez

    2015-01-01

    Two complications of central venous catheterization (CVC), iatrogenic pneumothorax and central line-associated bloodstream infection (CLABSI), have dedicated International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) codes. Despite increasing use of ICD-9-CM codes for research and pay-for-performance purposes, their validity for detecting complications of CVC has not been established. Complications of CVCs placed between July 2010 and December 2011 were identified by ICD-9-CM codes in discharge records from a single hospital and compared with those revealed by medical record abstraction. The ICD-9-CM code for iatrogenic pneumothorax had a sensitivity of 66.7%, specificity of 100%, positive predictive value (PPV) of 100%, and negative predictive value (NPV) of 99.5%. The ICD-9-CM codes for CLABSI had a sensitivity of 33.3%, specificity of 99.0%, PPV of 28.6%, and NPV of 99.2%. The low sensitivity and variable PPV of ICD-9-CM codes for detection of complications of CVC raise concerns about their use for research or pay-for-performance purposes.

  6. Code-Mixing in Social Media Text: The Last Language Identification Frontier?

    OpenAIRE

    Das, Amitava; Gambäck, Björn

    2015-01-01

    ABSTRACT: Automatic understanding of noisy social media text is one of the prime present-day research areas. Most research has so far concentrated on English texts ; however, more than half of the users are writing in other languages, making language identification a pre-requisite for comprehensive processing of social media text. Though language identification has been considered an almost solved problem in other applications, language detectors fail in the social media context due to pheno...

  7. Method for Face Identification with Facial Action Coding System: FACS Based on Eigen Value Decomposion

    Directory of Open Access Journals (Sweden)

    Kohei Arai

    2012-12-01

    Full Text Available Method for face identification based on eigen value decomposition together with tracing trajectories in the eigen space after the eigen value decomposition is proposed. The proposed method allows person to person differences due to faces in the different emotions. By using the well known action unit approach, the proposed method admits the faces in the different emotions. Experimental results show that recognition performance depends on the number of targeted peoples. The face identification rate is 80% for four peoples of targeted number while 100% is achieved for the number of targeted number of peoples is two.

  8. Identification of evolutionarily conserved non-AUG-initiated N-terminal extensions in human coding sequences.

    LENUS (Irish Health Repository)

    Ivanov, Ivaylo P

    2011-05-01

    In eukaryotes, it is generally assumed that translation initiation occurs at the AUG codon closest to the messenger RNA 5\\' cap. However, in certain cases, initiation can occur at codons differing from AUG by a single nucleotide, especially the codons CUG, UUG, GUG, ACG, AUA and AUU. While non-AUG initiation has been experimentally verified for a handful of human genes, the full extent to which this phenomenon is utilized--both for increased coding capacity and potentially also for novel regulatory mechanisms--remains unclear. To address this issue, and hence to improve the quality of existing coding sequence annotations, we developed a methodology based on phylogenetic analysis of predicted 5\\' untranslated regions from orthologous genes. We use evolutionary signatures of protein-coding sequences as an indicator of translation initiation upstream of annotated coding sequences. Our search identified novel conserved potential non-AUG-initiated N-terminal extensions in 42 human genes including VANGL2, FGFR1, KCNN4, TRPV6, HDGF, CITED2, EIF4G3 and NTF3, and also affirmed the conservation of known non-AUG-initiated extensions in 17 other genes. In several instances, we have been able to obtain independent experimental evidence of the expression of non-AUG-initiated products from the previously published literature and ribosome profiling data.

  9. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    Valenzise G

    2009-01-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  10. Identification of long non-coding RNA in the horse transcriptome.

    Science.gov (United States)

    Scott, E Y; Mansour, T; Bellone, R R; Brown, C T; Mienaltowski, M J; Penedo, M C; Ross, P J; Valberg, S J; Murray, J D; Finno, C J

    2017-07-04

    Efforts to resolve the transcribed sequences in the equine genome have focused on protein-coding RNA. The transcription of the intergenic regions, although detected via total RNA sequencing (RNA-seq), has yet to be characterized in the horse. The most recent equine transcriptome based on RNA-seq from several tissues was a prime opportunity to obtain a concurrent long non-coding RNA (lncRNA) database. This lncRNA database has a breadth of eight tissues and a depth of over 20 million reads for select tissues, providing the deepest and most expansive equine lncRNA database. Utilizing the intergenic reads and three categories of novel genes from a previously published equine transcriptome pipeline, we better describe these groups by annotating the lncRNA candidates. These lncRNA candidates were filtered using an approach adapted from human lncRNA annotation, which removes transcripts based on size, expression, protein-coding capability and distance to the start or stop of annotated protein-coding transcripts. Our equine lncRNA database has 20,800 transcripts that demonstrate characteristics unique to lncRNA including low expression, low exon diversity and low levels of sequence conservation. These candidate lncRNA will serve as a baseline lncRNA annotation and begin to describe the RNA-seq reads assigned to the intergenic space in the horse.

  11. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    G. Valenzise

    2009-02-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  12. Genome-Wide Identification and Characterization of Long Non-Coding RNAs from Mulberry (Morus notabilis RNA-seq Data

    Directory of Open Access Journals (Sweden)

    Xiaobo Song

    2016-02-01

    Full Text Available Numerous sources of evidence suggest that most of the eukaryotic genome is transcribed into protein-coding mRNAs and also into a large number of non-coding RNAs (ncRNAs. Long ncRNAs (lncRNAs, a group consisting of ncRNAs longer than 200 nucleotides, have been found to play critical roles in transcriptional, post-transcriptional, and epigenetic gene regulation across all kingdoms of life. However, lncRNAs and their regulatory roles remain poorly characterized in plants, especially in woody plants. In this paper, we used a computational approach to identify novel lncRNAs from a published RNA-seq data set and analyzed their sequences and expression patterns. In total, 1133 novel lncRNAs were identified in mulberry, and 106 of these lncRNAs displayed a predominant tissue-specific expression in the five major tissues investigated. Additionally, functional predictions revealed that tissue-specific lncRNAs adjacent to protein-coding genes might play important regulatory roles in the development of floral organ and root in mulberry. The pipeline used in this study would be useful for the identification of lncRNAs obtained from other deep sequencing data. Furthermore, the predicted lncRNAs would be beneficial towards an understanding of the variations in gene expression in plants.

  13. Identification of maize long non-coding RNAs responsive to drought stress.

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    Full Text Available Long non-coding RNAs (lncRNAs represent a class of riboregulators that either directly act in long form or are processed to shorter miRNAs and siRNAs. Emerging evidence shows that lncRNAs participate in stress responsive regulation. In this study, to identify the putative maize lncRNAs responsive to drought stress, 8449 drought responsive transcripts were first uploaded to the Coding Potential Calculator website for classification as protein coding or non-coding RNAs, and 1724 RNAs were identified as potential non-coding RNAs. A Perl script was written to screen these 1724 ncRNAs and 664 transcripts were ultimately identified as drought-responsive lncRNAs. Of these 664 transcripts, 126 drought-responsive lncRNAs were highly similar to known maize lncRNAs; the remaining 538 transcripts were considered as novel lncRNAs. Among the 664 lncRNAs identified as drought responsive, 567 were upregulated and 97 were downregulated in drought-stressed leaves of maize. 8 lncRNAs were identified as miRNA precursor lncRNAs, 62 were classified as both shRNA and siRNA precursors, and 279 were classified as siRNA precursors. The remaining 315 lncRNAs were classified as other lncRNAs that are likely to function as longer molecules. Among these 315 lncRNAs, 10 are identified as antisense lncRNAs and 7 could pair with 17 CDS sequences with near-perfect matches. Finally, RT-qPCR results confirmed that all selected lncRNAs could respond to drought stress. These findings extend the current view on lncRNAs as ubiquitous regulators under stress conditions.

  14. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  15. Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation.

    Science.gov (United States)

    Xing, Chuanhua; Bitzer, Donald L; Alexander, Winser E; Vouk, Mladen A; Stomp, Anne-Marie

    2009-02-01

    We introduce a new approach in this article to distinguish protein-coding sequences from non-coding sequences utilizing a period-3, free energy signal that arises from the interactions of the 3'-terminal nucleotides of the 18S rRNA with mRNA. We extracted the special features of the amplitude and the phase of the period-3 signal in protein-coding regions, which is not found in non-coding regions, and used them to distinguish protein-coding sequences from non-coding sequences. We tested on all the experimental genes from Saccharomyces cerevisiae and Schizosaccharomyces pombe. The identification was consistent with the corresponding information from GenBank, and produced better performance compared to existing methods that use a period-3 signal. The primary tests on some fly, mouse and human genes suggests that our method is applicable to higher eukaryotic genes. The tests on pseudogenes indicated that most pseudogenes have no period-3 signal. Some exploration of the 3'-tail of 18S rRNA and pattern analysis of protein-coding sequences supported further our assumption that the 3'-tail of 18S rRNA has a role of synchronization throughout translation elongation process. This, in turn, can be utilized for the identification of protein-coding sequences.

  16. Genome-wide identification and characterization of long intergenic non-coding RNAs in Ganoderma lucidum.

    Directory of Open Access Journals (Sweden)

    Jianqin Li

    Full Text Available Ganoderma lucidum is a white-rot fungus best-known for its medicinal activities. We have previously sequenced its genome and annotated the protein coding genes. However, long non-coding RNAs in G. lucidum genome have not been analyzed. In this study, we have identified and characterized long intergenic non-coding RNAs (lincRNA in G. lucidum systematically. We developed a computational pipeline, which was used to analyze RNA-Seq data derived from G. lucidum samples collected from three developmental stages. A total of 402 lincRNA candidates were identified, with an average length of 609 bp. Analysis of their adjacent protein-coding genes (apcGenes revealed that 46 apcGenes belong to the pathways of triterpenoid biosynthesis and lignin degradation, or families of cytochrome P450, mating type B genes, and carbohydrate-active enzymes. To determine if lincRNAs and these apcGenes have any interactions, the corresponding pairs of lincRNAs and apcGenes were analyzed in detail. We developed a modified 3' RACE method to analyze the transcriptional direction of a transcript. Among the 46 lincRNAs, 37 were found unidirectionally transcribed, and 9 were found bidirectionally transcribed. The expression profiles of 16 of these 37 lincRNAs were found to be highly correlated with those of the apcGenes across the three developmental stages. Among them, 11 are positively correlated (r>0.8 and 5 are negatively correlated (r<-0.8. The co-localization and co-expression of lincRNAs and those apcGenes playing important functions is consistent with the notion that lincRNAs might be important regulators for cellular processes. In summary, this represents the very first study to identify and characterize lincRNAs in the genomes of basidiomycetes. The results obtained here have laid the foundation for study of potential lincRNA-mediated expression regulation of genes in G. lucidum.

  17. A Bar Code and Radio-Frequency Identification System for Transfusion Safety

    Institute of Scientific and Technical Information of China (English)

    Sandler SG; DiBandi L; Langeberg A; Gibble J; Wilson C; Feldman CF

    2006-01-01

    This presentation will describe a pilot study of radio-frequency (RF) identification tags ("chips") that was conducted in parallel with standard procedures for the collection and testing of Red Blood Cells (Greater Chesapeake and Potomac Region, American Red Cross Biomedical Services, Baltimore, MD) and transfusion (Georgetown University Hospital, Washington, DC). The purpose of the study was to evaluate whether multi-write RF chips could be attached to blood bags, programmed, and used to facilitate the collection of information from (1) a blood bag manufacturer to (2) a blood collection center and, subsequently, to (3) a hospital transfusion service.

  18. Consumer’s defense code and Mercosul: variations in their coexistence Código de defesa do consumidor e Mercosul: vicissitudes em sua coexistência

    Directory of Open Access Journals (Sweden)

    Fagner Gomes da Silva

    2002-11-01

    Full Text Available With the process created by the Cold War conjunction, in which the evolution of economic integration and communitarian reality are noticed, there is evidence of the problematic of becoming closer, the harmonization and unification of the legal structures of the States, often to the detriment of the development of the block. The study, having as its object the Consumer’s Defense Code and MERCOSUL, points to the intended goals and to the differences, which exist between these two manifestations of the juridical word. The first one aims at protecting consumers in their vulnerability and hypo-sufficiency, whereas the second one presents as goal the economic integration among the peoples gathered by the geographical proximity, in the Southern Cone. The work presents these two realities closely related from the analysis of their respective origins, from the exam of the development of each one, as well as of the course that they are led, reaching the present stage of the relations established by them at the end of the article.Com o processo desencadeado pela conjuntura Pós-Guerra Fria, em que se observa a evolução da integração econômica e da realidade comunitária, evidencia-se a problemática da aproximação, harmonização e unificação das estruturas normativa dos Estados, muitas vezes em detrimento da legislação nacional e em favor do aprimoramento do bloco. O estudo, tomando como seu objeto o Código de Defesa do Consumidor e o MERCOSUL, aponta para os escopos buscados e para as divergências existentes entre essas duas manifestações do mundo jurídico. O primeiro intenta salvaguardar o consumidor em sua vulnerabilidade e hipossuficiência, enquanto o segundo apresenta como finalidade a integração econômica entre os povos irmanados pela proximidade geográfica, no Cone Sul da América. O trabalho apresenta essas duas realidades intimamente relacionadas a partir da análise de seus respectivos surgimentos, do exame do

  19. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    Directory of Open Access Journals (Sweden)

    Abdul Rouf Mir

    2016-01-01

    Full Text Available This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR. Out of 98 isolates, 71 (72.45% isolates were identified as E. coli and the remaining 27 (27.55% as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients.

  20. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    Science.gov (United States)

    Bashir, Yasir; Dar, Firdous Ahmad; Sekhar, M.

    2016-01-01

    This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR). Out of 98 isolates, 71 (72.45%) isolates were identified as E. coli and the remaining 27 (27.55%) as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients. PMID:27403451

  1. An improved method for identification of small non-coding RNAs in bacteria using support vector machine

    Science.gov (United States)

    Barman, Ranjan Kumar; Mukhopadhyay, Anirban; Das, Santasabuj

    2017-04-01

    Bacterial small non-coding RNAs (sRNAs) are not translated into proteins, but act as functional RNAs. They are involved in diverse biological processes like virulence, stress response and quorum sensing. Several high-throughput techniques have enabled identification of sRNAs in bacteria, but experimental detection remains a challenge and grossly incomplete for most species. Thus, there is a need to develop computational tools to predict bacterial sRNAs. Here, we propose a computational method to identify sRNAs in bacteria using support vector machine (SVM) classifier. The primary sequence and secondary structure features of experimentally-validated sRNAs of Salmonella Typhimurium LT2 (SLT2) was used to build the optimal SVM model. We found that a tri-nucleotide composition feature of sRNAs achieved an accuracy of 88.35% for SLT2. We validated the SVM model also on the experimentally-detected sRNAs of E. coli and Salmonella Typhi. The proposed model had robustly attained an accuracy of 81.25% and 88.82% for E. coli K-12 and S. Typhi Ty2, respectively. We confirmed that this method significantly improved the identification of sRNAs in bacteria. Furthermore, we used a sliding window-based method and identified sRNAs from complete genomes of SLT2, S. Typhi Ty2 and E. coli K-12 with sensitivities of 89.09%, 83.33% and 67.39%, respectively.

  2. Automatic Screening of Missing Objects and Identification with Group Coding of RF Tags

    Directory of Open Access Journals (Sweden)

    G. Vijayaraju

    2013-11-01

    Full Text Available Here the container of the shipping based phenomena it is a collection of the objects in a well oriented fashion by which there is a group oriented fashion related to the well efficient strategy of the objects based on the physical phenomena in a well efficient fashion respectively. Here by the enabling of the radio frequency identification based strategy in which object identification takes place in the system in a well efficient fashion and followed by the container oriented strategy in a well effective fashion respectively. Here there is a problem with respect to the present strategy in which there is a problem with respect to the design oriented mechanism by which there is a no proper analysis takes place for the accurate identification of the objects based on the missing strategy plays a major role in the system based aspect respectively. Here a new technique is proposed in order to overcome the problem of the previous method here the present design oriented powerful strategy includes the object oriented determination of the ID based on the user oriented phenomena in a well effective manner where the data related to the strategy of the missing strategy plays a major role in the system based aspect in a well effective fashion by which that is from the perfect analysis takes place from the same phenomena without the help of the entire database n a well respective fashion takes place in the system respectively. Here the main key aspect of the present method is to effectively divide the entire data related to the particular aspect and define based on the present strategy in a well effective manner in which there is coordination has to be maintained in the system based aspect respectively. Simulations have been conducted on the present method and a lot of analysis takes place on the large number of the data sets in a well oriented fashion with respect to the different environmental conditions where there is an accurate analysis with respect to

  3. Identification and functional characterization of small non-coding RNAs in Xanthomonas oryzae pathovar oryzae

    Directory of Open Access Journals (Sweden)

    Zhang Jie-Qiong

    2011-01-01

    Full Text Available Abstract Background Small non-coding RNAs (sRNAs are regarded as important regulators in prokaryotes and play essential roles in diverse cellular processes. Xanthomonas oryzae pathovar oryzae (Xoo is an important plant pathogenic bacterium which causes serious bacterial blight of rice. However, little is known about the number, genomic distribution and biological functions of sRNAs in Xoo. Results Here, we performed a systematic screen to identify sRNAs in the Xoo strain PXO99. A total of 850 putative non-coding RNA sequences originated from intergenic and gene antisense regions were identified by cloning, of which 63 were also identified as sRNA candidates by computational prediction, thus were considered as Xoo sRNA candidates. Northern blot hybridization confirmed the size and expression of 6 sRNA candidates and other 2 cloned small RNA sequences, which were then added to the sRNA candidate list. We further examined the expression profiles of the eight sRNAs in an hfq deletion mutant and found that two of them showed drastically decreased expression levels, and another exhibited an Hfq-dependent transcript processing pattern. Deletion mutants were obtained for seven of the Northern confirmed sRNAs, but none of them exhibited obvious phenotypes. Comparison of the proteomic differences between three of the ΔsRNA mutants and the wild-type strain by two-dimensional gel electrophoresis (2-DE analysis showed that these sRNAs are involved in multiple physiological and biochemical processes. Conclusions We experimentally verified eight sRNAs in a genome-wide screen and uncovered three Hfq-dependent sRNAs in Xoo. Proteomics analysis revealed Xoo sRNAs may take part in various metabolic processes. Taken together, this work represents the first comprehensive screen and functional analysis of sRNAs in rice pathogenic bacteria and facilitates future studies on sRNA-mediated regulatory networks in this important phytopathogen.

  4. Incoherent optical correlators and phase encoding of identification codes for access control or authentication

    Science.gov (United States)

    Brasher, James D.; Johnson, Eric G.

    1997-09-01

    We show how phase-only filters can be used in incoherent optical correlators for security applications such as access control, identification, or authentication. As a specific example, a biometric signature, a fingerprint, is encoded in a phase-only representation. The phase encoding is accomplished with the method of generalized projections onto constraint sets implemented by an iterated Fourier transform algorithm. The operation of an incoherent optical security system using both a phase-only filter generated with the generalized projections algorithm and a phase-only matched filter is simulated. The results demonstrate that the selected access pattern was accepted while a false pattern was rejected by the security system and that better recognition and discrimination performance was attained with the phase-only filter produced by the generalized projections algorithm.

  5. Systematic identification and characterization of long non-coding RNAs in mouse mature sperm

    Science.gov (United States)

    Zhang, Xiaoning; Gao, Fengxin; Fu, Jianbo; Zhang, Peng; Wang, Yuqing; Zeng, Xuhui

    2017-01-01

    Increasing studies have shown that mature spermatozoa contain many transcripts including mRNAs and miRNAs. However, the expression profile of long non-coding RNAs (lncRNAs) in mammalian sperm has not been systematically investigated. Here, we used highly purified RNA to investigate lncRNA expression profiles in mouse mature sperm by stranded-specific RNA-seq. We identified 20,907 known and 4,088 novel lncRNAs transcripts, and the existence of intact lncRNAs was confirmed by RT-PCR and fluorescence in situ hybridization on two representative lncRNAs. Compared to round spermatids, 1,794 upregulated and 165 downregulated lncRNAs and 4,435 upregulated and 3,920 downregulated mRNAs were identified in sperm. Based on the “Cis and Trans” RNA-RNA interaction principle, we found 14,259 targeted coding genes of differently expressed lncRNAs. In terms of Gene ontology (GO) analysis, differentially expressed lncRNAs targeted genes mainly related to nucleic acid metabolic, protein modification, chromatin and histone modification, heterocycle compound metabolic, sperm function, spermatogenesis and other processes. In contrast, differentially expressed transcripts of mRNAs were highly enriched for protein metabolic process and RNA metabolic, spermatogenesis, sperm motility, cell cycle, chromatin organization, heterocycle and aromatic compound metabolic processes. Kyoto encyclopedia of genes and genomes (KEGG) pathway analysis showed that the differentially expressed lncRNAs were involved in RNA transport, mRNA surveillance pathway, PI3K-Akt signaling pathway, AMPK signaling pathway, protein processing in endoplasmic reticulum. Metabolic pathways, mRNA surveillance pathway, AMPK signaling pathway, cell cycle, RNA transport splicesome and endocytosis incorporated with the differentially expressed mRNA. Furthermore, many lncRNAs were specifically expressed in testis/sperm, and 880 lncRNAs were conserved between human and mouse. In summary, this study provides a preliminary

  6. Identification and characterisation of coding tandem repeat variants in incA gene of Chlamydophila pecorum.

    Science.gov (United States)

    Yousef Mohamad, Khalil; Rekiki, Abdessalem; Myers, Garry; Bavoil, Patrik M; Rodolakis, Annie

    2008-01-01

    Bacteria of the family Chlamydiaceae are obligate intracellular pathogens of human and animals. Chlamydophila pecorum is associated with different pathological conditions in ruminants, swine and koala. To characterize a coding tandem repeat (CTR) identified at the 3' end of incA gene of C. pecorum, 51 strains of different chlamydial species were examined. The CTR were observed in 18 of 18 tested C. pecorum isolates including symptomatic and asymptomatic animals from diverse geographical origins. The CTR were also found in two strains of C. abortus respectively isolated from faeces from a healthy ewe and from a goat belonging to asymptomatic herds, but were absent in C. abortus strains isolated from clinical disease specimens, and in tested strains of C. psittaci, C. caviae, C. felis and C. trachomatis. The number of CTR repeats is variable and encode several motifs that are rich in alanine and proline. The CTR-derived variable structure of incA, which encode the Chlamydiaceae-specific type III secreted inclusion membrane protein, IncA, may be involved in the adaptation of C. pecorum to its environment by allowing it to persist in the host cell.

  7. A multiple copyright identification watermarking algorithm based on code division multiple access

    Institute of Scientific and Technical Information of China (English)

    Zhang Fan; Li Jie; Su Yuting; Zhang Chun tian

    2008-01-01

    A multiple watermarking algorithm is presented according to the multiple accessing technique of the code division multiple access (CDMA) system. Multiple watermarks are embedded into digital images in the wavelet transform domain. Each of the watermarks is embedded and extracted independently without impacts to each other. Multiple watermarks are convolution encoded and block interleaved, and the orthogonal Gold sequences are used to spread spectrum of the copyright messages. CDMA encoded watermark messages are embedded into the wavelet sub-bands excluding the wavelet HH1 sub-bands. The embedment amplitude is decided by Watson's perceptual model of wavelet transform domain, and the embedment position in the selected wavelet sub-bands is decided randomly by a pseudo-random noise (PN) sequence. As a blind watermarking algorithm, watermarks are extracted without original image. The watermarking capacity of proposed algorithm is also discussed. When two watermarks are embedded in an image at the same time, the capacity is larger than the capacity when a single watermark is embedded, and is smaller than the sum of the capacity of two separately embedded watermarks. Experimental results show that the proposed algorithm improves the detection bits error rate (BER) observably, and the multiple watermarks have a preferable robustness and invisibility.

  8. Identification of four novel small non-coding RNAs from Xanthomonas campestris pathovar campestris

    Directory of Open Access Journals (Sweden)

    Lu Guang-Tao

    2010-05-01

    Full Text Available Abstract Background In bacteria, small non-coding RNAs (sRNAs have been recognized as important regulators of various cellular processes. Approximately 200 bacterial sRNAs in total have been reported. However, very few sRNAs have been identified from phytopathogenic bacteria. Results Xanthomons campestris pathovar campestris (Xcc is the causal agent of black rot disease of cruciferous crops. In this study, a cDNA library was constructed from the low-molecular weight RNA isolated from the Xcc strain 8004 grown to exponential phase in the minimal medium XVM2. Seven sRNA candidates were obtained by sequencing screen of 2,500 clones from the library and four of them were confirmed to be sRNAs by Northern hybridization, which were named sRNA-Xcc1, sRNA-Xcc2, sRNA-Xcc3, and sRNA-Xcc4. The transcription start and stop sites of these sRNAs were further determined. BLAST analysis revealed that the four sRNAs are novel. Bioinformatics prediction showed that a large number of genes with various known or unknown functions in Xcc 8004 are potential targets of sRNA-Xcc1, sRNA-Xcc3 and sRNA-Xcc4. In contrast, only a few genes were predicted to be potential targets of sRNA-Xcc2. Conclusion We have identified four novel sRNAs from Xcc by a large-scale screen. Bioinformatics analysis suggests that they may perform various functions. This work provides the first step toward understanding the role of sRNAs in the molecular mechanisms of Xanthomonas campestris pathogenesis.

  9. Identification of neural firing patterns, frequency and temporal coding mechanisms in individual aortic baroreceptors

    Directory of Open Access Journals (Sweden)

    Huaguang eGu

    2015-08-01

    Full Text Available In rabbit depressor nerve fibers, an on-off firing pattern, period-1 firing, and integer multiple firing with quiescent state were observed as the static pressure level was increased. A bursting pattern with bursts at the systolic phase of blood pressure, continuous firing, and bursting with burst at diastolic phase and quiescent state at systolic phase were observed as the mean level of the dynamic blood pressure was increased. For both static and dynamic pressures, the firing frequency of the first two firing patterns increased and of the last firing pattern decreased due to the quiescent state. If the quiescent state is disregarded, the spike frequency becomes an increasing trend. The instantaneous spike frequency of the systolic phase bursting, continuous firing, and diastolic phase bursting can reflect the temporal process of the systolic phase, whole procedure, and diastolic phase of the dynamic blood pressure signal, respectively. With increasing the static current corresponding to pressure level, the deterministic Hodgkin-Huxley (HH model manifests a process from a resting state first to period-1 firing via a subcritical Hopf bifurcation and then to a resting state via a supercritical Hopf bifurcation, and the firing frequency increases. The on-off firing and integer multiple firing were here identified as noise-induced firing patterns near the subcritical and supercritical Hopf bifurcation points, respectively, using the stochastic HH model. The systolic phase bursting and diastolic phase bursting were identified as pressure-induced firings near the subcritical and supercritical Hopf bifurcation points, respectively, using an HH model with a dynamic signal. The firing, spike frequency, and instantaneous spike frequency observed in the experiment were simulated and explained using HH models. The results illustrate the dynamics of different firing patterns and the frequency and temporal coding mechanisms of aortic baroreceptor.

  10. Identification and expression profiling of Ceratitis capitata genes coding for β-hexosaminidases.

    Science.gov (United States)

    Pasini, Maria E; Intra, Jari; Gomulski, Ludvik M; Calvenzani, Valentina; Petroni, Katia; Briani, Federica; Perotti, Maria Elisa

    2011-02-15

    The goal of this study was to identify the genes coding for β-N-acetylhexosaminidases in the Mediterranean fruit fly (medfly) Ceratitis capitata, one of the most destructive agricultural pests, belonging to the Tephritidae family, order Diptera. Two dimeric β-N-acetylhexosaminidases, HEXA and HEXB, have been recently identified on Drosophila sperm. These enzymes are involved in egg binding through interactions with complementary carbohydrates on the surface of the egg shell. Three genes, Hexosaminidase 1 (Hexo1), Hexosaminidase 2 (Hexo2) and fused lobes (fdl), encode for HEXA and HEXB subunits. The availability of C. capitata EST libraries derived from embryos and adult heads allowed us to identify three sequences homologous to the D. melanogaster Hexo1, Hexo2 and fdl genes. Here, we report the expression profile analysis of CcHexo1, CcHexo2 and Ccfdld in several tissues, organs and stages. Ccfdl expression was highest in heads of both sexes and in whole adult females. In the testis and ovary the three genes showed distinct spatial and temporal expression patterns. All the mRNAs were detectable in early stages of spermatogenesis; CcHexo2 and Ccfdl were also expressed in early elongating spermatid cysts. All three genes are expressed in the ovarian nurse cells. CcHexo1 and Ccfdl are stage specific, since they have been observed in stages 12 and 13 during oocyte growth, when programmed cell death occurs in nurse cells. The expression pattern of the three genes in medfly gonads suggests that, as their Drosophila counterparts, they may encode for proteins involved in gametogenesis and fertilization. Copyright © 2010 Elsevier B.V. All rights reserved.

  11. Identification and Molecular Characterization of Genes Coding Pharmaceutically Important Enzymes from Halo-Thermo Tolerant Bacillus

    Science.gov (United States)

    Safary, Azam; Moniri, Rezvan; Hamzeh-Mivehroud, Maryam; Dastmalchi, Siavoush

    2016-01-01

    Purpose: Robust pharmaceutical and industrial enzymes from extremophile microorganisms are main source of enzymes with tremendous stability under harsh conditions which make them potential tools for commercial and biotechnological applications. Methods: The genome of a Gram-positive halo-thermotolerant Bacillus sp. SL1, new isolate from Saline Lake, was investigated for the presence of genes coding for potentially pharmaceutical enzymes. We determined gene sequences for the enzymes laccase (CotA), l-asparaginase (ansA3, ansA1), glutamate-specific endopeptidase (blaSE), l-arabinose isomerase (araA2), endo-1,4-β mannosidase (gmuG), glutaminase (glsA), pectate lyase (pelA), cellulase (bglC1), aldehyde dehydrogenase (ycbD) and allantoinases (pucH) in the genome of Bacillus sp. SL1. Results: Based on the DNA sequence alignment results, six of the studied enzymes of Bacillus sp. SL-1 showed 100% similarity at the nucleotide level to the same genes of B. licheniformis 14580 demonstrating extensive organizational relationship between these two strains. Despite high similarities between the B. licheniformis and Bacillus sp. SL-1 genomes, there are minor differences in the sequences of some enzyme. Approximately 30% of the enzyme sequences revealed more than 99% identity with some variations in nucleotides leading to amino acid substitution in protein sequences. Conclusion: Molecular characterization of this new isolate provides useful information regarding evolutionary relationship between B. subtilis and B. licheniformis species. Since, the most industrial processes are often performed in harsh conditions, enzymes from such halo-thermotolerant bacteria may provide economically and industrially appealing biocatalysts to be used under specific physicochemical situations in medical, pharmaceutical, chemical and other industries. PMID:28101462

  12. Translation of the Department of Defense Disease and Injury Codes to the Eighth Revision International Classification of Diseases for use by the Military Services.

    Science.gov (United States)

    1976-06-01

    Example: DDDIC ICDA-8 NHRC Code Ntmuber Code Number Code Number Disease Entity Desivnator 5000 08-467-01 Hypertrophy of tonsils and adenoids ...Unspecified with regard to surgical treatment 5100 08-467-02 Hypertrophy of tonsils and adenoids / Without mention of tonsillectomy or adenoidectomy 5101 08-467...03 Hypertrophy of tonsils and adenoids / With tonsillectomy or adenoidectomy 5110 5010 08-468-01 Peritonsillar abscess/All types 5120 5020 08-469-01

  13. 一种基于Cloud-P2P计算模型的恶意代码联合防御网络%Malicious code united-defense network based on Cloud-P2P model

    Institute of Scientific and Technical Information of China (English)

    徐小龙; 吴家兴; 杨庚

    2012-01-01

    The current anti-virus systems are usually unable io respond to endless emerging malicious codes in time. To sohe this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Servers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious cooes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.%针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于CloudP2P计算模型的恶意代码联合防御网络.Cloud-P2P计算模型将云计算与对等计算进行有机融合.恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力.为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent.基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现.

  14. Identification and characterization of novel host defense peptides from the skin secretion of the fungoid frog, Hydrophylax bahuvistara (Anura: Ranidae).

    Science.gov (United States)

    Vineeth Kumar, Thundi Parambil Vasanth Kumar; Asha, Radhamony; Shyla, Gopal; George, Sanil

    2017-01-10

    Two novel peptides (brevinin1 HYba1 and brevinin1 HYba2) were identified from the skin secretion of the frog Hydrophylax bahuvistara, endemic to Western Ghats, India, and their amino acid sequences were confirmed using cDNA cloning and LC/MS/MS. Antibacterial, hemolytic, and cytotoxic activities of brevinin1 peptides and their synthetic analogs (amidated C-terminus) were investigated and compared. All the peptides except the acidic forms showed antibacterial activity against all tested Gram-positive and Gram-negative bacteria. They exhibited low hemolysis on human erythrocytes and showed potent cytotoxic activity against Hep 3B cancer cell line. Upon amidation, the peptides showed increased activity against the tested microbes without altering their hemolytic and cytotoxic properties. The study also emphasizes the need for screening endemic amphibian fauna of Western Ghats, as a potential source of host defense peptides with possible therapeutic applications in the future.

  15. Development of PARA-ID Code to Simulate Inelastic Constitutive Equations and Their Parameter Identifications for the Next Generation Reactor Designs

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Gyeong Hoi; Lee, J. H

    2006-03-15

    The establishment of the inelastic analysis technology is essential issue for a development of the next generation reactors subjected to elevated temperature operations. In this report, the peer investigation of constitutive equations in points of a ratcheting and creep-fatigue analysis is carried out and the methods extracting the constitutive parameters from experimental data are established. To perform simulations for each constitutive model, the PARA-ID (PARAmeter-IDentification) computer program is developed. By using this code, various simulations related with the parameter identification of the constitutive models are carried out.

  16. Molecular identification of three novel glutaredoxin genes that play important roles in antioxidant defense in Helicoverpa armigera.

    Science.gov (United States)

    Zhang, Song-Dou; Shen, Zhong-Jian; Liu, Xiao-Ming; Li, Zhen; Zhang, Qing-Wen; Liu, Xiao-Xia

    2016-08-01

    Glutaredoxins (Grxs), also known as thioltransferases, play key roles in maintaining intracellular redox balance and protecting cells from oxidative damage in plants and mammals. We tested whether Grxs play important roles in antioxidant defense in insects using the moth, Helicoverpa armigera. We obtained the full-length cDNA sequences of three novel Grx genes, named HaGrx, HaGrx3, and HaGrx5. Sequence analysis indicated that HaGrx shared a high amino acid identity (58%-78%) and a CPYC motif of conserved redox activity with homologues from other selected insect species. In contrast, HaGrx3 and HaGrx5 both shared a CGF(S/G) motif, a conserved catalytic domain, with other orthologous genes. Quantitative real-time PCR results revealed that HaGrx, HaGrx3, and HaGrx5 exhibited temporally- and spatially-dependent patterns of expression. The mRNA expression of HaGrx, HaGrx3, and HaGrx5 was induced by various temperature stresses and H2O2 treatments. We further investigated the knockdown of HaGrx, HaGrx3, and HaGrx5 in H. armigera larvae and found that most of the selected antioxidant genes were up regulated. However, Tpx was down regulated, and further interpretation of the complementary functions of these antioxidant genes is still required. We also determined the effect of HaGrx, HaGrx3, and HaGrx5 knockdown on antioxidant enzymatic activity and metabolite content. The enzymatic activities of SOD, CAT, and POD, and the metabolite contents of hydrogen peroxide, ascorbate, protein carbonyl, and total GSH increased after RNAi mediated knockdown of HaGrx, HaGrx3, and HaGrx5. These results supported our hypothesis that HaGrx, HaGrx3, and HaGrx5 play important roles in antioxidant defense of Helicoverpa armigera and provided a theoretical basis for further in-depth study of physiological function in the insect glutaredoxin family genes.

  17. Research on Framework of Verification Code Rapid Identification Based on PIL%基于PIL的验证码快速识别框架的研究

    Institute of Scientific and Technical Information of China (English)

    胡光中; 欧阳鸿志

    2012-01-01

    The verification code is widely used on the network as a Turing test, the study of the verification code identification technology helps verification code development and solves some emerging issues. This paper presents a framework based on PIL library, through a combination of excellent features of Python and known identification methods, can quickly respond to common verification code in the form, and can achieve better recognition results.%验证码是网络上普遍采用的一种图灵测试,研究验证码识别技术有助于验证码发展和解决一些新生问题.本文提出一种基于PIL类库的识别框架,通过结合Python的优良特性和己知识别方法,能够快速应时常见验证码形式,并能达到较好的识别效果.

  18. The identification of the first molluscan Akirin2 with immune defense function in the Hong Kong oyster Crassostrea hongkongensis.

    Science.gov (United States)

    Qu, Fufa; Xiang, Zhiming; Zhang, Yang; Li, Jun; Zhang, Yuehuan; Yu, Ziniu

    2014-12-01

    The Akirin protein is a nuclear factor in the innate immune system that is highly conserved from insects to mammals and plays key roles in diverse biological processes, including immunity, myogenesis, development and the cellular stress response. However, the function of Akirins in mollusk, the second most diverse group of animals, is still poorly understood. In this study, we report the discovery of an Akirin2 gene homolog (ChAkirin2) and its biological functions in the Hong Kong oyster Crassostrea hongkongensis. ChAkirin2 is 189 amino acids in length and shares significant homology with invertebrate homologs. Phylogenetic analysis results revealed that ChAkirin2 is clustered with invertebrate Akirin2s. A sequence analysis of the 5' flanking regions of ChAkirin2 indicated that it harbors several potential PAMP-activated transcription factor binding sites (TFB), including sites for NF-κB, C/EBPα, AP-1, SRF, Oct-1 and GATA-1. An RT-PCR analysis showed that ChAkirin2 mRNA was ubiquitously expressed in various tissues and at different embryonic and larval stages. Additionally, upon infection by pathogens (Vibrio alginolyticus, Staphylococcus haemolyticus and Saccharomyces cerevisiae) and pathogen-associated molecular patterns (PAMPs: LPS, PGN and polyI:C), the expression of ChAkirin2 was significantly up-regulated. Moreover, fluorescence microscopy observations show that ChAkirin2 is located in the nuclei of HeLa cells, and the overexpression of ChAkirin2 activated the transcriptional activities of the NF-κB reporter gene in HEK293T cells. Altogether, this report provided the first experimental demonstration that mollusks possess a functional Akirin2 that is involved in the innate defense and embryogenesis processes of the oyster.

  19. Major influence of interobserver reliability on polytrauma identification with the Injury Severity Score (ISS): Time for a centralised coding in trauma registries?

    Science.gov (United States)

    Maduz, Roman; Kugelmeier, Patrick; Meili, Severin; Döring, Robert; Meier, Christoph; Wahl, Peter

    2017-04-01

    The Abbreviated Injury Scale (AIS) and the Injury Severity Score (ISS) find increasingly widespread use to assess trauma burden and to perform interhospital benchmarking through trauma registries. Since 2015, public resource allocation in Switzerland shall even be derived from such data. As every trauma centre is responsible for its own coding and data input, this study aims at evaluating interobserver reliability of AIS and ISS coding. Interobserver reliability of the AIS and ISS is analysed from a cohort of 50 consecutive severely injured patients treated in 2012 at our institution, coded retrospectively by 3 independent and specifically trained observers. Considering a cutoff ISS≥16, only 38/50 patients (76%) were uniformly identified as polytraumatised or not. Increasing the cut off to ≥20, this increased to 41/50 patients (82%). A difference in the AIS of ≥ 1 was present in 261 (16%) of possible codes. Excluding the vast majority of uninjured body regions, uniformly identical AIS severity values were attributed in 67/193 (35%) body regions, or 318/579 (55%) possible observer pairings. Injury severity all too often is neither identified correctly nor consistently when using the AIS. This leads to wrong identification of severely injured patients using the ISS. Improving consistency of coding through centralisation is recommended before scores based on the AIS are to be used for interhospital benchmarking and resource allocation in the treatment of severely injured patients. Copyright © 2017. Published by Elsevier Ltd.

  20. Research on Identification of LDPC Code Based on Statistical Properties%基于统计特性的LDPC码分析识别研究

    Institute of Scientific and Technical Information of China (English)

    张俊

    2012-01-01

    In this Paper, the ideas and methods of the analysis of LDPC (Low Density Parity Check) code have been put forward from a statistical point, and they have been confirmed in the simulation conditions . The methods analyse some LDPC code' s properties in statistical view u- sing the way taking LDPC code as a kind of block code. To a certain extent, the ideas and methods overcome the limitations of Gaussian equation method, a the traditional method, and solve some problems of achieving part characterization of the LDPC code. The ideas and methods are also applicable to the analysis and identification of other block codes.%从统计角度出发,提出对LDPC码分析思路和初步方法,在仿真的情况下进行验证。利用LDPC码作为分组码的特性,通过统计和对统计特性的分析,在一定程度上克服传统方法———解高斯方程法的局限性,实现了对LDPC码部分特性分析。同样适用于其他分组码的分析识别。

  1. 基于链码跟踪的Data Matrix二维条码快速识别%Quick identification of Data Matrix two-dimensional bar code based on chain code tracking

    Institute of Scientific and Technical Information of China (English)

    徐义钊; 白瑞林; 余震虹; 吉峰

    2012-01-01

    为实现工业现场中Data Matrix二维条码的快速识别,提出一种基于链码跟踪、直线段提取的条码快速识别方法.首先采用Sobel算子提取图像边缘;然后基于链码跟踪方法,跟踪图像的边缘点,记录链码;接着根据快速直线段提取方法,将直线相似度低于阈值的线段剔除,结合线形连接方法合并断裂线段,并使用长度判别剔除不可靠的线段;最后结合Data Matrix二维条码的特征,定位Data Matrix二维条码.实际测试表明,该识别方法能够快速、准确地定位二维条码区域,识别正确率可达99.39%以上,具有实时性强、可靠性好等特点,满足工业现场要求.%A two-dimensional bar code recognition method based on chain code tracking and straight line segment extraction was proposed in order to realize quick identification of the Data Matrix two-dimensional bar code in the industrial field. Firstly, the Sobel operator was used to extract the edge of image. Secondly, the image edge points were tracked and chain codes were recorded based on chain code tracking method. Thirdly, line segment whose straight line similarity was below the threshold was removed with fast straight line segment extraction method. The fracture line was combined with the linear connection method and the unreliable line was excluded by length discrimination. Finally, the Data Matrix bar code was located with the characteristics of the Data Matrix two-dimensional bar code. The application test shows that the two-dimensional bar code area can be quickly and accurately located by the recognition method with the recognition rate of 99. 39%. The proposed method is ready to meet the requirements of industrial field with strong real-time ability and high reliability.

  2. The fusion protein signal-peptide-coding region of canine distemper virus: a useful tool for phylogenetic reconstruction and lineage identification.

    Directory of Open Access Journals (Sweden)

    Nicolás Sarute

    Full Text Available Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages.

  3. A Logistics Code Identification Technology Based on Improved BRIEF Algorithm%基于改进BRIEF算法的物流编码识别技术

    Institute of Scientific and Technical Information of China (English)

    杜辉

    2015-01-01

    In this paper, we proposed a QR code identification method based on the improved BRIEF algorithm, which, making use of the image modification and rapid feature identification technologies, could quickly identify and match QR codes and effectively solve problems met in the practical application of the QR codes, and at the end, through a test, proved the validity of the method.%提出一种改进BRIEF算法的QR码识别方法,该方法通过图像校正和快速特征点识别技术,对QR码进行快速识别匹配,有效地解决了QR码在实际应用中遇到的问题.实验结果表明,该QR码识别方法运算速度快,实时性好,识别率高,鲁棒性强,改善了现实中的识别难题,满足了移动物流管理的需求.

  4. Dynamic parameters’ identification for the feeding system of computer numerical control machine tools stimulated by G-code

    Directory of Open Access Journals (Sweden)

    Guangsheng Chen

    2015-08-01

    Full Text Available This study proposed a dynamic parameters’ identification method for the feeding system of computer numerical control machine tools based on internal sensor. A simplified control model and linear identification model of the feeding system were established, in which the input and output signals are from sensors embedded in computer numerical control machine tools, and the dynamic parameters of the feeding system, including the equivalent inertia, equivalent damping, worktable damping, and the overall stiffness of the mechanical system, were solved by the least square method. Using the high-order Taylor expansion, the nonlinear Stribeck friction model was linearized and the parameters of the Stribeck friction model were obtained by the same way. To verify the validity and effectiveness of the identification method, identification experiments, circular motion testing, and simulations were conducted. The results obtained were stable and suggested that inertia and damping identification experiments converged fast. Stiffness identification experiments showed some deviation from simulation due to the influences of geometric error and nonlinear of stiffness. However, the identification results were still of reference significance and the method is convenient, effective, and suited for industrial condition.

  5. Identification of a long non-coding RNA gene, growth hormone secretagogue receptor opposite strand, which stimulates cell migration in non-small cell lung cancer cell lines.

    Science.gov (United States)

    Whiteside, Eliza J; Seim, Inge; Pauli, Jana P; O'Keeffe, Angela J; Thomas, Patrick B; Carter, Shea L; Walpole, Carina M; Fung, Jenny N T; Josh, Peter; Herington, Adrian C; Chopin, Lisa K

    2013-08-01

    The molecular mechanisms involved in non‑small cell lung cancer tumourigenesis are largely unknown; however, recent studies have suggested that long non-coding RNAs (lncRNAs) are likely to play a role. In this study, we used public databases to identify an mRNA-like, candidate long non-coding RNA, GHSROS (GHSR opposite strand), transcribed from the antisense strand of the ghrelin receptor gene, growth hormone secretagogue receptor (GHSR). Quantitative real-time RT-PCR revealed higher expression of GHSROS in lung cancer tissue compared to adjacent, non-tumour lung tissue. In common with many long non-coding RNAs, GHSROS is 5' capped and 3' polyadenylated (mRNA-like), lacks an extensive open reading frame and harbours a transposable element. Engineered overexpression of GHSROS stimulated cell migration in the A549 and NCI-H1299 non-small cell lung cancer cell lines, but suppressed cell migration in the Beas-2B normal lung-derived bronchoepithelial cell line. This suggests that GHSROS function may be dependent on the oncogenic context. The identification of GHSROS, which is expressed in lung cancer and stimulates cell migration in lung cancer cell lines, contributes to the growing number of non-coding RNAs that play a role in the regulation of tumourigenesis and metastatic cancer progression.

  6. Potential prognostic long non-coding RNA identification and their validation in predicting survival of patients with multiple myeloma.

    Science.gov (United States)

    Hu, Ai-Xin; Huang, Zhi-Yong; Zhang, Lin; Shen, Jian

    2017-04-01

    Multiple myeloma, a typical hematological malignancy, is characterized by malignant proliferation of plasma cells. This study was to identify differently expressed long non-coding RNAs to predict the survival of patients with multiple myeloma efficiently. Gene expressing profiles of diagnosed patients with multiple myeloma, GSE24080 (559 samples) and GSE57317 (55 samples), were downloaded from Gene Expression Omnibus database. After processing, survival-related long non-coding RNAs were identified by Cox regression analysis. The prognosis of multiple myeloma patients with differently expressed long non-coding RNAs was predicted by Kaplan-Meier analysis. Meanwhile, stratified analysis was performed based on the concentrations of serum beta 2-microglobulin (S-beta 2m), albumin, and lactate dehydrogenase of multiple myeloma patients. Gene set enrichment analysis was performed to further explore the functions of identified long non-coding RNAs. A total of 176 long non-coding RNAs significantly related to the survival of multiple myeloma patients (p multiple myeloma. Gene set enrichment analysis-identified pathways of cell cycle, focal adhesion, and G2-M checkpoint were associated with these long non-coding RNAs. A total of 176 long non-coding RNAs, especially RP1-286D6.1, AC008875.2, MTMR9L, AC069360.2, and AL512791.1, were potential biomarkers to evaluate the prognosis of multiple myeloma patients. These long non-coding RNAs participated indispensably in many pathways associated to the development of multiple myeloma; however, the molecular mechanisms need to be further studied.

  7. 彩色比特码自动识别技术在图书馆中的应用研究%Application Research on Color Bit Code Automatic Identification technology in the Libraries

    Institute of Scientific and Technical Information of China (English)

    李海华

    2012-01-01

    This paper introduces the basic identification principles and features of Color Bit Code Automatic Identification technology the application of the technology in many fields of foreign, analyzes the feasibility of domestic libraries by using Color Bit Code Automatic Identification technology. In the end of this paper, the paper has put forward the format of Color Bit Code Automatic Identification technology protocol.%对彩色比特码的定义及工作原理进行了概述,简单介绍了该技术在国外各领域的应用现状,分析了目前国内在图书馆领域应用彩色比特码自动识别技术的可行性,并提出了一种基于彩色比特码技术的图书管理协议格式。

  8. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  9. Identification of a Coding Sequence and Structure Modeling of a Glycine-Rich RNA-Binding Protein (CmGRP1) from Chelidonium majus L.

    Science.gov (United States)

    Nawrot, Robert; Tomaszewski, Lukasz; Czerwoniec, Anna; Goździcka-Józefiak, Anna

    2013-01-01

    The family of glycine-rich plant proteins (GRPs) is a large and complex group of proteins that share, as a common feature, the presence of glycine-rich domains arranged in (Gly)n-X repeats that are suggested to be involved in protein-protein interactions, RNA binding, and nucleolar targeting. These proteins are implicated in several independent physiological processes. Some are components of cell walls of many higher plants, while others are involved in molecular responses to environmental stress, and mediated by post-transcriptional regulatory mechanisms. The goals of this study are to identify the coding sequence of a novel glycine-rich RNA-binding protein from Chelidonium majus and to propose its structural model. DNA fragments obtained using degenerate PCR primers showed high sequence identities with glycine-rich RNA-binding protein coding sequences from different plant species. A 439-bp nucleotide sequence is identified coding for a novel polypeptide composed of 146 amino acids, designated as CmGRP1 (C. majus glycine-rich protein 1), with a calculated MW of 14,931 Da (NCBI GenBank accession no. HM173636). Using NCBI CDD and GeneSilico MetaServer, a single conserved domain, the RNA recognition motif (RRM), was detected in CmGRP1. The C-terminal region of CmGRP1 is a glycine-rich motif (GGGGxxGxGGGxxG), and it is predicted to be disordered. Based on a 1fxl crystal structure, a 3D model of CmGRP1 is proposed. CmGRP1 can be classified as a class IVa plant GRP, implicated to play a role in plant defense.

  10. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  11. 基于组织机构代码的污染源标识研究%Study on the Identification of Pollution Sources Based on Organization Codes

    Institute of Scientific and Technical Information of China (English)

    袁步先; 刘定; 张学雷

    2015-01-01

    In this paper,the present condition of pollution source codes in multiple environmental protection businesses was de-scribed briefly.The encoding rules for pollution sources were established independently according to the needs of environmental management.However,the different ways of identification were unpredictable and incompatible on coding format for pollution sources,leading to multiple isolated information islands,which was a disadvantage towards the mutual communication of the basic information on pollution sources.The new encoding rules for pollution sources were proposed based on organization codes.The enco-ding structure and representation form were determined on the basis of the new encoding rules,which therefore had better practica-bility,uniqueness of identification and regularity of structures.Based on the pollution source codes,the environmental information resources could be effectively integrated to form an archive of pollution sources,which provides a comprehensive and detailed data support for the environmental regulation.Recommendations for the future implementing works were given according to the reality of the information system for the present environmental management businesses.%简述了中国环境保护多项业务中污染源代码现状,其污染源编码都是根据当时的环境管理工作需要,独立确定的一套编码规则,这些不同的标识方式,在污染源的编码格式上不具有稳定性与统一性,不利于污染源基础信息的共享,形成多个信息孤岛。提出了基于组织机构代码的污染源编码规则,确定了编码结构及表示形式,使新污染源编码规则具有较强的实用性、标识的唯一性以及结构的规范性。基于污染源代码,可以有效整合环境信息资源,形成污染源档案,为环境监管提供全面的、详实的数据支撑。根据当前环境管理业务信息系统的实际,提出了今后实施工作的建议。

  12. Identification of a long non-coding RNA NR_026689 associated with lung carcinogenesis induced by NNK

    OpenAIRE

    Wu, Jianjun; Li, Xun; Xu, Yiqin; Yang, Ti; Yang, Qiaoyuan; Yang, Chengfeng; Jiang, Yiguo

    2016-01-01

    Long non-coding RNAs (lncRNA) are thought to be important epigenetic regulators involved in the development of a variety of cancers. Alterations in lncRNA expression are associated with exposure to chemical carcinogens. However, it is still unclear whether lncRNA expression during lung carcinogenesis is induced by chemical carcinogens. In this study, using NNK-induced rat lung cancer model established by our previous study, we determined the lncRNA expression profiles, and an alteration in ln...

  13. Maximum Likelihood Expectation-Maximization Algorithms Applied to Localization and Identification of Radioactive Sources with Recent Coded Mask Gamma Cameras

    Energy Technology Data Exchange (ETDEWEB)

    Lemaire, H.; Barat, E.; Carrel, F.; Dautremer, T.; Dubos, S.; Limousin, O.; Montagu, T.; Normand, S.; Schoepff, V. [CEA, Gif-sur-Yvette, F-91191 (France); Amgarou, K.; Menaa, N. [CANBERRA, 1, rue des Herons, Saint Quentin en Yvelines, F-78182 (France); Angelique, J.-C. [LPC, 6, boulevard du Marechal Juin, F-14050 (France); Patoz, A. [CANBERRA, 10, route de Vauzelles, Loches, F-37600 (France)

    2015-07-01

    In this work, we tested Maximum likelihood expectation-maximization (MLEM) algorithms optimized for gamma imaging applications on two recent coded mask gamma cameras. We respectively took advantage of the characteristics of the GAMPIX and Caliste HD-based gamma cameras: noise reduction thanks to mask/anti-mask procedure but limited energy resolution for GAMPIX, high energy resolution for Caliste HD. One of our short-term perspectives is the test of MAPEM algorithms integrating specific prior values for the data to reconstruct adapted to the gamma imaging topic. (authors)

  14. Identification of Tissue-Specific Protein-Coding and Noncoding Transcripts across 14 Human Tissues Using RNA-seq.

    Science.gov (United States)

    Zhu, Jinhang; Chen, Geng; Zhu, Sibo; Li, Suqing; Wen, Zhuo; Bin Li; Zheng, Yuanting; Shi, Leming

    2016-06-22

    Many diseases and adverse drug reactions exhibit tissue specificity. To better understand the tissue-specific expression characteristics of transcripts in different human tissues, we deeply sequenced RNA samples from 14 different human tissues. After filtering many lowly expressed transcripts, 24,729 protein-coding transcripts and 1,653 noncoding transcripts were identified. By analyzing highly expressed tissue-specific protein-coding transcripts (TSCTs) and noncoding transcripts (TSNTs), we found that testis expressed the highest numbers of TSCTs and TSNTs. Brain, monocytes, ovary, and heart expressed more TSCTs than the rest tissues, whereas brain, placenta, heart, and monocytes expressed more TSNTs than other tissues. Co-expression network constructed based on the TSCTs and TSNTs showed that each hub TSNT was co-expressed with several TSCTs, allowing functional annotation of TSNTs. Important biological processes and KEGG pathways highly related to the specific functions or diseases of each tissue were enriched with the corresponding TSCTs. These TSCTs and TSNTs may participate in the tissue-specific physiological or pathological processes. Our study provided a unique data set and systematic analysis of expression characteristics and functions of both TSCTs and TSNTs based on 14 distinct human tissues, and could facilitate future investigation of the mechanisms behind tissue-specific diseases and adverse drug reactions.

  15. Identification of coding exon 3 duplication in the BMPR1A gene in a patient with juvenile polyposis syndrome.

    Science.gov (United States)

    Yamaguchi, Junya; Nagayama, Satoshi; Chino, Akiko; Sakata, Ai; Yamamoto, Noriko; Sato, Yuri; Ashihara, Yuumi; Kita, Mizuho; Nomura, Sachio; Ishikawa, Yuichi; Igarashi, Masahiro; Ueno, Masashi; Arai, Masami

    2014-10-01

    Juvenile polyposis syndrome is an autosomal dominant inherited disorder characterized by multiple juvenile polyps arising in the gastrointestinal tract and an increased risk of gastrointestinal cancers, specifically colon cancer. BMPR1A and SMAD4 germline mutations have been found in patients with juvenile polyposis syndrome. We identified a BMPR1A mutation, which involves a duplication of coding exon 3 (c.230+452_333+441dup1995), on multiple ligation dependent probe amplification in a patient with juvenile polyposis syndrome. The mutation causes a frameshift, producing a truncated protein (p.D112NfsX2). Therefore, the mutation is believed to be pathogenic. We also identified a duplication breakpoint in which Alu sequences are located. These results suggest that the duplication event resulted from recombination between Alu sequences. To our knowledge, partial duplication in the BMPR1A gene has not been reported previously. This is the first case report to document coding exon 3 duplication in the BMPR1A gene in a patient with juvenile polyposis syndrome.

  16. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    Science.gov (United States)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  17. 基于结构化识别码的朝鲜文识别策略%A strategy of Korean character recognition based on structured identification code

    Institute of Scientific and Technical Information of China (English)

    崔荣一

    2000-01-01

    从文字识别的角度讨论了朝鲜文字母和文字的组成规则,采用字母结构化识别码分析了字母的基本要素与组成规律,并通过文字生成图和文字结构图分析了文字的时空特征.同时还讨论了文字复杂性的来源以及off-line手写体朝鲜文字识别的一种策略.%This paper discusses the combination rules of Korean grapheme and character from the point of view of character recognition. The essential components and combination rules of Korean grapheme are analyzed by adopting the structured identification code (ID-code), and the time-spece characteristics are analyzed with character generation diagram(CGD) and character structure diagram (CSD). The source of character complexity and a strategy of off-line handwritten Korean character recognition are also discussed.

  18. Identification and characterization of wheat long non-protein coding RNAs responsive to powdery mildew infection and heat stress by using microarray analysis and SBS sequencing

    Directory of Open Access Journals (Sweden)

    Peng Huiru

    2011-04-01

    Full Text Available Abstract Background Biotic and abiotic stresses, such as powdery mildew infection and high temperature, are important limiting factors for yield and grain quality in wheat production. Emerging evidences suggest that long non-protein coding RNAs (npcRNAs are developmentally regulated and play roles in development and stress responses of plants. However, identification of long npcRNAs is limited to a few plant species, such as Arabidopsis, rice and maize, no systematic identification of long npcRNAs and their responses to abiotic and biotic stresses is reported in wheat. Results In this study, by using computational analysis and experimental approach we identified 125 putative wheat stress responsive long npcRNAs, which are not conserved among plant species. Among them, some were precursors of small RNAs such as microRNAs and siRNAs, two long npcRNAs were identified as signal recognition particle (SRP 7S RNA variants, and three were characterized as U3 snoRNAs. We found that wheat long npcRNAs showed tissue dependent expression patterns and were responsive to powdery mildew infection and heat stress. Conclusion Our results indicated that diverse sets of wheat long npcRNAs were responsive to powdery mildew infection and heat stress, and could function in wheat responses to both biotic and abiotic stresses, which provided a starting point to understand their functions and regulatory mechanisms in the future.

  19. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  20. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  1. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  2. Properties of non-coding DNA and identification of putative cis-regulatory elements in Theileria parva

    Directory of Open Access Journals (Sweden)

    Guo Xiang

    2008-12-01

    Full Text Available Abstract Background Parasites in the genus Theileria cause lymphoproliferative diseases in cattle, resulting in enormous socio-economic losses. The availability of the genome sequences and annotation for T. parva and T. annulata has facilitated the study of parasite biology and their relationship with host cell transformation and tropism. However, the mechanism of transcriptional regulation in this genus, which may be key to understanding fundamental aspects of its parasitology, remains poorly understood. In this study, we analyze the evolution of non-coding sequences in the Theileria genome and identify conserved sequence elements that may be involved in gene regulation of these parasitic species. Results Intergenic regions and introns in Theileria are short, and their length distributions are considerably right-skewed. Intergenic regions flanked by genes in 5'-5' orientation tend to be longer and slightly more AT-rich than those flanked by two stop codons; intergenic regions flanked by genes in 3'-5' orientation have intermediate values of length and AT composition. Intron position is negatively correlated with intron length, and positively correlated with GC content. Using stringent criteria, we identified a set of high-quality orthologous non-coding sequences between T. parva and T. annulata, and determined the distribution of selective constraints across regions, which are shown to be higher close to translation start sites. A positive correlation between constraint and length in both intergenic regions and introns suggests a tight control over length expansion of non-coding regions. Genome-wide searches for functional elements revealed several conserved motifs in intergenic regions of Theileria genomes. Two such motifs are preferentially located within the first 60 base pairs upstream of transcription start sites in T. parva, are preferentially associated with specific protein functional categories, and have significant similarity to know

  3. Critical Code: Software Producibility for Defense

    Science.gov (United States)

    2010-01-01

    JON EISENBERG, Director, CSTB LYNETTE I. MILLETT, Senior Program Officer JOAN D. WINSTON, Program Officer (until May 2008) ENITA A. WILLIAMS...Enita Williams, Jon Eisenberg, Lynette Millett, Joan Winston, and Eric Whitaker, who have ably managed the project and coordinated the team effort...the Next Economy (2001, with Costas Markides); Japan’s Software Factories (1991); and The Japanese Automobile Industry (1985). Mary Ann Davidson is

  4. Identification of developmentally regulated PCP-responsive non-coding RNA, prt6, in the rat thalamus.

    Directory of Open Access Journals (Sweden)

    Hironao Takebayashi

    Full Text Available Schizophrenia and similar psychoses induced by NMDA-type glutamate receptor antagonists, such as phencyclidine (PCP and ketamine, usually develop after adolescence. Moreover, adult-type behavioral disturbance following NMDA receptor antagonist application in rodents is observed after a critical period at around 3 postnatal weeks. These observations suggest that the schizophrenic symptoms caused by and psychotomimetic effects of NMDA antagonists require the maturation of certain brain neuron circuits and molecular networks, which differentially respond to NMDA receptor antagonists across adolescence and the critical period. From this viewpoint, we have identified a novel developmentally regulated phencyclidine-responsive transcript from the rat thalamus, designated as prt6, as a candidate molecule involved in the above schizophrenia-related systems using a DNA microarray technique. The transcript is a non-coding RNA that includes sequences of at least two microRNAs, miR132 and miR212, and is expressed strongly in the brain and testis, with trace or non-detectable levels in the spleen, heart, liver, kidney, lung and skeletal muscle, as revealed by Northern blot analysis. The systemic administration of PCP (7.5 mg/kg, subcutaneously (s.c. significantly elevated the expression of prt6 mRNA in the thalamus at postnatal days (PD 32 and 50, but not at PD 8, 13, 20, or 24 as compared to saline-treated controls. At PD 50, another NMDA receptor antagonist, dizocilpine (0.5 mg/kg, s.c., and a schizophrenomimetic dopamine agonist, methamphetamine (4.8 mg/kg, s.c., mimicked a significant increase in the levels of thalamic prt6 mRNAs, while a D2 dopmamine receptor antagonist, haloperidol, partly inhibited the increasing influence of PCP on thalamic prt6 expression without its own effects. These data indicate that prt6 may be involved in the pathophysiology of the onset of drug-induced schizophrenia-like symptoms and schizophrenia through the possible

  5. Identification of Developmentally Regulated PCP-Responsive Non-Coding RNA, prt6, in the Rat Thalamus

    Science.gov (United States)

    Umino, Asami; Nishikawa, Toru

    2014-01-01

    Schizophrenia and similar psychoses induced by NMDA-type glutamate receptor antagonists, such as phencyclidine (PCP) and ketamine, usually develop after adolescence. Moreover, adult-type behavioral disturbance following NMDA receptor antagonist application in rodents is observed after a critical period at around 3 postnatal weeks. These observations suggest that the schizophrenic symptoms caused by and psychotomimetic effects of NMDA antagonists require the maturation of certain brain neuron circuits and molecular networks, which differentially respond to NMDA receptor antagonists across adolescence and the critical period. From this viewpoint, we have identified a novel developmentally regulated phencyclidine-responsive transcript from the rat thalamus, designated as prt6, as a candidate molecule involved in the above schizophrenia-related systems using a DNA microarray technique. The transcript is a non-coding RNA that includes sequences of at least two microRNAs, miR132 and miR212, and is expressed strongly in the brain and testis, with trace or non-detectable levels in the spleen, heart, liver, kidney, lung and skeletal muscle, as revealed by Northern blot analysis. The systemic administration of PCP (7.5 mg/kg, subcutaneously (s.c.)) significantly elevated the expression of prt6 mRNA in the thalamus at postnatal days (PD) 32 and 50, but not at PD 8, 13, 20, or 24 as compared to saline-treated controls. At PD 50, another NMDA receptor antagonist, dizocilpine (0.5 mg/kg, s.c.), and a schizophrenomimetic dopamine agonist, methamphetamine (4.8 mg/kg, s.c.), mimicked a significant increase in the levels of thalamic prt6 mRNAs, while a D2 dopmamine receptor antagonist, haloperidol, partly inhibited the increasing influence of PCP on thalamic prt6 expression without its own effects. These data indicate that prt6 may be involved in the pathophysiology of the onset of drug-induced schizophrenia-like symptoms and schizophrenia through the possible dysregulation of

  6. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    Science.gov (United States)

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  7. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    Science.gov (United States)

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  8. Identification of a cell lineage-specific gene coding for a sea urchin alpha 2(IV)-like collagen chain.

    Science.gov (United States)

    Exposito, J Y; Suzuki, H; Geourjon, C; Garrone, R; Solursh, M; Ramirez, F

    1994-05-06

    We report the isolation of several overlapping cDNAs from an embryonic library of Strongylocentrotus purpuratus coding for a novel sea urchin collagen chain. The conceptual amino acid translation of the cDNAs indicated that the protein displays the structural features of a vertebrate type IV-like collagen alpha chain. In addition to a putative 31-residue signal peptide, the sea urchin molecule contains a 14-residue amino-terminal non-collagenous segment, a discontinuous 1,477-amino acid triple helical domain, and a 225-residue carboxyl-terminal domain rich in cysteines. The amino- and carboxyl-terminal non-collagenous regions of the echinoid molecule are remarkably similar to the 7 S and carboxyl-terminal non-collagenous (NC1) domains of the alpha 1 and alpha 2 chains of vertebrate type IV collagen. The sequence similarity and distinct structural features of the 7 S and NC1 domains strongly suggest that the sea urchin polypeptide is evolutionarily related to the alpha 2(IV) class of collagen chains. Finally, in situ hybridizations revealed that expression of this collagen gene is restricted to the mesenchyme cell lineage of the developing sea urchin embryo.

  9. Non-coding RNA identification based on topology secondary structure and reading frame in organelle genome level.

    Science.gov (United States)

    Wu, Cheng-Yan; Li, Qian-Zhong; Feng, Zhen-Xing

    2016-01-01

    Non-coding RNA (ncRNA) genes make transcripts as same as the encoding genes, and ncRNAs directly function as RNAs rather than serve as blueprints for proteins. As the function of ncRNA is closely related to organelle genomes, it is desirable to explore ncRNA function by confirming its provenance. In this paper, the topology secondary structure, motif and the triplets under three reading frames are considered as parameters of ncRNAs. A method of SVM combining the increment of diversity (ID) algorithm is applied to construct the classifier. When the method is applied to the ncRNA dataset less than 80% sequence identity, the overall accuracies reach 95.57%, 96.40% in the five-fold cross-validation and the jackknife test, respectively. Further, for the independent testing dataset, the average prediction success rate of our method achieved 93.24%. The higher predictive success rates indicate that our method is very helpful for distinguishing ncRNAs from various organelle genomes.

  10. Identification and expression of small non-coding RNA, L10-Leader, in different growth phases of Streptococcus mutans.

    Science.gov (United States)

    Xia, Li; Xia, Wei; Li, Shaohua; Li, Wuju; Liu, Jiaojiao; Ding, Hongmei; Li, Jie; Li, Hui; Chen, Ying; Su, Xueting; Wang, Wei; Sun, Li; Wang, Chenglong; Shao, Ningsheng; Chu, Bingfeng

    2012-06-01

    Streptococcus mutans is one of the major cariogenic bacteria in the oral environment. Small non-coding RNAs (sRNAs) play important roles in the regulation of bacterial growth, stress tolerance, and virulence. In this study, we experimentally verified the existence of sRNA, L10-Leader, in S. mutans for the first time. Our results show that the expression level of L10-Leader was growth-phase dependent in S. mutans and varied among different clinical strains of S. mutans. The level of L10-Leader in S. mutans UA159 was closely related to the pH value, but not to the concentrations of glucose and sucrose in culture medium. We predicted target mRNAs of L10-Leader bioinformatically and found that some of these mRNAs were related to growth and stress response. Five predicted mRNA targets were selected and detected by quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR), and we found that the expression levels of these mRNAs were closely related to the level of L10-Leader at different growth phases of the bacteria. Our results indicate that L10-Leader may play an important role in the regulation of responses in S. mutans, especially during its growth phase and acid adaption response.

  11. Identification of long non-coding RNA involved in osteogenic differentiation from mesenchymal stem cells using RNA-Seq data.

    Science.gov (United States)

    Song, W Q; Gu, W Q; Qian, Y B; Ma, X; Mao, Y J; Liu, W J

    2015-01-01

    The aim of this study was to identify long non-coding RNA (lncRNA) associated with osteogenic differentiation from mesenchymal stem cells (MSCs) using high-throughput RNA sequencing (RNA-Seq) data. RNA-Seq dataset was obtained from the European Bioinformatics Institute (accession No. PRJEB4496), including two replicates each for immortalized mesenchymal stem cells iMSC#3 cultured in growth medium (GM) and differentiation medium (DM) for 28 days. The clean reads were aligned to a hg19 reference genome by Tophat and assembled by Cufflinks to identify the known and novel transcripts. RPKM values were calculated to screen for differentially expressed RNA. Novel lncRNA were screened based on various filter criteria. Subsequently, the underlying function of novel lncRNAs were predicted by functional annotation by ERPIN, a co-expression network was constructed by WGCNA and the KEGG pathway enriched by KOBAS. A total of 3171 RNA differentially expressed between the DM and GM groups (2597 mRNA and 574 lncRNA) were identified. Among the 574 differentially expressed lncRNA, 357 were known and 217 were novel lncRNA. Furthermore, 32 novel lncRNA were found to be miRNA precursors (including miR-689, miR-640, miR-601, and miR-544). A total of 14,275 co-expression relationships and 217 co-expression networks were obtained between novel lncRNA and mRNA. The differentially expressed lncRNA and mRNA were enriched into 6 significant pathways, including those for cancer, ECM-receptor interaction, and focal adhesion. Therefore, novel lncRNAwere identified and their underlying function predicted, which may provide the basis for future analyses of the role of lncRNA in osteoblastic differentiation.

  12. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  13. Identification of novel non-coding RNAs using profiles of short sequence reads from next generation sequencing data

    Directory of Open Access Journals (Sweden)

    Makunin Igor V

    2010-02-01

    Full Text Available Abstract Background The increasing interest in small non-coding RNAs (ncRNAs such as microRNAs (miRNAs, small interfering RNAs (siRNAs and Piwi-interacting RNAs (piRNAs and recent advances in sequencing technology have yielded large numbers of short (18-32 nt RNA sequences from different organisms, some of which are derived from small nucleolar RNAs (snoRNAs and transfer RNAs (tRNAs. We observed that these short ncRNAs frequently cover the entire length of annotated snoRNAs or tRNAs, which suggests that other loci specifying similar ncRNAs can be identified by clusters of short RNA sequences. Results We combined publicly available datasets of tens of millions of short RNA sequence tags from Drosophila melanogaster, and mapped them to the Drosophila genome. Approximately 6 million perfectly mapping sequence tags were then assembled into 521,302 tag-contigs (TCs based on tag overlap. Most transposon-derived sequences, exons and annotated miRNAs, tRNAs and snoRNAs are detected by TCs, which show distinct patterns of length and tag-depth for different categories. The typical length and tag-depth of snoRNA-derived TCs was used to predict 7 previously unrecognized box H/ACA and 26 box C/D snoRNA candidates. We also identified one snRNA candidate and 86 loci with a high number of tags that are yet to be annotated, 7 of which have a particular 18mer motif and are located in introns of genes involved in development. A subset of new snoRNA candidates and putative ncRNA candidates was verified by Northern blot. Conclusions In this study, we have introduced a new approach to identify new members of known classes of ncRNAs based on the features of TCs corresponding to known ncRNAs. A large number of the identified TCs are yet to be examined experimentally suggesting that many more novel ncRNAs remain to be discovered.

  14. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  15. Site investigation SFR. Rock type coding, overview geological mapping and identification of rock units and possible deformation zones in drill cores from the construction of SFR

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, Jesper (Vattenfall Power Consultant AB, Stockholm (Sweden)); Curtis, Philip; Bockgaard, Niclas (Golder Associates AB (Sweden)); Mattsson, Haakan (GeoVista AB, Luleaa (Sweden))

    2011-01-15

    This report presents the rock type coding, overview lithological mapping and identification of rock units and possible deformation zones in drill cores from 32 boreholes associated with the construction of SFR. This work can be seen as complementary to single-hole interpretations of other older SFR boreholes earlier reported in /Petersson and Andersson 2010/: KFR04, KFR08, KFR09, KFR13, KFR35, KFR36, KFR54, KFR55, KFR7A, KFR7B and KFR7C. Due to deficiencies in the available material, the necessary activities have deviated somewhat from the established methodologies used during the recent Forsmark site investigations for the final repository for spent nuclear fuel. The aim of the current work has been, wherever possible, to allow the incorporation of all relevant material from older boreholes in the ongoing SFR geological modelling work in spite of the deficiencies. The activities include: - Rock type coding of the original geological mapping according to the nomenclature used during the preceding Forsmark site investigation. As part of the Forsmark site investigation such rock type coding has already been performed on most of the old SFR boreholes if the original geological mapping results were available. This earlier work has been complemented by rock type coding on two further boreholes: KFR01 and KFR02. - Lithological overview mapping, including documentation of (1) rock types, (2) ductile and brittle-ductile deformation and (3) alteration for drill cores from eleven of the boreholes for which no original geological borehole mapping was available (KFR31, KFR32, KFR34, KFR37,KFR38, KFR51, KFR69, KFR70, KFR71, KFR72 and KFR89). - Identification of possible deformation zones and merging of similar rock types into rock units. This follows SKB's established criteria and methodology of the geological Single-hole interpretation (SHI) process wherever possible. Deviations from the standard SHI process are associated with the lack of data, for example BIPS images

  16. THE PROTECTION OF CONTRADICTORY IN THE BRAZILIAN NEW CIVIL PROCEDURE CODE: THE PROHIBITION OF “SUPRISE DECISIONS”; CONDITION TO THE EXTENSION OF THE OBJECTIVE LIMITS OF “RES JUDICATA”; IDENTIFICATION OF UNMOTIVATED DECISIONS.

    Directory of Open Access Journals (Sweden)

    Paulo Henrique dos Santos Lucon

    2016-06-01

    Full Text Available This article aims to analyze different kinds of judicial protection to the contradictory principle in the new Civil Procedure Code. As a procedural fundamental right, contradictory demands real application by judges and legislators. The new Civil Procedure Code ruled the theme properly, which can be identified by the prohibition of “suprise decisions”; the prevision of contradictory as a condition to the extension of the objective limits of “res judicata” to the so called “prejudicial questions” and the identification of unmotivated decisions

  17. Identification and Expression Analysis of Candidate Genes Associated with Defense Responses to Phytophthora capsici in Pepper Line “PI 201234”

    Directory of Open Access Journals (Sweden)

    Pingyong Wang

    2015-05-01

    Full Text Available Phytophthora capsici (Leonian, classified as an oomycete, seriously threatens the production of pepper (Capsicum annuum. Current understanding of the defense responses in pepper to P. capsici is limited. In this study, RNA-sequencing analysis was utilized to identify differentially expressed genes in the resistant line “PI 201234”, with 1220 differentially expressed genes detected. Of those genes, 480 were up-regulated and 740 were down-regulated, with 211 candidate genes found to be involved in defense responses based on the gene annotations. Furthermore, the expression patterns of 12 candidate genes were further validated via quantitative real-time PCR (qPCR. These genes were found to be significantly up-regulated at different time points post-inoculation (6 hpi, 24 hpi, and 5 dpi in the resistant line “PI 201234” and susceptible line “Qiemen”. Seven genes were found to be involved in cell wall modification, phytoalexin biosynthesis, symptom development, and phytohormone signaling pathways, thus possibly playing important roles in combating exogenous pathogens. The genes identified herein will provide a basis for further gene cloning and functional verification studies and will aid in an understanding of the regulatory mechanism of pepper resistance to P. capsici.

  18. Identification of an ortholog of the eukaryotic RNA polymerase III subunit RPC34 in Crenarchaeota and Thaumarchaeota suggests specialization of RNA polymerases for coding and non-coding RNAs in Archaea.

    NARCIS (Netherlands)

    Blombach, F.; Makarova, K.S.; Marrero, J.; Siebers, B.G.; Koonin, E.V.; Oost, J. van der

    2009-01-01

    One of the hallmarks of eukaryotic information processing is the co-existence of 3 distinct, multi-subunit RNA polymerase complexes that are dedicated to the transcription of specific classes of coding or non-coding RNAs. Archaea encode only one RNA polymerase that resembles the eukaryotic RNA polym

  19. Identification of an ortholog of the eukaryotic RNA polymerase III subunit RPC34 in Crenarchaeota and Thaumarchaeota suggests specialization of RNA polymerases for coding and non-coding RNAs in Archaea

    NARCIS (Netherlands)

    Blombach, F.; Makarova, K.S.; Marrero, J.; Siebers, B.; Koonin, E.V.; Oost, van der J.

    2009-01-01

    One of the hallmarks of eukaryotic information processing is the co-existence of 3 distinct, multi-subunit RNA polymerase complexes that are dedicated to the transcription of specific classes of coding or non-coding RNAs. Archaea encode only one RNA polymerase that resembles the eukaryotic RNA polym

  20. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    Science.gov (United States)

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  1. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy

    Science.gov (United States)

    2015-12-01

    Abbreviations AIT Automatic Identification Technology CONOPS Concept of Operations DLA Defense Logistics Agency DOD Department of...RFID Capability (Navy) Establish an automated information system with automatic identification and data-capture capabilities to improve logistics ...Defense Authorization Act for Fiscal Year 2014, Pub. L. No. 113-66, § 326 (Dec. 26, 2013). 6DOD uses Automatic Identification Technology (AIT

  2. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  3. Construction of a full-length cDNA library of Solen grandis dunker and identification of defense- and immune-related genes

    Science.gov (United States)

    Sun, Guohua; Liu, Xiangquan; Ren, Lihua; Yang, Jianmin; Wei, Xiumei; Yang, Jialong

    2013-11-01

    The basic genetic characteristics, important functional genes, and entire transcriptome of Solen grandis Dunker were investigated by constructing a full-length cDNA library with the `switching mechanism at the 5'-end of the RNA transcript' (SMART) technique. Total RNA was isolated from the immune-relevant tissues, gills and hemocytes, using the Trizol reagent, and cDNA fragments were digested with Sfi I before being ligated to the pBluescript II SK* vector. The cDNA library had a titer of 1048 cfu μL-1 and a storage capacity of 1.05×106 cfu. Approximately 98% of the clones in the library were recombinants, and the fragment lengths of insert cDNA ranged from 0.8 kb to 3.0 kb. A total of 2038 expressed sequence tags were successfully sequenced and clustered into 965 unigenes. BLASTN analysis showed that 240 sequences were highly similar to the known genes (E-value 80%), accounting for 25% of the total unigenes. According to the Gene Ontology, these unigenes were related to several biological processes, including cell structure, signal transport, protein synthesis, transcription, energy metabolism, and immunity. Fifteen of the identified sequences were related to defense and immunity. The full-length cDNA sequence of HSC70 was obtained. The cDNA library of S. grandis provided a useful resource for future researches of functional genomics related to stress tolerance, immunity, and other physiological activities.

  4. The evaluation of an identification algorithm for Mycobacterium species using the 16S rRNA coding gene and rpoB

    Directory of Open Access Journals (Sweden)

    Yuko Kazumi

    2012-01-01

    Conclusions: The 16S rRNA gene identification is a rapid and prevalent method but still has some limitations. Therefore, the stepwise combination of rpoB with 16S rRNA gene analysis is an effective system for the identification of Mycobacterium species.

  5. Extracellular Alkalinization as a Defense Response in Potato Cells

    OpenAIRE

    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-de...

  6. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  7. Department of Defense Dictionary of Military and Associated Terms

    Science.gov (United States)

    2016-02-15

    distribution and deployment. f. level VI - personnel: detail expressed by name, Service , military occupational specialty and unique identification...of one or more weapons with all related equipment, materials, services , personnel, and means of delivery and deployment (if applicable) required for...2016 A-46 JP 1-02 DCRF defense chemical, biological, radiological, and nuclear response force DCS Defense Courier Service ; deputy chief

  8. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  9. Identification and Functional Characterization of G6PC2 Coding Variants Influencing Glycemic Traits Define an Effector Transcript at the G6PC2-ABCB11 Locus

    Science.gov (United States)

    Mahajan, Anubha; Sim, Xueling; Ng, Hui Jin; Manning, Alisa; Rivas, Manuel A.; Highland, Heather M.; Locke, Adam E.; Grarup, Niels; Im, Hae Kyung; Cingolani, Pablo; Flannick, Jason; Fontanillas, Pierre; Fuchsberger, Christian; Gaulton, Kyle J.; Teslovich, Tanya M.; Rayner, N. William; Robertson, Neil R.; Beer, Nicola L.; Rundle, Jana K.; Bork-Jensen, Jette; Ladenvall, Claes; Blancher, Christine; Buck, David; Buck, Gemma; Burtt, Noël P.; Gabriel, Stacey; Gjesing, Anette P.; Groves, Christopher J.; Hollensted, Mette; Huyghe, Jeroen R.; Jackson, Anne U.; Jun, Goo; Justesen, Johanne Marie; Mangino, Massimo; Murphy, Jacquelyn; Neville, Matt; Onofrio, Robert; Small, Kerrin S.; Stringham, Heather M.; Syvänen, Ann-Christine; Trakalo, Joseph; Abecasis, Goncalo; Bell, Graeme I.; Blangero, John; Cox, Nancy J.; Duggirala, Ravindranath; Hanis, Craig L.; Seielstad, Mark; Wilson, James G.; Christensen, Cramer; Brandslund, Ivan; Rauramaa, Rainer; Surdulescu, Gabriela L.; Doney, Alex S. F.; Lannfelt, Lars; Linneberg, Allan; Isomaa, Bo; Tuomi, Tiinamaija; Jørgensen, Marit E.; Jørgensen, Torben; Kuusisto, Johanna; Uusitupa, Matti; Salomaa, Veikko; Spector, Timothy D.; Morris, Andrew D.; Palmer, Colin N. A.; Collins, Francis S.; Mohlke, Karen L.; Bergman, Richard N.; Ingelsson, Erik; Lind, Lars; Tuomilehto, Jaakko; Hansen, Torben; Watanabe, Richard M.; Prokopenko, Inga; Dupuis, Josee; Karpe, Fredrik; Groop, Leif; Laakso, Markku; Pedersen, Oluf; Florez, Jose C.; Morris, Andrew P.; Altshuler, David; Meigs, James B.; Boehnke, Michael; McCarthy, Mark I.; Lindgren, Cecilia M.; Gloyn, Anna L.

    2015-01-01

    Genome wide association studies (GWAS) for fasting glucose (FG) and insulin (FI) have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7) evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF)=1.5%) influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1%) influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding) GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser) influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D), the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights. PMID:25625282

  10. Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus.

    Directory of Open Access Journals (Sweden)

    Anubha Mahajan

    2015-01-01

    Full Text Available Genome wide association studies (GWAS for fasting glucose (FG and insulin (FI have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7 evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF=1.5% influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1% influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D, the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights.

  11. Codes and Standards Technical Team Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    The Hydrogen Codes and Standards Tech Team (CSTT) mission is to enable and facilitate the appropriate research, development, & demonstration (RD&D) for the development of safe, performance-based defensible technical codes and standards that support the technology readiness and are appropriate for widespread consumer use of fuel cells and hydrogen-based technologies with commercialization by 2020. Therefore, it is important that the necessary codes and standards be in place no later than 2015.

  12. Serotype identification and VP1 coding sequence analysis of foot-and-mouth disease virus from outbreaks in Eastern and Northern Uganda in 2008/9

    DEFF Research Database (Denmark)

    Kasambula, L.; Belsham, Graham; Siegismund, H. R.

    2012-01-01

    was to identify the serotype and compare the variable protein (VP)1 coding sequences of the viruses responsible for FMD outbreaks during 2008 and 2009, to trace the transmission pathways of the disease in Uganda. Probang and epithelial swab samples were collected from cattle with clinical signs of FMD in the two...... regions, and the presence of FMDV RNA in these samples was determined using a standard diagnostic RT-PCR assay. From the total of 27 positive samples, the VP1 coding region was amplified and sequenced. Each of these sequences showed >99% identity to each other, and just five distinct sequences were...... identified. BLAST searches and phylogenetic analysis of the complete variable protein (VP)1 coding sequences revealed that they belonged to serotype O, topotype EA-2. The close similarity between the virus sequences suggested introduction from a single source. We therefore conclude that FMD in the northern...

  13. 电力仓库管理系统的指纹识别与条形码技术实现%Fingerprint Identification and Bar Code Technology Implementation of Power Warehouse Management System

    Institute of Scientific and Technical Information of China (English)

    欧振国

    2016-01-01

    介绍了利用条形码、指纹识别、数据库以及网络技术的电力仓库管理系统的设计与开发,分析了指纹识别和条形码技术要点,通过C++ Builder可视化编程实现系统功能模块与联网优化,测试结果表明,该系统界面友好、维护简单、操作便捷,提高了仓库管理效率。%Introduction was made to the system design and development of the power warehouse management using bar codes, fingerprint identification, database and network technology. Analysis was made to the main points of fingerprint identification and bar code technology. This paper used c++ Builder visual programming to realize the function module and network optimization. The test results show that the system has a friendly interface with simple maintenance and convenient operation, which improves the efficiency of warehouse management.

  14. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  15. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  16. Validation of ICD-9-CM/ICD-10 coding algorithms for the identification of patients with acetaminophen overdose and hepatotoxicity using administrative data

    Directory of Open Access Journals (Sweden)

    Shaheen Abdel

    2007-10-01

    Full Text Available Abstract Background Acetaminophen overdose is the most common cause of acute liver failure (ALF. Our objective was to develop coding algorithms using administrative data for identifying patients with acetaminophen overdose and hepatic complications. Methods Patients hospitalized for acetaminophen overdose were identified using population-based administrative data (1995–2004. Coding algorithms for acetaminophen overdose, hepatotoxicity (alanine aminotransferase >1,000 U/L and ALF (encephalopathy and international normalized ratio >1.5 were derived using chart abstraction data as the reference and logistic regression analyses. Results Of 1,776 potential acetaminophen overdose cases, the charts of 181 patients were reviewed; 139 (77% had confirmed acetaminophen overdose. An algorithm including codes 965.4 (ICD-9-CM and T39.1 (ICD-10 was highly accurate (sensitivity 90% [95% confidence interval 84–94%], specificity 83% [69–93%], positive predictive value 95% [89–98%], negative predictive value 71% [57–83%], c-statistic 0.87 [0.80–0.93]. Algorithms for hepatotoxicity (including codes for hepatic necrosis, toxic hepatitis and encephalopathy and ALF (hepatic necrosis and encephalopathy were also highly predictive (c-statistics = 0.88. The accuracy of the algorithms was not affected by age, gender, or ICD coding system, but the acetaminophen overdose algorithm varied between hospitals (c-statistics 0.84–0.98; P = 0.003. Conclusion Administrative databases can be used to identify patients with acetaminophen overdose and hepatic complications. If externally validated, these algorithms will facilitate investigations of the epidemiology and outcomes of acetaminophen overdose.

  17. Review of current severe accident management approaches in Europe and identification of related modelling requirements for the computer code ASTEC V2.1

    Energy Technology Data Exchange (ETDEWEB)

    Hermsmeyer, S. [European Commission JRC, Petten (Netherlands). Inst. for Energy and Transport; Herranz, L.E.; Iglesias, R. [CIEMAT, Madrid (Spain); and others

    2015-07-15

    The severe accident at the Fukushima-Daiichi nuclear power plant (NPP) has led to a worldwide review of nuclear safety approaches and is bringing a refocussing of R and D in the field. To support these efforts several new Euratom FP7 projects have been launched. The CESAM project focuses on the improvement of the ASTEC computer code. ASTEC is jointly developed by IRSN and GRS and is considered as the European reference code for Severe Accident Analyses since it capitalizes knowledge from the extensive Euro-pean R and D in the field. The project aims at the code's enhancement and extension for use in Severe Accident Management (SAM) analysis of the NPPs of Generation II-III presently under operation or foreseen in the near future in Europe, spent fuel pools included. The work reported here is concerned with the importance, for the further development of the code, of SAM strategies to be simulated. To this end, SAM strategies applied in the EU have been compiled. This compilation is mainly based on the public information made available in the frame of the EU ''stress tests'' for NPPs and has been complemented by information pro-vided by the different CESAM partners. The context of SAM is explained and the strategies are presented. The modelling capabilities for the simulation of these strategies in the current production version 2.0 of ASTEC are discussed. Furthermore, the requirements for the next version of ASTEC V2.1 that is supported in the CESAM project are highlighted. They are a necessary complement to the list of code improvements that is drawn from consolidating new fields of application, like SFP and BWR model enhancements, and from new experimental results on severe accident phenomena.

  18. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  19. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  20. 32 CFR 634.25 - Installation traffic codes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes. 634.25 Section 634.25... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation or activity commanders will establish a traffic code for operation of motor...

  1. Identification of kakusei, a nuclear non-coding RNA, as an immediate early gene from the honeybee, and its application for neuroethological study

    OpenAIRE

    Taketoshi Kiya; Atsushi Ugajin; Takekazu Kunieda; Takeo Kubo

    2012-01-01

    The honeybee is a social insect that exhibits various social behaviors. To elucidate the neural basis of honeybee behavior, we detected neural activity in freely-moving honeybee workers using an immediate early gene (IEG) that is expressed in a neural activity-dependent manner. In European honeybees (Apis mellifera), we identified a novel nuclear non-coding RNA, termed kakusei, as the first insect IEG, and revealed the neural activity pattern in foragers. In addition, we isolated a homologue ...

  2. Identification of novel non-coding RNA-based negative feedback regulating the expression of the oncogenic transcription factor GLI1.

    Science.gov (United States)

    Villegas, Victoria E; Rahman, Mohammed Ferdous-Ur; Fernandez-Barrena, Maite G; Diao, Yumei; Liapi, Eleni; Sonkoly, Enikö; Ståhle, Mona; Pivarcsi, Andor; Annaratone, Laura; Sapino, Anna; Ramírez Clavijo, Sandra; Bürglin, Thomas R; Shimokawa, Takashi; Ramachandran, Saraswathi; Kapranov, Philipp; Fernandez-Zapico, Martin E; Zaphiropoulos, Peter G

    2014-07-01

    Non-coding RNAs are a complex class of nucleic acids, with growing evidence supporting regulatory roles in gene expression. Here we identify a non-coding RNA located head-to-head with the gene encoding the Glioma-associated oncogene 1 (GLI1), a transcriptional effector of multiple cancer-associated signaling pathways. The expression of this three-exon GLI1 antisense (GLI1AS) RNA in cancer cells was concordant with GLI1 levels. siRNAs knockdown of GLI1AS up-regulated GLI1 and increased cellular proliferation and tumor growth in a xenograft model system. Conversely, GLI1AS overexpression decreased the levels of GLI1, its target genes PTCH1 and PTCH2, and cellular proliferation. Additionally, we demonstrate that GLI1 knockdown reduced GLI1AS, while GLI1 overexpression increased GLI1AS, supporting the role of GLI1AS as a target gene of the GLI1 transcription factor. Activation of TGFβ and Hedgehog signaling, two known regulators of GLI1 expression, conferred a concordant up-regulation of GLI1 and GLI1AS in cancer cells. Finally, analysis of the mechanism underlying the interplay between GLI1 and GLI1AS indicates that the non-coding RNA elicits a local alteration of chromatin structure by increasing the silencing mark H3K27me3 and decreasing the recruitment of RNA polymerase II to this locus. Taken together, the data demonstrate the existence of a novel non-coding RNA-based negative feedback loop controlling GLI1 levels, thus expanding the repertoire of mechanisms regulating the expression of this oncogenic transcription factor.

  3. Identification of four novel small non-coding RNAs from Xanthomonas campestris pathovar campestris

    OpenAIRE

    Lu Guang-Tao; Jiang Bo-Le; Feng Jia-Xun; He Yong-Qiang; Chen Xiao-Lin; Tang Dong-Jie; Jiang Rui-Ping; Lin Min; Tang Ji-Liang

    2010-01-01

    Abstract Background In bacteria, small non-coding RNAs (sRNAs) have been recognized as important regulators of various cellular processes. Approximately 200 bacterial sRNAs in total have been reported. However, very few sRNAs have been identified from phytopathogenic bacteria. Results Xanthomons campestris pathovar campestris (Xcc) is the causal agent of black rot disease of cruciferous crops. In this study, a cDNA library was constructed from the low-molecular weight RNA isolated from the Xc...

  4. Exceeding of Official Powers (Art. 286 of the Criminal Code of Russian Federation: Identification and Analysis of Signs of Object and Victim

    Directory of Open Access Journals (Sweden)

    Sergey D. Brazhnik

    2014-03-01

    Full Text Available In the present article authors defines attributes of object and victim in the framework of offense "abuse of power" (Article 286 of the Criminal Code of the Russian Federation and conduct comparative analysis. At the first place questions of what should be considered as object of crime in the Russian legal doctrine. Author believe that "vertical" objects are divided into general, intragenic, clan, group, specific and direct, "horizontal" - at primary, secondary and optional. Author carried out a comprehensive analysis of each object under consideration provisions of the Criminal Code of the Russian Federation. Authors give particular attention to the study of victims of this crime. According to authors, lack of the unified approach to this issue is largely generated by the procedural legislation. Author concludes that victims of the power abuse in the criminal law sense may be citizens (any individual, organizations (legal entities, irrespective of their legal form, society and the state. Based on the comprehensive analysis of legal acts, court practice and a wide range of scientific sources authors justify the appropriateness of amending Criminal Code of the Russian Federation.

  5. Identification and analysis of unitary loss of long-established protein-coding genes in Poaceae shows evidences for biased gene loss and putatively functional transcription of relics.

    Science.gov (United States)

    Zhao, Yi; Tang, Liang; Li, Zhe; Jin, Jinpu; Luo, Jingchu; Gao, Ge

    2015-04-18

    Long-established protein-coding genes may lose their coding potential during evolution ("unitary gene loss"). Members of the Poaceae family are a major food source and represent an ideal model clade for plant evolution research. However, the global pattern of unitary gene loss in Poaceae genomes as well as the evolutionary fate of lost genes are still less-investigated and remain largely elusive. Using a locally developed pipeline, we identified 129 unitary gene loss events for long-established protein-coding genes from four representative species of Poaceae, i.e. brachypodium, rice, sorghum and maize. Functional annotation suggested that the lost genes in all or most of Poaceae species are enriched for genes involved in development and response to endogenous stimulus. We also found that 44 mutated genomic loci of lost genes, which we referred as relics, were still actively transcribed, and of which 84% (37 of 44) showed significantly differential expression across different tissues. More interestingly, we found that there were totally five expressed relics may function as competitive endogenous RNA in brachypodium, rice and sorghum genome. Based on comparative genomics and transcriptome data, we firstly compiled a comprehensive catalogue of unitary gene loss events in Poaceae species and characterized a statistically significant functional preference for these lost genes as well showed the potential of relics functioning as competitive endogenous RNAs in Poaceae genomes.

  6. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome.

    Science.gov (United States)

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-12-11

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives.

  7. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  8. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  9. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  11. Study on the Establishment of the South China Sea Air Defense Identification Zone from the Perspective of International Law---Talking from the Lost Affair of Malaysia Airliner MH370%从国际法角度探讨我国南海防空识别区的设立--从马航MH370失联客机谈起

    Institute of Scientific and Technical Information of China (English)

    冯丽; 艾朝霞

    2014-01-01

    According to the provisions of convention on international civil aviation (1944) and United Nations Convention on the Law of the Sea, the country has absolute sovereignty over its territorial airspace. Any foreign aircraft airspace is forbidden to enter the territorial airspace of a country unless allowed. Accordingly, after a long period of international practice, the United States and other countries have set up their own air defense identification area. Setting up air defense identification area beside the territorial airspace become an international habits. According to the above international treaty and international habits, setting up the south China sea air defense identification area is legal and reasonable. It is help to protect the security of the China ’s airspace and solve our country’s territorial disputes with its neighbors.%根据1944年《国际民航公约》和1982年《联合国海洋法公约》的规定,一国对其领空享有绝对的主权,非经一国同意,别国的航空器不得擅入本国领空。据此,经过长期的国际实践,美国等国家纷纷建立自己的防空识别区,使得在一国领空之外设立防空识别区成为国际习惯。根据以上国际条约和国际习惯,我国设立南海防空识别区合法合理,既有助于保卫我国领空的安全,又有助于解决我国与邻国的领土争端。

  12. Identification of Potential Key Long Non-Coding RNAs and Target Genes Associated with Pneumonia Using Long Non-Coding RNA Sequencing (lncRNA-Seq): A Preliminary Study

    Science.gov (United States)

    Huang, Sai; Feng, Cong; Chen, Li; Huang, Zhi; Zhou, Xuan; Li, Bei; Wang, Li-li; Chen, Wei; Lv, Fa-qin; Li, Tan-shi

    2016-01-01

    Background This study aimed to identify the potential key long non-coding RNAs (lncRNAs) and target genes associated with pneumonia using lncRNA sequencing (lncRNA-seq). Material/Methods A total of 9 peripheral blood samples from patients with mild pneumonia (n=3) and severe pneumonia (n=3), as well as volunteers without pneumonia (n=3), were received for lncRNA-seq. Based on the sequencing data, differentially expressed lncRNAs (DE-lncRNAs) were identified by the limma package. After the functional enrichment analysis, target genes of DE-lncRNAs were predicted, and the regulatory network was constructed. Results In total, 99 DE-lncRNAs (14 upregulated and 85 downregulated ones) were identified in the mild pneumonia group and 85 (72 upregulated and 13 downregulated ones) in the severe pneumonia group, compared with the control group. Among these DE-lncRNAs, 9 lncRNAs were upregulated in both the mild and severe pneumonia groups. A set of 868 genes were predicted to be targeted by these 9 DE-lncRNAs. In the network, RP11-248E9.5 and RP11-456D7.1 targeted the majority of genes. RP11-248E9.5 regulated several genes together with CTD-2300H10.2, such as QRFP and EPS8. Both upregulated RP11-456D7.1 and RP11-96C23.9 regulated several genes, such as PDK2. RP11-456D7.1 also positively regulated CCL21. Conclusions These novel lncRNAs and their target genes may be closely associated with the progression of pneumonia. PMID:27663962

  13. Identification of intermediate-size non-coding RNAs involved in the UV-induced DNA damage response in C. elegans.

    Directory of Open Access Journals (Sweden)

    Aqian Li

    Full Text Available BACKGROUND: A network of DNA damage response (DDR mechanisms functions coordinately to maintain genome integrity and prevent disease. The Nucleotide Excision Repair (NER pathway is known to function in the response to UV-induced DNA damage. Although numbers of coding genes and miRNAs have been identified and reported to participate in UV-induced DNA damage response (UV-DDR, the precise role of non-coding RNAs (ncRNAs in UV-DDR remains largely unknown. METHODOLOGY/PRINCIPAL FINDINGS: We used high-throughput RNA-sequencing (RNA-Seq to discover intermediate-size (70-500 nt ncRNAs (is-ncRNAs in C. elegans, using the strains of L4 larvae of wild-type (N2, UV-irradiated (N2/UV100 and NER-deficient mutant (xpa-1, and 450 novel non-coding transcripts were initially identified. A customized microarray assay was then applied to examine the expression profiles of both novel transcripts and known is-ncRNAs, and 57 UV-DDR-related is-ncRNA candidates showed expression variations at different levels between UV irradiated strains and non- irradiated strains. The top ranked is-ncRNA candidates with expression differences were further validated by qRT-PCR analysis, of them, 8 novel is-ncRNAs were significantly up-regulated after UV irradiation. Knockdown of two novel is-ncRNAs, ncRNA317 and ncRNA415, by RNA interference, resulted in higher UV sensitivity and significantly decreased expression of NER-related genes in C. elegans. CONCLUSIONS/SIGNIFICANCE: The discovery of above two novel is-ncRNAs in this study indicated the functional roles of is-ncRNAs in the regulation of UV-DDR network, and aided our understanding of the significance of ncRNA involvement in the UV-induced DNA damage response.

  14. Identification of kakusei, a Nuclear Non-Coding RNA, as an Immediate Early Gene from the Honeybee, and Its Application for Neuroethological Study

    Directory of Open Access Journals (Sweden)

    Taketoshi Kiya

    2012-11-01

    Full Text Available The honeybee is a social insect that exhibits various social behaviors. To elucidate the neural basis of honeybee behavior, we detected neural activity in freely-moving honeybee workers using an immediate early gene (IEG that is expressed in a neural activity-dependent manner. In European honeybees (Apis mellifera, we identified a novel nuclear non-coding RNA, termed kakusei, as the first insect IEG, and revealed the neural activity pattern in foragers. In addition, we isolated a homologue of kakusei, termed Acks, from the Japanese honeybee (Apis cerana, and detected active neurons in workers fighting with the giant hornet.

  15. Identification of kakusei, a nuclear non-coding RNA, as an immediate early gene from the honeybee, and its application for neuroethological study.

    Science.gov (United States)

    Kiya, Taketoshi; Ugajin, Atsushi; Kunieda, Takekazu; Kubo, Takeo

    2012-11-22

    The honeybee is a social insect that exhibits various social behaviors. To elucidate the neural basis of honeybee behavior, we detected neural activity in freely-moving honeybee workers using an immediate early gene (IEG) that is expressed in a neural activity-dependent manner. In European honeybees (Apis mellifera), we identified a novel nuclear non-coding RNA, termed kakusei, as the first insect IEG, and revealed the neural activity pattern in foragers. In addition, we isolated a homologue of kakusei, termed Acks, from the Japanese honeybee (Apis cerana), and detected active neurons in workers fighting with the giant hornet.

  16. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  17. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  18. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  19. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  20. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  1. IMPROVED SECURITY WARNING ALGORITHM BASED ON CODE POLLUTION IDENTIFICATION%改进的基于代码污染识别安全警告的算法

    Institute of Scientific and Technical Information of China (English)

    牛霜霞; 吕卓; 张威; 莫坚松

    2016-01-01

    由于静态代码审计工具具有自动化、不容易出错的特点,开发人员经常使用它来检测代码漏洞,但是检测出的代码漏洞的结果会产生大量的警告信息,开发人员必须手动进行检查和纠正。此工具的缺点是浪费开发人员大量的时间。通过对用户的输入以及敏感数据流的追踪来确定警告的缺陷是否真的被利用,从而减少静态检测工具产生的大量警告数量。同时提供给开发者更多真正能对软件产生威胁的警告信息。针对静态代码审计工具的缺点,研究三种不同的方法来提高静态代码审计工具的性能。第一,对于商业性的静态代码分析工具 Coverity,重新分析它的结果,并且从安全的角度创建一组具体的相关警告。第二,对开放的源代码分析工具 Findbugs 进行修改,并只对被用户输入所污染的代码进行分析。第三,研发灰盒代码审计工具,此工具侧重于 Java 代码中的跨站脚本攻击 XSS(Cross Site Scripting),使用数据流分析的方法来确定漏洞的切入点。实验结果证明工程 B 使警告数量降低了20%,工程 E 只产生了2%的警告,降低了工具产生警告的数量,为开发人员提供更多的信息来区分此警告是否是真正的安全威胁。%Since static code auditing tools have the features of automation and less error-prone,developers often use them to detect code vulnerabilities.However the results of the vulnerabilities detected will generate a lot of warning messages,and have to be manually examined and corrected by developers.The disadvantage of such tools will waste a lot of time of them.In this paper,we determine whether the defects warned really be used or not by tracking user inputs and sensitive data flow,thereby reduce the number of numerous warnings generated in static detection tools.Meanwhile we provide developers with more real warning messages which actually threaten

  2. Identification of genes coding for B cell antigens of Mycoplasma mycoides subsp. mycoides Small Colony (MmmSC by using phage display

    Directory of Open Access Journals (Sweden)

    Vilei Edy M

    2009-10-01

    Full Text Available Abstract Background Contagious bovine pleuropneumonia (CBPP is a mycoplasmal disease caused by Mycoplasma mycoides subsp. mycoides SC (MmmSC. Since the disease is a serious problem that can affect cattle production in parts of Africa, there is a need for an effective and economical vaccine. Identifying which of the causative agent's proteins trigger potentially protective immune responses is an important step towards developing a subunit vaccine. Accordingly, the purpose of this study was to determine whether phage display combined with bioinformatics could be used to narrow the search for genes that code for potentially immunogenic proteins of MmmSC. Since the production of IgG2 and IgA are associated with a Th1 cellular immune response which is implicated in protection against CBPP, antigens which elicit these immunoglobulin subclasses may be useful in developing a subunit vaccine. Results A filamentous phage library displaying a repertoire of peptides expressed by fragments of the genome of MmmSC was constructed. It was subjected to selection using antibodies from naturally- and experimentally-infected cattle. Mycoplasmal genes were identified by matching the nucleotide sequences of DNA from immunoselected phage particles with the mycoplasmal genome. This allowed a catalogue of genes coding for the proteins that elicited an immune response to be compiled. Using this method together with computer algorithms designed to score parameters that influence surface accessibility and hence potential antigenicity, five genes (abc, gapN, glpO, lppB and ptsG were chosen to be expressed in Escherichia coli. After appropriate site-directed mutagenesis, polypeptides representing portions of each of these proteins were tested for immunoreactivity. Of these five, polypeptides representing expression products of abc and lppB were recognised on immunoblots by sera obtained from cattle during a natural outbreak of the disease. Conclusion Since phage display

  3. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination.

    Directory of Open Access Journals (Sweden)

    Xiaomin Dong

    2015-12-01

    Full Text Available Long non-coding RNAs (lncRNAs (> 200 bp play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC differentiation from Neural Stem Cells (NSCs and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and

  4. 48 CFR 204.7202-1 - CAGE codes.

    Science.gov (United States)

    2010-10-01

    ...-free 1-888-352-9333); (B) The on-line access to the CAGE file through the Defense Logistics Information System; (C) The on-line access to the Defense Logistics Agency (DLA) CAGE file through the DLA Network or....39-M, Federal Logistics Information System (FLIS) Procedures Manual, prescribe use of CAGE codes. (b...

  5. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  6. Identification of mRNA-like non-coding RNAs and validation of a mighty one named MAR in Panax ginseng

    Institute of Scientific and Technical Information of China (English)

    Meizhen Wang; Bin Wu; Chao Chen; Shanfa Lu

    2015-01-01

    Increasing evidence suggests that long non‐coding RNAs (lncRNAs) play significant roles in plants. However, little is known about lncRNAs in Panax ginseng C. A. Meyer, an economical y significant medicinal plant species. A total of 3,688 mRNA‐like non‐coding RNAs (mlncRNAs), a class of lncRNAs, were identified in P. ginseng. Approximately 40%of the identified mlncRNAs were processed into smal RNAs, implying their regulatory roles via smal RNA‐mediated mechanisms. Eleven miRNA‐generating mlncRNAs also pro-duced siRNAs, suggesting the coordinated production of miRNAs and siRNAs in P. ginseng. The mlncRNA‐derived smal RNAs might be 21‐, 22‐, or 24‐nt phased and could be generated from both or only one strand of mlncRNAs, or from super long hairpin structures. A ful‐length mlncRNA, termed MAR (multiple‐function‐associated mlncRNA), was cloned. It gener-ated the most abundant siRNAs. The MAR siRNAs were predominantly 24‐nt and some of them were distributed in a phased pattern. A total of 228 targets were predicted for 71 MAR siRNAs. Degradome sequencing validated 68 predicted targets involved in diverse metabolic pathways, suggesting the significance of MAR in P. ginseng. Consistently, MAR was detected in al tissues analyzed and responded to methyl jasmonate (MeJA) treatment. It sheds light on the function of mlncRNAs in plants.

  7. Identification of mRNA-like non-coding RNAs and validation of a mighty one named MAR in Panax ginseng.

    Science.gov (United States)

    Wang, Meizhen; Wu, Bin; Chen, Chao; Lu, Shanfa

    2015-03-01

    Increasing evidence suggests that long non-coding RNAs (lncRNAs) play significant roles in plants. However, little is known about lncRNAs in Panax ginseng C. A. Meyer, an economically significant medicinal plant species. A total of 3,688 mRNA-like non-coding RNAs (mlncRNAs), a class of lncRNAs, were identified in P. ginseng. Approximately 40% of the identified mlncRNAs were processed into small RNAs, implying their regulatory roles via small RNA-mediated mechanisms. Eleven miRNA-generating mlncRNAs also produced siRNAs, suggesting the coordinated production of miRNAs and siRNAs in P. ginseng. The mlncRNA-derived small RNAs might be 21-, 22-, or 24-nt phased and could be generated from both or only one strand of mlncRNAs, or from super long hairpin structures. A full-length mlncRNA, termed MAR (multiple-function-associated mlncRNA), was cloned. It generated the most abundant siRNAs. The MAR siRNAs were predominantly 24-nt and some of them were distributed in a phased pattern. A total of 228 targets were predicted for 71 MAR siRNAs. Degradome sequencing validated 68 predicted targets involved in diverse metabolic pathways, suggesting the significance of MAR in P. ginseng. Consistently, MAR was detected in all tissues analyzed and responded to methyl jasmonate (MeJA) treatment. It sheds light on the function of mlncRNAs in plants. © 2014 Institute of Botany, Chinese Academy of Sciences.

  8. Sequence analysis and identification of new variations in the coding sequence of melatonin receptor gene (MTNR1A of Indian Chokla sheep breed

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Saxena

    2014-12-01

    Full Text Available Melatonin receptor 1A gene is the prime receptor mediating the effect of melatonin at the neuroendocrine level for control of seasonal reproduction in sheep. The aims of this study were to examine the polymorphism pattern of coding sequence of MTNR1A gene in Chokla sheep, a breed of Indian arid tract and to identify new variations in relation to its aseasonal status. Genomic DNAs of 101 Chokla sheep were collected and an 824 bp coding sequence of Exon II was amplified. RFLP was performed with enzyme RsaI and MnlI to assess the presence of polymorphism at position C606T and G612A, respectively. Genotyping revealed significantly higher frequency of M and R alleles than m and r alleles. RR and MM were found to be dominantly present in the group of studied population. Cloning and sequencing of Exon II followed by mutation/polymorphism analysis revealed ten mutations of which three were non-synonymous mutations (G706A, C893A, G931C. G706A leads to substitution of valine by isoleucine Val125I (U14109 in the fifth transmembrane domain. C893A leads to substitution of alanine by aspartic acid in the third extracellular loop. G931C mutation brings about substitution of amino acid alanine by proline in the seventh transmembrane helix, can affect the conformational stability of the molecule. Polyphen-2 analysis revealed that the polymorphism at position 931 is potentially damaging while the mutations at positions 706 and 893 were benign. It is concluded that G931C mutation of MTNR 1A gene, may explain, in part, the importance of melatonin structure integrity in influencing seasonality in sheep.

  9. Molecular Characterization of the Tumor Suppressor Candidate 5 Gene: Regulation by PPARγ and Identification of TUSC5 Coding Variants in Lean and Obese Humans

    Directory of Open Access Journals (Sweden)

    Trina A. Knotts

    2009-01-01

    Full Text Available Tumor suppressor candidate 5 (TUSC5 is a gene expressed abundantly in white adipose tissue (WAT, brown adipose tissue (BAT, and peripheral afferent neurons. Strong adipocyte expression and increased expression following peroxisome proliferator activated receptor γ (PPARγ agonist treatment of 3T3-L1 adipocytes suggested a role for Tusc5 in fat cell proliferation and/or metabolism. However, the regulation of Tusc5 in WAT and its potential association with obesity phenotypes remain unclear. We tested the hypothesis that the TUSC5 gene is a bona fide PPARγ target and evaluated whether its WAT expression or single-nucleotide polymorphisms (SNPs in the TUSC5 coding region are associated with human obesity. Induction of Tusc5 mRNA levels in 3T3-L1 adipocytes by troglitazone and GW1929 followed a dose-response consistent with these agents' binding affinities for PPARγ. Chromatin immunoprecipitation (ChIP experiments confirmed that PPARγ protein binds a ∼−1.1 kb promotor sequence of murine TUSC5 transiently during 3T3-L1 adipogenesis, concurrent with histone H3 acetylation. No change in Tusc5 mRNA or protein levels was evident in type 2 diabetic patients treated with pioglitazone. Tusc5 expression was not induced appreciably in liver preparations overexpressing PPARs, suggesting that tissue-specific factors regulate PPARγ responsiveness of the TUSC5 gene. Finally, we observed no differences in Tusc5 WAT expression or prevalence of coding region SNPs in lean versus obese human subjects. These studies firmly establish the murine TUSC5 gene locus as a PPARγ target, but the significance of Tusc5 in obesity phenotypes or in the pharmacologic actions of PPARγ agonists in humans remains equivocal.

  10. Genetic identification of cryptic genospecies of Haemophilus causing urogenital and neonatal infections by PCR using specific primers targeting genes coding for 16S rRNA.

    Science.gov (United States)

    Quentin, R; Ruimy, R; Rosenau, A; Musser, J M; Christen, R

    1996-06-01

    Previous genetic analysis of Haemophilus influenzae strains isolated from genital and neonatal infections identified a group of biotype IV that constitutes a cryptic genospecies only distantly related to H. influenzae and H. Haemolyticus. Small-subunit rRNA genes of two representative strains of this genital Haemophilus genospecies (strains 16N and 2406) were sequenced. The analysis indicated that these strains form a monophyletic unit with H. haemolyticus and H. influenzae biogroups Influenzae and Aegyptius and are more closely related to H. haemolyticus than to H. influenzae biogroups Influenzae and Aegyptius. 16S rRNA gene sequences were used to formulate primers for PCR-based identification of cryptic genital Haemophilus organisms. A 242-bp fragment was amplified from strains belonging to the genital Haemophilus genospecies but not from strains of 12 other Haemophilus species, including strains of H. influenzae biotype IV sensu stricto.

  11. Defense mechanisms and self-reported violence toward strangers.

    Science.gov (United States)

    Kim, Myeong; Cogan, Rosemary; Carter, Stacy; Porcerelli, John H

    2005-01-01

    College men who reported committing violence toward strangers (N = 30) and nonviolent college men (N = 30) completed Thematic Apperception Test cards (TAT) and responded to the Minnesota Multiphasic Personality Inventory-2 (MMPI-2). Defense mechanisms were coded from the TAT responses with the Defense Mechanism Manual (DMM). The men who reported violence toward strangers had higher DMM Denial scores and higher MMPI-2 Antisocial Practices scores than the nonviolent men. Student violence toward strangers seems to reflect immaturity rather than psychopathy.

  12. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  13. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  14. NHRIC (National Health Related Items Code)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Health Related Items Code (NHRIC) is a system for identification and numbering of marketed device packages that is compatible with other numbering...

  15. NHRIC (National Health Related Items Code)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Health Related Items Code (NHRIC) is a system for identification and numbering of marketed device packages that is compatible with other numbering...

  16. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  17. Identification of novel growth phase- and media-dependent small non-coding RNAs in Streptococcus pyogenes M49 using intergenic tiling arrays

    Directory of Open Access Journals (Sweden)

    Patenge Nadja

    2012-10-01

    Full Text Available Abstract Background Small non-coding RNAs (sRNAs have attracted attention as a new class of gene regulators in both eukaryotes and bacteria. Genome-wide screening methods have been successfully applied in Gram-negative bacteria to identify sRNA regulators. Many sRNAs are well characterized, including their target mRNAs and mode of action. In comparison, little is known about sRNAs in Gram-positive pathogens. In this study, we identified novel sRNAs in the exclusively human pathogen Streptococcus pyogenes M49 (Group A Streptococcus, GAS M49, employing a whole genome intergenic tiling array approach. GAS is an important pathogen that causes diseases ranging from mild superficial infections of the skin and mucous membranes of the naso-pharynx, to severe toxic and invasive diseases. Results We identified 55 putative sRNAs in GAS M49 that were expressed during growth. Of these, 42 were novel. Some of the newly-identified sRNAs belonged to one of the common non-coding RNA families described in the Rfam database. Comparison of the results of our screen with the outcome of two recently published bioinformatics tools showed a low level of overlap between putative sRNA genes. Previously, 40 potential sRNAs have been reported to be expressed in a GAS M1T1 serotype, as detected by a whole genome intergenic tiling array approach. Our screen detected 12 putative sRNA genes that were expressed in both strains. Twenty sRNA candidates appeared to be regulated in a medium-dependent fashion, while eight sRNA genes were regulated throughout growth in chemically defined medium. Expression of candidate genes was verified by reverse transcriptase-qPCR. For a subset of sRNAs, the transcriptional start was determined by 5′ rapid amplification of cDNA ends-PCR (RACE-PCR analysis. Conclusions In accord with the results of previous studies, we found little overlap between different screening methods, which underlines the fact that a comprehensive analysis of s

  18. Transport of defense compounds from source to sink

    DEFF Research Database (Denmark)

    Jørgensen, Morten Egevang; Nour-Eldin, Hussam Hassan; Halkier, Barbara Ann

    2015-01-01

    Plants synthesize a plethora of defense compounds crucial for their survival in a challenging and changing environment. Transport processes are important for shaping the distribution pattern of defense compounds, albeit focus hitherto has been mostly on their biosynthetic pathways. A recent...... identification of two glucosinolate transporters represents a breakthrough in our understanding of glucosinolate transport in Arabidopsis and has advanced knowledge in transport of defense compounds. In this review, we discuss the role of the glucosinolate transporters in establishing dynamic glucosinolate...... distribution patterns and source-sink relations. We focus on lessons learned from glucosinolate transport that may apply to transport of other defense compounds and discuss future avenues in the emerging field of defense compound transport....

  19. Identification and functional analysis of acute myeloid leukemia susceptibility associated single nucleotide polymorphisms at non-protein coding regions of RUNX1.

    Science.gov (United States)

    Xu, Xin; Ren, Xiuyu; Wang, Haiying; Zhao, Yao; Yi, Zhengjun; Wang, Kaifeng; Zhang, Shizhuang; Wang, Lin; Samuelson, David J; Hu, Zhenbo

    2016-01-01

    Little is known about the susceptibility to acute myeloid leukemia. We aim to search non-protein coding regions of key hematopoiesis transcription factors for genetic variations associated with acute myeloid leukemia susceptibility. We genotyped SNPs of RUNX1 P1 promoter, P2 promoter, +23 enhancer, intron 5.2 enhancer, PU.1 promoter, CEBPA promoter, and CEBPE promoter from acute myeloid leukemia patients and healthy controls. Rs2249650 and rs2268276 at RUNX1 intron 5.2 enhancer were found to be associated with acute myeloid leukemia susceptibility. Artificial reporters containing different rs2249650 and rs2268276 alleles showed differential activities in the K562 cell line, a human immortalized myeloid leukemia line. Rs2249650 contributes to reporter activities more than rs2268276. Gel shift assay is consistent with the luciferase assay. Supershift assay indicated that one potential binding protein was PU.1. To sum up, rs2268276 and especially rs2249650 may be qualified as new acute myeloid leukemia susceptibility-associated SNPs.

  20. Identification of a novel Drosophila melanogaster heat-shock gene, lethal(2)denticleless [l(2)dtl], coding for an 83-kDa protein.

    Science.gov (United States)

    Kurzik-Dumke, U; Neubauer, M; Debes, A

    1996-06-01

    In this study, we describe the identification of a novel Drosophila melanogaster (Dm) gene, l(2)dtl, characterized by elevated expression under heat-shock (HS) conditions. It encodes a protein of 83 kDa with no homology to known members of the HSP90 family and other proteins. Gene l(2)dtl is located on the right arm of the second chromosome at locus 59F5, close to the tumor suppressor gene l(2)tid, a homolog of the dnaJ encoding a chaperone strongly conserved in evolution. In the following, we present the sequence of l(2)dtl, the putative protein it encodes, and its molecular localization in a closely interspaced gene cluster consisting of at least four nested genes spanning an approximately 10-kb genomic interval. Furthermore, we present the temporal expression of l(2)dtl in the wild type under normal and HS conditions, and describe the isolation and the phenotype of eight embryonic lethal l(2)dtl mutants.

  1. 东海防空识别区的国际法分析及海峡两岸合作%The International Law Status of East China Sea Air Defense Identification Zone and the Cross-Strait Cooperation

    Institute of Scientific and Technical Information of China (English)

    吴燕妮

    2014-01-01

    On November 23, 2013, the Chinese government officially declared the establishment of the East China Sea Air Defense Identification Zone (ADIZ), and issued a corresponding recognition rules. From the perspective of international law, ADIZ was proposed at first to maintain the national security of the coastal states, however, norms of international law in this area is still lacking. Presently the ADIZ was accepted by more and more countries, but since the general practice was formed over time, ADIZ then was basically a forming international custom without any legal binding force. Therefore, for China, it is a huge challenge to participate in the internation-al rule-making process, and then based on the grasp of the rules, implement and maintain the national interests of our country. In this regard, the establishment of East China Sea ADIZ is just a start. We must formulate the rules in domestic law, and focus on cooperation and communication across the Straits to establish a long-term mechanism on both sides. Then the ADIZ can serve our national security and people’s well-being better.%2013年11月23日,我国政府正式宣告设立东海“防空识别区”,并颁布了相应的识别规则。从国际法的角度看,“防空识别区”的提出,最早是源于国内法上维护沿海国防安全的需要。历经半个多世纪的实践发展,该领域仍然缺乏可遵循的国际法规范。目前,接受这一规则的国家逐渐增多,但由于国际通例的形成仍需要相当长的时间,“防空识别区”制度本质上仍是一种正在形成之中的国际习惯。对中国来说,如何从国际规则的参与者转变为规则的制定者,进而通过对规则的把握,实现和维护我国国家利益是我们所面临的严峻挑战。“防空识别区”的设立只是一个开始,我们应当从国内法上对“防空识别区”进行严格规范,并重视与海峡对岸的合作与沟通,建立“防空识

  2. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  3. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  4. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  5. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  6. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  7. Identification of genes potentially responsible for extra-oral digestion and overcoming plant defense from salivary glands of the tarnished plant bug (Lygus lineolaris) using cDNA sequencing

    Science.gov (United States)

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris) feeding. TPBs secrete saliva during feeding to facilitate the piercing into plant tissues. More importantly, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the p...

  8. Identification of Long Non‐Coding RNAs Deregulated in Multiple Myeloma Cells Resistant to Proteasome Inhibitors

    Directory of Open Access Journals (Sweden)

    Ehsan Malek

    2016-10-01

    Full Text Available While the clinical benefit of proteasome inhibitors (PIs for multiple myeloma (MM treatment remains unchallenged, dose‐limiting toxicities and the inevitable emergence of drug resistance limit their long‐term utility. Disease eradication is compromised by drug resistance that is either present de novo or therapy‐induced, which accounts for the majority of tumor relapses and MM‐related deaths. Non‐coding RNAs (ncRNAs are a broad class of RNA molecules, including long non‐coding RNAs (lncRNAs, that do not encode proteins but play a major role in regulating the fundamental cellular processes that control cancer initiation, metastasis, and therapeutic resistance. While lncRNAs have recently attracted significant attention as therapeutic targets to potentially improve cancer treatment, identification of lncRNAs that are deregulated in cells resistant to PIs has not been previously addressed. We have modeled drug resistance by generating three MM cell lines with acquired resistance to either bortezomib, carfilzomib, or ixazomib. Genome‐wide profiling identified lncRNAs that were significantly deregulated in all three PIresistant cell lines relative to the drug‐sensitive parental cell line. Strikingly, certain lncRNAs deregulated in the three PI‐resistant cell lines were also deregulated in MM plasma cells isolated from newly diagnosed patients compared to healthy plasma cells. Taken together, these preliminary studies strongly suggest that lncRNAs represent potential therapeutic targets to prevent or overcome drug resistance. More investigations are ongoing to expand these initial studies in a greater number of MM patients to better define lncRNAs signatures that contribute to PI resistance in MM.

  9. Multiple Encryption-based Algorithm of Agricultural Product Trace Code

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    To establish a sound traceability system of agricultural products and guarantee security of agricultural products,an algorithm is proposed to encrypt trace code of agricultural products.Original trace code consists of 34 digits indicating such information as place of origin,name of product,date of production and authentication.Area code is used to indicate enterprise information,the encrypted algorithm is designed because of the increasing code length,such coding algorithms as system conversion and section division are applied for the encrypted conversion of code of origin place and production date code,moreover,section identification code and authentication code are permutated and combined to produce check code.Through the multiple encryption and code length compression,34 digits are compressed to 20 on the basis of ensuring complete coding information,shorter code length and better encryption enable the public to know information about agricultural products without consulting professional database.

  10. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  11. 32 CFR 636.11 - Installation traffic codes

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes 636.11 Section 636.11... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION (SPECIFIC INSTALLATIONS) Fort Stewart, Georgia § 636.11 Installation traffic codes In addition to the requirements in § 634.25(d) of this subchapter...

  12. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  13. Sources Of Evolution Of The Japan Air Self Defense Force’s Strategy

    Science.gov (United States)

    2016-12-01

    EVOLUTION OF THE JAPAN AIR SELF- DEFENSE FORCE’S STRATEGY by Kisung Nam December 2016 Thesis Advisor: Wade L. Huntley Co-Advisor: Robert...COVERED Master’s thesis 4. TITLE AND SUBTITLE SOURCES OF EVOLUTION OF THE JAPAN AIR SELF-DEFENSE FORCE’S STRATEGY 5. FUNDING NUMBERS 6. AUTHOR(S...DISTRIBUTION CODE 13. ABSTRACT (maximum 200words) The Japan Air Self-Defense Force’s (JASDF) activities, training, and weapons after the first

  14. 76 FR 4322 - Availability of the Fiscal Year 2009 Missile Defense Agency Services Contracts Inventory Pursuant...

    Science.gov (United States)

    2011-01-25

    ... of the Secretary Availability of the Fiscal Year 2009 Missile Defense Agency Services Contracts... United States Code as amended by the National Defense Authorization Act for Fiscal Year 2008 (NDAA 08... Procurement and Acquisition Policy, Office of Strategic Sourcing (DPAP/SS) will make available to the public...

  15. 76 FR 78874 - Defense Federal Acquisition Regulation Supplement: Title 41 Positive Law Codification-Further...

    Science.gov (United States)

    2011-12-20

    ... Positive Law Codification--Further Implementation (DFARS Case 2012- D003) AGENCIES: Defense Acquisition... Defense Federal Acquisition Regulation Supplement to conform statutory titles to the new Positive Law Codification of Title 41, United States Code, ``Public Contracts.'' DATES: Comment Date: Comments on the...

  16. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  17. 76 FR 76318 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-12-07

    ..., Contractor Code of Business Ethics and Conduct, is the DoD Office of Inspector General at the following... (Acquisition & Procurement)''; and 0 d. Removing the Defense Business Transformation Agency Contracting Office... procedures at PGI 205.207(a)(i). (d)(i) * * * (iii) For special notices for small business events, follow the...

  18. Chemical and Biological Defense Program Annual Report to Congress

    Science.gov (United States)

    2006-03-01

    state public health systems, to expand existing biosurveillance efforts, and to fund research on medical countermeasures against potential bioterror...Detection System (JBSDS) • Joint Portal Shield • Biological Identification System (BIDS) • Dry Filter Units (DFUs) Table 2-3 Biological Defense...Detection System (BIDS) • Joint Portal Shield Network Sensor System • Automated biological remote detection and early warning capabilities

  19. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  20. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  1. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  2. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  3. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections.

  4. Accurate discrimination of conserved coding and non-coding regions through multiple indicators of evolutionary dynamics

    Directory of Open Access Journals (Sweden)

    Pesole Graziano

    2009-09-01

    Full Text Available Abstract Background The conservation of sequences between related genomes has long been recognised as an indication of functional significance and recognition of sequence homology is one of the principal approaches used in the annotation of newly sequenced genomes. In the context of recent findings that the number non-coding transcripts in higher organisms is likely to be much higher than previously imagined, discrimination between conserved coding and non-coding sequences is a topic of considerable interest. Additionally, it should be considered desirable to discriminate between coding and non-coding conserved sequences without recourse to the use of sequence similarity searches of protein databases as such approaches exclude the identification of novel conserved proteins without characterized homologs and may be influenced by the presence in databases of sequences which are erroneously annotated as coding. Results Here we present a machine learning-based approach for the discrimination of conserved coding sequences. Our method calculates various statistics related to the evolutionary dynamics of two aligned sequences. These features are considered by a Support Vector Machine which designates the alignment coding or non-coding with an associated probability score. Conclusion We show that our approach is both sensitive and accurate with respect to comparable methods and illustrate several situations in which it may be applied, including the identification of conserved coding regions in genome sequences and the discrimination of coding from non-coding cDNA sequences.

  5. Inducible direct plant defense against insect herbivores: A review

    Institute of Scientific and Technical Information of China (English)

    Ming-Shun Chen

    2008-01-01

    Plants respond to insect herbivory with responses broadly known as direct defenses, indirect defenses, and tolerance. Direct defenses include all plant traits that affect susceptibility of host plants by themselves. Overall categories of direct plant defenses against insect herbivores include limiting food supply, reducing nutrient value, reducing preference, disrupting physical structures, and inhibiting chemical pathways of the attacking insect. Major known defense chemicals include plant secondary metabolites, protein inhibitors of insect digestive enzymes, proteases, lectins, amino acid deaminases and oxidases. Multiple factors with additive or even synergistic impact are usually involved in defense against a specific insect species, and factors of major importance to one insect species may only be of secondary importance or not effective at all against another insect species. Extensive qualitative and quantitative high throughput analyses of temporal and spatial variations in gene expression, protein level and activity, and metabolite concentration will accelerate not only the understanding of the overall mechanisms of direct defense, but also accelerate the identification of specific targets for enhancement of plant resistance for agriculture.

  6. Identification of a novel small cysteine-rich protein in the fraction from the biocontrol Fusarium oxysporum strain CS-20 that mitigates Fusarium wilt symptoms and triggers defense responses in tomato

    Directory of Open Access Journals (Sweden)

    Larisa A. Shcherbakova

    2016-01-01

    Full Text Available The biocontrol effect of the nonpathogenic F. oxysporum strain CS-20 against the tomato wilt pathogen F. oxysporum f. sp. lycopersici (FOL has been previously reported to be primarily plant-mediated. This study shows that CS-20 produces proteins, which elicit defense responses in tomato plants. Three protein-containing fractions were isolated from CS-20 biomass using size exclusion chromatography. Exposure of seedling roots to one of these fractions prior to inoculation with pathogenic FOL strains significantly reduced wilt severity. This fraction initiated an ion exchange response in cultured tomato cells resulting in a reversible alteration of extracellular pH; increased tomato chitinase activity, and induced systemic resistance by enhancing PR-1 expression in tomato leaves. Two other protein fractions were inactive in seedling protection. The main polypeptide (designated CS20EP, which was specifically present in the defense-inducing fraction and was not detected in inactive protein fractions, was identified. The nucleotide sequence encoding this protein was determined, and its complete amino acid sequence was deduced from direct Edman degradation (25 N-terminal amino acid residues and DNA sequencing. The CS20EP was found to be a small basic cysteine-rich protein with a pI of 9.87 and 23.43% of hydrophobic amino acid residues. BLAST search in the NCBI database showed that the protein is new; however, it displays 48% sequence similarity with a hypothetical protein FGSG_10784 from F. graminearum strain PH-1. The contribution of CS20EP to elicitation of tomato defense responses resulting in wilt mitigating is discussed.

  7. Identification of a Novel Small Cysteine-Rich Protein in the Fraction from the Biocontrol Fusarium oxysporum Strain CS-20 that Mitigates Fusarium Wilt Symptoms and Triggers Defense Responses in Tomato

    Science.gov (United States)

    Shcherbakova, Larisa A.; Odintsova, Tatyana I.; Stakheev, Alexander A.; Fravel, Deborah R.; Zavriev, Sergey K.

    2016-01-01

    The biocontrol effect of the non-pathogenic Fusarium oxysporum strain CS-20 against the tomato wilt pathogen F. oxysporum f. sp. lycopersici (FOL) has been previously reported to be primarily plant-mediated. This study shows that CS-20 produces proteins, which elicit defense responses in tomato plants. Three protein-containing fractions were isolated from CS-20 biomass using size exclusion chromatography. Exposure of seedling roots to one of these fractions prior to inoculation with pathogenic FOL strains significantly reduced wilt severity. This fraction initiated an ion exchange response in cultured tomato cells resulting in a reversible alteration of extracellular pH; increased tomato chitinase activity, and induced systemic resistance by enhancing PR-1 expression in tomato leaves. Two other protein fractions were inactive in seedling protection. The main polypeptide (designated CS20EP), which was specifically present in the defense-inducing fraction and was not detected in inactive protein fractions, was identified. The nucleotide sequence encoding this protein was determined, and its complete amino acid sequence was deduced from direct Edman degradation (25 N-terminal amino acid residues) and DNA sequencing. The CS20EP was found to be a small basic cysteine-rich protein with a pI of 9.87 and 23.43% of hydrophobic amino acid residues. BLAST search in the NCBI database showed that the protein is new; however, it displays 48% sequence similarity with a hypothetical protein FGSG_10784 from F. graminearum strain PH-1. The contribution of CS20EP to elicitation of tomato defense responses resulting in wilt mitigating is discussed. PMID:26779237

  8. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  9. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  10. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  11. 多入单出正交空时分组码系统的调制识别%Modulation Identification for Orthogonal Space-time Block Code in Multiple Input Single Output Systems

    Institute of Scientific and Technical Information of China (English)

    钱国兵; 李立萍; 郭亨艺

    2015-01-01

    在现代无线通信系统中,采用正交空时分组码(STBC)的多天线发射技术是提高通信速率和可靠性,并且能够实现简单译码的关键技术。该文针对瑞利信道系统模型,提出一种适用于多入单出正交空时分组码(OSTBC)的调制识别算法。该算法通过对接收到的数据进行重排,将多入单出的系统模型转化为类似多入多出的系统模型,并且根据信源的特殊性用最大似然的思想实现调制类型的识别。仿真结果验证了所提算法的有效性。%In modern wireless communication systems, multiple-antenna-transmitting in association with Orthogonal Space-Time Block Code (OSTBC) is a key technology to improve communication rate, reliability, and decoding complexity. In this paper, a modulation identification algorithm is proposed which is well suitable for the Multiple Input Single Output (MISO)-OSTBC system. First, the MISO system is transformed into a Multiple Input Multiple Output (MIMO) system by reshaping the received data. Then, maximum likelihood based approach is used to identify the modulation. Simulations validate the effectiveness of the proposed algorithm.

  12. Event-recording devices with identification codes

    Science.gov (United States)

    Watters, David G. (Inventor); Huestis, David L. (Inventor); Bahr, Alfred J. (Inventor); Vidmar, Robert J. (Inventor)

    2003-01-01

    A recording device allows wireless interrogation to determine its identity and its state. The state indicates whether one or more physical or chemical events have taken place. In effect, the one or more physical or chemical events are recorded by the device. The identity of the device allows it to be distinguished from a number of similar devices. The recording device may be used in an array of devices that allows wireless probing by an interrogation unit. When probed, each device tells the interrogator who it is and what state it is in. The devices allow multiple use and the interrogator may use a logical reset to determine the state of each device. The interrogator can thus easily identify particular items in an array that have reached a particular condition. The device may record the status of each device in a database to maintain a history for each.

  13. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  14. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  15. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  16. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  17. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  18. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  19. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  20. Original article Identifying indicators of defensive activity in narration about important interpersonal relations

    Directory of Open Access Journals (Sweden)

    Emilia Soroko

    2014-10-01

    Full Text Available Background One of the main components of psychological conversation that influence communication is psychological defensiveness. 
In the paper I propose processual – situational understanding of defensiveness, and its measurement based on coding system. Preliminary results on link between personality traits and defensiveness in people’s narratives are presented as well. Participants and procedure To test proposed coding system, study was conducted with participants presenting different levels of personality organization’s (borderline: n = 35, 20 women, M = 26.09, SD = 4.82, neurotic: n = 29, 24 women, M = 25.90, SD = 5.25, integrated: n = 31, 26 women, M = 21.94, SD = 1.69. Correlation method was applied (Borderline Personality Inventory, Neuroticism Scale, Emotion Control Inventory, as well as narrative’s interviews. Participants’ statements were coded by competent judges (defensiveness and coherence of narratives, and by automatic lexical analyses (descriptive indicators. Results Results indicate that proposed defensiveness coding system is a set of heterogeneous indicators, and four groups of indicators could be extracted. Correlations between those indicators and expression control (positive relation, and coherence of narratives (negative relation. Moreover, differences between borderline participants and neurotic ones emerged. Conclusions Proposed coding system seems to be a heterogeneous but useful tool for assessing defensiveness during psychological interviews. It could be applied as an element of a procedural control measures, directed to test the reliability of psychological conversation.

  1. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  2. Low Rank Sparse Coding for Image Classification

    Science.gov (United States)

    2013-12-08

    Singapore 4 Institute of Automation, Chinese Academy of Sciences, P. R. China 5 University of Illinois at Urbana-Champaign, Urbana, IL USA Abstract In this...coding [36]. 1. Introduction The bag-of-words (BoW) model is one of the most pop - ular models for feature design. It has been successfully applied to...defense of softassignment coding. In ICCV, 2011. [26] S. Liu, J. Feng, Z. Song , T. Zhang, H. Lu, C. Xu, and S. Yan. Hi, magic closet, tell me what to

  3. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  4. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  5. Extracellular Alkalinization as a Defense Response in Potato Cells

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists (Phytophthora infestans and Spongospora subterranea) and fungi (Verticillium dahliae and Colletotrichum coccodes). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes. PMID:28174578

  6. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  7. Automatic Language Identification

    Science.gov (United States)

    2000-08-01

    Phonology . A "phoneme" is an underlying men- THIS WORK WAS SPONSORED BY THE DEPARTMENT tal representation of a phonological unit in a lan- OF DEFENSE...34 is a realization of an acoustic- FORCE. phonetic unit or segment. It is the actual sound 106 ACOUSTIC AND LANGUAGE MODEL LIBRARY AFRIKAANS...LID. HMM-based language identification phonetic transcription (sequence of symbols representing was first proposed by House and Neuburg [17]. Savic

  8. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  9. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  10. System Identification

    NARCIS (Netherlands)

    Keesman, K.J.

    2011-01-01

    Summary System Identification Introduction.- Part I: Data-based Identification.- System Response Methods.- Frequency Response Methods.- Correlation Methods.- Part II: Time-invariant Systems Identification.- Static Systems Identification.- Dynamic Systems Identification.- Part III: Time-varying

  11. Automatic Identification And Data Collection Via Barcode Laser Scanning.

    Science.gov (United States)

    Jacobeus, Michel

    1986-07-01

    How to earn over 100 million a year by investing 40 million ? No this is not the latest Wall Street "tip" but the costsavings obtained by the U.S. Department of Defense. 2 % savings on annual turnover claim supermarkets ! Millions of Dollars saved report automotive companies ! These are not daydreams, but tangible results measured by users after implemen-ting Automatic Identification and Data Collection systems, based on bar codes. To paraphrase the famous sentence "I think, thus I am", with AI/ADC systems "You knonw, thus you are". Indeed, in today's world, an immediate, accurate and precise information is a vital management need for companies growth and survival. AI/ADC techniques fullfill these objectives by supplying automatically and without any delay nor alteration the right information.

  12. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  13. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  14. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  15. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  16. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  17. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  18. 75 FR 22203 - Delegation of Certain Functions Under Section 1265 of the National Defense Authorization Act for...

    Science.gov (United States)

    2010-04-28

    ... Functions Under Section 1265 of the National Defense Authorization Act for Fiscal Year 2010 Memorandum for... the United States, including section 301 of title 3, United States Code, I hereby delegate to you the functions and authority conferred upon the President by section 1265 of the National Defense...

  19. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  20. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    National Research Council Canada - National Science Library

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    .... Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card...

  1. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  2. Nonbinary codeword-stabilized quantum codes

    Science.gov (United States)

    Chen, Xie; Zeng, Bei; Chuang, Isaac L.

    2008-12-01

    The codeword-stabilized (CWS) quantum code formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes [see A. Cross , e-print arXiv:0708.1021], but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimensions) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

  3. Discriminative sparse coding on multi-manifolds

    KAUST Repository

    Wang, J.J.-Y.

    2013-09-26

    Sparse coding has been popularly used as an effective data representation method in various applications, such as computer vision, medical imaging and bioinformatics. However, the conventional sparse coding algorithms and their manifold-regularized variants (graph sparse coding and Laplacian sparse coding), learn codebooks and codes in an unsupervised manner and neglect class information that is available in the training set. To address this problem, we propose a novel discriminative sparse coding method based on multi-manifolds, that learns discriminative class-conditioned codebooks and sparse codes from both data feature spaces and class labels. First, the entire training set is partitioned into multiple manifolds according to the class labels. Then, we formulate the sparse coding as a manifold-manifold matching problem and learn class-conditioned codebooks and codes to maximize the manifold margins of different classes. Lastly, we present a data sample-manifold matching-based strategy to classify the unlabeled data samples. Experimental results on somatic mutations identification and breast tumor classification based on ultrasonic images demonstrate the efficacy of the proposed data representation and classification approach. 2013 The Authors. All rights reserved.

  4. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  5. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  6. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  7. Total Quality Management Implementation Plan: Defense Depot, Ogden

    Science.gov (United States)

    1989-07-01

    NUMBERS Total Quality Management Implementation Plan Defense Depot Ogden 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...PAGES TQM ( Total Quality Management ), Continuous Process Improvement, Depot Operations, Process Action Teams 16. PRICE CODE 17. SECURITY...034 A Message From The Commander On Total Quality Management i fully support the DLA aoproacii to Total Quality Management . As stated by General

  8. Sandia National Laboratories analysis code data base

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, C.W.

    1994-11-01

    Sandia National Laboratories, mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The Laboratories` strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia`s technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code ``ownership`` and release status, and references describing the physical models and numerical implementation.

  9. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  10. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  11. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    UZUN, Vassilya; BILGIN, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  12. DDoS攻击从检测到流量识别总体防御方案研究%Overall scheme of defense against DDoS attack from detection to traffic identification

    Institute of Scientific and Technical Information of China (English)

    张丽; 陈曙晖; 孙一品

    2013-01-01

    Distributed denial of service (DDoS) attack is a serious threat to Internet security. Target networks and hosts will be overwhelmed by massive traffic when attack happens. It is important for the defense against DDoS attack to detect the at-tack quickly and accurately,discriminate the attack traffic from legitimate crowd traffic to eliminate attack traffic,and eliminate the attack traffic. The entropy is used to execute real-time statistics of some flow parameters for detecting the attack,and cumula-tive sum(CUSUM)algorithm is employed to track continuous changes of the entropy. According to the growth of destination IP quantity,victims can be discovered,and then the traffic swarming into the victims is observed emphatically. As the large-scale attack traffic and legitimate crowd traffic are very similar,it is difficult to recognize attack traffic. The correlation coefficient is used in this paper to check the similarity of the flow to discriminate the attack traffic from legitimate crowd traffic,which pro-vides an evidence for subsequent elimination and filtering.%分布式拒绝服务(DDoS)攻击是互联网安全的严重威胁,攻击发生时会有大规模流量淹没目标网络和主机。能够准确快速地检测到攻击,区分合法拥塞流量和攻击流量,对攻击流量加以清洗,对于DDoS攻击的防御来说十分重要。采用信息熵对流量参数进行实时统计来检测攻击,用累积和(CUSUM)算法控制熵值连续变化情况。检测到攻击后,依据目的IP数量前后增长情况找出受害者,对流向受害者处的流量进行重点观察。由于大规模的攻击流量与合法的拥塞流量非常相似,难以识别,在此对流本身的相似性进行考察,使用流相关系数算法辨别攻击流量和合法拥塞流量,为流量清洗工作提供依据。

  13. Deciphering the genetic regulatory code using an inverse error control coding framework.

    Energy Technology Data Exchange (ETDEWEB)

    Rintoul, Mark Daniel; May, Elebeoba Eni; Brown, William Michael; Johnston, Anna Marie; Watson, Jean-Paul

    2005-03-01

    We have found that developing a computational framework for reconstructing error control codes for engineered data and ultimately for deciphering genetic regulatory coding sequences is a challenging and uncharted area that will require advances in computational technology for exact solutions. Although exact solutions are desired, computational approaches that yield plausible solutions would be considered sufficient as a proof of concept to the feasibility of reverse engineering error control codes and the possibility of developing a quantitative model for understanding and engineering genetic regulation. Such evidence would help move the idea of reconstructing error control codes for engineered and biological systems from the high risk high payoff realm into the highly probable high payoff domain. Additionally this work will impact biological sensor development and the ability to model and ultimately develop defense mechanisms against bioagents that can be engineered to cause catastrophic damage. Understanding how biological organisms are able to communicate their genetic message efficiently in the presence of noise can improve our current communication protocols, a continuing research interest. Towards this end, project goals include: (1) Develop parameter estimation methods for n for block codes and for n, k, and m for convolutional codes. Use methods to determine error control (EC) code parameters for gene regulatory sequence. (2) Develop an evolutionary computing computational framework for near-optimal solutions to the algebraic code reconstruction problem. Method will be tested on engineered and biological sequences.

  14. 32 CFR 634.24 - Traffic planning and codes.

    Science.gov (United States)

    2010-07-01

    ..., and points of congestion. The installation law enforcement officer and traffic engineer usually... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic planning and codes. 634.24 Section 634.24... CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.24 Traffic planning...

  15. 32 CFR 635.20 - Military Police Codes (MPC).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Military Police Codes (MPC). 635.20 Section 635... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police... attached military police units are notified for mobilization, relocation, activation, or inactivation....

  16. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  17. 76 FR 22003 - Delegation of Functions and Authority Under Sections 315 and 325 of Title 32, United States Code

    Science.gov (United States)

    2011-04-20

    ... 325 of Title 32, United States Code Memorandum for the Secretary of Defense By the authority vested in... 301 of title 3, United States Code, I hereby delegate to you: (a) the functions and authority of the President contained in section 315 of title 32, United States Code, to permit a commissioned officer of...

  18. Plant defense against herbivorous pests: exploiting resistance and tolerance traits for sustainable crop protection

    Directory of Open Access Journals (Sweden)

    Carolyn Mitchell

    2016-07-01

    Full Text Available Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  19. Plant Defense against Herbivorous Pests: Exploiting Resistance and Tolerance Traits for Sustainable Crop Protection.

    Science.gov (United States)

    Mitchell, Carolyn; Brennan, Rex M; Graham, Julie; Karley, Alison J

    2016-01-01

    Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  20. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  1. Concurrency Attacks and Defenses

    Science.gov (United States)

    2016-10-04

    Administration, Morningside 615 West 131st Street, Room 254, Mail Code 8725 New York, NY 10027-7922 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING...on desktops (e.g., word processing), are now served from distributed “clouds” of servers to meet the current computing demands for high scalability...Document - Text Analysis Report Document - Text Analysis Appendix Documents 2. Thank You E- mail user Sep 28, 2016 18:09:13 Success: Email Sent to: junfeng@cs.columbia.edu

  2. Gene expression analysis during cassava defense response to bacterial blight disease

    OpenAIRE

    2006-01-01

    Cassava bacterial blight (CBB) caused by Xanthomonas axonopodis pv. manihotis (Xam) is a destructive disease in the South América and África and yield losses range between 12 and 100%. Cytochemistry and biochemistry of defense response to CBB have been well studied. However, the response of the plant to pathogen attack at the molecular and cellular level remains uncharacterized. Identification of genes associated with defense responses is one of most critical steps leading to the elucidation ...

  3. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  4. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms.

  5. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  6. Finding the key to a better code: code team restructure to improve performance and outcomes.

    Science.gov (United States)

    Prince, Cynthia R; Hines, Elizabeth J; Chyou, Po-Huang; Heegeman, David J

    2014-09-01

    Code teams respond to acute life threatening changes in a patient's status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team's resuscitation could be hindered. To improve the overall performance of our hospital's code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team participants, clear identification of team members and their primary responsibilities and position relative to the patient, and initiation of team training events and surprise mock codes (simulations). Team member assessments of the restructured code team and its performance were collected through self-administered electronic questionnaires. Time-to-defibrillation, defined as the time the code was called until the start of defibrillation, was measured for each code using actual time recordings from code summary sheets. Significant improvements in team member confidence in the skills specific to their role and clarity in their role's position were identified. Smaller improvements were seen in team leadership and reduction in the amount of extra talking and noise during a code. The average time-to-defibrillation during real codes decreased each year since the code team restructure. This type of code team restructure resulted in improvements in several areas that impact the functioning of the team, as well as decreased the average time-to-defibrillation, making it beneficial to many, including the team members, medical institution, and patients. © 2014 Marshfield Clinic.

  7. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  8. An introduction to using QR codes in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jae Hwa Chang

    2014-08-01

    Full Text Available The Quick Response (QR code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements. In scholarly journals, the QR code is used to provide immediate direction to the journal homepage or specific content such as figures or videos. To produce a QR code and print it in the print version or upload to the web is very simple. Using a QR code producing program, an editor can add simple information to a website. After that, a QR code is produced. A QR code is very stable, such that it can be used for a long time without loss of quality. Producing and adding QR codes to a journal costs nothing; therefore, to increase the visibility of their journals, it is time for editors to add QR codes to their journals.

  9. Oil and gas field code master list, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  10. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  11. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  12. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  13. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  14. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  15. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  16. From Barcode to QR Code Applications

    Directory of Open Access Journals (Sweden)

    László Várallyai

    2012-12-01

    Full Text Available This paper shows the Zsohár Horticulture Company in Nagyrákos, how they want to change their barcode identification system to QR code. They cultivate herbaceous, perpetual decorational plants, rock-garden, flower-bed and swamp perpetuals, decorational grasses and spices. A part of the perpetuals are evergreens, but most of them has special organs - such as onions, thick-, bulbous roots, "winter-proof" buds - so they can survive winter. In the first part of the paper I introduce the different barcode standards, how can it be printed and how can it be read. In the second part of the paper I give details about the quick response code (QR code and the two-dimensional (2D barcode. Third part of this paper illustrates the QR code usability in agriculture focused on the gardening.

  17. 78 FR 23194 - Federal Acquisition Regulation; Commercial and Government Entity Code

    Science.gov (United States)

    2013-04-18

    ... registration is not required, a CAGE code will be requested and obtained from the Defense Logistics Agency, Logistics Information Service. A CAGE code is not required when a condition described at FAR 4.605(c)(2... assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to...

  18. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  19. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  20. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  1. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  2. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  3. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  4. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  5. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  6. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  7. Identification of the 3' and 5' terminal sequences of the 8 rna genome segments of european and north american genotypes of infectious salmon anemia virus (an orthomyxovirus and evidence for quasispecies based on the non-coding sequences of transcripts

    Directory of Open Access Journals (Sweden)

    Riveroll Angela

    2010-11-01

    Full Text Available Abstract Background Infectious salmon anemia (ISA virus (ISAV is a pathogen of marine-farmed Atlantic salmon (Salmo salar; a disease first diagnosed in Norway in 1984. This virus, which was first characterized following its isolation in cell culture in 1995, belongs to the family Orthomyxoviridae, genus, Isavirus. The Isavirus genome consists of eight single-stranded RNA segments of negative sense, each with one to three open reading frames flanked by 3' and 5' non-coding regions (NCRs. Although the terminal sequences of other members of the family Orthomyxoviridae such as Influenzavirus A have been extensively analyzed, those of Isavirus remain largely unknown, and the few reported are from different ISAV strains and on different ends of the different RNA segments. This paper describes a comprehensive analysis of the 3' and 5' end sequences of the eight RNA segments of ISAV of both European and North American genotypes, and evidence of quasispecies of ISAV based on sequence variation in the untranslated regions (UTRs of transcripts. Results Two different ISAV strains and two different RNA preparations were used in this study. ISAV strain ADL-PM 3205 ISAV-07 (ADL-ISAV-07 of European genotype was the source of total RNA extracted from ISAV-infected TO cells, which contained both viral mRNA and cRNA. ISAV strain NBISA01 of North American genotype was the source of vRNA extracted from purified virus. The NCRs of each segment were identified by sequencing cDNA prepared by three different methods, 5' RACE (Rapid amplification of cDNA ends, 3' RACE, and RNA ligation mediated PCR. Sequence analysis of five clones each derived from one RT-PCR product from each NCR of ISAV transcripts of segments 1 to 8 revealed significant heterogeneity among the clones of the same segment end, providing unequivocal evidence for presence of intra-segment ISAV quasispecies. Both RNA preparations (mRNA/cRNA and vRNA yielded complementary sequence information, allowing the

  8. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  9. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  10. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  11. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  12. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  13. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  14. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  15. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  16. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  19. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  20. Adaptive midlife defense mechanisms and late-life health.

    Science.gov (United States)

    Malone, Johanna C; Cohen, Shiri; Liu, Sabrina R; Vaillant, George E; Waldinger, Robert J

    2013-07-01

    A growing body of research suggests that personality characteristics relate to physical health; however, this relation ship has primarily been tested in cross-sectional studies that have not followed the participants into old age. The present study utilizes data from a 70-year longitudinal study to prospectively examine the relationship between the adaptive defense mechanisms in midlife and objectively assessed physical health in late life. In addition to examining the direct effect, we test whether social support mediates this relation ship. The sample consisted of 90 men who were followed for over seven decades beginning in late adolescence. Health ratings from medical records were made at three time points (ages 70, 75, and 80). Defense mechanisms were coded from narratives by trained independent raters (Vaillant, Bond, & Vaillant, 1986). Independent raters assessed social supports between ages 50 and 70. More adaptive defenses in midlife were associated with better physical health at all three time points in late life. These relationships were partially mediated by social support. Findings are consistent with the theory that defense maturity is important for building social relationships, which in turn contribute to better late-life physical health. Psychological interventions aimed at improving these domains may be beneficial for physical health.

  1. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  2. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  3. An empirical look at the Defense Mechanism Test (DMT): reliability and construct validity.

    Science.gov (United States)

    Ekehammar, Bo; Zuber, Irena; Konstenius, Marja-Liisa

    2005-07-01

    Although the Defense Mechanism Test (DMT) has been in use for almost half a century, there are still quite contradictory views about whether it is a reliable instrument, and if so, what it really measures. Thus, based on data from 39 female students, we first examined DMT inter-coder reliability by analyzing the agreement among trained judges in their coding of the same DMT protocols. Second, we constructed a "parallel" photographic picture that retained all structural characteristic of the original and analyzed DMT parallel-test reliability. Third, we examined the construct validity of the DMT by (a) employing three self-report defense-mechanism inventories and analyzing the intercorrelations between DMT defense scores and corresponding defenses in these instruments, (b) studying the relationships between DMT responses and scores on trait and state anxiety, and (c) relating DMT-defense scores to measures of self-esteem. The main results showed that the DMT can be coded with high reliability by trained coders, that the parallel-test reliability is unsatisfactory compared to traditional psychometric standards, that there is a certain generalizability in the number of perceptual distortions that people display from one picture to another, and that the construct validation provided meager empirical evidence for the conclusion that the DMT measures what it purports to measure, that is, psychological defense mechanisms.

  4. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  5. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  6. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  7. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  8. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  9. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  10. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  11. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  12. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  13. Pallet Management System: A Study of the Implementation of UID/RFID Technology for Tracking Shipping Materials Within the Department of Defense Distribution Network

    Science.gov (United States)

    2008-06-01

    San Joaquin DFARS: Defense Federal Acquisition Regulations DI: Data Identifier DoD: Department of Defense EPC : Electronic Product Code FOD...provides a coherent and stable interface between RFID hardware operations and the flow of data elements—such as electronic product code ( EPC ...custody (government or contractor ), and • How it is marked. (DoD AT&L 2006) Figure 11. Data Included in the UID Registry (DoD AT&L 2006

  14. Interleukin 17-Mediated Host Defense against Candida albicans

    Directory of Open Access Journals (Sweden)

    Florian Sparber

    2015-08-01

    Full Text Available Candida albicans is part of the normal microbiota in most healthy individuals. However, it can cause opportunistic infections if host defenses are breached, with symptoms ranging from superficial lesions to severe systemic disease. The study of rare congenital defects in patients with chronic mucocutaneous candidiasis led to the identification of interleukin-17 (IL-17 as a key factor in host defense against mucosal fungal infection. Experimental infections in mice confirmed the critical role of IL-17 in mucocutaneous immunity against C. albicans. Research on mouse models has also contributed importantly to our current understanding of the regulation of IL-17 production by different cellular sources and its effector functions in distinct tissues. In this review, we highlight recent findings on IL-17-mediated immunity against C. albicans in mouse and man.

  15. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    provides a framework for examining spending patterns of the federal government by category of activity, rather than by agency or type of financing...Within the system, spending categories are called functions, and each is coded with both an explanatory title and numeric code ending in zero (and shown

  16. Structural Identification Problem

    Directory of Open Access Journals (Sweden)

    Suvorov Aleksei

    2016-01-01

    Full Text Available The identification problem of the existing structures though the Quasi-Newton and its modification, Trust region algorithms is discussed. For the structural problems, which could be represented by means of the mathematical modelling of the finite element code discussed method is extremely useful. The nonlinear minimization problem of the L2 norm for the structures with linear elastic behaviour is solved by using of the Optimization Toolbox of Matlab. The direct and inverse procedures for the composition of the desired function to minimize are illustrated for the spatial 3D truss structure as well as for the problem of plane finite elements. The truss identification problem is solved with 2 and 3 unknown parameters in order to compare the computational efforts and for the graphical purposes. The particular commands of the Matlab codes are present in this paper.

  17. 77 FR 16649 - Delegation of Reporting Functions Specified in Section 1045 of the National Defense Authorization...

    Science.gov (United States)

    2012-03-21

    ... Documents#0;#0; ] Memorandum of March 16, 2012 Delegation of Reporting Functions Specified in Section 1045... America, including section 301 of title 3 of the United States Code, I hereby delegate to the Secretaries of Defense and Energy the reporting functions conferred upon the President by section 1045 of...

  18. 77 FR 28757 - Delegation of Reporting Functions Specified in Section 1235(c) of the National Defense...

    Science.gov (United States)

    2012-05-16

    ... Functions Specified in Section 1235(c) of the National Defense Authorization Act for Fiscal Year 2012... laws of the United States of America, including section 301 of title 3 of the United States Code, I hereby delegate to you the reporting functions conferred upon the President by section 1235(c) of...

  19. 77 FR 12721 - Delegation of Reporting Function Specified In Section 1043 of the National Defense Authorization...

    Science.gov (United States)

    2012-03-02

    ... Function Specified In Section 1043 of the National Defense Authorization Act for Fiscal Year 2012... the Constitution and the laws of the United States of America, including section 301 of title 3 of the United States Code, I hereby delegate to you the reporting function conferred upon the President...

  20. Joint Program Executive Office for Chemical and Biological Defense Collaboration Study

    Science.gov (United States)

    2011-03-01

    87 14. SUBJECT TERMS Technology Transition, Collaboration, Organizational Design Components, Chemical Biological Defense 16. PRICE CODE 17...Biological Medical Systems (JPM CBMS) JPM CBMS centrally manages and employs government and commercial pharmaceutical development best practices to oversee...none have been previously done on technology transfer and collaboration. Professor Sazali Wahab et al. of Universiti Putra Malaysia examined the

  1. 77 FR 35879 - Defense Federal Acquisition Regulation Supplement: Title 41 Positive Law Codification-Further...

    Science.gov (United States)

    2012-06-15

    ...: Title 41 Positive Law Codification--Further Implementation (DFARS Case 2012- D003) AGENCY: Defense... titles throughout the DFARS to the new Positive Law Codification of Title 41, United States Code, ``Public Contracts.'' DATES: June 15, 2012. FOR FURTHER INFORMATION CONTACT: Ms. Amy G. Williams, telephone...

  2. Optimal patch code design via device characterization

    Science.gov (United States)

    Wu, Wencheng; Dalal, Edul N.

    2012-01-01

    In many color measurement applications, such as those for color calibration and profiling, "patch code" has been used successfully for job identification and automation to reduce operator errors. A patch code is similar to a barcode, but is intended primarily for use in measurement devices that cannot read barcodes due to limited spatial resolution, such as spectrophotometers. There is an inherent tradeoff between decoding robustness and the number of code levels available for encoding. Previous methods have attempted to address this tradeoff, but those solutions have been sub-optimal. In this paper, we propose a method to design optimal patch codes via device characterization. The tradeoff between decoding robustness and the number of available code levels is optimized in terms of printing and measurement efforts, and decoding robustness against noises from the printing and measurement devices. Effort is drastically reduced relative to previous methods because print-and-measure is minimized through modeling and the use of existing printer profiles. Decoding robustness is improved by distributing the code levels in CIE Lab space rather than in CMYK space.

  3. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  4. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  5. Development of objective provision trees for Sodium-Cooled Fast Reactor Defense-in-depth evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Huichang [TUEV Rheinland Korea Ltd., Seoul (Korea, Republic of); Suh, Namduk [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-05-15

    KALIMER is one of sodium-cooled fast reactor and being developed by Korea Atomic Energy Research Institute (KAERI), was developed and suggested in this paper. Developed OPT is for the defense-in-depth level 3, core heat removal safety function. Using OPT method, the evaluation of defense-in-depth implementation for the design features of KALIMER reactors were tried in this study. To utilize the design information of KALIMER, challenges in OPTs which are under development in this study, were identified based on the system physical boundaries. This approach make the identification of possible and postulated challenges much clear and this will be a benefit to further identification of provisions in KALIMER design. OPTs for other levels of defense-in-depth and other safety functions are under development.

  6. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  7. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  8. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  9. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  10. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  11. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  12. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  13. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  14. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  15. Sequence of the intron/exon junctions of the coding region of the human androgen receptor gene and identification of a point mutation in a family with complete androgen insensitivity

    Energy Technology Data Exchange (ETDEWEB)

    Lubahn, D.B.; Simental, J.A.; Higgs, H.N.; Wilson, E.M.; French, F.S. (Univ. of North Carolina, Chapel Hill (USA)); Brown, T.R.; Migeon, C.J. (Johns Hopkins Univ. School of Medicine, Baltimore, MD (USA))

    1989-12-01

    Androgens act through a receptor protein (AR) to mediate sex differentiation and development of the male phenotype. The authors have isolated the eight exons in the amino acid coding region of the AR gene from a human X chromosome library. Nucleotide sequences of the AR gene intron/exon boundaries were determined for use in designing synthetic oligonucleotide primers to bracket coding exons for amplification by the polymerase chain reaction. Genomic DNA was amplified from 46, XY phenotypic female siblings with complete androgen insensitivity syndrome. AR binding affinity for dihydrotestosterone in the affected siblings was lower than in normal males, but the binding capacity was normal. Sequence analysis of amplified exons demonstrated within the AR steroid-binding domain (exon G) a single guanine to adenine mutation, resulting in replacement of valine with methionine at amino acid residue 866. As expected, the carrier mother had both normal and mutant AR genes. Thus, a single point mutation in the steroid-binding domain of the AR gene correlated with the expression of an AR protein ineffective in stimulating male sexual development.

  16. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  17. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  18. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  19. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  20. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  1. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  2. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  3. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  4. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  5. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  6. 32 CFR 537.6 - Identification of recovery incidents.

    Science.gov (United States)

    2010-07-01

    ... for assistance with workers' compensation forms, without coordinating with the RJA or recovery... 32 National Defense 3 2010-07-01 2010-07-01 true Identification of recovery incidents. 537.6... ACCOUNTS CLAIMS ON BEHALF OF THE UNITED STATES § 537.6 Identification of recovery incidents....

  7. 32 CFR 707.7 - Submarine identification light.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Submarine identification light. 707.7 Section... RULES WITH RESPECT TO ADDITIONAL STATION AND SIGNAL LIGHTS § 707.7 Submarine identification light... off-period. The light will be located where it can best be seen, as near as practicable, all...

  8. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  9. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  10. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  11. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  12. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  13. 基于ARM的卷烟32位码防伪识别系统的设计与实现%Design and implementation of ARM-based anti-counterfeiting and identification system for cigarettes with 32-digit code

    Institute of Scientific and Technical Information of China (English)

    门鹏

    2013-01-01

    To fight such illegal behaviors as counterfeiting, smuggling and selling of cigarettes outside authorized areas, a cigarette anti-counterfeiting and identification system is designed and developed based on information technology. The 32-digit identification number is taken as identification object, and ARM single-chip microcomputer is adopted in the design of hardware of portable handheld devices. Image recognition technology is used to collect 32-digit code printed on the cigarettes, which is compared with one in the database by using of SMS module for distinguishing the genuine cigarettes from the fake cigarettes. The experiment shows that the system has the advantages of high recognition rate and strong reliability, which has wide applica-tion prospect and popularization value.%为有效打击假冒、走私、串货卷烟等违法行为,采用信息技术,设计并开发一套卷烟防伪识别系统.以卷烟32位代码作为识别对象,利用ARM单片机实现便携式手持设备的硬件构造,采用图像识别技术获取卷烟上的32位条码,通过短信模块完成与后台打码数据的比对,进而辨别卷烟的真伪.实验表明,该系统具有识别率高、可靠性强等优点,具有一定的应用推广价值.

  14. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  15. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  16. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  17. Flow regimes and heat transfer modes identification in ANGRA 2 core, during small break in the primary loop with area of 100 cm{sup 2}, simulated with RELAP5 code

    Energy Technology Data Exchange (ETDEWEB)

    Borges, Eduardo M.; Sabundjian, Gaiane, E-mail: gdgian@ipen.br, E-mail: borges.em@hotmail.com [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    Identifying the flow regimes and the heat transfer modes is important for the analysis of accidents such as the Loss-of-Coolant Accident (LOCA). The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used in the RELAP5/MOD3.2.gama code in ANGRA 2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 100cm{sup 2}-rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of ANGRA 2 (FSAR - A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of ANGRA 2 during the postulated accident. (author)

  18. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  19. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  20. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  1. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  2. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  3. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  4. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  5. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  6. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  7. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  8. Applications of Bar Code Technology in the Construction Industry

    Science.gov (United States)

    1991-01-01

    per week. This is an indication that we have much better control of our inventory " ( Ryan 87 ). Producto Machine Company of Bridgeport, Connecticut... marketing and patenting advanced technologies to encourage firms to take on the risks involved. Our country, however, has no such policy. Until it does...assistance in marketing and patenting their achievements. 2) The Department of Defense, who already requires bar codes on all supplies accepted into

  9. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  10. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  11. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  12. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  13. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  14. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  15. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  16. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  17. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  18. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

    NARCIS (Netherlands)

    Goktas, E.K.; Athanasopoulos, E.; Polychronakis, M.; Bos, H.J.; Portokalides, G.

    2014-01-01

    Code-reuse attacks based on return oriented programming are among the most popular exploitation techniques used by attackers today. Few practical defenses are able to stop such attacks on arbitrary binaries without access to source code. A notable exception are the techniques that employ new hardwar

  19. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  20. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  1. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  2. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  3. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  4. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  5. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  6. Detecting Code-Switching in a Multilingual Alpine Heritage Corpus

    OpenAIRE

    Volk, Martin; Clematide, Simon

    2014-01-01

    This paper describes experiments in detecting and annotating code-switching in a large multilingual diachronic corpus of Swiss Alpine texts. The texts are in English, French, German, Italian, Romansh and Swiss German. Because of the multilingual authors (mountaineers, scientists) and the assumed multilingual readers, the texts contain numerous code-switching elements. When building and annotating the corpus, we faced issues of language identification on the sentence and sub-sentential level. ...

  7. Binary CFG Rebuilt of Self-Modifying Codes

    Science.gov (United States)

    2016-10-03

    unlimited.10/13 (3) As an algorithm optimization of the symbolic execution, we investigated how to guarantee the termination of loop unfolding and...techniques in a specific order. The table below shows how a small binary code is packed and what kinds of obfuscation techniques are inserted (in which the...quite consistent among other small packed binary codes. Current experiments of the packer identification, which focuses only on the frequency of

  8. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  9. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  10. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  11. Identification by sequencing based typing and complete coding region analysis of three new HLA class II alleles: DRB3*0210, DRB3*0211 and DQB1*0310.

    Science.gov (United States)

    Balas, A; Santos, S; Aviles, M J; Garcia-Sanchez, F; Lillo, R; Vicario, J L

    2000-10-01

    The study of HLA class II polymorphism by direct exon 2 DNA sequencing analysis has been established to be a reliable and accurate high-resolution typing procedure. This approach shows some advantages in relation to previous methods, polymerase chain reaction using sequence-specific oligonucleotides (PCR-SSO) and sequence-specific primers (PCR-SSP), basically due to the capability of analysis for the complete sequenced genomic region, including non-polymorphic motifs. DRB3 and DQB1 sequencing based typing (SBT) in unrelated bone marrow donor searching allowed us to detect three new alleles. The complete coding region sequences were characterised from cDNA. Two new DRB3 alleles, DRB3*0210 and DRB3*0211, were described in two Caucasian bone marrow donors. Both sequences showed single point mutations regarding DRB3*0202, producing amino acid replacements at positions 51 (Asp to Thr) and 67 (Leu to Ile), respectively. These two point mutations can be found in other DRB alleles, and suggest that gene conversion would be involved in the origin of both alleles. A new DQB1 sequence was found in a Spanish patient that showed two nucleotide differences, positions 134 and 141, with regard to its close similar DQB1*03011 allele. Only substitution at position 134 provoked amino acid replacement at residue 45, Glu to Gly. This single amino acid change would be involved in the lack of serologic recognition of this new molecule by DQ7-specific reagents.

  12. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  13. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  14. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  15. 32 CFR Appendix C to Part 516 - Department of Defense Directive 5405.2, Release of Official Information in Litigation and...

    Science.gov (United States)

    2010-07-01

    ... of Official Information in Litigation and Testimony by DoD Personnel as Witnesses C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Pt. 516, App. C Appendix C to Part 516—Department of Defense... Code, Sections 301, 552, and 552a (b) Title 10, United States Code, Section 133 (c) DoD Directive...

  16. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  17. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  18. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  19. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  20. Defense Small Business Innovation Research Program (SBIR). Volume 4. Defense Agency Projects, Abstracts of Phase 1 Awards from FY 1989 SBIR Solicitation

    Science.gov (United States)

    1990-04-01

    LABORATORY UNDER THE CODE NAME " DELPHI ", FOR THE OFFICE OF STRATEGIC DEFENSE; AND BETATRON RESEARCH CONDUCTED BY BOTH U.S. AND SOVIET SOURCES SUPPORTS THE...TITLE: HYPERGOLIC FUEL INJECTOR FEATURES INCREASED UTILITY FOR REMOTELY PILOTED VEHICLES (RPVs) INCREASED RANGE ENDURANCE PAYLOAD MULTI.. TOPIC# 20...OFFICE: PM/SBIR IDENT#: 33860 A HYPERGOLIC FUEL INJECTOR IS DESCRIBED THAT ENABLES MULTIFUEL OPERATION, LOWER FUEL CONSUMPTION, AND ENHANCED ALL WEATHER

  1. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  2. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  3. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  4. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  5. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  6. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  7. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  8. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  9. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  10. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  11. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  12. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  13. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  14. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  15. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  16. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  17. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  18. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  19. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  20. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  1. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  2. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  3. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  4. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  5. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  6. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  7. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  8. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  9. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  10. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  11. Improvement of QR Code Recognition Based on Pillbox Filter Analysis

    Directory of Open Access Journals (Sweden)

    Jia-Shing Sheu

    2013-04-01

    Full Text Available The objective of this paper is to perform the innovation design for improving the recognition of a captured QR code image with blur through the Pillbox filter analysis. QR code images can be captured by digital video cameras. Many factors contribute to QR code decoding failure, such as the low quality of the image. Focus is an important factor that affects the quality of the image. This study discusses the out-of-focus QR code image and aims to improve the recognition of the contents in the QR code image. Many studies have used the pillbox filter (circular averaging filter method to simulate an out-of-focus image. This method is also used in this investigation to improve the recognition of a captured QR code image. A blurred QR code image is separated into nine levels. In the experiment, four different quantitative approaches are used to reconstruct and decode an out-of-focus QR code image. These nine reconstructed QR code images using methods are then compared. The final experimental results indicate improvements in identification.

  12. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  13. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  14. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  15. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  16. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  17. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  18. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  19. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  20. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  3. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  4. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  5. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  6. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  7. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  8. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  9. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  10. Coding and traceability for cells, tissues and organs for transplantation

    Science.gov (United States)

    Shinozaki, Naoshi

    2010-01-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with miss-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  11. CERN access card: Introduction of a bar code

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    Before the latest version of the implementation measures relating to Operational Circular No. 2 comes into force, we would like to inform you that, in future, CERN access cards may bear a bar code to transcribe the holder's identification number. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  12. CERN access cards - Introduction of a bar code (Reminder)

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    In accordance with the latest revised version of the implementation measures relating to Operational Circular No. 2, CERN access cards may bear a bar code transcribing the holder's identification number (the revised version of this subsidiary document to the aforementioned Circular will be published shortly). Relations with the Host States Service http://www.cern.ch/relations/ relations.secretariat@cern.ch Tel. 72848

  13. Optimal probabilistic dense coding schemes

    Science.gov (United States)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  14. Microbial Pathogenesis and Host Defense.

    Science.gov (United States)

    1998-03-01

    of Molecular Microbiology, Instituto de Biotecnologia , UNAM, Cuernavaca, Mexico: Regulatory features of bundle-forming pilus expression in...Jos& L. Puente. Department of Molecular Microbiology, Instituto de Biotecnologia , UNAM, Cuernavaca, Morelos, 62210, Mexico. In EPEC, the bfpA gene codes

  15. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    Ore 2,000 pounds Bauxite, metallurgical Ore 20 short tons or jamaica Bauxite, metallurgical Ore 20 short tons or surinam Bauxite, refractory Ore... Amphibian Vehicle (to recipients other than a 3. Army Tanks and other Combat museum): Vehicles: Commandant of the Marine Corps Commander Code LPP-2

  16. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  17. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a nu

  18. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a nu

  19. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  20. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  1. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  2. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  3. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  4. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  5. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  6. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  7. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  8. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    OpenAIRE

    Moses Okechukwu Onyesolu; Ignatius Majesty Ezeani

    2012-01-01

    The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's) for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric auth...

  9. Dental orthopantomogram biometrics system for human identification.

    Science.gov (United States)

    Singh, Sandeep; Bhargava, Darpan; Deshpande, Ashwini

    2013-07-01

    Fingerprinting is the most widely accepted method of identification of people. But in cases of disfigured, decomposed, burnt or fragmented bodies, it is of limited value. Teeth and dental restorations on the other hand are extremely resistant to destruction by fire. They retain a number of their original characteristics, which are often unique and hence offer a possibility of rather accurate and legally acceptable identification of such remains. This study was undertaken to evaluate the utility of orthopantomography for human identification and propose a coding system for orthopantomogram (OPG), which can be utilized as an identification tool in forensic sciences.

  10. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  11. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  12. MMPI Profiles and Code Types of Responsible and Non-Responsible Criminal Defendants.

    Science.gov (United States)

    Kurlychek, Robert T.; Jordan, L.

    1980-01-01

    Compared MMPI profiles and two-point code types of criminal defendants (N=50) pleading a defense of "not responsible due to mental disease or defect." A sign test was computed, treating the clinical scales as matched pairs, and a significant difference was found; the nonresponsible group profile was more elevated. (Author)

  13. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  14. 78 FR 7415 - Department of Defense Task Force on the Care, Management, and Transition of Recovering Wounded...

    Science.gov (United States)

    2013-02-01

    ... and Survivor Care Survey Program (continued) 5:00 p.m.-5:15 p.m. Wrap Up Day Two: Wednesday, February... (continued) 4:45 p.m.-5:00 p.m. Wrap Up Public's Accessibility to the Meeting: Pursuant to 5 U.S.C. 552b and... of Defense. BILLING CODE 5001-06-P...

  15. 78 FR 66902 - Department of Defense Task Force on the Care, Management, and Transition of Recovering Wounded...

    Science.gov (United States)

    2013-11-07

    .... Humana's Military Warrior Navigation and Assistance Program (WNAP) Briefing 4:30 p.m.-4:45 p.m. Wrap Up.... Wrap Up Public's Accessibility to the Meeting: Pursuant to 5 U.S.C. 552b and 41 CFR 102-3.140 through... of Defense. BILLING CODE 5001-06-P...

  16. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  17. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  18. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  19. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  20. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution