WorldWideScience

Sample records for defense identification code

  1. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  2. Error-Detecting Identification Codes for Algebra Students.

    Science.gov (United States)

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  3. The CODE: a revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H. R.; Olff, M.; Ursin, H.

    1997-01-01

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  4. The CODE : A revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H.R; Olff, M.; Ursin, H

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  5. Permanent phonetic identification code for radiation workers

    International Nuclear Information System (INIS)

    Khatua, R.; Somasundaram, S.; Srivastava, D.N.

    1987-01-01

    This report describes a system of self-checking short and easily memorisable 4-digit 'Permanent Phonetic Radiation Code' (PPRC) using radix 128 for Indians occupationally exposed to radiation, to facilitate entry of all radiation dose data pertaining to an individual in a single record of a file. The logic of PPRC is computer compatible. The necessary computer program has been developed in Health Physics Division for printing the PPRCs in Devanagari script through dot-matrix printers for making it understandable to the majority of the persons concerned. (author)

  6. DNA Bar-Coding for Phytoplasma Identification

    DEFF Research Database (Denmark)

    Makarova, Olga; Contaldo, Nicoletta; Paltrinieri, Samanta

    2013-01-01

    Phytoplasma identi fi cation has proved dif fi cult due to their inability to be maintained in vitro. DNA barcoding is an identi fi cation method based on comparison of a short DNA sequence with known sequences from a database. A DNA barcoding tool has been developed for phytoplasma identi fi cat...... genes, can be used to identify the following phytoplasma groups: 16SrI, 16SrII, 16SrIII, 16SrIV, 16SrV, 16SrVI, 16SrVII, 16SrIX, 16SrX, 16SrXI, 16SrXII, 16SrXV, 16SrXX, 16SrXXI....... cation. While other sequencebased methods may be well adapted to identification of particular strains of phytoplasmas, often they cannot be used for the simultaneous identification of phytoplasmas from different groups. The phytoplasma DNA barcoding protocol in this chapter, based on the tuf and 16SrRNA......Phytoplasma identi fi cation has proved dif fi cult due to their inability to be maintained in vitro. DNA barcoding is an identi fi cation method based on comparison of a short DNA sequence with known sequences from a database. A DNA barcoding tool has been developed for phytoplasma identi fi...

  7. Code for plant identification (KKS) key in PC version

    International Nuclear Information System (INIS)

    Pannenbaecker, K.

    1991-01-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.) [de

  8. Identification of coding and non-coding mutational hotspots in cancer genomes.

    Science.gov (United States)

    Piraino, Scott W; Furney, Simon J

    2017-01-05

    The identification of mutations that play a causal role in tumour development, so called "driver" mutations, is of critical importance for understanding how cancers form and how they might be treated. Several large cancer sequencing projects have identified genes that are recurrently mutated in cancer patients, suggesting a role in tumourigenesis. While the landscape of coding drivers has been extensively studied and many of the most prominent driver genes are well characterised, comparatively less is known about the role of mutations in the non-coding regions of the genome in cancer development. The continuing fall in genome sequencing costs has resulted in a concomitant increase in the number of cancer whole genome sequences being produced, facilitating systematic interrogation of both the coding and non-coding regions of cancer genomes. To examine the mutational landscapes of tumour genomes we have developed a novel method to identify mutational hotspots in tumour genomes using both mutational data and information on evolutionary conservation. We have applied our methodology to over 1300 whole cancer genomes and show that it identifies prominent coding and non-coding regions that are known or highly suspected to play a role in cancer. Importantly, we applied our method to the entire genome, rather than relying on predefined annotations (e.g. promoter regions) and we highlight recurrently mutated regions that may have resulted from increased exposure to mutational processes rather than selection, some of which have been identified previously as targets of selection. Finally, we implicate several pan-cancer and cancer-specific candidate non-coding regions, which could be involved in tumourigenesis. We have developed a framework to identify mutational hotspots in cancer genomes, which is applicable to the entire genome. This framework identifies known and novel coding and non-coding mutional hotspots and can be used to differentiate candidate driver regions from

  9. Long non-coding RNAs as molecular players in plant defense against pathogens.

    Science.gov (United States)

    Zaynab, Madiha; Fatima, Mahpara; Abbas, Safdar; Umair, Muhammad; Sharif, Yasir; Raza, Muhammad Ammar

    2018-05-31

    Long non-coding RNAs (lncRNAs) has significant role in of gene expression and silencing pathways for several biological processes in eukaryotes. lncRNAs has been reported as key player in remodeling chromatin and genome architecture, RNA stabilization and transcription regulation, including enhancer-associated activity. Host lncRNAs are reckoned as compulsory elements of plant defense. In response to pathogen attack, plants protect themselves with the help of lncRNAs -dependent immune systems in which lncRNAs regulate pathogen-associated molecular patterns (PAMPs) and other effectors. Role of lncRNAs in plant microbe interaction has been studied extensively but regulations of several lncRNAs still need extensive research. In this study we discussed and provide as overview the topical advancements and findings relevant to pathogen attack and plant defense mediated by lncRNAs. It is hoped that lncRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. Copyright © 2018. Published by Elsevier Ltd.

  10. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  11. Unique identification code for medical fundus images using blood vessel pattern for tele-ophthalmology applications.

    Science.gov (United States)

    Singh, Anushikha; Dutta, Malay Kishore; Sharma, Dilip Kumar

    2016-10-01

    Identification of fundus images during transmission and storage in database for tele-ophthalmology applications is an important issue in modern era. The proposed work presents a novel accurate method for generation of unique identification code for identification of fundus images for tele-ophthalmology applications and storage in databases. Unlike existing methods of steganography and watermarking, this method does not tamper the medical image as nothing is embedded in this approach and there is no loss of medical information. Strategic combination of unique blood vessel pattern and patient ID is considered for generation of unique identification code for the digital fundus images. Segmented blood vessel pattern near the optic disc is strategically combined with patient ID for generation of a unique identification code for the image. The proposed method of medical image identification is tested on the publically available DRIVE and MESSIDOR database of fundus image and results are encouraging. Experimental results indicate the uniqueness of identification code and lossless recovery of patient identity from unique identification code for integrity verification of fundus images. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Identification of ICD Codes Suggestive of Child Maltreatment

    Science.gov (United States)

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  13. Identification of Biomarkers for Defense Response to Plasmopara viticola in a Resistant Grape Variety

    Directory of Open Access Journals (Sweden)

    Giulia Chitarrini

    2017-09-01

    Full Text Available Downy mildew (Plasmopara viticola is one of the most destructive diseases of the cultivated species Vitis vinifera. The use of resistant varieties, originally derived from backcrosses of North American Vitis spp., is a promising solution to reduce disease damage in the vineyards. To shed light on the type and the timing of pathogen-triggered resistance, this work aimed at discovering biomarkers for the defense response in the resistant variety Bianca, using leaf discs after inoculation with a suspension of P. viticola. We investigated primary and secondary metabolism at 12, 24, 48, and 96 h post-inoculation (hpi. We used methods of identification and quantification for lipids (LC-MS/MS, phenols (LC-MS/MS, primary compounds (GC-MS, and semi-quantification for volatile compounds (GC-MS. We were able to identify and quantify or semi-quantify 176 metabolites, among which 53 were modulated in response to pathogen infection. The earliest changes occurred in primary metabolism at 24–48 hpi and involved lipid compounds, specifically unsaturated fatty acid and ceramide; amino acids, in particular proline; and some acids and sugars. At 48 hpi, we also found changes in volatile compounds and accumulation of benzaldehyde, a promoter of salicylic acid-mediated defense. Secondary metabolism was strongly induced only at later stages. The classes of compounds that increased at 96 hpi included phenylpropanoids, flavonols, stilbenes, and stilbenoids. Among stilbenoids we found an accumulation of ampelopsin H + vaticanol C, pallidol, ampelopsin D + quadrangularin A, Z-miyabenol C, and α-viniferin in inoculated samples. Some of these compounds are known as phytoalexins, while others are novel biomarkers for the defense response in Bianca. This work highlighted some important aspects of the host response to P. viticola in a commercial variety under controlled conditions, providing biomarkers for a better understanding of the mechanism of plant defense and a

  14. Enhancing lineup identification accuracy: two codes are better than one.

    Science.gov (United States)

    Melara, R D; DeWitt-Rickards, T S; O'Brien, T P

    1989-10-01

    Ways of improving identification accuracy were explored by comparing the conventional visual lineup with an auditory/visual lineup, one that paired color photographs with voice recordings. This bimodal lineup necessitated sequential presentation of lineup members; Experiment 1 showed that performance in sequential lineups was better than performance in traditional simultaneous lineups. In Experiments 2A and 2B unimodal and bimodal lineups were compared by using a multiple-lineup paradigm: Ss viewed 3 videotaped episodes depicting standard police procedures and were tested in 4 sequential lineups. Bimodal lineups were more diagnostic than either visual or auditory lineups alone. The bimodal lineup led to a 126% improvement in number of correct identifications over the conventional visual lineup, with no concomitant increase in number of false identifications. These results imply strongly that bimodal procedures should be adopted in real-world lineups. The nature of memorial processes underlying this bimodal advantage is discussed.

  15. To Fight Against the Defensive Jurisprudence with the New Civil Procedure Code: Yes, We Can! Or Can We?

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2016-10-01

    Full Text Available In order to reduce their workloads, Brazilian Courts have been landing many precedents that lead to unwarranted restrictions to the right to appeal, thereby belittling the fundamental constitutional right to access to justice. Despite the existence of studies on this "defensive jurisprudence", there are still few who analyze it in the light of the new Civil Procedure Code (Law 13.105/2015, which is about to enter into force. This article aims to evaluate the suitability of the new CPC to remedy this adjudicative problem or at least minimize it. We demonstrated, based on literature and through a deductive argumentative reasoning, that the new procedural law contains a number of specific and general legal clauses which may be used as instruments able to curb the adjudicate "defensiveness. Nonetheless, the achievement of this goal will depend largely on how this legal clauses are to be interpreted and applied.

  16. Genome-wide identification of coding and non-coding conserved sequence tags in human and mouse genomes

    Directory of Open Access Journals (Sweden)

    Maggi Giorgio P

    2008-06-01

    Full Text Available Abstract Background The accurate detection of genes and the identification of functional regions is still an open issue in the annotation of genomic sequences. This problem affects new genomes but also those of very well studied organisms such as human and mouse where, despite the great efforts, the inventory of genes and regulatory regions is far from complete. Comparative genomics is an effective approach to address this problem. Unfortunately it is limited by the computational requirements needed to perform genome-wide comparisons and by the problem of discriminating between conserved coding and non-coding sequences. This discrimination is often based (thus dependent on the availability of annotated proteins. Results In this paper we present the results of a comprehensive comparison of human and mouse genomes performed with a new high throughput grid-based system which allows the rapid detection of conserved sequences and accurate assessment of their coding potential. By detecting clusters of coding conserved sequences the system is also suitable to accurately identify potential gene loci. Following this analysis we created a collection of human-mouse conserved sequence tags and carefully compared our results to reliable annotations in order to benchmark the reliability of our classifications. Strikingly we were able to detect several potential gene loci supported by EST sequences but not corresponding to as yet annotated genes. Conclusion Here we present a new system which allows comprehensive comparison of genomes to detect conserved coding and non-coding sequences and the identification of potential gene loci. Our system does not require the availability of any annotated sequence thus is suitable for the analysis of new or poorly annotated genomes.

  17. PROBCON-HDW: A probability and consequence system of codes for long-term analysis of Hanford defense wastes

    International Nuclear Information System (INIS)

    Piepho, M.G.; Nguyen, T.H.

    1988-12-01

    The PROBCON-HDW (PROBability and CONsequence analysis for Hanford defense waste) computer code system calculates the long-term cumulative releases of radionuclides from the Hanford defense wastes (HDW) to the accessible environment and compares the releases to environmental release limits as defined in 40 CFR 191. PROBCON-HDW takes into account the variability of input parameter values used in models to calculate HDW release and transport in the vadose zone to the accessible environment (taken here as groundwater). A human intrusion scenario, which consists of drilling boreholes into the waste beneath the waste sites and bringing waste to the surface, is also included in PROBCON-HDW. PROBCON-HDW also includes the capability to combine the cumulative releases according to various long-term (10,000 year) scenarios into a composite risk curve or complementary cumulative distribution function (CCDF). The system structure of the PROBCON-HDW codes, the mathematical models in PROBCON-HDW, the input files, the input formats, the command files, and the graphical output results of several HDW release scenarios are described in the report. 3 refs., 7 figs., 9 tabs

  18. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.12 What security controls must I use for identification codes and passwords? If you use electronic signatures based upon use...

  19. Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation

    Science.gov (United States)

    2006-06-16

    Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline ...and client configurations was motivated by our desire to measure the processor over- head imposed by the Strata VM. Providing the server twice as much

  20. Computerized Dental Comparison: A Critical Review of Dental Coding and Ranking Algorithms Used in Victim Identification.

    Science.gov (United States)

    Adams, Bradley J; Aschheim, Kenneth W

    2016-01-01

    Comparison of antemortem and postmortem dental records is a leading method of victim identification, especially for incidents involving a large number of decedents. This process may be expedited with computer software that provides a ranked list of best possible matches. This study provides a comparison of the most commonly used conventional coding and sorting algorithms used in the United States (WinID3) with a simplified coding format that utilizes an optimized sorting algorithm. The simplified system consists of seven basic codes and utilizes an optimized algorithm based largely on the percentage of matches. To perform this research, a large reference database of approximately 50,000 antemortem and postmortem records was created. For most disaster scenarios, the proposed simplified codes, paired with the optimized algorithm, performed better than WinID3 which uses more complex codes. The detailed coding system does show better performance with extremely large numbers of records and/or significant body fragmentation. © 2015 American Academy of Forensic Sciences.

  1. Validation of ICD-9-CM coding algorithm for improved identification of hypoglycemia visits

    Directory of Open Access Journals (Sweden)

    Lieberman Rebecca M

    2008-04-01

    Full Text Available Abstract Background Accurate identification of hypoglycemia cases by International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM codes will help to describe epidemiology, monitor trends, and propose interventions for this important complication in patients with diabetes. Prior hypoglycemia studies utilized incomplete search strategies and may be methodologically flawed. We sought to validate a new ICD-9-CM coding algorithm for accurate identification of hypoglycemia visits. Methods This was a multicenter, retrospective cohort study using a structured medical record review at three academic emergency departments from July 1, 2005 to June 30, 2006. We prospectively derived a coding algorithm to identify hypoglycemia visits using ICD-9-CM codes (250.3, 250.8, 251.0, 251.1, 251.2, 270.3, 775.0, 775.6, and 962.3. We confirmed hypoglycemia cases by chart review identified by candidate ICD-9-CM codes during the study period. The case definition for hypoglycemia was documented blood glucose 3.9 mmol/l or emergency physician charted diagnosis of hypoglycemia. We evaluated individual components and calculated the positive predictive value. Results We reviewed 636 charts identified by the candidate ICD-9-CM codes and confirmed 436 (64% cases of hypoglycemia by chart review. Diabetes with other specified manifestations (250.8, often excluded in prior hypoglycemia analyses, identified 83% of hypoglycemia visits, and unspecified hypoglycemia (251.2 identified 13% of hypoglycemia visits. The absence of any predetermined co-diagnosis codes improved the positive predictive value of code 250.8 from 62% to 92%, while excluding only 10 (2% true hypoglycemia visits. Although prior analyses included only the first-listed ICD-9 code, more than one-quarter of identified hypoglycemia visits were outside this primary diagnosis field. Overall, the proposed algorithm had 89% positive predictive value (95% confidence interval, 86–92 for

  2. CERPI and CEREL, two computer codes for the automatic identification and determination of gamma emitters in thermal neutron activated samples

    International Nuclear Information System (INIS)

    Giannini, M.; Oliva, P.R.; Ramorino, C.

    1978-01-01

    A description is given of a computer code which automatically analyses gamma-ray spectra obtained with Ge(Li) detectors. The program contains features as automatic peak location and fitting, determination of peak energies and intensities, nuclide identification and calculation of masses and errors. Finally the results obtained with our computer code for a lunar sample are reported and briefly discussed

  3. Identification of Thioredoxin Target Disulfides Using Isotope-Coded Affinity Tags

    DEFF Research Database (Denmark)

    Hägglund, Per; Bunkenborg, Jakob; Maeda, Kenji

    2014-01-01

    Thioredoxins (Trx) are small redox proteins that reduce disulfide bonds in various target proteins and maintain cellular thiol redox control. Here, a thiol-specific labeling and affinity enrichment approach for identification and relative quantification of Trx target disulfides in complex protein...... reduction is determined by LC-MS/MS-based quantification of tryptic peptides labeled with "light" (12C) and "heavy" (13C) ICAT reagents. The methodology can be adapted to monitor the effect of different reductants or oxidants on the redox status of thiol/disulfide proteomes in biological systems....... extracts is described. The procedure utilizes the isotope-coded affinity tag (ICAT) reagents containing a thiol reactive iodoacetamide group and a biotin affinity tag to target peptides containing reduced cysteine residues. The identification of substrates for Trx and the extent of target disulfide...

  4. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Directory of Open Access Journals (Sweden)

    Ai-bing Zhang

    Full Text Available Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish and two representing non-coding ITS barcodes (rust fungi and brown algae. Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ and Maximum likelihood (ML methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40% for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37% for 1094 brown algae queries, both using ITS barcodes.

  5. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Science.gov (United States)

    Zhang, Ai-bing; Feng, Jie; Ward, Robert D; Wan, Ping; Gao, Qiang; Wu, Jun; Zhao, Wei-zhong

    2012-01-01

    Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI) region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS) genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF) to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish) and two representing non-coding ITS barcodes (rust fungi and brown algae). Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ) and Maximum likelihood (ML) methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI) of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40%) for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37%) for 1094 brown algae queries, both using ITS barcodes.

  6. Transcriptional response of bronchial epithelial cells to Pseudomonas aeruginosa: identification of early mediators of host defense.

    NARCIS (Netherlands)

    Vos, J.B.; Sterkenburg, M.A. van; Rabe, K.F.; Schalkwijk, J.; Hiemstra, P.S.; Datson, N.A.

    2005-01-01

    The airway epithelium responds to microbial exposure by altering expression of a variety of genes to increase innate host defense. We aimed to delineate the early transcriptional response in human primary bronchial epithelial cells exposed for 6 h to a mixture of IL-1beta and TNF-alpha or

  7. Stealth proteins: in silico identification of a novel protein family rendering bacterial pathogens invisible to host immune defense.

    Directory of Open Access Journals (Sweden)

    Peter Sperisen

    2005-11-01

    Full Text Available There are a variety of bacterial defense strategies to survive in a hostile environment. Generation of extracellular polysaccharides has proved to be a simple but effective strategy against the host's innate immune system. A comparative genomics approach led us to identify a new protein family termed Stealth, most likely involved in the synthesis of extracellular polysaccharides. This protein family is characterized by a series of domains conserved across phylogeny from bacteria to eukaryotes. In bacteria, Stealth (previously characterized as SacB, XcbA, or WefC is encoded by subsets of strains mainly colonizing multicellular organisms, with evidence for a protective effect against the host innate immune defense. More specifically, integrating all the available information about Stealth proteins in bacteria, we propose that Stealth is a D-hexose-1-phosphoryl transferase involved in the synthesis of polysaccharides. In the animal kingdom, Stealth is strongly conserved across evolution from social amoebas to simple and complex multicellular organisms, such as Dictyostelium discoideum, hydra, and human. Based on the occurrence of Stealth in most Eukaryotes and a subset of Prokaryotes together with its potential role in extracellular polysaccharide synthesis, we propose that metazoan Stealth functions to regulate the innate immune system. Moreover, there is good reason to speculate that the acquisition and spread of Stealth could be responsible for future epidemic outbreaks of infectious diseases caused by a large variety of eubacterial pathogens. Our in silico identification of a homologous protein in the human host will help to elucidate the causes of Stealth-dependent virulence. At a more basic level, the characterization of the molecular and cellular function of Stealth proteins may shed light on fundamental mechanisms of innate immune defense against microbial invasion.

  8. Stealth Proteins: In Silico Identification of a Novel Protein Family Rendering Bacterial Pathogens Invisible to Host Immune Defense.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available There are a variety of bacterial defense strategies to survive in a hostile environment. Generation of extracellular polysaccharides has proved to be a simple but effective strategy against the host's innate immune system. A comparative genomics approach led us to identify a new protein family termed Stealth, most likely involved in the synthesis of extracellular polysaccharides. This protein family is characterized by a series of domains conserved across phylogeny from bacteria to eukaryotes. In bacteria, Stealth (previously characterized as SacB, XcbA, or WefC is encoded by subsets of strains mainly colonizing multicellular organisms, with evidence for a protective effect against the host innate immune defense. More specifically, integrating all the available information about Stealth proteins in bacteria, we propose that Stealth is a D-hexose-1-phosphoryl transferase involved in the synthesis of polysaccharides. In the animal kingdom, Stealth is strongly conserved across evolution from social amoebas to simple and complex multicellular organisms, such as Dictyostelium discoideum, hydra, and human. Based on the occurrence of Stealth in most Eukaryotes and a subset of Prokaryotes together with its potential role in extracellular polysaccharide synthesis, we propose that metazoan Stealth functions to regulate the innate immune system. Moreover, there is good reason to speculate that the acquisition and spread of Stealth could be responsible for future epidemic outbreaks of infectious diseases caused by a large variety of eubacterial pathogens. Our in silico identification of a homologous protein in the human host will help to elucidate the causes of Stealth-dependent virulence. At a more basic level, the characterization of the molecular and cellular function of Stealth proteins may shed light on fundamental mechanisms of innate immune defense against microbial invasion.

  9. Flow regime identification methodology with MCNP-X code and artificial neural network

    International Nuclear Information System (INIS)

    Salgado, Cesar M.; Instituto de Engenharia Nuclear; Schirru, Roberto; Brandao, Luis E.B.; Pereira, Claudio M.N.A.

    2009-01-01

    This paper presents flow regimes identification methodology in multiphase system in annular, stratified and homogeneous oil-water-gas regimes. The principle is based on recognition of the pulse height distributions (PHD) from gamma-ray with supervised artificial neural network (ANN) systems. The detection geometry simulation comprises of two NaI(Tl) detectors and a dual-energy gamma-ray source. The measurement of scattered radiation enables the dual modality densitometry (DMD) measurement principle to be explored. Its basic principle is to combine the measurement of scattered and transmitted radiation in order to acquire information about the different flow regimes. The PHDs obtained by the detectors were used as input to ANN. The data sets required for training and testing the ANN were generated by the MCNP-X code from static and ideal theoretical models of multiphase systems. The ANN correctly identified the three different flow regimes for all data set evaluated. The results presented show that PHDs examined by ANN may be applied in the successfully flow regime identification. (author)

  10. Evidence for a Nest Defense Pheromone in Bald-Faced Hornets, Dolichovespula Maculata, and Identification of Components.

    Science.gov (United States)

    Jimenez, Sebastian Ibarra; Gries, Regine; Zhai, Huimin; Derstine, Nathan; McCann, Sean; Gries, Gerhard

    2016-05-01

    In eusocial insects like Bald-faced hornets, Dolichovespula maculata, nest defense is essential because nests contain a large number of protein-rich larvae and pupae, and thus are attractive to nest predators. Our objectives were to investigate whether D. maculata exhibit pheromone-mediated nest defense, and to identify and field test any pheromone components. We tested for pheromone-mediated nest defense behavior of D. maculata by placing a paired box-apparatus near the entrance of D. maculata nests, and treating both boxes with a solvent control, or one of the two boxes with a solvent control and the other with either venom sac extract, the putative source of nest defense pheromone, or synthetic pheromone. The sound impulses caused by nest mates attempting to sting or strike the boxes were recorded for 3 min. Compared to the double-control treatment, the number of strikes increased 27-fold when one of the two boxes was treated with venom sac extract, providing evidence for an alarm response. The box treated with venom sac extract also induced a significantly greater proportion of strikes than the corresponding control box, providing evidence for a target-oriented response. Analyzing venom sac extract by gas chromatographic-electroantennographic detection (GC-EAD) and GC-mass spectrometry resulted in the identification of seven candidate pheromone components: (a) dimethylaminoethanol, (b) dimethylamino ethyl acetate, (c) 2,5-dimethylpyrazine, (d) N-3-methylbutylacetamide, (e) 2-heptadecanone, (f) (Z)-8-heptadecen-2-one, and (g) (Z)-10-nonadecen-2-one. Testing in paired-box bioassays blends of the nitrogen-containing volatile components a-d, the less volatile ketones e-g, or both (a-g), indicated that a-d primarily have an alarm function. The ketones e-g, in contrast, induced target-oriented responses, possibly marking the box, or potential nest predators, for guided and concerted attacks, or enhancing the alarm-inducing effect of the volatile pheromone components

  11. Container for waste, identification code reading device thereof, method and system for controlling waste by using them

    International Nuclear Information System (INIS)

    Kikuchi, Takashi; Yoshida, Tomiji; Omote, Tatsuyuki.

    1991-01-01

    In the conventional method of controlling waste containers by labels attached thereto, the data relevant to wastes contained in the waste containers are limited. Further, if the label should be peeled off, there is a possibility that the wastes therein can no more be identified. Then, in the present invention, an identification plate is previously attached, to which mechanically readable codes or visually readable letters or numerical figures are written. Then, the identification codes can be read in a remote control manner at high speed and high reliability and the waste containers can be managed only by the identification codes of the containers. Further, the identification codes on the container are made so as to be free from aging degradation, thereby enabling to manage waste containers for long time storage. With such a constitution, since data can be inputted from an input terminal and a great amount of data such as concerning the source of wastes can be managed collectively on a software, the data can be managed easily. (T.M.)

  12. THE END OF TRANSGENIC FOOD LABELING AND THE RIGHT TO INFORMATION CONSERVED BY THE CONSUMER DEFENSE CODE IN THE LIGHT OF THE FEDERAL CONSTITUTION OF 1988

    Directory of Open Access Journals (Sweden)

    Ingrid Lima Barbosa

    2018-03-01

    Full Text Available Bill No. 4.148/08 intends to eliminate the requirement for the “T” symbol in the packaging of products containing more than one percent of GMOs in its composition, due to the alleged negative charge that it presents, going against what is advocated by the Biosafety Law, the Consumer Defense Code, as well as the Federal Constitution. Thus, the objective is to analyze the consequences to consumers, in case the bill is eventually sanctioned, as well as if there is an affront to the fundamental precepts listed in the Magna Carta and other legal diplomas, through the inductive method of research supported by the bibliographic collection available. It was concluded that, in addition to confronting the provisions of the Consumer Defense Code, there is also a violation of the Cartagena Protocol on Biosafety, as well as the material unconstitutionality of Bill No. 4.148/08, resulting from the affront to articles 5, XIV and XXXII, and 170, V of the Constitution.

  13. Mycoplasma non-coding RNA: identification of small RNAs and targets

    Directory of Open Access Journals (Sweden)

    Franciele Maboni Siqueira

    2016-10-01

    Full Text Available Abstract Background Bacterial non-coding RNAs act by base-pairing as regulatory elements in crucial biological processes. We performed the identification of trans-encoded small RNAs (sRNA from the genomes of Mycoplama hyopneumoniae, Mycoplasma flocculare and Mycoplasma hyorhinis, which are Mycoplasma species that have been identified in the porcine respiratory system. Results A total of 47, 15 and 11 putative sRNAs were predicted in M. hyopneumoniae, M. flocculare and M. hyorhinis, respectively. A comparative genomic analysis revealed the presence of species or lineage specific sRNA candidates. Furthermore, the expression profile of some M. hyopneumoniae sRNAs was determined by a reverse transcription amplification approach, in three different culture conditions. All tested sRNAs were transcribed in at least one condition. A detailed investigation revealed a differential expression profile for two M. hyopneumoniae sRNAs in response to oxidative and heat shock stress conditions, suggesting that their expression is influenced by environmental signals. Moreover, we analyzed sRNA-mRNA hybrids and accessed putative target genes for the novel sRNA candidates. The majority of the sRNAs showed interaction with multiple target genes, some of which could be linked to pathogenesis and cell homeostasis activity. Conclusion This study contributes to our knowledge of Mycoplasma sRNAs and their response to environmental changes. Furthermore, the mRNA target prediction provides a perspective for the characterization and comprehension of the function of the sRNA regulatory mechanisms.

  14. Identification of genetic loci required for Campylobacter resistance to fowlicidin-1, a chicken host defense peptide

    Directory of Open Access Journals (Sweden)

    Ky Van Hoang

    2012-03-01

    Full Text Available Antimicrobial peptides (AMPs are critical components of host defense limiting bacterial infections at the gastrointestinal mucosal surface. Bacterial pathogens have co-evolved with host innate immunity and developed means to counteract the effect of endogenous AMPs. However, molecular mechanisms of AMP resistance in Campylobacter, an important human food borne pathogen with poultry as a major reservoir, are still largely unknown. In this study, random transposon mutagenesis and targeted site-directed mutagenesis approaches were used to identify genetic loci contributing Campylobacter resistance to fowlicidin-1, a chicken AMP belonging to cathelicidin family. An efficient transposon mutagenesis approach (EZ::TNTM Transposome in conjunction with a microtiter plate screening identified three mutants whose susceptibilities to fowlicidin-1 were significantly increased. Backcrossing of the transposon mutations into parent strain confirmed that the AMP-sensitive phenotype in each mutant was linked to the specific transposon insertion. Direct sequencing showed that these mutants have transposon inserted in the genes encoding two-component regulator CbrR, transporter CjaB, and putative trigger factor Tig. Genomic analysis also revealed an operon (Cj1580c-1584c that is homologous to sapABCDF, an operon conferring resistance to AMP in other pathogens. Insertional inactivation of Cj1583c (sapB significantly increased susceptibility of Campylobacter to fowlicidin-1. The sapB as well as tig and cjaB mutants were significantly impaired in their ability to compete with their wild-type strain 81-176 to colonize the chicken cecum. Together, this study identified four genetic loci in Campylobacter that will be useful for characterizing molecular basis of Campylobacter resistance to AMPs, a significant knowledge gap in Campylobacter pathogenesis.

  15. Code for plant identification (KKS) key in PC version. KKS-Schluessel-Programm in PC-Version

    Energy Technology Data Exchange (ETDEWEB)

    Pannenbaecker, K. (GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Erlangen (Germany) GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Muenchen (Germany))

    1991-11-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.).

  16. Five-way Smoking Status Classification Using Text Hot-Spot Identification and Error-correcting Output Codes

    OpenAIRE

    Cohen, Aaron M.

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2...

  17. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry

    Science.gov (United States)

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems. PMID:25616408

  18. The identification and characterization of non-coding and coding RNAs and their modified nucleosides by mass spectrometry.

    Science.gov (United States)

    Gaston, Kirk W; Limbach, Patrick A

    2014-01-01

    The analysis of ribonucleic acids (RNA) by mass spectrometry has been a valuable analytical approach for more than 25 years. In fact, mass spectrometry has become a method of choice for the analysis of modified nucleosides from RNA isolated out of biological samples. This review summarizes recent progress that has been made in both nucleoside and oligonucleotide mass spectral analysis. Applications of mass spectrometry in the identification, characterization and quantification of modified nucleosides are discussed. At the oligonucleotide level, advances in modern mass spectrometry approaches combined with the standard RNA modification mapping protocol enable the characterization of RNAs of varying lengths ranging from low molecular weight short interfering RNAs (siRNAs) to the extremely large 23 S rRNAs. New variations and improvements to this protocol are reviewed, including top-down strategies, as these developments now enable qualitative and quantitative measurements of RNA modification patterns in a variety of biological systems.

  19. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    Science.gov (United States)

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here.

  20. A QR code identification technology in package auto-sorting system

    Science.gov (United States)

    di, Yi-Juan; Shi, Jian-Ping; Mao, Guo-Yong

    2017-07-01

    Traditional manual sorting operation is not suitable for the development of Chinese logistics. For better sorting packages, a QR code recognition technology is proposed to identify the QR code label on the packages in package auto-sorting system. The experimental results compared with other algorithms in literatures demonstrate that the proposed method is valid and its performance is superior to other algorithms.

  1. Identification of Host Defense-Related Proteins Using Label-Free Quantitative Proteomic Analysis of Milk Whey from Cows with Staphylococcus aureus Subclinical Mastitis

    Directory of Open Access Journals (Sweden)

    Shaimaa Abdelmegid

    2017-12-01

    Full Text Available Staphylococcus aureus is the most common contagious pathogen associated with bovine subclinical mastitis. Current diagnosis of S. aureus mastitis is based on bacteriological culture of milk samples and somatic cell counts, which lack either sensitivity or specificity. Identification of milk proteins that contribute to host defense and their variable responses to pathogenic stimuli would enable the characterization of putative biomarkers of subclinical mastitis. To accomplish this, milk whey samples from healthy and mastitic dairy cows were analyzed using a label-free quantitative proteomics approach. In total, 90 proteins were identified, of which 25 showed significant differential abundance between healthy and mastitic samples. In silico functional analyses indicated the involvement of the differentially abundant proteins in biological mechanisms and signaling pathways related to host defense including pathogen-recognition, direct antimicrobial function, and the acute-phase response. This proteomics and bioinformatics analysis not only facilitates the identification of putative biomarkers of S. aureus subclinical mastitis but also recapitulates previous findings demonstrating the abundance of host defense proteins in intramammary infection. All mass spectrometry data are available via ProteomeXchange with identifier PXD007516.

  2. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    International Nuclear Information System (INIS)

    Miron, Adrian; Valentine, Joshua; Christenson, John; Hawwari, Majd; Bhatt, Santosh; Dunzik-Gougar, Mary Lou; Lineberry, Michael

    2009-01-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), University of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  3. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    Energy Technology Data Exchange (ETDEWEB)

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  4. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    International Nuclear Information System (INIS)

    Dickens, J.K.

    1981-03-01

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given

  5. CERPI and CEREL, two computer codes for the automatic identification and determination of gamma emitters in thermal-neutron-activated samples

    International Nuclear Information System (INIS)

    Giannini, M.; Oliva, P.R.; Ramorino, M.C.

    1979-01-01

    A computer code that automatically analyzes gamma-ray spectra obtained with Ge(Li) detectors is described. The program contains such features as automatic peak location and fitting, determination of peak energies and intensities, nuclide identification, and calculation of masses and errors. Finally, the results obtained with this computer code for a lunar sample are reported and briefly discussed

  6. NODC Standard Format Marine Toxic Substances and Pollutants (F144) chemical identification codes (NODC Accession 9200273)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This archival information package contains a listing of codes and chemical names that were used in NODC Standard Format Marine Toxic Substances and Pollutants (F144)...

  7. Use the Bar Code System to Improve Accuracy of the Patient and Sample Identification.

    Science.gov (United States)

    Chuang, Shu-Hsia; Yeh, Huy-Pzu; Chi, Kun-Hung; Ku, Hsueh-Chen

    2018-01-01

    In time and correct sample collection were highly related to patient's safety. The sample error rate was 11.1%, because misbranded patient information and wrong sample containers during January to April, 2016. We developed a barcode system of "Specimens Identify System" through process of reengineering of TRM, used bar code scanners, add sample container instructions, and mobile APP. Conclusion, the bar code systems improved the patient safety and created green environment.

  8. Validation of coding algorithms for the identification of patients hospitalized for alcoholic hepatitis using administrative data.

    Science.gov (United States)

    Pang, Jack X Q; Ross, Erin; Borman, Meredith A; Zimmer, Scott; Kaplan, Gilaad G; Heitman, Steven J; Swain, Mark G; Burak, Kelly W; Quan, Hude; Myers, Robert P

    2015-09-11

    Epidemiologic studies of alcoholic hepatitis (AH) have been hindered by the lack of a validated International Classification of Disease (ICD) coding algorithm for use with administrative data. Our objective was to validate coding algorithms for AH using a hospitalization database. The Hospital Discharge Abstract Database (DAD) was used to identify consecutive adults (≥18 years) hospitalized in the Calgary region with a diagnosis code for AH (ICD-10, K70.1) between 01/2008 and 08/2012. Medical records were reviewed to confirm the diagnosis of AH, defined as a history of heavy alcohol consumption, elevated AST and/or ALT (34 μmol/L, and elevated INR. Subgroup analyses were performed according to the diagnosis field in which the code was recorded (primary vs. secondary) and AH severity. Algorithms that incorporated ICD-10 codes for cirrhosis and its complications were also examined. Of 228 potential AH cases, 122 patients had confirmed AH, corresponding to a positive predictive value (PPV) of 54% (95% CI 47-60%). PPV improved when AH was the primary versus a secondary diagnosis (67% vs. 21%; P codes for ascites (PPV 75%; 95% CI 63-86%), cirrhosis (PPV 60%; 47-73%), and gastrointestinal hemorrhage (PPV 62%; 51-73%) had improved performance, however, the prevalence of these diagnoses in confirmed AH cases was low (29-39%). In conclusion the low PPV of the diagnosis code for AH suggests that caution is necessary if this hospitalization database is used in large-scale epidemiologic studies of this condition.

  9. IDGAM. A PC code and database to help nuclide identification in activation analysis

    International Nuclear Information System (INIS)

    Paviotti Corcuera, R.; Moraes Cunha, M. de; Jayanthi, K.A.

    1994-01-01

    The document describes a PC diskette containing a code and database which helps researchers to identify the nuclides in a radioactive sample. Data can be retrieved by gamma-ray energy, nuclide or element. The PC diskette is available, costfree, from the IAEA Nuclear Data Section, upon request. (author). 6 refs, 5 figs

  10. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    Valenzise G

    2009-01-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  11. Identification of evolutionarily conserved non-AUG-initiated N-terminal extensions in human coding sequences.

    LENUS (Irish Health Repository)

    Ivanov, Ivaylo P

    2011-05-01

    In eukaryotes, it is generally assumed that translation initiation occurs at the AUG codon closest to the messenger RNA 5\\' cap. However, in certain cases, initiation can occur at codons differing from AUG by a single nucleotide, especially the codons CUG, UUG, GUG, ACG, AUA and AUU. While non-AUG initiation has been experimentally verified for a handful of human genes, the full extent to which this phenomenon is utilized--both for increased coding capacity and potentially also for novel regulatory mechanisms--remains unclear. To address this issue, and hence to improve the quality of existing coding sequence annotations, we developed a methodology based on phylogenetic analysis of predicted 5\\' untranslated regions from orthologous genes. We use evolutionary signatures of protein-coding sequences as an indicator of translation initiation upstream of annotated coding sequences. Our search identified novel conserved potential non-AUG-initiated N-terminal extensions in 42 human genes including VANGL2, FGFR1, KCNN4, TRPV6, HDGF, CITED2, EIF4G3 and NTF3, and also affirmed the conservation of known non-AUG-initiated extensions in 17 other genes. In several instances, we have been able to obtain independent experimental evidence of the expression of non-AUG-initiated products from the previously published literature and ribosome profiling data.

  12. Angra 2 small break LOCA flow regime identification through RELAP5 code

    Energy Technology Data Exchange (ETDEWEB)

    Rocha, Marcelo da Silva; Sabundjian, Gaiane; Belchior Junior, Antonio; Andrade, Delvonei Alves de; Torres, Walmir Maximo; Conti, Thadeu das Neves; Macedo, Luiz Alberto; Umbehaun, Pedro Ernesto; Mesquita, Roberto Navarro de; Masotti, Paulo Henrique Ferraz, E-mail: msrocha@ipen.br, E-mail: gdjian@ipen.br, E-mail: abelchior@ipen.br, E-mail: delvonei@ipen.br, E-mail: wmtorres@ipen.br, E-mail: tnconti@ipen.br, E-mail: lamacedo@ipen.br, E-mail: umbehaun@ipen.br, E-mail: s, E-mail: rnavarro@ipen.br, E-mail: pmasotti@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    The purpose of this paper is to identify the flow regimes in the core of Angra 2 nuclear reactor with RELAP5/MOD3.2.gamma code (RELAP5, 2001). The postulated accident is the loss of coolant through a small break in the primary circuit (SBLOCA), which is described in Chapter 15 of the Final Safety Analysis Report of Angra 2 - FSAR (ETN, 2006). As the primary circuit pressure decreases due to the loss of coolant, several alternating two phase flow regimes are established in the primary circuit. This paper analyses the coolant two-phase flow behavior in the nuclear reactor core during the postulated accident. (author)

  13. Genome-wide identification and characterization of long intergenic non-coding RNAs in Ganoderma lucidum.

    Directory of Open Access Journals (Sweden)

    Jianqin Li

    Full Text Available Ganoderma lucidum is a white-rot fungus best-known for its medicinal activities. We have previously sequenced its genome and annotated the protein coding genes. However, long non-coding RNAs in G. lucidum genome have not been analyzed. In this study, we have identified and characterized long intergenic non-coding RNAs (lincRNA in G. lucidum systematically. We developed a computational pipeline, which was used to analyze RNA-Seq data derived from G. lucidum samples collected from three developmental stages. A total of 402 lincRNA candidates were identified, with an average length of 609 bp. Analysis of their adjacent protein-coding genes (apcGenes revealed that 46 apcGenes belong to the pathways of triterpenoid biosynthesis and lignin degradation, or families of cytochrome P450, mating type B genes, and carbohydrate-active enzymes. To determine if lincRNAs and these apcGenes have any interactions, the corresponding pairs of lincRNAs and apcGenes were analyzed in detail. We developed a modified 3' RACE method to analyze the transcriptional direction of a transcript. Among the 46 lincRNAs, 37 were found unidirectionally transcribed, and 9 were found bidirectionally transcribed. The expression profiles of 16 of these 37 lincRNAs were found to be highly correlated with those of the apcGenes across the three developmental stages. Among them, 11 are positively correlated (r>0.8 and 5 are negatively correlated (r<-0.8. The co-localization and co-expression of lincRNAs and those apcGenes playing important functions is consistent with the notion that lincRNAs might be important regulators for cellular processes. In summary, this represents the very first study to identify and characterize lincRNAs in the genomes of basidiomycetes. The results obtained here have laid the foundation for study of potential lincRNA-mediated expression regulation of genes in G. lucidum.

  14. Application of Inverse Gamma Transport to Material Thickness Identification with SGRD Code

    Directory of Open Access Journals (Sweden)

    Humbert Philippe

    2017-01-01

    Full Text Available SGRD (Spectroscopy, Gamma rays, Rapid, Deterministic code is used to infer the dimensions of a one dimensional model of a shielded gamma ray source. The method is based on the simulation of the uncollided leakage current of discrete gamma lines that are produced by nuclear decay. Experimentally, the unscattered gamma lines leakage current is obtained by processing high precision gamma spectroscopy measurements. The material thicknesses are computed with SGRD using a fast ray-tracing algorithm embedded in a non-linear multidimensional iterative optimization procedure that minimizes the error metric between calculated and measured signatures. For verification, numerical results on a test problem are presented.

  15. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    Directory of Open Access Journals (Sweden)

    Abdul Rouf Mir

    2016-01-01

    Full Text Available This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR. Out of 98 isolates, 71 (72.45% isolates were identified as E. coli and the remaining 27 (27.55% as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients.

  16. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India.

    Science.gov (United States)

    Mir, Abdul Rouf; Bashir, Yasir; Dar, Firdous Ahmad; Sekhar, M

    This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR). Out of 98 isolates, 71 (72.45%) isolates were identified as E. coli and the remaining 27 (27.55%) as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients.

  17. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  18. Co-expression analysis and identification of fecundity-related long non-coding RNAs in sheep ovaries.

    Science.gov (United States)

    Miao, Xiangyang; Luo, Qingmiao; Zhao, Huijing; Qin, Xiaoyu

    2016-12-16

    Small Tail Han sheep, including the FecB B FecB B (Han BB) and FecB + FecB + (Han++) genotypes, and Dorset sheep exhibit different fecundities. To identify novel long non-coding RNAs (lncRNAs) associated with sheep fecundity to better understand their molecular mechanisms, a genome-wide analysis of mRNAs and lncRNAs from Han BB, Han++ and Dorset sheep was performed. After the identification of differentially expressed mRNAs and lncRNAs, 16 significant modules were explored by using weighted gene coexpression network analysis (WGCNA) followed by functional enrichment analysis of the genes and lncRNAs in significant modules. Among these selected modules, the yellow and brown modules were significantly related to sheep fecundity. lncRNAs (e.g., NR0B1, XLOC_041882, and MYH15) in the yellow module were mainly involved in the TGF-β signalling pathway, and NYAP1 and BCORL1 were significantly associated with the oxytocin signalling pathway, which regulates several genes in the coexpression network of the brown module. Overall, we identified several gene modules associated with sheep fecundity, as well as networks consisting of hub genes and lncRNAs that may contribute to sheep prolificacy by regulating the target mRNAs related to the TGF-β and oxytocin signalling pathways. This study provides an alternative strategy for the identification of potential candidate regulatory lncRNAs.

  19. Identification of novel non-coding RNAs as potential antisense regulators in the archaeon Sulfolobus solfataricus

    DEFF Research Database (Denmark)

    tang, T. H.; Polacek, N.; Zywicki, M.

    2005-01-01

    By generating a specialized cDNA library from the archaeon Sulfolobus solfataricus, we have identified 57 novel small non-coding RNA (ncRNA) candidates and confirmed their expression by Northern blot analysis. The majority was found to belong to one of two classes, either antisense or antisense...... elements by inhibiting expression of the transposase mRNA. Surprisingly, the class of antisense RNAs also contained RNAs complementary to tRNAs or sRNAs (small-nucleolar-like RNAs). For the antisense-box ncRNAs, the majority could be assigned to the class of C/D sRNAs, which specify 2'-O-methylation sites...... on rRNAs or tRNAs. Five C/D sRNAs of this group are predicted to target methylation at six sites in 13 different tRNAs, thus pointing to the widespread role of these sRNA species in tRNA modification in Archaea. Another group of antisense-box RNAs, lacking typical C/D sRNA motifs, was predicted...

  20. PSP: rapid identification of orthologous coding genes under positive selection across multiple closely related prokaryotic genomes.

    Science.gov (United States)

    Su, Fei; Ou, Hong-Yu; Tao, Fei; Tang, Hongzhi; Xu, Ping

    2013-12-27

    With genomic sequences of many closely related bacterial strains made available by deep sequencing, it is now possible to investigate trends in prokaryotic microevolution. Positive selection is a sub-process of microevolution, in which a particular mutation is favored, causing the allele frequency to continuously shift in one direction. Wide scanning of prokaryotic genomes has shown that positive selection at the molecular level is much more frequent than expected. Genes with significant positive selection may play key roles in bacterial adaption to different environmental pressures. However, selection pressure analyses are computationally intensive and awkward to configure. Here we describe an open access web server, which is designated as PSP (Positive Selection analysis for Prokaryotic genomes) for performing evolutionary analysis on orthologous coding genes, specially designed for rapid comparison of dozens of closely related prokaryotic genomes. Remarkably, PSP facilitates functional exploration at the multiple levels by assignments and enrichments of KO, GO or COG terms. To illustrate this user-friendly tool, we analyzed Escherichia coli and Bacillus cereus genomes and found that several genes, which play key roles in human infection and antibiotic resistance, show significant evidence of positive selection. PSP is freely available to all users without any login requirement at: http://db-mml.sjtu.edu.cn/PSP/. PSP ultimately allows researchers to do genome-scale analysis for evolutionary selection across multiple prokaryotic genomes rapidly and easily, and identify the genes undergoing positive selection, which may play key roles in the interactions of host-pathogen and/or environmental adaptation.

  1. Identification of neural firing patterns, frequency and temporal coding mechanisms in individual aortic baroreceptors

    Directory of Open Access Journals (Sweden)

    Huaguang eGu

    2015-08-01

    Full Text Available In rabbit depressor nerve fibers, an on-off firing pattern, period-1 firing, and integer multiple firing with quiescent state were observed as the static pressure level was increased. A bursting pattern with bursts at the systolic phase of blood pressure, continuous firing, and bursting with burst at diastolic phase and quiescent state at systolic phase were observed as the mean level of the dynamic blood pressure was increased. For both static and dynamic pressures, the firing frequency of the first two firing patterns increased and of the last firing pattern decreased due to the quiescent state. If the quiescent state is disregarded, the spike frequency becomes an increasing trend. The instantaneous spike frequency of the systolic phase bursting, continuous firing, and diastolic phase bursting can reflect the temporal process of the systolic phase, whole procedure, and diastolic phase of the dynamic blood pressure signal, respectively. With increasing the static current corresponding to pressure level, the deterministic Hodgkin-Huxley (HH model manifests a process from a resting state first to period-1 firing via a subcritical Hopf bifurcation and then to a resting state via a supercritical Hopf bifurcation, and the firing frequency increases. The on-off firing and integer multiple firing were here identified as noise-induced firing patterns near the subcritical and supercritical Hopf bifurcation points, respectively, using the stochastic HH model. The systolic phase bursting and diastolic phase bursting were identified as pressure-induced firings near the subcritical and supercritical Hopf bifurcation points, respectively, using an HH model with a dynamic signal. The firing, spike frequency, and instantaneous spike frequency observed in the experiment were simulated and explained using HH models. The results illustrate the dynamics of different firing patterns and the frequency and temporal coding mechanisms of aortic baroreceptor.

  2. Invasive Species Guidebook for Department of Defense Installations in the Chesapeake Bay Watershed: Identification, Control, and Restoration

    Science.gov (United States)

    2007-11-01

    Crown vetch Coronilla varia MD, VA 14 Leafy spurge Euphorbia esula VA 15 Ground ivy Glechoma hederacea DC, MD, PA, VA, WV 17 Cogongrass Imperata ...INSTALLATIONS IN THE CHESAPEAKE BAY WATERSHED IDENTIFICATION AND CONTROL METHODS Cogongrass ( Imperata cylindrica) Description & Biology – A large

  3. 32 CFR 635.19 - Offense codes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Offense codes. 635.19 Section 635.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.19 Offense codes. (a) The offense code describes, as nearly as possible, the...

  4. Identification of a serine proteinase homolog (Sp-SPH) involved in immune defense in the mud crab Scylla paramamosain.

    Science.gov (United States)

    Zhang, Qiu-xia; Liu, Hai-peng; Chen, Rong-yuan; Shen, Kai-li; Wang, Ke-jian

    2013-01-01

    Clip domain serine proteinase homologs are involved in many biological processes including immune response. To identify the immune function of a serine proteinase homolog (Sp-SPH), originally isolated from hemocytes of the mud crab, Scylla paramamosain, the Sp-SPH was expressed recombinantly and purified for further studies. It was found that the Sp-SPH protein could bind to a number of bacteria (including Aeromonas hydrophila, Escherichia coli, Staphylococcus aureus, Vibrio fluvialis, Vibrio harveyi and Vibrio parahemolyticus), bacterial cell wall components such as lipopolysaccharide or peptidoglycan (PGN), and β-1, 3-glucan of fungus. But no direct antibacterial activity of Sp-SPH protein was shown by using minimum inhibitory concentration or minimum bactericidal concentration assays. Nevertheless, the Sp-SPH protein was found to significantly enhance the crab hemocyte adhesion activity (paired t-test, Pparahemolyticus which were both recognized by Sp-SPH protein, if pre-incubated with Sp-SPH protein, respectively. Whereas, the crabs died much faster when challenged with Vibrio alginolyiicus, a pathogenic bacterium not recognized by Sp-SPH protein, compared to those of crabs challenged with A. hydrophila or V. parahemolyticus when pre-coated with Sp-SPH protein. Taken together, these data suggested that Sp-SPH molecule might play an important role in immune defense against bacterial infection in the mud crab S. paramamosain.

  5. Identification of a Serine Proteinase Homolog (Sp-SPH) Involved in Immune Defense in the Mud Crab Scylla paramamosain

    Science.gov (United States)

    Zhang, Qiu-xia; Liu, Hai-peng; Chen, Rong-yuan; Shen, Kai-li; Wang, Ke-jian

    2013-01-01

    Clip domain serine proteinase homologs are involved in many biological processes including immune response. To identify the immune function of a serine proteinase homolog (Sp-SPH), originally isolated from hemocytes of the mud crab, Scylla paramamosain, the Sp-SPH was expressed recombinantly and purified for further studies. It was found that the Sp-SPH protein could bind to a number of bacteria (including Aeromonas hydrophila, Escherichia coli, Staphylococcus aureus, Vibrio fluvialis, Vibrio harveyi and Vibrio parahemolyticus), bacterial cell wall components such as lipopolysaccharide or peptidoglycan (PGN), and β-1, 3-glucan of fungus. But no direct antibacterial activity of Sp-SPH protein was shown by using minimum inhibitory concentration or minimum bactericidal concentration assays. Nevertheless, the Sp-SPH protein was found to significantly enhance the crab hemocyte adhesion activity (paired t-test, Pparahemolyticus which were both recognized by Sp-SPH protein, if pre-incubated with Sp-SPH protein, respectively. Whereas, the crabs died much faster when challenged with Vibrio alginolyiicus, a pathogenic bacterium not recognized by Sp-SPH protein, compared to those of crabs challenged with A. hydrophila or V. parahemolyticus when pre-coated with Sp-SPH protein. Taken together, these data suggested that Sp-SPH molecule might play an important role in immune defense against bacterial infection in the mud crab S. paramamosain. PMID:23724001

  6. 一种基于Cloud-P2P计算模型的恶意代码联合防御网络%Malicious code united-defense network based on Cloud-P2P model

    Institute of Scientific and Technical Information of China (English)

    徐小龙; 吴家兴; 杨庚

    2012-01-01

    The current anti-virus systems are usually unable io respond to endless emerging malicious codes in time. To sohe this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Servers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious cooes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.%针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于CloudP2P计算模型的恶意代码联合防御网络.Cloud-P2P计算模型将云计算与对等计算进行有机融合.恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力.为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent.基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现.

  7. Development of PARA-ID Code to Simulate Inelastic Constitutive Equations and Their Parameter Identifications for the Next Generation Reactor Designs

    International Nuclear Information System (INIS)

    Koo, Gyeong Hoi; Lee, J. H.

    2006-03-01

    The establishment of the inelastic analysis technology is essential issue for a development of the next generation reactors subjected to elevated temperature operations. In this report, the peer investigation of constitutive equations in points of a ratcheting and creep-fatigue analysis is carried out and the methods extracting the constitutive parameters from experimental data are established. To perform simulations for each constitutive model, the PARA-ID (PARAmeter-IDentification) computer program is developed. By using this code, various simulations related with the parameter identification of the constitutive models are carried out

  8. Identification of a serine proteinase homolog (Sp-SPH involved in immune defense in the mud crab Scylla paramamosain.

    Directory of Open Access Journals (Sweden)

    Qiu-xia Zhang

    Full Text Available Clip domain serine proteinase homologs are involved in many biological processes including immune response. To identify the immune function of a serine proteinase homolog (Sp-SPH, originally isolated from hemocytes of the mud crab, Scylla paramamosain, the Sp-SPH was expressed recombinantly and purified for further studies. It was found that the Sp-SPH protein could bind to a number of bacteria (including Aeromonas hydrophila, Escherichia coli, Staphylococcus aureus, Vibrio fluvialis, Vibrio harveyi and Vibrio parahemolyticus, bacterial cell wall components such as lipopolysaccharide or peptidoglycan (PGN, and β-1, 3-glucan of fungus. But no direct antibacterial activity of Sp-SPH protein was shown by using minimum inhibitory concentration or minimum bactericidal concentration assays. Nevertheless, the Sp-SPH protein was found to significantly enhance the crab hemocyte adhesion activity (paired t-test, P<0.05, and increase phenoloxidase activity if triggered by PGN in vitro (paired t-test, P<0.05. Importantly, the Sp-SPH protein was demonstrated to promote the survival rate of the animals after challenge with A. hydrophila or V. parahemolyticus which were both recognized by Sp-SPH protein, if pre-incubated with Sp-SPH protein, respectively. Whereas, the crabs died much faster when challenged with Vibrio alginolyiicus, a pathogenic bacterium not recognized by Sp-SPH protein, compared to those of crabs challenged with A. hydrophila or V. parahemolyticus when pre-coated with Sp-SPH protein. Taken together, these data suggested that Sp-SPH molecule might play an important role in immune defense against bacterial infection in the mud crab S. paramamosain.

  9. Refining the accuracy of validated target identification through coding variant fine-mapping in type 2 diabetes

    DEFF Research Database (Denmark)

    Mahajan, Anubha

    2018-01-01

    , compelling evidence for coding variant causality was obtained for only 16 signals. At 13 others, the associated coding variants clearly represent 'false leads' with potential to generate erroneous mechanistic inference. Coding variant associations offer a direct route to biological insight for complex...

  10. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  11. Molecular identification and functional delineation of a glutathione reductase homolog from disk abalone (Haliotis discus discus): Insights as a potent player in host antioxidant defense.

    Science.gov (United States)

    Herath, H M L P B; Wickramasinghe, P D S U; Bathige, S D N K; Jayasooriya, R G P T; Kim, Gi-Young; Park, Myoung Ae; Kim, Chul; Lee, Jehee

    2017-01-01

    Glutathione reductase (GSR) is an enzyme that catalyzes the biochemical conversion of oxidized glutathione (GSSG) into the reduced form (GSH). Since the ratio between the two forms of glutathione (GSH/GSSG) is important for the optimal function of GSH to act as an antioxidant against H 2 O 2 , the contribution of GSR as an enzymatic regulatory agent to maintain the proper ratio is essential. Abalones are marine mollusks that frequently encounter environmental factors that can trigger the overproduction of reactive oxygen species (ROS) such as H 2 O 2 . Therefore, we conducted the current study to reveal the molecular and functional properties of a GSR homolog in the disk abalone, Haliotis discus discus. The identified cDNA sequence (2325 bp) has a 1356 bp long open reading frame (ORF), coding for a 909 bp long amino acid sequence, which harbors a pyridine nucleotide-disulfide oxidoreductase domain (171-246 aa), a pyridine nucleotide-disulfide oxidoreductase dimerization domain, and a NAD(P)(+)-binding Rossmann fold superfamily signature domain. Four functional residues: the FAD binding site, glutathione binding site, NADPH binding motif, and assembly domain were identified to be conserved among the other species. The recombinant abalone GSR (rAbGSR) exhibited detectable activity in a standard glutathione reductase activity assay. The optimum pH and optimal temperature for the reaction were found to be 7.0 and 50 °C, respectively, while the ionic strength of the medium had no effect. The enzymatic reaction was vastly inhibited by Cu +2 and Cd +2 ions. A considerable effect of cellular protection was detected with a disk diffusion assay conducted with rAbGSR. Moreover, an MTT assay and flow cytometry confirmed the significance of the protective role of rAbGSR in cell function. Furthermore, AbGSR was found to be ubiquitously distributed in different types of abalone tissues. AbGSR mRNA expression was significantly upregulated in response to three immune challenges

  12. Major influence of interobserver reliability on polytrauma identification with the Injury Severity Score (ISS): Time for a centralised coding in trauma registries?

    Science.gov (United States)

    Maduz, Roman; Kugelmeier, Patrick; Meili, Severin; Döring, Robert; Meier, Christoph; Wahl, Peter

    2017-04-01

    The Abbreviated Injury Scale (AIS) and the Injury Severity Score (ISS) find increasingly widespread use to assess trauma burden and to perform interhospital benchmarking through trauma registries. Since 2015, public resource allocation in Switzerland shall even be derived from such data. As every trauma centre is responsible for its own coding and data input, this study aims at evaluating interobserver reliability of AIS and ISS coding. Interobserver reliability of the AIS and ISS is analysed from a cohort of 50 consecutive severely injured patients treated in 2012 at our institution, coded retrospectively by 3 independent and specifically trained observers. Considering a cutoff ISS≥16, only 38/50 patients (76%) were uniformly identified as polytraumatised or not. Increasing the cut off to ≥20, this increased to 41/50 patients (82%). A difference in the AIS of ≥ 1 was present in 261 (16%) of possible codes. Excluding the vast majority of uninjured body regions, uniformly identical AIS severity values were attributed in 67/193 (35%) body regions, or 318/579 (55%) possible observer pairings. Injury severity all too often is neither identified correctly nor consistently when using the AIS. This leads to wrong identification of severely injured patients using the ISS. Improving consistency of coding through centralisation is recommended before scores based on the AIS are to be used for interhospital benchmarking and resource allocation in the treatment of severely injured patients. Copyright © 2017. Published by Elsevier Ltd.

  13. Improving the identification of people with dementia in primary care: evaluation of the impact of primary care dementia coding guidance on identified prevalence.

    Science.gov (United States)

    Russell, Paul; Banerjee, Sube; Watt, Jen; Adleman, Rosalyn; Agoe, Belinda; Burnie, Nerida; Carefull, Alex; Chandan, Kiran; Constable, Dominie; Daniels, Mark; Davies, David; Deshmukh, Sid; Huddart, Martin; Jabin, Ashrafi; Jarrett, Penelope; King, Jenifer; Koch, Tamar; Kumar, Sanjoy; Lees, Stavroula; Mir, Sinan; Naidoo, Dominic; Nyame, Sylvia; Sasae, Ryuichiro; Sharma, Tushar; Thormod, Clare; Vedavanam, Krish; Wilton, Anja; Flaherty, Breda

    2013-12-23

    Improving dementia care is a policy priority nationally and internationally; there is a 'diagnosis gap' with less than half of the cases of dementia ever diagnosed. The English Health Department's Quality and Outcomes Framework (QOF) encourages primary care recognition and recording of dementia. The codes for dementia are complex with the possibility of underidentification through miscoding. We developed guidance on coding of dementia; we report the impact of applying this to 'clean up' dementia coding and records at a practice level. The guidance had five elements: (1) identify Read Codes for dementia; (2) access QOF dementia register; (3) generate lists of patients who may have dementia; (4) compare search with QOF data and (5) review cases. In each practice, one general practitioner conducted the exercise. The number of dementia QOF registers before and after the exercise was recorded with the hours taken to complete the exercise. London primary care. 23 (85%) of 27 practices participated, covering 79 312 (19 562 over 65 s) participants. The number on dementia QOF registers; time taken. The number of people with dementia on QOF registers increased from 1007 to 1139 (χ(2)=8.17, p=0.004), raising identification rates by 8.8%. It took 4.7 h per practice, on an average. These data demonstrate the potential of a simple primary care coding exercise, requiring no specific training, to increase the dementia identification rate. An improvement of 8.8% between 2011 and 2012 is equivalent to that of the fourth most improved primary care trust in the UK. In absolute terms, if this effects were mirrored across the UK primary care, the number of cases with dementia identified would rise by over 70 000 from 364 329 to 434 488 raising the recognition rate from 46% to 54.8%. Implementing this exercise appears to be a simple and effective way to improve recognition rates in primary care.

  14. The fusion protein signal-peptide-coding region of canine distemper virus: a useful tool for phylogenetic reconstruction and lineage identification.

    Directory of Open Access Journals (Sweden)

    Nicolás Sarute

    Full Text Available Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages.

  15. The fusion protein signal-peptide-coding region of canine distemper virus: a useful tool for phylogenetic reconstruction and lineage identification.

    Science.gov (United States)

    Sarute, Nicolás; Calderón, Marina Gallo; Pérez, Ruben; La Torre, José; Hernández, Martín; Francia, Lourdes; Panzera, Yanina

    2013-01-01

    Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus) is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H) gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp) coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages.

  16. Cloning and identification of the gene coding for the 140-kd subunit of Drosophila RNA polymerase II

    OpenAIRE

    Faust, Daniela M.; Renkawitz-Pohl, Renate; Falkenburg, Dieter; Gasch, Alexander; Bialojan, Siegfried; Young, Richard A.; Bautz, Ekkehard K. F.

    1986-01-01

    Genomic clones of Drosophila melanogaster were isolated from a λ library by cross-hybridization with the yeast gene coding for the 150-kd subunit of RNA polymerase II. Clones containing a region of ∼2.0 kb with strong homology to the yeast gene were shown to code for a 3.9-kb poly(A)+-RNA. Part of the coding region was cloned into an expression vector. A fusion protein was obtained which reacted with an antibody directed against RNA polymerase II of Drosophila. Peptide mapping of the fusion p...

  17. Identification of Novel Long Non-coding and Circular RNAs in Human Papillomavirus-Mediated Cervical Cancer

    Directory of Open Access Journals (Sweden)

    Hongbo Wang

    2017-09-01

    Full Text Available Cervical cancer is the third most common cancer worldwide and the fourth leading cause of cancer-associated mortality in women. Accumulating evidence indicates that long non-coding RNAs (lncRNAs and circular RNAs (circRNAs may play key roles in the carcinogenesis of different cancers; however, little is known about the mechanisms of lncRNAs and circRNAs in the progression and metastasis of cervical cancer. In this study, we explored the expression profiles of lncRNAs, circRNAs, miRNAs, and mRNAs in HPV16 (human papillomavirus genotype 16 mediated cervical squamous cell carcinoma and matched adjacent non-tumor (ATN tissues from three patients with high-throughput RNA sequencing (RNA-seq. In total, we identified 19 lncRNAs, 99 circRNAs, 28 miRNAs, and 304 mRNAs that were commonly differentially expressed (DE in different patients. Among the non-coding RNAs, 3 lncRNAs and 44 circRNAs are novel to our knowledge. Functional enrichment analysis showed that DE lncRNAs, miRNAs, and mRNAs were enriched in pathways crucial to cancer as well as other gene ontology (GO terms. Furthermore, the co-expression network and function prediction suggested that all 19 DE lncRNAs could play different roles in the carcinogenesis and development of cervical cancer. The competing endogenous RNA (ceRNA network based on DE coding and non-coding RNAs showed that each miRNA targeted a number of lncRNAs and circRNAs. The link between part of the miRNAs in the network and cervical cancer has been validated in previous studies, and these miRNAs targeted the majority of the novel non-coding RNAs, thus suggesting that these novel non-coding RNAs may be involved in cervical cancer. Taken together, our study shows that DE non-coding RNAs could be further developed as diagnostic and therapeutic biomarkers of cervical cancer. The complex ceRNA network also lays the foundation for future research of the roles of coding and non-coding RNAs in cervical cancer.

  18. Identification of Novel Long Non-coding and Circular RNAs in Human Papillomavirus-Mediated Cervical Cancer

    Science.gov (United States)

    Wang, Hongbo; Zhao, Yingchao; Chen, Mingyue; Cui, Jie

    2017-01-01

    Cervical cancer is the third most common cancer worldwide and the fourth leading cause of cancer-associated mortality in women. Accumulating evidence indicates that long non-coding RNAs (lncRNAs) and circular RNAs (circRNAs) may play key roles in the carcinogenesis of different cancers; however, little is known about the mechanisms of lncRNAs and circRNAs in the progression and metastasis of cervical cancer. In this study, we explored the expression profiles of lncRNAs, circRNAs, miRNAs, and mRNAs in HPV16 (human papillomavirus genotype 16) mediated cervical squamous cell carcinoma and matched adjacent non-tumor (ATN) tissues from three patients with high-throughput RNA sequencing (RNA-seq). In total, we identified 19 lncRNAs, 99 circRNAs, 28 miRNAs, and 304 mRNAs that were commonly differentially expressed (DE) in different patients. Among the non-coding RNAs, 3 lncRNAs and 44 circRNAs are novel to our knowledge. Functional enrichment analysis showed that DE lncRNAs, miRNAs, and mRNAs were enriched in pathways crucial to cancer as well as other gene ontology (GO) terms. Furthermore, the co-expression network and function prediction suggested that all 19 DE lncRNAs could play different roles in the carcinogenesis and development of cervical cancer. The competing endogenous RNA (ceRNA) network based on DE coding and non-coding RNAs showed that each miRNA targeted a number of lncRNAs and circRNAs. The link between part of the miRNAs in the network and cervical cancer has been validated in previous studies, and these miRNAs targeted the majority of the novel non-coding RNAs, thus suggesting that these novel non-coding RNAs may be involved in cervical cancer. Taken together, our study shows that DE non-coding RNAs could be further developed as diagnostic and therapeutic biomarkers of cervical cancer. The complex ceRNA network also lays the foundation for future research of the roles of coding and non-coding RNAs in cervical cancer. PMID:28970820

  19. Identification of small non-coding RNA classes expressed in swine whole blood during HP-PRRSV infection

    Science.gov (United States)

    It has been established that reduced susceptibility to porcine reproductive and respiratory syndrome virus (PRRSV) has a genetic component. This genetic component may take the form of small non-coding RNAs (sncRNA), which are molecules that function as regulators of gene expression. Various sncRNAs ...

  20. Identification and antigenic characterization of virulence-associated, plasmid-coded proteins of Shigella spp. and enteroinvasive Escherichia coli.

    OpenAIRE

    Hale, T L; Oaks, E V; Formal, S B

    1985-01-01

    Seven plasmid-coded polypeptides, designated a through g, were identified by two-dimensional nonequilibrium pH gradient electrophoresis of radiolabeled extracts from minicells of virulent Shigella flexneri serotypes 2a and 5 and enteroinvasive Escherichia coli O143. These polypeptides were deemed to be products of 140-megadalton (MDa) virulence-associated plasmids because they were not synthesized in minicells which were not harboring a 140-MDa plasmid or in minicells which were carrying an F...

  1. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  2. IdentiCS – Identification of coding sequence and in silico reconstruction of the metabolic network directly from unannotated low-coverage bacterial genome sequence

    Directory of Open Access Journals (Sweden)

    Zeng An-Ping

    2004-08-01

    Full Text Available Abstract Background A necessary step for a genome level analysis of the cellular metabolism is the in silico reconstruction of the metabolic network from genome sequences. The available methods are mainly based on the annotation of genome sequences including two successive steps, the prediction of coding sequences (CDS and their function assignment. The annotation process takes time. The available methods often encounter difficulties when dealing with unfinished error-containing genomic sequence. Results In this work a fast method is proposed to use unannotated genome sequence for predicting CDSs and for an in silico reconstruction of metabolic networks. Instead of using predicted genes or CDSs to query public databases, entries from public DNA or protein databases are used as queries to search a local database of the unannotated genome sequence to predict CDSs. Functions are assigned to the predicted CDSs simultaneously. The well-annotated genome of Salmonella typhimurium LT2 is used as an example to demonstrate the applicability of the method. 97.7% of the CDSs in the original annotation are correctly identified. The use of SWISS-PROT-TrEMBL databases resulted in an identification of 98.9% of CDSs that have EC-numbers in the published annotation. Furthermore, two versions of sequences of the bacterium Klebsiella pneumoniae with different genome coverage (3.9 and 7.9 fold, respectively are examined. The results suggest that a 3.9-fold coverage of the bacterial genome could be sufficiently used for the in silico reconstruction of the metabolic network. Compared to other gene finding methods such as CRITICA our method is more suitable for exploiting sequences of low genome coverage. Based on the new method, a program called IdentiCS (Identification of Coding Sequences from Unfinished Genome Sequences is delivered that combines the identification of CDSs with the reconstruction, comparison and visualization of metabolic networks (free to download

  3. Utilizing elements of the CSAU phenomena identification and ranking table (PIRT) to qualify a PWR non-LOCA transients system code

    Energy Technology Data Exchange (ETDEWEB)

    Greene, K.R.; Fletcher, C.D.; Gottula, R.C.; Lindquist, T.R.; Stitt, B.D. [Framatome ANP, Richland, WA (United States)

    2001-07-01

    Licensing analyses of Nuclear Regulatory Commission (NRC) Standard Review Plan (SRP) Chapter 15 non-LOCA transients are an important part of establishing operational safety limits and design limits for nuclear power plants. The applied codes and methods are generally qualified using traditional methods of benchmarking and assessment, sample problems, and demonstration of conservatism. Rigorous formal methods for developing code and methodology have been created and applied to qualify realistic methods for Large Break Loss-of-Coolant Accidents (LBLOCA's). This methodology, Code Scaling, Applicability, and Uncertainty (CSAU), is a very demanding, resource intensive, process to apply. It would be challenging to apply a comprehensive and complete CSAU level of analysis, individually, to each of the more than 30 non-LOCA transients that comprise Chapter 15 events. However, certain elements of the process can be easily adapted to improve quality of the codes and methods used to analyze non- LOCA transients. One of these elements is the Phenomena Identification and Ranking Table (PIRT). This paper presents the results of an informally constructed PIRT that applies to non-LOCA transients for Pressurized Water Reactors (PWR's) of the Westinghouse and Combustion Engineering design. A group of experts in thermal-hydraulics and safety analysis identified and ranked the phenomena. To begin the process, the PIRT was initially performed individually by each expert. Then through group interaction and discussion, a consensus was reached on both the significant phenomena and the appropriate ranking. The paper also discusses using the PIRT as an aid to qualify a 'conservative' system code and methodology. Once agreement was obtained on the phenomena and ranking, the table was divided into six functional groups, by nature of the transients, along the same lines as Chapter 15. Then, assessment and disposition of the significant phenomena was performed. The PIRT and

  4. Identification and Functional Analysis of Long Intergenic Non-coding RNAs Underlying Intramuscular Fat Content in Pigs

    Directory of Open Access Journals (Sweden)

    Cheng Zou

    2018-03-01

    Full Text Available Intramuscular fat (IMF content is an important trait that can affect pork quality. Previous studies have identified many genes that can regulate IMF. Long intergenic non-coding RNAs (lincRNAs are emerging as key regulators in various biological processes. However, lincRNAs related to IMF in pig are largely unknown, and the mechanisms by which they regulate IMF are yet to be elucidated. Here we reconstructed 105,687 transcripts and identified 1,032 lincRNAs in pig longissimus dorsi muscle (LDM of four stages with different IMF contents based on published RNA-seq. These lincRNAs show typical characteristics such as shorter length and lower expression compared with protein-coding genes. Combined with methylation data, we found that both the promoter and genebody methylation of lincRNAs can negatively regulate lincRNA expression. We found that lincRNAs exhibit high correlation with their protein-coding neighbors in expression. Co-expression network analysis resulted in eight stage-specific modules, gene ontology and pathway analysis of them suggested that some lincRNAs were involved in IMF-related processes, such as fatty acid metabolism and peroxisome proliferator-activated receptor signaling pathway. Furthermore, we identified hub lincRNAs and found six of them may play important roles in IMF development. This work detailed some lincRNAs which may affect of IMF development in pig, and facilitated future research on these lincRNAs and molecular assisted breeding for pig.

  5. Analysis of putative apoplastic effectors from the nematode, Globodera rostochiensis, and identification of an expansin-like protein that can induce and suppress host defenses.

    Science.gov (United States)

    Ali, Shawkat; Magne, Maxime; Chen, Shiyan; Côté, Olivier; Stare, Barbara Gerič; Obradovic, Natasa; Jamshaid, Lubna; Wang, Xiaohong; Bélair, Guy; Moffett, Peter

    2015-01-01

    The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12) and an expansin-like protein (GrEXPB2), suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses.

  6. Analysis of putative apoplastic effectors from the nematode, Globodera rostochiensis, and identification of an expansin-like protein that can induce and suppress host defenses.

    Directory of Open Access Journals (Sweden)

    Shawkat Ali

    Full Text Available The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12 and an expansin-like protein (GrEXPB2, suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses.

  7. Properties of non-coding DNA and identification of putative cis-regulatory elements in Theileria parva

    Directory of Open Access Journals (Sweden)

    Guo Xiang

    2008-12-01

    Full Text Available Abstract Background Parasites in the genus Theileria cause lymphoproliferative diseases in cattle, resulting in enormous socio-economic losses. The availability of the genome sequences and annotation for T. parva and T. annulata has facilitated the study of parasite biology and their relationship with host cell transformation and tropism. However, the mechanism of transcriptional regulation in this genus, which may be key to understanding fundamental aspects of its parasitology, remains poorly understood. In this study, we analyze the evolution of non-coding sequences in the Theileria genome and identify conserved sequence elements that may be involved in gene regulation of these parasitic species. Results Intergenic regions and introns in Theileria are short, and their length distributions are considerably right-skewed. Intergenic regions flanked by genes in 5'-5' orientation tend to be longer and slightly more AT-rich than those flanked by two stop codons; intergenic regions flanked by genes in 3'-5' orientation have intermediate values of length and AT composition. Intron position is negatively correlated with intron length, and positively correlated with GC content. Using stringent criteria, we identified a set of high-quality orthologous non-coding sequences between T. parva and T. annulata, and determined the distribution of selective constraints across regions, which are shown to be higher close to translation start sites. A positive correlation between constraint and length in both intergenic regions and introns suggests a tight control over length expansion of non-coding regions. Genome-wide searches for functional elements revealed several conserved motifs in intergenic regions of Theileria genomes. Two such motifs are preferentially located within the first 60 base pairs upstream of transcription start sites in T. parva, are preferentially associated with specific protein functional categories, and have significant similarity to know

  8. Identification and characterization of wheat long non-protein coding RNAs responsive to powdery mildew infection and heat stress by using microarray analysis and SBS sequencing

    Directory of Open Access Journals (Sweden)

    Peng Huiru

    2011-04-01

    Full Text Available Abstract Background Biotic and abiotic stresses, such as powdery mildew infection and high temperature, are important limiting factors for yield and grain quality in wheat production. Emerging evidences suggest that long non-protein coding RNAs (npcRNAs are developmentally regulated and play roles in development and stress responses of plants. However, identification of long npcRNAs is limited to a few plant species, such as Arabidopsis, rice and maize, no systematic identification of long npcRNAs and their responses to abiotic and biotic stresses is reported in wheat. Results In this study, by using computational analysis and experimental approach we identified 125 putative wheat stress responsive long npcRNAs, which are not conserved among plant species. Among them, some were precursors of small RNAs such as microRNAs and siRNAs, two long npcRNAs were identified as signal recognition particle (SRP 7S RNA variants, and three were characterized as U3 snoRNAs. We found that wheat long npcRNAs showed tissue dependent expression patterns and were responsive to powdery mildew infection and heat stress. Conclusion Our results indicated that diverse sets of wheat long npcRNAs were responsive to powdery mildew infection and heat stress, and could function in wheat responses to both biotic and abiotic stresses, which provided a starting point to understand their functions and regulatory mechanisms in the future.

  9. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    Science.gov (United States)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  10. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  11. cDNA sequence of human transforming gene hst and identification of the coding sequence required for transforming activity

    International Nuclear Information System (INIS)

    Taira, M.; Yoshida, T.; Miyagawa, K.; Sakamoto, H.; Terada, M.; Sugimura, T.

    1987-01-01

    The hst gene was originally identified as a transforming gene in DNAs from human stomach cancers and from a noncancerous portion of stomach mucosa by DNA-mediated transfection assay using NIH3T3 cells. cDNA clones of hst were isolated from the cDNA library constructed from poly(A) + RNA of a secondary transformant induced by the DNA from a stomach cancer. The sequence analysis of the hst cDNA revealed the presence of two open reading frames. When this cDNA was inserted into an expression vector containing the simian virus 40 promoter, it efficiently induced the transformation of NIH3T3 cells upon transfection. It was found that one of the reading frames, which coded for 206 amino acids, was responsible for the transforming activity

  12. Identification of Thioredoxin Disulfide Targets Using a Quantitative Proteomics Approach Based on Isotope-Coded Affinity Tags

    DEFF Research Database (Denmark)

    Hägglund, Per; Bunkenborg, Jakob; Maeda, Kenji

    2008-01-01

    Thioredoxin (Trx) is a ubiquitous protein disulfide reductase involved in a wide range of cellular redox processes. A large number of putative target proteins have been identified using proteomics approaches, but insight into target specificity at the molecular level is lacking since the reactivity...... of Trx toward individual disulfides has not been quantified. Here, a novel proteomics procedure is described for quantification of Trx-mediated target disulfide reduction based on thiol-specific differential labeling with the iodoacetamide-based isotope-coded affinity tag (ICAT) reagents. Briefly......, protein extract of embryos from germinated barley seeds was treated +/- Trx, and thiols released from target protein disulfides were irreversibly blocked with iodoacetamide. The remaining cysteine residues in the Trx-treated and the control (-Trx) samples were then chemically reduced and labeled...

  13. Identification of small non-coding RNA classes expressed in swine whole blood during HP-PRRSV infection.

    Science.gov (United States)

    Fleming, Damarius S; Miller, Laura C

    2018-04-01

    It has been established that reduced susceptibility to porcine reproductive and respiratory syndrome virus (PRRSV) has a genetic component. This genetic component may take the form of small non-coding RNAs (sncRNA), which are molecules that function as regulators of gene expression. Various sncRNAs have emerged as having an important role in the immune system in humans. The study uses transcriptomic read counts to profile the type and quantity of both well and lesser characterized sncRNAs, such as microRNAs and small nucleolar RNAs to identify and quantify the classes of sncRNA expressed in whole blood between healthy and highly pathogenic PRRSV-infected pigs. Our results returned evidence on nine classes of sncRNA, four of which were consistently statistically significantly different based on Fisher's Exact Test, that can be detected and possibly interrogated for their effect on host dysregulation during PRRSV infections. Published by Elsevier Inc.

  14. Identification of developmentally regulated PCP-responsive non-coding RNA, prt6, in the rat thalamus.

    Directory of Open Access Journals (Sweden)

    Hironao Takebayashi

    Full Text Available Schizophrenia and similar psychoses induced by NMDA-type glutamate receptor antagonists, such as phencyclidine (PCP and ketamine, usually develop after adolescence. Moreover, adult-type behavioral disturbance following NMDA receptor antagonist application in rodents is observed after a critical period at around 3 postnatal weeks. These observations suggest that the schizophrenic symptoms caused by and psychotomimetic effects of NMDA antagonists require the maturation of certain brain neuron circuits and molecular networks, which differentially respond to NMDA receptor antagonists across adolescence and the critical period. From this viewpoint, we have identified a novel developmentally regulated phencyclidine-responsive transcript from the rat thalamus, designated as prt6, as a candidate molecule involved in the above schizophrenia-related systems using a DNA microarray technique. The transcript is a non-coding RNA that includes sequences of at least two microRNAs, miR132 and miR212, and is expressed strongly in the brain and testis, with trace or non-detectable levels in the spleen, heart, liver, kidney, lung and skeletal muscle, as revealed by Northern blot analysis. The systemic administration of PCP (7.5 mg/kg, subcutaneously (s.c. significantly elevated the expression of prt6 mRNA in the thalamus at postnatal days (PD 32 and 50, but not at PD 8, 13, 20, or 24 as compared to saline-treated controls. At PD 50, another NMDA receptor antagonist, dizocilpine (0.5 mg/kg, s.c., and a schizophrenomimetic dopamine agonist, methamphetamine (4.8 mg/kg, s.c., mimicked a significant increase in the levels of thalamic prt6 mRNAs, while a D2 dopmamine receptor antagonist, haloperidol, partly inhibited the increasing influence of PCP on thalamic prt6 expression without its own effects. These data indicate that prt6 may be involved in the pathophysiology of the onset of drug-induced schizophrenia-like symptoms and schizophrenia through the possible

  15. Identification of long non-coding RNAs in two anthozoan species and their possible implications for coral bleaching.

    Science.gov (United States)

    Huang, Chen; Morlighem, Jean-Étienne R L; Cai, Jing; Liao, Qiwen; Perez, Carlos Daniel; Gomes, Paula Braga; Guo, Min; Rádis-Baptista, Gandhi; Lee, Simon Ming-Yuen

    2017-07-13

    Long non-coding RNAs (lncRNAs) have been shown to play regulatory roles in a diverse range of biological processes and are associated with the outcomes of various diseases. The majority of studies about lncRNAs focus on model organisms, with lessened investigation in non-model organisms to date. Herein, we have undertaken an investigation on lncRNA in two zoanthids (cnidarian): Protolpalythoa varibilis and Palythoa caribaeorum. A total of 11,206 and 13,240 lncRNAs were detected in P. variabilis and P. caribaeorum transcriptome, respectively. Comparison using NONCODE database indicated that the majority of these lncRNAs is taxonomically species-restricted with no identifiable orthologs. Even so, we found cases in which short regions of P. caribaeorum's lncRNAs were similar to vertebrate species' lncRNAs, and could be associated with lncRNA conserved regulatory functions. Consequently, some high-confidence lncRNA-mRNA interactions were predicted based on such conserved regions, therefore revealing possible involvement of lncRNAs in posttranscriptional processing and regulation in anthozoans. Moreover, investigation of differentially expressed lncRNAs, in healthy colonies and colonial individuals undergoing natural bleaching, indicated that some up-regulated lncRNAs in P. caribaeorum could posttranscriptionally regulate the mRNAs encoding proteins of Ras-mediated signal transduction pathway and components of innate immune-system, which could contribute to the molecular response of coral bleaching.

  16. In Silico Identification of Mimicking Molecules as Defense Inducers Triggering Jasmonic Acid Mediated Immunity against Alternaria Blight Disease in Brassica Species

    Directory of Open Access Journals (Sweden)

    Dinesh Pandey

    2017-04-01

    Full Text Available Alternaria brassicae and Alternaria brassicicola are two major phytopathogenic fungi which cause Alternaria blight, a recalcitrant disease on Brassica crops throughout the world, which is highly destructive and responsible for significant yield losses. Since no resistant source is available against Alternaria blight, therefore, efforts have been made in the present study to identify defense inducer molecules which can induce jasmonic acid (JA mediated defense against the disease. It is believed that JA triggered defense response will prevent necrotrophic mode of colonization of Alternaria brassicae fungus. The JA receptor, COI1 is one of the potential targets for triggering JA mediated immunity through interaction with JA signal. In the present study, few mimicking compounds more efficient than naturally occurring JA in terms of interaction with COI1 were identified through virtual screening and molecular dynamics simulation studies. A high quality structural model of COI1 was developed using the protein sequence of Brassica rapa. This was followed by virtual screening of 767 analogs of JA from ZINC database for interaction with COI1. Two analogs viz. ZINC27640214 and ZINC43772052 showed more binding affinity with COI1 as compared to naturally occurring JA. Molecular dynamics simulation of COI1 and COI1-JA complex, as well as best screened interacting structural analogs of JA with COI1 was done for 50 ns to validate the stability of system. It was found that ZINC27640214 possesses efficient, stable, and good cell permeability properties. Based on the obtained results and its physicochemical properties, it is capable of mimicking JA signaling and may be used as defense inducers for triggering JA mediated resistance against Alternaria blight, only after further validation through field trials.

  17. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    Science.gov (United States)

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  18. Systematic identification of non-coding RNA 2,2,7-trimethylguanosine cap structures in Caenorhabditis elegans

    Directory of Open Access Journals (Sweden)

    Skogerbø Geir

    2007-09-01

    Full Text Available Abstract Background The 2,2,7-trimethylguanosine (TMG cap structure is an important functional characteristic of ncRNAs with critical cellular roles, such as some snRNAs. Here we used immunoprecipitation with both K121 and R1131 anti-TMG antibodies to systematically identify the TMG cap structures for all presently characterized ncRNAs in C. elegans. Results The two anti-TMG antibodies precipitated a similar group of the C. elegans ncRNAs. All snRNAs known to have a TMG cap structure were found in the precipitate, indicating that our identification system was efficient. Other ncRNA families related to splicing, such as SL RNAs and Sm Y RNAs, were also found in the precipitate, as were 7 C/D box snoRNAs. Further analysis showed that the SL RNAs and the Sm Y RNAs shared a very similar Sm binding site element (AAU4–5GGA, which sequence composition differed somewhat from those of other U snRNAs. There were also 16 ncRNAs without an Sm binding site element in the precipitate, suggesting that for these ncRNAs, TMG formation may occur independently of Sm proteins. Conclusion Our results showed that most ncRNAs predicted to be transcribed by RNA polymerase II had a TMG cap, while those predicted to be transcribed by RNA plymerase III or located in introns did not have a TMG cap structure. Compared to ncRNAs without a TMG cap, TMG-capped ncRNAs tended to have higher expression levels. Five functionally non-annotated ncRNAs also have a TMG cap structure, which might be helpful for identifying the cellular roles of these ncRNAs.

  19. Identification of microRNAs and long non-coding RNAs involved in fatty acid biosynthesis in tree peony seeds.

    Science.gov (United States)

    Yin, Dan-Dan; Li, Shan-Shan; Shu, Qing-Yan; Gu, Zhao-Yu; Wu, Qian; Feng, Cheng-Yong; Xu, Wen-Zhong; Wang, Liang-Sheng

    2018-08-05

    MicroRNAs (miRNAs) and long noncoding RNAs (lncRNAs) act as important molecular regulators in a wide range of biological processes during plant development and seed formation, including oil production. Tree peony seeds contain >90% unsaturated fatty acids (UFAs) and high proportions of α-linolenic acid (ALA, > 40%). To dissect the non-coding RNAs (ncRNAs) pathway involved in fatty acids synthesis in tree peony seeds, we construct six small RNA libraries and six transcriptome libraries from developing seeds of two cultivars (J and S) containing different content of fatty acid compositions. After deep sequencing the RNA libraries, the ncRNA expression profiles of tree peony seeds in two cultivars were systematically and comparatively analyzed. A total of 318 known and 153 new miRNAs and 22,430 lncRNAs were identified, among which 106 conserved and 9 novel miRNAs and 2785 lncRNAs were differentially expressed between the two cultivars. In addition, potential target genes of the microRNA and lncRNAs were also predicted and annotated. Among them, 9 miRNAs and 39 lncRNAs were predicted to target lipid related genes. Results showed that all of miR414, miR156b, miR2673b, miR7826, novel-m0027-5p, TR24651|c0_g1, TR24544|c0_g15, and TR27305|c0_g1 were up-regulated and expressed at a higher level in high-ALA cultivar J when compared to low-ALA cultivar S, suggesting that these ncRNAs and target genes are possibly involved in different fatty acid synthesis and lipid metabolism through post-transcriptional regulation. These results provide a better understanding of the roles of ncRNAs during fatty acid biosynthesis and metabolism in tree peony seeds. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. Genome-wide identification and characterization of long non-coding RNAs in developmental skeletal muscle of fetal goat.

    Science.gov (United States)

    Zhan, Siyuan; Dong, Yao; Zhao, Wei; Guo, Jiazhong; Zhong, Tao; Wang, Linjie; Li, Li; Zhang, Hongping

    2016-08-22

    Long non-coding RNAs (lncRNAs) have been studied extensively over the past few years. Large numbers of lncRNAs have been identified in mouse, rat, and human, and some of them have been shown to play important roles in muscle development and myogenesis. However, there are few reports on the characterization of lncRNAs covering all the development stages of skeletal muscle in livestock. RNA libraries constructed from developing longissimus dorsi muscle of fetal (45, 60, and 105 days of gestation) and postnatal (3 days after birth) goat (Capra hircus) were sequenced. A total of 1,034,049,894 clean reads were generated. Among them, 3981 lncRNA transcripts corresponding to 2739 lncRNA genes were identified, including 3515 intergenic lncRNAs and 466 anti-sense lncRNAs. Notably, in pairwise comparisons between the libraries of skeletal muscle at the different development stages, a total of 577 transcripts were differentially expressed (P development-related processes, indicating they may be in cis-regulatory relationships. Additionally, Pearson's correlation coefficients of co-expression levels suggested 1737 lncRNAs and 19,422 mRNAs were possibly in trans-regulatory relationships (r > 0.95 or r development-related biological processes such as muscle system processes, regulation of cell growth, muscle cell development, regulation of transcription, and embryonic morphogenesis. This study provides a catalog of goat muscle-related lncRNAs, and will contribute to a fuller understanding of the molecular mechanism underpinning muscle development in mammals.

  1. Triboelectric-Based Transparent Secret Code.

    Science.gov (United States)

    Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju

    2018-04-01

    Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.

  2. Identification of an ICP27-responsive element in the coding region of a herpes simplex virus type 1 late gene.

    Science.gov (United States)

    Sedlackova, Lenka; Perkins, Keith D; Meyer, Julia; Strain, Anna K; Goldman, Oksana; Rice, Stephen A

    2010-03-01

    During productive herpes simplex virus type 1 (HSV-1) infection, a subset of viral delayed-early (DE) and late (L) genes require the immediate-early (IE) protein ICP27 for their expression. However, the cis-acting regulatory sequences in DE and L genes that mediate their specific induction by ICP27 are unknown. One viral L gene that is highly dependent on ICP27 is that encoding glycoprotein C (gC). We previously demonstrated that this gene is posttranscriptionally transactivated by ICP27 in a plasmid cotransfection assay. Based on our past results, we hypothesized that the gC gene possesses a cis-acting inhibitory sequence and that ICP27 overcomes the effects of this sequence to enable efficient gC expression. To test this model, we systematically deleted sequences from the body of the gC gene and tested the resulting constructs for expression. In so doing, we identified a 258-bp "silencing element" (SE) in the 5' portion of the gC coding region. When present, the SE inhibits gC mRNA accumulation from a transiently transfected gC gene, unless ICP27 is present. Moreover, the SE can be transferred to another HSV-1 gene, where it inhibits mRNA accumulation in the absence of ICP27 and confers high-level expression in the presence of ICP27. Thus, for the first time, an ICP27-responsive sequence has been identified in a physiologically relevant ICP27 target gene. To see if the SE functions during viral infection, we engineered HSV-1 recombinants that lack the SE, either in a wild-type (WT) or ICP27-null genetic background. In an ICP27-null background, deletion of the SE led to ICP27-independent expression of the gC gene, demonstrating that the SE functions during viral infection. Surprisingly, the ICP27-independent gC expression seen with the mutant occurred even in the absence of viral DNA synthesis, indicating that the SE helps to regulate the tight DNA replication-dependent expression of gC.

  3. Critical Code: Software Producibility for Defense

    Science.gov (United States)

    2010-01-01

    in fatal x-ray doses being administered to cancer patients. static analysis. The results of tests that fail are manifestations of errors (unit tests...ray doses being administered to cancer patients. static analysis. The results of tests that fail are manifestations of errors (unit tests) or failures...forthcoming. 29 Siobhan O’Mahony, Fernando Cela Diaz, and Evan Mamas , 2005, “IBM and Eclipse (A),” Harvard Business School Case 906007, Cambridge, MA

  4. 32 CFR 635.20 - Military Police Codes (MPC).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Military Police Codes (MPC). 635.20 Section 635.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.20 Military Police Codes (MPC). (a) MPCs identify individual Provos...

  5. 32 CFR 634.25 - Installation traffic codes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Installation traffic codes. 634.25 Section 634.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.25 Installation traffic codes. (a) Installation or activit...

  6. 32 CFR 634.24 - Traffic planning and codes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic planning and codes. 634.24 Section 634.24 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.24 Traffic planning and codes. (a) Safe and efficient...

  7. Site investigation SFR. Rock type coding, overview geological mapping and identification of rock units and possible deformation zones in drill cores from the construction of SFR

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, Jesper (Vattenfall Power Consultant AB, Stockholm (Sweden)); Curtis, Philip; Bockgaard, Niclas (Golder Associates AB (Sweden)); Mattsson, Haakan (GeoVista AB, Luleaa (Sweden))

    2011-01-15

    This report presents the rock type coding, overview lithological mapping and identification of rock units and possible deformation zones in drill cores from 32 boreholes associated with the construction of SFR. This work can be seen as complementary to single-hole interpretations of other older SFR boreholes earlier reported in /Petersson and Andersson 2010/: KFR04, KFR08, KFR09, KFR13, KFR35, KFR36, KFR54, KFR55, KFR7A, KFR7B and KFR7C. Due to deficiencies in the available material, the necessary activities have deviated somewhat from the established methodologies used during the recent Forsmark site investigations for the final repository for spent nuclear fuel. The aim of the current work has been, wherever possible, to allow the incorporation of all relevant material from older boreholes in the ongoing SFR geological modelling work in spite of the deficiencies. The activities include: - Rock type coding of the original geological mapping according to the nomenclature used during the preceding Forsmark site investigation. As part of the Forsmark site investigation such rock type coding has already been performed on most of the old SFR boreholes if the original geological mapping results were available. This earlier work has been complemented by rock type coding on two further boreholes: KFR01 and KFR02. - Lithological overview mapping, including documentation of (1) rock types, (2) ductile and brittle-ductile deformation and (3) alteration for drill cores from eleven of the boreholes for which no original geological borehole mapping was available (KFR31, KFR32, KFR34, KFR37,KFR38, KFR51, KFR69, KFR70, KFR71, KFR72 and KFR89). - Identification of possible deformation zones and merging of similar rock types into rock units. This follows SKB's established criteria and methodology of the geological Single-hole interpretation (SHI) process wherever possible. Deviations from the standard SHI process are associated with the lack of data, for example BIPS images

  8. Site investigation SFR. Rock type coding, overview geological mapping and identification of rock units and possible deformation zones in drill cores from the construction of SFR

    International Nuclear Information System (INIS)

    Petersson, Jesper; Curtis, Philip; Bockgaard, Niclas; Mattsson, Haakan

    2011-01-01

    This report presents the rock type coding, overview lithological mapping and identification of rock units and possible deformation zones in drill cores from 32 boreholes associated with the construction of SFR. This work can be seen as complementary to single-hole interpretations of other older SFR boreholes earlier reported in /Petersson and Andersson 2010/: KFR04, KFR08, KFR09, KFR13, KFR35, KFR36, KFR54, KFR55, KFR7A, KFR7B and KFR7C. Due to deficiencies in the available material, the necessary activities have deviated somewhat from the established methodologies used during the recent Forsmark site investigations for the final repository for spent nuclear fuel. The aim of the current work has been, wherever possible, to allow the incorporation of all relevant material from older boreholes in the ongoing SFR geological modelling work in spite of the deficiencies. The activities include: - Rock type coding of the original geological mapping according to the nomenclature used during the preceding Forsmark site investigation. As part of the Forsmark site investigation such rock type coding has already been performed on most of the old SFR boreholes if the original geological mapping results were available. This earlier work has been complemented by rock type coding on two further boreholes: KFR01 and KFR02. - Lithological overview mapping, including documentation of (1) rock types, (2) ductile and brittle-ductile deformation and (3) alteration for drill cores from eleven of the boreholes for which no original geological borehole mapping was available (KFR31, KFR32, KFR34, KFR37,KFR38, KFR51, KFR69, KFR70, KFR71, KFR72 and KFR89). - Identification of possible deformation zones and merging of similar rock types into rock units. This follows SKB's established criteria and methodology of the geological Single-hole interpretation (SHI) process wherever possible. Deviations from the standard SHI process are associated with the lack of data, for example BIPS images, or a

  9. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    Science.gov (United States)

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  10. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  11. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  14. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  15. Molecular identification of disk abalone (Haliotis discus discus) tetraspanin 33 and CD63: Insights into potent players in the disk abalone host defense system.

    Science.gov (United States)

    Priyathilaka, Thanthrige Thiunuwan; Bathige, S D N K; Herath, H M L P B; Lee, Sukkyoung; Lee, Jehee

    2017-10-01

    Tetraspanins are a superfamily of transmembrane proteins involved in a diverse range of physiological processes including differentiation, adhesion, signal transduction, cell motility, and immune responses. In the present study, two tetraspanins, CD63 and tetraspanin 33 (TSPAN33) from disk abalone (AbCD63 and AbTSPAN33), were identified and characterized at the molecular level. The coding sequences for AbCD63 and AbTSPAN33 encoded polypeptides of 234 and 290 amino acids (aa) with predicted molecular mass of 25.3 and 32.5 kDa, respectively. The deduced AbCD63 and AbTSPAN33 protein sequences were also predicted to have a typical tetraspanin domain architecture, including four transmembrane domains (TM), short N- and C- terminal regions, a short intracellular loop, as well as a large and small extracellular loop. A characteristic CCG motif and cysteine residues, which are highly conserved across CD63 and TSPAN33 proteins of different species, were present in the large extracellular loop of both abalone tetraspanins. Phylogenetic analysis revealed that the AbCD63 and AbTSPAN33 clustered in the invertebrate subclade of tetraspanins, thus exhibiting a close relationship with tetraspanins of other mollusks. The AbCD63 and AbTSPAN33 mRNA transcripts were detected at early embryonic development stages of disk abalone with significantly higher amounts at the trochophore stage, suggesting the involvement of these proteins in embryonic development. Both AbCD63 and AbTSPAN33 were ubiquitously expressed in all the tissues of unchallenged abalones analyzed, with the highest expression levels found in hemocytes. Moreover, significant induction of AbCD63 and AbTSPAN33 mRNA expression was observed in immunologically important tissues, such as hemocytes and gills, upon stimulation with live bacteria (Vibrio parahaemolyticus and Listeria monocytogenes), virus (viral hemorrhagic septicemia virus), and two potent immune stimulators [polyinosinic:polycytidylic acid (poly I:C) and

  16. Screening and Identification of putative long non coding RNAs from transcriptome data of a high yielding blackgram (Vigna mungo, Cv. T9

    Directory of Open Access Journals (Sweden)

    Pankaj Kumar Singh

    2018-04-01

    Full Text Available Blackgram (Vigna mungo is one of primary legumes cultivated throughout India, Cv.T9 being one of its common high yielding cultivar. This article reports RNA sequencing data and a pipeline for prediction of novel long non-coding RNAs from the sequenced data. The raw data generated during sequencing are available at Sequence Read Archive (SRA of NCBI with accession number- SRX1558530 Keywords: Blackgram, Long non-coding RNA, Legumes, RNA sequencing data

  17. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  18. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  19. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  20. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  1. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  2. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  4. Serotype identification and VP1 coding sequence analysis of foot-and-mouth disease virus from outbreaks in Eastern and Northern Uganda in 2008/9

    DEFF Research Database (Denmark)

    Kasambula, L.; Belsham, Graham; Siegismund, H. R.

    2012-01-01

    regions, and the presence of FMDV RNA in these samples was determined using a standard diagnostic RT-PCR assay. From the total of 27 positive samples, the VP1 coding region was amplified and sequenced. Each of these sequences showed >99% identity to each other, and just five distinct sequences were...

  5. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  6. Review of current severe accident management approaches in Europe and identification of related modelling requirements for the computer code ASTEC V2.1

    International Nuclear Information System (INIS)

    Hermsmeyer, S.

    2015-01-01

    The severe accident at the Fukushima-Daiichi nuclear power plant (NPP) has led to a worldwide review of nuclear safety approaches and is bringing a refocussing of R and D in the field. To support these efforts several new Euratom FP7 projects have been launched. The CESAM project focuses on the improvement of the ASTEC computer code. ASTEC is jointly developed by IRSN and GRS and is considered as the European reference code for Severe Accident Analyses since it capitalizes knowledge from the extensive Euro-pean R and D in the field. The project aims at the code's enhancement and extension for use in Severe Accident Management (SAM) analysis of the NPPs of Generation II-III presently under operation or foreseen in the near future in Europe, spent fuel pools included. The work reported here is concerned with the importance, for the further development of the code, of SAM strategies to be simulated. To this end, SAM strategies applied in the EU have been compiled. This compilation is mainly based on the public information made available in the frame of the EU ''stress tests'' for NPPs and has been complemented by information pro-vided by the different CESAM partners. The context of SAM is explained and the strategies are presented. The modelling capabilities for the simulation of these strategies in the current production version 2.0 of ASTEC are discussed. Furthermore, the requirements for the next version of ASTEC V2.1 that is supported in the CESAM project are highlighted. They are a necessary complement to the list of code improvements that is drawn from consolidating new fields of application, like SFP and BWR model enhancements, and from new experimental results on severe accident phenomena.

  7. Review of current severe accident management approaches in Europe and identification of related modelling requirements for the computer code ASTEC V2.1

    Energy Technology Data Exchange (ETDEWEB)

    Hermsmeyer, S. [European Commission JRC, Petten (Netherlands). Inst. for Energy and Transport; Herranz, L.E.; Iglesias, R. [CIEMAT, Madrid (Spain); and others

    2015-07-15

    The severe accident at the Fukushima-Daiichi nuclear power plant (NPP) has led to a worldwide review of nuclear safety approaches and is bringing a refocussing of R and D in the field. To support these efforts several new Euratom FP7 projects have been launched. The CESAM project focuses on the improvement of the ASTEC computer code. ASTEC is jointly developed by IRSN and GRS and is considered as the European reference code for Severe Accident Analyses since it capitalizes knowledge from the extensive Euro-pean R and D in the field. The project aims at the code's enhancement and extension for use in Severe Accident Management (SAM) analysis of the NPPs of Generation II-III presently under operation or foreseen in the near future in Europe, spent fuel pools included. The work reported here is concerned with the importance, for the further development of the code, of SAM strategies to be simulated. To this end, SAM strategies applied in the EU have been compiled. This compilation is mainly based on the public information made available in the frame of the EU ''stress tests'' for NPPs and has been complemented by information pro-vided by the different CESAM partners. The context of SAM is explained and the strategies are presented. The modelling capabilities for the simulation of these strategies in the current production version 2.0 of ASTEC are discussed. Furthermore, the requirements for the next version of ASTEC V2.1 that is supported in the CESAM project are highlighted. They are a necessary complement to the list of code improvements that is drawn from consolidating new fields of application, like SFP and BWR model enhancements, and from new experimental results on severe accident phenomena.

  8. 78 FR 20624 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-04-05

    ... Identification Advance Shipment Notices AGENCY: Defense Acquisition Regulations System, Department of Defense (Do...) Whether the proposed collection of information is necessary for the proper performance of the functions of... at 252.211; Radio Frequency Identification Advance Shipment Notices, OMB Control Number 0704-0434...

  9. Use of MAAP code for identification of key plant vulnerabilities for the beyond design accidents and their mitigation at NPP Krsko

    International Nuclear Information System (INIS)

    Krajnc, B.

    1995-01-01

    NPP Krsko performed according to GL 88-20, Supplement 1-4 and RUJV requirement the Individual Plant Examination analyses. For the required deterministic analyses the MAAP 3.0B code was used. It was proven that such severe accident analysis can be used for evaluation of the overall level of safety improvement that can be gained with the different modifications and alternate design. In this paper one such important outcomes from these analyses will be presented. (author)

  10. Exceeding of Official Powers (Art. 286 of the Criminal Code of Russian Federation: Identification and Analysis of Signs of Object and Victim

    Directory of Open Access Journals (Sweden)

    Sergey D. Brazhnik

    2014-03-01

    Full Text Available In the present article authors defines attributes of object and victim in the framework of offense "abuse of power" (Article 286 of the Criminal Code of the Russian Federation and conduct comparative analysis. At the first place questions of what should be considered as object of crime in the Russian legal doctrine. Author believe that "vertical" objects are divided into general, intragenic, clan, group, specific and direct, "horizontal" - at primary, secondary and optional. Author carried out a comprehensive analysis of each object under consideration provisions of the Criminal Code of the Russian Federation. Authors give particular attention to the study of victims of this crime. According to authors, lack of the unified approach to this issue is largely generated by the procedural legislation. Author concludes that victims of the power abuse in the criminal law sense may be citizens (any individual, organizations (legal entities, irrespective of their legal form, society and the state. Based on the comprehensive analysis of legal acts, court practice and a wide range of scientific sources authors justify the appropriateness of amending Criminal Code of the Russian Federation.

  11. Improvement of genome assembly completeness and identification of novel full-length protein-coding genes by RNA-seq in the giant panda genome.

    Science.gov (United States)

    Chen, Meili; Hu, Yibo; Liu, Jingxing; Wu, Qi; Zhang, Chenglin; Yu, Jun; Xiao, Jingfa; Wei, Fuwen; Wu, Jiayan

    2015-12-11

    High-quality and complete gene models are the basis of whole genome analyses. The giant panda (Ailuropoda melanoleuca) genome was the first genome sequenced on the basis of solely short reads, but the genome annotation had lacked the support of transcriptomic evidence. In this study, we applied RNA-seq to globally improve the genome assembly completeness and to detect novel expressed transcripts in 12 tissues from giant pandas, by using a transcriptome reconstruction strategy that combined reference-based and de novo methods. Several aspects of genome assembly completeness in the transcribed regions were effectively improved by the de novo assembled transcripts, including genome scaffolding, the detection of small-size assembly errors, the extension of scaffold/contig boundaries, and gap closure. Through expression and homology validation, we detected three groups of novel full-length protein-coding genes. A total of 12.62% of the novel protein-coding genes were validated by proteomic data. GO annotation analysis showed that some of the novel protein-coding genes were involved in pigmentation, anatomical structure formation and reproduction, which might be related to the development and evolution of the black-white pelage, pseudo-thumb and delayed embryonic implantation of giant pandas. The updated genome annotation will help further giant panda studies from both structural and functional perspectives.

  12. Codes and Standards Technical Team Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    The Hydrogen Codes and Standards Tech Team (CSTT) mission is to enable and facilitate the appropriate research, development, & demonstration (RD&D) for the development of safe, performance-based defensible technical codes and standards that support the technology readiness and are appropriate for widespread consumer use of fuel cells and hydrogen-based technologies with commercialization by 2020. Therefore, it is important that the necessary codes and standards be in place no later than 2015.

  13. Genome-wide identification and functional prediction of nitrogen-responsive intergenic and intronic long non-coding RNAs in maize (Zea mays L.).

    Science.gov (United States)

    Lv, Yuanda; Liang, Zhikai; Ge, Min; Qi, Weicong; Zhang, Tifu; Lin, Feng; Peng, Zhaohua; Zhao, Han

    2016-05-11

    Nitrogen (N) is an essential and often limiting nutrient to plant growth and development. Previous studies have shown that the mRNA expressions of numerous genes are regulated by nitrogen supplies; however, little is known about the expressed non-coding elements, for example long non-coding RNAs (lncRNAs) that control the response of maize (Zea mays L.) to nitrogen. LncRNAs are a class of non-coding RNAs larger than 200 bp, which have emerged as key regulators in gene expression. In this study, we surveyed the intergenic/intronic lncRNAs in maize B73 leaves at the V7 stage under conditions of N-deficiency and N-sufficiency using ribosomal RNA depletion and ultra-deep total RNA sequencing approaches. By integration with mRNA expression profiles and physiological evaluations, 7245 lncRNAs and 637 nitrogen-responsive lncRNAs were identified that exhibited unique expression patterns. Co-expression network analysis showed that the nitrogen-responsive lncRNAs were enriched mainly in one of the three co-expressed modules. The genes in the enriched module are mainly involved in NADH dehydrogenase activity, oxidative phosphorylation and the nitrogen compounds metabolic process. We identified a large number of lncRNAs in maize and illustrated their potential regulatory roles in response to N stress. The results lay the foundation for further in-depth understanding of the molecular mechanisms of lncRNAs' role in response to nitrogen stresses.

  14. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  15. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  16. Genome-wide identification of long non-coding RNA genes and their association with insecticide resistance and metamorphosis in diamondback moth, Plutella xylostella.

    Science.gov (United States)

    Liu, Feiling; Guo, Dianhao; Yuan, Zhuting; Chen, Chen; Xiao, Huamei

    2017-11-20

    Long non-coding RNA (lncRNA) is a class of noncoding RNA >200 bp in length that has essential roles in regulating a variety of biological processes. Here, we constructed a computational pipeline to identify lncRNA genes in the diamondback moth (Plutella xylostella), a major insect pest of cruciferous vegetables. In total, 3,324 lncRNAs corresponding to 2,475 loci were identified from 13 RNA-Seq datasets, including samples from parasitized, insecticide-resistant strains and different developmental stages. The identified P. xylostella lncRNAs had shorter transcripts and fewer exons than protein-coding genes. Seven out of nine randomly selected lncRNAs were validated by strand-specific RT-PCR. In total, 54-172 lncRNAs were specifically expressed in the insecticide resistant strains, among which one lncRNA was located adjacent to the sodium channel gene. In addition, 63-135 lncRNAs were specifically expressed in different developmental stages, among which three lncRNAs overlapped or were located adjacent to the metamorphosis-associated genes. These lncRNAs were either strongly or weakly co-expressed with their overlapping or neighboring mRNA genes. In summary, we identified thousands of lncRNAs and presented evidence that lncRNAs might have key roles in conferring insecticide resistance and regulating the metamorphosis development in P. xylostella.

  17. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  18. Low-pass shotgun sequencing of the barley genome facilitates rapid identification of genes, conserved non-coding sequences and novel repeats

    Directory of Open Access Journals (Sweden)

    Graner Andreas

    2008-10-01

    Full Text Available Abstract Background Barley has one of the largest and most complex genomes of all economically important food crops. The rise of new short read sequencing technologies such as Illumina/Solexa permits such large genomes to be effectively sampled at relatively low cost. Based on the corresponding sequence reads a Mathematically Defined Repeat (MDR index can be generated to map repetitive regions in genomic sequences. Results We have generated 574 Mbp of Illumina/Solexa sequences from barley total genomic DNA, representing about 10% of a genome equivalent. From these sequences we generated an MDR index which was then used to identify and mark repetitive regions in the barley genome. Comparison of the MDR plots with expert repeat annotation drawing on the information already available for known repetitive elements revealed a significant correspondence between the two methods. MDR-based annotation allowed for the identification of dozens of novel repeat sequences, though, which were not recognised by hand-annotation. The MDR data was also used to identify gene-containing regions by masking of repetitive sequences in eight de-novo sequenced bacterial artificial chromosome (BAC clones. For half of the identified candidate gene islands indeed gene sequences could be identified. MDR data were only of limited use, when mapped on genomic sequences from the closely related species Triticum monococcum as only a fraction of the repetitive sequences was recognised. Conclusion An MDR index for barley, which was obtained by whole-genome Illumina/Solexa sequencing, proved as efficient in repeat identification as manual expert annotation. Circumventing the labour-intensive step of producing a specific repeat library for expert annotation, an MDR index provides an elegant and efficient resource for the identification of repetitive and low-copy (i.e. potentially gene-containing sequences regions in uncharacterised genomic sequences. The restriction that a particular

  19. Comprehensive Identification of Long Non-coding RNAs in Purified Cell Types from the Brain Reveals Functional LncRNA in OPC Fate Determination.

    Directory of Open Access Journals (Sweden)

    Xiaomin Dong

    2015-12-01

    Full Text Available Long non-coding RNAs (lncRNAs (> 200 bp play crucial roles in transcriptional regulation during numerous biological processes. However, it is challenging to comprehensively identify lncRNAs, because they are often expressed at low levels and with more cell-type specificity than are protein-coding genes. In the present study, we performed ab initio transcriptome reconstruction using eight purified cell populations from mouse cortex and detected more than 5000 lncRNAs. Predicting the functions of lncRNAs using cell-type specific data revealed their potential functional roles in Central Nervous System (CNS development. We performed motif searches in ENCODE DNase I digital footprint data and Mouse ENCODE promoters to infer transcription factor (TF occupancy. By integrating TF binding and cell-type specific transcriptomic data, we constructed a novel framework that is useful for systematically identifying lncRNAs that are potentially essential for brain cell fate determination. Based on this integrative analysis, we identified lncRNAs that are regulated during Oligodendrocyte Precursor Cell (OPC differentiation from Neural Stem Cells (NSCs and that are likely to be involved in oligodendrogenesis. The top candidate, lnc-OPC, shows highly specific expression in OPCs and remarkable sequence conservation among placental mammals. Interestingly, lnc-OPC is significantly up-regulated in glial progenitors from experimental autoimmune encephalomyelitis (EAE mouse models compared to wild-type mice. OLIG2-binding sites in the upstream regulatory region of lnc-OPC were identified by ChIP (chromatin immunoprecipitation-Sequencing and validated by luciferase assays. Loss-of-function experiments confirmed that lnc-OPC plays a functional role in OPC genesis. Overall, our results substantiated the role of lncRNA in OPC fate determination and provided an unprecedented data source for future functional investigations in CNS cell types. We present our datasets and

  20. 48 CFR 252.211-7003 - Item identification and valuation.

    Science.gov (United States)

    2010-10-01

    ... Defense Logistics Information System (DLIS) Commercial and Government Entity (CAGE) Code). Issuing agency... Standard 15434), in accordance with the Air Transport Association Common Support Data Dictionary; and (ii...

  1. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  2. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  3. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  4. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  5. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  6. Identification of novel growth phase- and media-dependent small non-coding RNAs in Streptococcus pyogenes M49 using intergenic tiling arrays

    Directory of Open Access Journals (Sweden)

    Patenge Nadja

    2012-10-01

    Full Text Available Abstract Background Small non-coding RNAs (sRNAs have attracted attention as a new class of gene regulators in both eukaryotes and bacteria. Genome-wide screening methods have been successfully applied in Gram-negative bacteria to identify sRNA regulators. Many sRNAs are well characterized, including their target mRNAs and mode of action. In comparison, little is known about sRNAs in Gram-positive pathogens. In this study, we identified novel sRNAs in the exclusively human pathogen Streptococcus pyogenes M49 (Group A Streptococcus, GAS M49, employing a whole genome intergenic tiling array approach. GAS is an important pathogen that causes diseases ranging from mild superficial infections of the skin and mucous membranes of the naso-pharynx, to severe toxic and invasive diseases. Results We identified 55 putative sRNAs in GAS M49 that were expressed during growth. Of these, 42 were novel. Some of the newly-identified sRNAs belonged to one of the common non-coding RNA families described in the Rfam database. Comparison of the results of our screen with the outcome of two recently published bioinformatics tools showed a low level of overlap between putative sRNA genes. Previously, 40 potential sRNAs have been reported to be expressed in a GAS M1T1 serotype, as detected by a whole genome intergenic tiling array approach. Our screen detected 12 putative sRNA genes that were expressed in both strains. Twenty sRNA candidates appeared to be regulated in a medium-dependent fashion, while eight sRNA genes were regulated throughout growth in chemically defined medium. Expression of candidate genes was verified by reverse transcriptase-qPCR. For a subset of sRNAs, the transcriptional start was determined by 5′ rapid amplification of cDNA ends-PCR (RACE-PCR analysis. Conclusions In accord with the results of previous studies, we found little overlap between different screening methods, which underlines the fact that a comprehensive analysis of s

  7. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  8. Identification of genes potentially responsible for extra-oral digestion and overcoming plant defense from salivary glands of the tarnished plant bug (Lygus lineolaris) using cDNA sequencing

    Science.gov (United States)

    Saliva is known to play a crucial role in tarnished plant bug (TPB, Lygus lineolaris) feeding. TPBs secrete saliva during feeding to facilitate the piercing into plant tissues. More importantly, the enzyme-rich saliva may be used for extra-oral digestion and for overcoming plant defense before the p...

  9. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  10. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  11. Coding-Sequence Identification and Transcriptional Profiling of Nine AMTs and Four NRTs From Tobacco Revealed Their Differential Regulation by Developmental Stages, Nitrogen Nutrition, and Photoperiod

    Directory of Open Access Journals (Sweden)

    Lai-Hua Liu

    2018-03-01

    Full Text Available Although many members encoding different ammonium- and nitrate-transporters (AMTs, NRTs were identified and functionally characterized from several plant species, little is known about molecular components for NH4+- and NO3- acquisition/transport in tobacco, which is often used as a plant model for biological studies besides its agricultural and industrial interest. We reported here the first molecular identification in tobacco (Nicotiana tabacum of nine AMTs and four NRTs, which are respectively divided into four (AMT1/2/3/4 and two (NRT1/2 clusters and whose functionalities were preliminarily evidenced by heterologous functional-complementation in yeast or Arabidopsis. Tissue-specific transcriptional profiling by qPCR revealed that NtAMT1.1/NRT1.1 mRNA occurred widely in leaves, flower organs and roots; only NtAMT1.1/1.3/2.1NRT1.2/2.2 were strongly transcribed in the aged leaves, implying their dominant roles in N-remobilization from source/senescent tissues. N-dependent expression analysis showed a marked upregulation of NtAMT1.1 in the roots by N-starvation and resupply with N including NH4+, suggesting a predominant action of NtAMT1.1 in NH4+ uptake/transport whenever required. The obvious leaf-expression of other NtAMTs e.g., AMT1.2 responsive to N indicates a major place, where they may play transport roles associated with plant N-status and (NH4+-N movement within aerial-parts. The preferentially root-specific transcription of NtNRT1.1/1.2/2.1 responsive to N argues their importance for root NO3- uptake and even sensing in root systems. Moreover, of all NtAMTs/NRTs, only NtAMT1.1/NRT1.1/1.2 showed their root-expression alteration in a typical diurnal-oscillation pattern, reflecting likely their significant roles in root N-acquisition regulated by internal N-demand influenced by diurnal-dependent assimilation and translocation of carbohydrates from shoots. This suggestion could be supported at least in part by sucrose- and MSX

  12. Coding-Sequence Identification and Transcriptional Profiling of Nine AMTs and Four NRTs From Tobacco Revealed Their Differential Regulation by Developmental Stages, Nitrogen Nutrition, and Photoperiod

    Science.gov (United States)

    Liu, Lai-Hua; Fan, Teng-Fei; Shi, Dong-Xue; Li, Chang-Jun; He, Ming-Jie; Chen, Yi-Yin; Zhang, Lei; Yang, Chao; Cheng, Xiao-Yuan; Chen, Xu; Li, Di-Qin; Sun, Yi-Chen

    2018-01-01

    Although many members encoding different ammonium- and nitrate-transporters (AMTs, NRTs) were identified and functionally characterized from several plant species, little is known about molecular components for NH4+- and NO3- acquisition/transport in tobacco, which is often used as a plant model for biological studies besides its agricultural and industrial interest. We reported here the first molecular identification in tobacco (Nicotiana tabacum) of nine AMTs and four NRTs, which are respectively divided into four (AMT1/2/3/4) and two (NRT1/2) clusters and whose functionalities were preliminarily evidenced by heterologous functional-complementation in yeast or Arabidopsis. Tissue-specific transcriptional profiling by qPCR revealed that NtAMT1.1/NRT1.1 mRNA occurred widely in leaves, flower organs and roots; only NtAMT1.1/1.3/2.1NRT1.2/2.2 were strongly transcribed in the aged leaves, implying their dominant roles in N-remobilization from source/senescent tissues. N-dependent expression analysis showed a marked upregulation of NtAMT1.1 in the roots by N-starvation and resupply with N including NH4+, suggesting a predominant action of NtAMT1.1 in NH4+ uptake/transport whenever required. The obvious leaf-expression of other NtAMTs e.g., AMT1.2 responsive to N indicates a major place, where they may play transport roles associated with plant N-status and (NH4+-)N movement within aerial-parts. The preferentially root-specific transcription of NtNRT1.1/1.2/2.1 responsive to N argues their importance for root NO3- uptake and even sensing in root systems. Moreover, of all NtAMTs/NRTs, only NtAMT1.1/NRT1.1/1.2 showed their root-expression alteration in a typical diurnal-oscillation pattern, reflecting likely their significant roles in root N-acquisition regulated by internal N-demand influenced by diurnal-dependent assimilation and translocation of carbohydrates from shoots. This suggestion could be supported at least in part by sucrose- and MSX-affected transcriptional

  13. Identification of genes for small non-coding RNAs that belong to the regulon of the two-component regulatory system CiaRH in Streptococcus

    Directory of Open Access Journals (Sweden)

    Hakenbeck Regine

    2010-11-01

    Full Text Available Abstract Background Post-transcriptional regulation by small RNAs (sRNAs in bacteria is now recognized as a wide-spread regulatory mechanism modulating a variety of physiological responses including virulence. In Streptococcus pneumoniae, an important human pathogen, the first sRNAs to be described were found in the regulon of the CiaRH two-component regulatory system. Five of these sRNAs were detected and designated csRNAs for cia-dependent small RNAs. CiaRH pleiotropically affects β-lactam resistance, autolysis, virulence, and competence development by yet to be defined molecular mechanisms. Since CiaRH is highly conserved among streptococci, it is of interest to determine if csRNAs are also included in the CiaRH regulon in this group of organisms consisting of commensal as well as pathogenic species. Knowledge on the participation of csRNAs in CiaRH-dependent regulatory events will be the key to define the physiological role of this important control system. Results Genes for csRNAs were predicted in streptococcal genomes and data base entries other than S. pneumoniae by searching for CiaR-activated promoters located in intergenic regions that are followed by a transcriptional terminator. 61 different candidate genes were obtained specifying csRNAs ranging in size from 51 to 202 nt. Comparing these genes among each other revealed 40 different csRNA types. All streptococcal genomes harbored csRNA genes, their numbers varying between two and six. To validate these predictions, S. mitis, S. oralis, and S. sanguinis were subjected to csRNA-specific northern blot analysis. In addition, a csRNA gene from S. thermophilus plasmid pST0 introduced into S. pneumoniae was also tested. Each of the csRNAs was detected on these blots and showed the anticipated sizes. Thus, the method applied here is able to predict csRNAs with high precision. Conclusions The results of this study strongly suggest that genes for small non-coding RNAs, csRNAs, are part of

  14. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  15. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  16. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  17. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  18. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  19. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  20. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  1. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  2. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  4. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  5. NHRIC (National Health Related Items Code)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Health Related Items Code (NHRIC) is a system for identification and numbering of marketed device packages that is compatible with other numbering...

  6. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  7. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  8. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  9. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  10. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  11. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  12. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  13. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  14. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  15. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  16. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  17. Defense Acquisition Review Journal. Volume 16, Number 3, Issue 52

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  18. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  19. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  20. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  1. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  2. The Impact of the Defense Industry Consolidation on the Aerospace Industry

    National Research Council Canada - National Science Library

    Davis, Judy B

    2006-01-01

    ... (SIC) codes. Using the structure-conduct- performance paradigm, a method in industrial organization, this thesis focused on how the defense consolidation affected the structure and behavior of the aerospace industry...

  3. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  4. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  5. Public Health Emergency Management Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    February 20071 (aa) DoD Instruction 1100.21, “ Voluntary Services in the Department of Defense,” March 11, 2002 (ab) DoD Instruction 5210.25...include eradication of disease, identification of affected animals, animal quarantine implementation, euthanasia , carcass disposal, cleaning and

  6. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  7. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  8. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  9. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  10. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  11. Strategic Foresight Process - Improvements for the Hungarian Ministry of Defense

    Science.gov (United States)

    2016-06-01

    data by modeling and econometric techniques including trend curves and trend extrapolations, among others; the kind of extrapolation of past data that...strategic management, Hungary, Hungarian Ministry of Defense, migration, Russia 15. NUMBER OF PAGES 79 16. PRICE CODE 17. SECURITY ...CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20

  12. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  13. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  14. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  15. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  16. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  17. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  18. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  19. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  20. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  1. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  2. 76 FR 32839 - Defense Federal Acquisition Regulation Supplement; Agency Office of the Inspector General (DFARS...

    Science.gov (United States)

    2011-06-06

    ... 52.203-13, Contractor Code of Business Ethics and Conduct. This final rule corrects two omissions in... Subjects in 48 CFR Parts 203 and 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition... clause 52.203-13, Contractor Code of Business Ethics and Conduct. * * * * * PART 252--SOLICITATION...

  3. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  4. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  5. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  6. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  7. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  8. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  9. 48 CFR 204.7206 - Using CAGE codes to identify agents and brokers.

    Science.gov (United States)

    2010-10-01

    ... identify agents and brokers. 204.7206 Section 204.7206 Federal Acquisition Regulations System DEFENSE... 204.7206 Using CAGE codes to identify agents and brokers. Authorized agents and brokers are entities... code will be assigned to the agent/broker establishment in addition to any codes assigned to the...

  10. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  11. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  12. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  13. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  14. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  15. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  16. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  17. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  18. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  19. User's guide for Reactor Incident Root Cause Coding Tree

    International Nuclear Information System (INIS)

    Busch, D.A.; Paradies, M.W.

    1986-01-01

    The Reactor Incident (RI) Cause Coding Tree is designed to allow identification of root causes of RI's, thereby leading to trending of useful information and developing of corrective actions to prevent recurrence. This guide explains the terminology of the RI Cause Coding Tree and how to use the tree. Using this guide for cause coding is stressed to allow consistency of coding among all RI investigators. 8 figs

  20. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  1. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  2. Defense Logistics: A Completed Comprehensive Strategy is Needed to Guide DOD’s In-Transit Visibility Efforts

    Science.gov (United States)

    2013-02-01

    Defense Logistics List of Abbreviations aRFID active radio frequency identification DOD Department of Defense RFID...The Navy and the Air Force each have their own Active Radio Frequency Identification ( aRFID ) Migration Program. These two programs are included...with the aRFID Program and the aRFID Infrastructure, respectively and are therefore not listed in the table. Appendix III: Comments from the

  3. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  4. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  5. Use of the Spine Adverse Events Severity System (SAVES) in patients with traumatic spinal cord injury. A comparison with institutional ICD-10 coding for the identification of acute care adverse events.

    Science.gov (United States)

    Street, J T; Thorogood, N P; Cheung, A; Noonan, V K; Chen, J; Fisher, C G; Dvorak, M F

    2013-06-01

    Observational cohort comparison. To compare the previously validated Spine Adverse Events Severity system (SAVES) with International Classification of Diseases, Tenth Revision codes (ICD-10) codes for identifying adverse events (AEs) in patients with traumatic spinal cord injury (TSCI). Quaternary Care Spine Program. Patients discharged between 2006 and 2010 were identified from our prospective registry. Two consecutive cohorts were created based on the system used to record acute care AEs; one used ICD-10 coding by hospital coders and the other used SAVES data prospectively collected by a multidisciplinary clinical team. The ICD-10 codes were appropriately mapped to the SAVES. There were 212 patients in the ICD-10 cohort and 173 patients in the SAVES cohort. Analyses were adjusted to account for the different sample sizes, and the two cohorts were comparable based on age, gender and motor score. The SAVES system identified twice as many AEs per person as ICD-10 coding. Fifteen unique AEs were more reliably identified using SAVES, including neuropathic pain (32 × more; Ppatient age and severity of paralysis were more reliably correlated to AEs collected through SAVES than ICD-10. Implementation of the SAVES system for patients with TSCI captured more individuals experiencing AEs and more AEs per person compared with ICD-10 codes. This study demonstrates the utility of prospectively collecting AE data using validated tools.

  6. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  7. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  8. Large Scale System Defense

    Science.gov (United States)

    2008-10-01

    NUMBER 00 5f. WORK UNIT NUMBER 01 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Columbia University 1700 Broadway New York NY 10019-5905 8...PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) AFRL/RIGA 525 Brooks Rd. Rome NY 13441-4505...pealing because of the need to modify source code. Since source-level annotations serve as a vestigial policy, we articulated a way to augment self

  9. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms.

  10. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    International Nuclear Information System (INIS)

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms

  11. Execute-Only Attacks against Execute-Only Defenses

    Science.gov (United States)

    2016-02-18

    strongest implementations of execute-only defenses: it exploits novel hardware features to incorporate non-readable code to prevent direct information...build two proof-of- concept exploits that can achieve control flow hijacking on a system protected by full- featured Readactor. • We evaluate the...According to the CVE [31], 123 such arbitrary read vulnerabilities were reported between January and September of 2015, in Firefox (CVE-2015-4495

  12. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  13. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  14. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  15. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  16. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  17. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  18. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  19. Small Business and Defense Acquisitions: A Review of Policies and Current Practices

    Science.gov (United States)

    2011-01-01

    Office of Management and Budget xviii Small Business and Defense Acquisitions: A Review of Policies and Current Practices PSC Product and Service Code...themselves as minority-owned, women-owned, veteran- owned, or small disadvantaged businesses . The resulting database gives sourcing managers a tool for...REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Small Business and Defense Acquisitions: A

  20. Discriminative sparse coding on multi-manifolds

    KAUST Repository

    Wang, J.J.-Y.; Bensmail, H.; Yao, N.; Gao, Xin

    2013-01-01

    Sparse coding has been popularly used as an effective data representation method in various applications, such as computer vision, medical imaging and bioinformatics. However, the conventional sparse coding algorithms and their manifold-regularized variants (graph sparse coding and Laplacian sparse coding), learn codebooks and codes in an unsupervised manner and neglect class information that is available in the training set. To address this problem, we propose a novel discriminative sparse coding method based on multi-manifolds, that learns discriminative class-conditioned codebooks and sparse codes from both data feature spaces and class labels. First, the entire training set is partitioned into multiple manifolds according to the class labels. Then, we formulate the sparse coding as a manifold-manifold matching problem and learn class-conditioned codebooks and codes to maximize the manifold margins of different classes. Lastly, we present a data sample-manifold matching-based strategy to classify the unlabeled data samples. Experimental results on somatic mutations identification and breast tumor classification based on ultrasonic images demonstrate the efficacy of the proposed data representation and classification approach. 2013 The Authors. All rights reserved.

  1. Discriminative sparse coding on multi-manifolds

    KAUST Repository

    Wang, J.J.-Y.

    2013-09-26

    Sparse coding has been popularly used as an effective data representation method in various applications, such as computer vision, medical imaging and bioinformatics. However, the conventional sparse coding algorithms and their manifold-regularized variants (graph sparse coding and Laplacian sparse coding), learn codebooks and codes in an unsupervised manner and neglect class information that is available in the training set. To address this problem, we propose a novel discriminative sparse coding method based on multi-manifolds, that learns discriminative class-conditioned codebooks and sparse codes from both data feature spaces and class labels. First, the entire training set is partitioned into multiple manifolds according to the class labels. Then, we formulate the sparse coding as a manifold-manifold matching problem and learn class-conditioned codebooks and codes to maximize the manifold margins of different classes. Lastly, we present a data sample-manifold matching-based strategy to classify the unlabeled data samples. Experimental results on somatic mutations identification and breast tumor classification based on ultrasonic images demonstrate the efficacy of the proposed data representation and classification approach. 2013 The Authors. All rights reserved.

  2. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  3. Sandia National Laboratories analysis code data base

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, C.W.

    1994-11-01

    Sandia National Laboratories, mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The Laboratories` strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia`s technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code ``ownership`` and release status, and references describing the physical models and numerical implementation.

  4. Sandia National Laboratories analysis code data base

    Science.gov (United States)

    Peterson, C. W.

    1994-11-01

    Sandia National Laboratories' mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The laboratories' strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia's technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems, and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code 'ownership' and release status, and references describing the physical models and numerical implementation.

  5. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  6. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  7. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  8. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  9. Structural Identification Problem

    Directory of Open Access Journals (Sweden)

    Suvorov Aleksei

    2016-01-01

    Full Text Available The identification problem of the existing structures though the Quasi-Newton and its modification, Trust region algorithms is discussed. For the structural problems, which could be represented by means of the mathematical modelling of the finite element code discussed method is extremely useful. The nonlinear minimization problem of the L2 norm for the structures with linear elastic behaviour is solved by using of the Optimization Toolbox of Matlab. The direct and inverse procedures for the composition of the desired function to minimize are illustrated for the spatial 3D truss structure as well as for the problem of plane finite elements. The truss identification problem is solved with 2 and 3 unknown parameters in order to compare the computational efforts and for the graphical purposes. The particular commands of the Matlab codes are present in this paper.

  10. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  11. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  12. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  13. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  14. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  15. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  16. Deciphering the genetic regulatory code using an inverse error control coding framework.

    Energy Technology Data Exchange (ETDEWEB)

    Rintoul, Mark Daniel; May, Elebeoba Eni; Brown, William Michael; Johnston, Anna Marie; Watson, Jean-Paul

    2005-03-01

    We have found that developing a computational framework for reconstructing error control codes for engineered data and ultimately for deciphering genetic regulatory coding sequences is a challenging and uncharted area that will require advances in computational technology for exact solutions. Although exact solutions are desired, computational approaches that yield plausible solutions would be considered sufficient as a proof of concept to the feasibility of reverse engineering error control codes and the possibility of developing a quantitative model for understanding and engineering genetic regulation. Such evidence would help move the idea of reconstructing error control codes for engineered and biological systems from the high risk high payoff realm into the highly probable high payoff domain. Additionally this work will impact biological sensor development and the ability to model and ultimately develop defense mechanisms against bioagents that can be engineered to cause catastrophic damage. Understanding how biological organisms are able to communicate their genetic message efficiently in the presence of noise can improve our current communication protocols, a continuing research interest. Towards this end, project goals include: (1) Develop parameter estimation methods for n for block codes and for n, k, and m for convolutional codes. Use methods to determine error control (EC) code parameters for gene regulatory sequence. (2) Develop an evolutionary computing computational framework for near-optimal solutions to the algebraic code reconstruction problem. Method will be tested on engineered and biological sequences.

  17. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  18. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  19. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  20. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  1. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  2. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  3. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  4. 21 CFR 206.10 - Code imprint required.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Code imprint required. 206.10 Section 206.10 Food...: GENERAL IMPRINTING OF SOLID ORAL DOSAGE FORM DRUG PRODUCTS FOR HUMAN USE § 206.10 Code imprint required... imprint that, in conjunction with the product's size, shape, and color, permits the unique identification...

  5. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  6. Caelum Liberam: Air Defense Identification Zones Outside Sovereign Airspace

    Science.gov (United States)

    2009-01-01

    0,1518, druck -562073,00.html. 59 For a thorough treatment of international law related to interception of foreign aircraft over the high seas, see Andrew...COMP. L. 377, 377–79, 386 (2000). 119 See, e.g., R. R. CHURCHILL & A. V. LOWE, THE LAW OF THE SEA 162 ( 3d ed. 1999). 110 DAVID JOSEPH ATTARD, THE

  7. Oil and gas field code master list, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  8. An introduction to using QR codes in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jae Hwa Chang

    2014-08-01

    Full Text Available The Quick Response (QR code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements. In scholarly journals, the QR code is used to provide immediate direction to the journal homepage or specific content such as figures or videos. To produce a QR code and print it in the print version or upload to the web is very simple. Using a QR code producing program, an editor can add simple information to a website. After that, a QR code is produced. A QR code is very stable, such that it can be used for a long time without loss of quality. Producing and adding QR codes to a journal costs nothing; therefore, to increase the visibility of their journals, it is time for editors to add QR codes to their journals.

  9. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. Defense AR Journal. Volume 16, Number 3, Issue 52, October 2009

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks in...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  11. On fuzzy semantic similarity measure for DNA coding.

    Science.gov (United States)

    Ahmad, Muneer; Jung, Low Tang; Bhuiyan, Md Al-Amin

    2016-02-01

    A coding measure scheme numerically translates the DNA sequence to a time domain signal for protein coding regions identification. A number of coding measure schemes based on numerology, geometry, fixed mapping, statistical characteristics and chemical attributes of nucleotides have been proposed in recent decades. Such coding measure schemes lack the biologically meaningful aspects of nucleotide data and hence do not significantly discriminate coding regions from non-coding regions. This paper presents a novel fuzzy semantic similarity measure (FSSM) coding scheme centering on FSSM codons׳ clustering and genetic code context of nucleotides. Certain natural characteristics of nucleotides i.e. appearance as a unique combination of triplets, preserving special structure and occurrence, and ability to own and share density distributions in codons have been exploited in FSSM. The nucleotides׳ fuzzy behaviors, semantic similarities and defuzzification based on the center of gravity of nucleotides revealed a strong correlation between nucleotides in codons. The proposed FSSM coding scheme attains a significant enhancement in coding regions identification i.e. 36-133% as compared to other existing coding measure schemes tested over more than 250 benchmarked and randomly taken DNA datasets of different organisms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  13. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  14. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  15. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  16. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  17. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  18. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  19. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  20. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  1. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  2. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  3. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  4. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  5. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  6. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  7. Sequence of the intron/exon junctions of the coding region of the human androgen receptor gene and identification of a point mutation in a family with complete androgen insensitivity

    International Nuclear Information System (INIS)

    Lubahn, D.B.; Simental, J.A.; Higgs, H.N.; Wilson, E.M.; French, F.S.; Brown, T.R.; Migeon, C.J.

    1989-01-01

    Androgens act through a receptor protein (AR) to mediate sex differentiation and development of the male phenotype. The authors have isolated the eight exons in the amino acid coding region of the AR gene from a human X chromosome library. Nucleotide sequences of the AR gene intron/exon boundaries were determined for use in designing synthetic oligonucleotide primers to bracket coding exons for amplification by the polymerase chain reaction. Genomic DNA was amplified from 46, XY phenotypic female siblings with complete androgen insensitivity syndrome. AR binding affinity for dihydrotestosterone in the affected siblings was lower than in normal males, but the binding capacity was normal. Sequence analysis of amplified exons demonstrated within the AR steroid-binding domain (exon G) a single guanine to adenine mutation, resulting in replacement of valine with methionine at amino acid residue 866. As expected, the carrier mother had both normal and mutant AR genes. Thus, a single point mutation in the steroid-binding domain of the AR gene correlated with the expression of an AR protein ineffective in stimulating male sexual development

  8. Writing robust C++ code for critical applications

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    **C++** is one of the most **complex**, expressive and powerful languages out there. However, its complexity makes it hard to write **robust** code. When using C++ to code **critical** applications, ensuring **reliability** is one of the key topics. Testing, debugging and profiling are all a major part of this kind of work. In the BE department we use C++ to write a big part of the controls system for beam operation, which implies putting a big focus on system stability and ensuring smooth operation. This talk will try to: - Highlight potential problems when writing C++ code, giving guidelines on writing defensive code that could have avoided such issues - Explain how to avoid common pitfalls (both in writing C++ code and at the debugging & profiling phase) - Showcase some tools and tricks useful to C++ development The attendees' proficiency in C++ should not be a concern. Anyone is free to join, even people that do not know C++, if only to learn the pitfalls a language may have. This may benefit f...

  9. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  10. Review of Business-Class and First-Class Airfares Within the Office of the Inspector General of the Department of Defense

    National Research Council Canada - National Science Library

    2004-01-01

    We reviewed 20 transactions that were coded as business-class and first-class travel during the 2002 and 2003 calendar years for the Office of the Inspector General of the Department of Defense (OIG DoD...

  11. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  12. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  13. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  14. 76 FR 38089 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-06-29

    ... Defense Contract Audit Agency audit; (ii) By DoD Offices of the Inspector General as part of pending or on...-3 MA-4(6) SC-4. AC-3(4) Audit & Identification and MA-5 SC-7. Accountability. Authentication. AC-4... determined). [[Page 38095

  15. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  16. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  17. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  18. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  19. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  20. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  1. Flow regimes and heat transfer modes identification in ANGRA 2 core, during small break in the primary loop with area of 100 cm2, simulated with RELAP5 code

    International Nuclear Information System (INIS)

    Borges, Eduardo M.; Sabundjian, Gaiane

    2015-01-01

    Identifying the flow regimes and the heat transfer modes is important for the analysis of accidents such as the Loss-of-Coolant Accident (LOCA). The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used in the RELAP5/MOD3.2.gama code in ANGRA 2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 100cm 2 -rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of ANGRA 2 (FSAR - A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of ANGRA 2 during the postulated accident. (author)

  2. Flow regimes and heat transfer modes identification in ANGRA 2 core, during small break in the primary loop with area of 100 cm{sup 2}, simulated with RELAP5 code

    Energy Technology Data Exchange (ETDEWEB)

    Borges, Eduardo M.; Sabundjian, Gaiane, E-mail: gdgian@ipen.br, E-mail: borges.em@hotmail.com [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    Identifying the flow regimes and the heat transfer modes is important for the analysis of accidents such as the Loss-of-Coolant Accident (LOCA). The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used in the RELAP5/MOD3.2.gama code in ANGRA 2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 100cm{sup 2}-rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of ANGRA 2 (FSAR - A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of ANGRA 2 during the postulated accident. (author)

  3. Identification of flow regimes and heat transfer modes in Angra-2 core during the simulation of the small break loss of coolant accident of 250 cm2 in the cold leg of primary loop using RELAP5 code

    International Nuclear Information System (INIS)

    Borges, Eduardo M.; Sabundjian, Gaiane

    2017-01-01

    The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used by RELAP5/MOD3.2. gamma code in Angra-2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 250cm 2 of rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of Angra-2 (FSAR-A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of Angra-2 during the postulated accident. The results obtained for Angra-2 nuclear reactor core during the postulated accident were satisfactory when compared with the FSAR-A2. Additionally, the results showed the correct actuation of the ECCS guaranteeing the integrity of the reactor core. (author)

  4. Identification of flow regimes and heat transfer modes in Angra-2 core during the simulation of the small break loss of coolant accident of 250 cm{sup 2} in the cold leg of primary loop using RELAP5 code

    Energy Technology Data Exchange (ETDEWEB)

    Borges, Eduardo M.; Sabundjian, Gaiane, E-mail: borges.em@hotmail.com, E-mail: gdjian@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNE-SP), Sao Paulo, SP (Brazil)

    2017-07-01

    The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used by RELAP5/MOD3.2. gamma code in Angra-2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 250cm{sup 2} of rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of Angra-2 (FSAR-A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of Angra-2 during the postulated accident. The results obtained for Angra-2 nuclear reactor core during the postulated accident were satisfactory when compared with the FSAR-A2. Additionally, the results showed the correct actuation of the ECCS guaranteeing the integrity of the reactor core. (author)

  5. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  6. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  7. Development of Adaptive Coping From Mid to Late Life: A 70-Year Longitudinal Study of Defense Maturity and Its Psychosocial Correlates.

    Science.gov (United States)

    Martin-Joy, John S; Malone, Johanna C; Cui, Xing-Jia; Johansen, Pål-Ørjan; Hill, Kevin P; Rahman, M Omar; Waldinger, Robert J; Vaillant, George E

    2017-09-01

    The present study examines changes in defense maturity from mid to late life using data from an over 70-year longitudinal study. A sample of 72 men was followed beginning in late adolescence. Participants' childhoods were coded for emotional warmth. Defense mechanisms were coded by independent raters using the Q-Sort of Defenses (, Ego mechanisms of defense: A guide for clinicians and researchers 217-233) based on interview data gathered at approximately ages 52 and 75. We examined psychosocial correlates of defenses at midlife, late life, and changes in defense from mid to late life. Overall, defenses grew more adaptive from midlife to late life. However, results differed on the basis of the emotional warmth experienced in the participants' childhoods. In midlife, men who experienced warm childhoods used more adaptive (mature) defenses; yet by late life, this difference in defensive maturity had disappeared. Men who experienced less childhood warmth were more likely to show an increase in adaptive defenses during the period from mid to late life.

  8. Knowledge Loss: A Defensive Model In Nuclear Research Organization Memory

    International Nuclear Information System (INIS)

    Mohamad Safuan Bin Sulaiman; Muhd Noor Muhd Yunus

    2013-01-01

    Knowledge is an essential part of research based organization. It should be properly managed to ensure that any pitfalls of knowledge retention due to knowledge loss of both tacit and explicit is mitigated. Audit of the knowledge entities exist in the organization is important to identify the size of critical knowledge. It is very much related to how much know-what, know-how and know-why experts exist in the organization. This study conceptually proposed a defensive model for Nuclear Malaysia's organization memory and application of Knowledge Loss Risk Assessment (KLRA) as an important tool for critical knowledge identification. (author)

  9. DOE Defense Program (DP) safety programs. Final report, Task 003

    International Nuclear Information System (INIS)

    1998-01-01

    The overall objective of the work on Task 003 of Subcontract 9-X52-W7423-1 was to provide LANL with support to the DOE Defense Program (DP) Safety Programs. The effort included the identification of appropriate safety requirements, the refinement of a DP-specific Safety Analysis Report (SAR) Format and Content Guide (FCG) and Comprehensive Review Plan (CRP), incorporation of graded approach instructions into the guidance, and the development of a safety analysis methodologies document. All tasks which were assigned under this Task Order were completed. Descriptions of the objectives of each task and effort performed to complete each objective is provided here

  10. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  11. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  12. Remote-Handled Transuranic Content Codes

    International Nuclear Information System (INIS)

    2001-01-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document represents the development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specific identification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing description for each content code and compiles this information for all DOE sites. Compliance with waste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The content code gives an overall description of the RH-TRU waste material in terms of processes and packaging, as well as the generation location. This helps to provide cradle-to-grave traceability of the waste material so that the various actions required to assess its qualification as payload for the 72-B cask can be performed. The content codes also impose restrictions and requirements on the manner in which a payload can be assembled. The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7 of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures applicable for the qualification of waste as payload for the 72-B cask. The logic for this classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON, RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. Each content code uniquely

  13. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  14. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  15. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  16. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  17. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  18. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  19. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  20. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  1. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  2. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  3. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  4. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  5. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  6. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  7. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  8. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  9. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  10. Optimal patch code design via device characterization

    Science.gov (United States)

    Wu, Wencheng; Dalal, Edul N.

    2012-01-01

    In many color measurement applications, such as those for color calibration and profiling, "patch code" has been used successfully for job identification and automation to reduce operator errors. A patch code is similar to a barcode, but is intended primarily for use in measurement devices that cannot read barcodes due to limited spatial resolution, such as spectrophotometers. There is an inherent tradeoff between decoding robustness and the number of code levels available for encoding. Previous methods have attempted to address this tradeoff, but those solutions have been sub-optimal. In this paper, we propose a method to design optimal patch codes via device characterization. The tradeoff between decoding robustness and the number of available code levels is optimized in terms of printing and measurement efforts, and decoding robustness against noises from the printing and measurement devices. Effort is drastically reduced relative to previous methods because print-and-measure is minimized through modeling and the use of existing printer profiles. Decoding robustness is improved by distributing the code levels in CIE Lab space rather than in CMYK space.

  11. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  12. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  13. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  14. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  15. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  16. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  17. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  18. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  19. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  20. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  1. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  2. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  3. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  4. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  5. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  6. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  7. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  8. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  9. [Projective identification in human relations].

    Science.gov (United States)

    Göka, Erol; Yüksel, Fatih Volkan; Göral, F Sevinç

    2006-01-01

    Melanie Klein, one of the pioneers of Object Relations Theory, first defined "projective identification", which is regarded as one of the most efficacious psychoanalytic concepts after the discovery of the "unconscious". Examination of the literature on "projective identification" shows that there are various perspectives and theories suggesting different uses of this concept. Some clinicians argue that projective identification is a primitive defense mechanism observed in severe psychopathologies like psychotic disorder and borderline personality disorder, where the intra-psychic structure has been damaged severely. Others suggest it to be an indispensable part of the transference and counter-transference between the therapist and the patient during psychotherapy and it can be used as a treatment material in the therapy by a skillful therapist. The latter group expands the use of the concept through normal daily relationships by stating that projective identification is one type of communication and part of the main human relation mechanism operating in all close relationships. Therefore, they suggest that projective identification has benign forms experienced in human relations as well as malign forms seen in psychopathologies. Thus, discussions about the definition of the concept appear complex. In order to clarify and overcome the complexity of the concept, Melanie Klein's and other most important subsequent approaches are discussed in this review article. Thereby, the article aims to explain its important function in understanding the psychopathologies, psychotherapeutic relationships and different areas of normal human relations.

  10. Public Anxieties and Projective Identification

    DEFF Research Database (Denmark)

    Steffen, Vibeke

    2016-01-01

    The capacity to receive occult messages and look into the future is claimed by individuals in most societies and probably always has been. In Denmark, clairvoyance is a popular service offered at the alternative market for counseling and healing. During my fieldwork among Danish spiritualist...... what to whom. Drawing on Jung's concept of the wounded healer to highlight the clairvoyant's role as a channel for societal anxieties and Melanie Klein's concept of projective identification as a framework for understanding the defense mechanisms at stake in object relations, I argue...

  11. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  12. Federal Logistics Information System (FLIS) Procedures Manual, Volume 4. Item Identification.

    Science.gov (United States)

    1995-01-01

    Functional I DRMS Defense Reutilization 1,15 Description and Marketing FDM Full Descriptive 2 Service Method (Item DPSC Defense Personnel 2,13,14...under DIC KRE, return code ment or segment mix of FLIS data. For interna- AU. tional cataloging, only one Output Data RequestV Code may be used per...Screening Results) with KMR (Matching NATO Maintenance and Supply Agency (NAMSA), Reference-Screening) and either KFC (File Data the custodian for control

  13. A DOE Computer Code Toolbox: Issues and Opportunities

    International Nuclear Information System (INIS)

    Vincent, A.M. III

    2001-01-01

    The initial activities of a Department of Energy (DOE) Safety Analysis Software Group to establish a Safety Analysis Toolbox of computer models are discussed. The toolbox shall be a DOE Complex repository of verified and validated computer models that are configuration-controlled and made available for specific accident analysis applications. The toolbox concept was recommended by the Defense Nuclear Facilities Safety Board staff as a mechanism to partially address Software Quality Assurance issues. Toolbox candidate codes have been identified through review of a DOE Survey of Software practices and processes, and through consideration of earlier findings of the Accident Phenomenology and Consequence Evaluation program sponsored by the DOE National Nuclear Security Agency/Office of Defense Programs. Planning is described to collect these high-use codes, apply tailored SQA specific to the individual codes, and implement the software toolbox concept. While issues exist such as resource allocation and the interface among code developers, code users, and toolbox maintainers, significant benefits can be achieved through a centralized toolbox and subsequent standardized applications

  14. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  15. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  16. Isotope Identification

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this training modules is to examine the process of using gamma spectroscopy for radionuclide identification; apply pattern recognition to gamma spectra; identify methods of verifying energy calibration; and discuss potential causes of isotope misidentification.

  17. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  19. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  20. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  1. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  2. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  3. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  4. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  5. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  6. Bar code usage in nuclear materials accountability

    International Nuclear Information System (INIS)

    Mee, W.T.

    1983-01-01

    The age old method of physically taking an inventory of materials by listing each item's identification number has lived beyond its usefulness. In this age of computerization, which offers the local grocery store a quick, sure, and easy means to inventory, it is time for nuclear materials facilities to automate accountability activities. The Oak Ridge Y-12 Plant began investigating the use of automated data collection devices in 1979. At that time, bar code and optical-character-recognition (OCR) systems were reviewed with the purpose of directly entering data into DYMCAS (Dynamic Special Nuclear Materials Control and Accountability System). Both of these systems appeared applicable; however, other automated devices already employed for production control made implementing the bar code and OCR seem improbable. However, the DYMCAS was placed on line for nuclear material accountability, a decision was made to consider the bar code for physical inventory listings. For the past several months a development program has been underway to use a bar code device to collect and input data to the DYMCAS on the uranium recovery operations. Programs have been completed and tested, and are being employed to ensure that data will be compatible and useful. Bar code implementation and expansion of its use for all nuclear material inventory activity in Y-12 is presented

  7. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  8. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  9. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  10. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  11. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  12. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  13. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  14. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  15. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  16. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  17. Cross-index to DOE-prescribed occupational safety codes and standards

    International Nuclear Information System (INIS)

    1981-01-01

    This Cross-Index volume is the 1981 compilation of detailed information from more than three hundred and fifty DOE prescribed or OSHA referenced industrial safety codes and standards and is revised yearly to provide information from current codes. Condensed data from individual code portions are listed according to reference code, section, paragraph and page. Each code is given a two-digit reference code number or letter in the Contents section (pages C to L) of this volume. This reference code provides ready identification of any code listed in the Cross-Index. The computerized information listings are on the left-hand portion of Cross-Index page; in order to the right of the listing are the reference code letters or numbers, the section, paragraph and page of the referenced code containing expanded information on the individual listing

  18. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  19. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  20. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  1. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  2. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  3. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  4. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  5. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  6. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  7. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  8. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  9. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  10. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  11. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  12. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  13. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  14. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  15. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  16. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  17. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  18. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  19. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  20. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  1. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  2. Defense programs beryllium good practice guide

    International Nuclear Information System (INIS)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D ampersand D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is

  3. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  4. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  5. Safety standards of flood defenses

    NARCIS (Netherlands)

    Vrijling, J.K.; Schweckendiek, T.; Kanning, W.

    2011-01-01

    Current design codes like the Eurocode use safety or reliability classes to assign target reliabilities to different types of structures or structural members according to the potential consequences of failure. That, in essence, is a risk-based criterion. A wide range of structures is designed with

  6. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  7. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  8. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  9. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  10. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  11. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  12. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  13. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  14. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  15. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  16. Signal trend identification with fuzzy methods

    International Nuclear Information System (INIS)

    Reifman, J.; Tsoukalas, L. H.; Wang, X.; Wei, T. Y. C.

    1999-01-01

    A fuzzy-logic-based methodology for on-line signal trend identification is introduced. Although signal trend identification is complicated by the presence of noise, fuzzy logic can help capture important features of on-line signals and classify incoming power plant signals into increasing, decreasing and steady-state trend categories. In order to verify the methodology, a code named PROTREN is developed and tested using plant data. The results indicate that the code is capable of detecting transients accurately, identifying trends reliably, and not misinterpreting a steady-state signal as a transient one

  17. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  18. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  19. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  20. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  1. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  2. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  3. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  4. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  5. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  6. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  7. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    Science.gov (United States)

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  8. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  9. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  10. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  12. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  13. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  14. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  15. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  16. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  17. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  18. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  19. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  20. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  1. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  2. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  3. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  4. CERN access cards - Introduction of a bar code (Reminder)

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    In accordance with the latest revised version of the implementation measures relating to Operational Circular No. 2, CERN access cards may bear a bar code transcribing the holder's identification number (the revised version of this subsidiary document to the aforementioned Circular will be published shortly). Relations with the Host States Service http://www.cern.ch/relations/ relations.secretariat@cern.ch Tel. 72848

  5. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  6. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  7. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  8. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  9. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  10. Suture Coding: A Novel Educational Guide for Suture Patterns.

    Science.gov (United States)

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good

  11. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  12. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  13. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  14. Improvement of QR Code Recognition Based on Pillbox Filter Analysis

    Directory of Open Access Journals (Sweden)

    Jia-Shing Sheu

    2013-04-01

    Full Text Available The objective of this paper is to perform the innovation design for improving the recognition of a captured QR code image with blur through the Pillbox filter analysis. QR code images can be captured by digital video cameras. Many factors contribute to QR code decoding failure, such as the low quality of the image. Focus is an important factor that affects the quality of the image. This study discusses the out-of-focus QR code image and aims to improve the recognition of the contents in the QR code image. Many studies have used the pillbox filter (circular averaging filter method to simulate an out-of-focus image. This method is also used in this investigation to improve the recognition of a captured QR code image. A blurred QR code image is separated into nine levels. In the experiment, four different quantitative approaches are used to reconstruct and decode an out-of-focus QR code image. These nine reconstructed QR code images using methods are then compared. The final experimental results indicate improvements in identification.

  15. Simple method for identification of plasmid-coded proteins

    International Nuclear Information System (INIS)

    Sancar, A.; Hack, A.M.; Rupp, W.D.

    1979-01-01

    Proteins encoded by plasmid DNA are specifically labeled in uv-irradiated cells of Escherichia coli carrying recA and uvrA mutations because extensive degradation of the chromosome DNA occurs concurrently with amplification of plasmid DNA

  16. 49 CFR 178.502 - Identification codes for packagings.

    Science.gov (United States)

    2010-10-01

    ... construction, as follows: (i) “A” means steel (all types and surface treatments). (ii) “B” means aluminum. (iii) “C” means natural wood. (iv) “D” means plywood. (v) “F” means reconstituted wood. (vi) “G” means...

  17. Isonitrosoacetophenone drives transcriptional reprogramming in Nicotiana tabacum cells in support of innate immunity and defense.

    Directory of Open Access Journals (Sweden)

    Arnaud T Djami-Tchatchou

    Full Text Available Plants respond to various stress stimuli by activating broad-spectrum defense responses both locally as well as systemically. As such, identification of expressed genes represents an important step towards understanding inducible defense responses and assists in designing appropriate intervention strategies for disease management. Genes differentially expressed in tobacco cell suspensions following elicitation with isonitrosoacetophenone (INAP were identified using mRNA differential display and pyro-sequencing. Sequencing data produced 14579 reads, which resulted in 198 contigs and 1758 singletons. Following BLAST analyses, several inducible plant defense genes of interest were identified and classified into functional categories including signal transduction, transcription activation, transcription and protein synthesis, protein degradation and ubiquitination, stress-responsive, defense-related, metabolism and energy, regulation, transportation, cytoskeleton and cell wall-related. Quantitative PCR was used to investigate the expression of 17 selected target genes within these categories. Results indicate that INAP has a sensitising or priming effect through activation of salicylic acid-, jasmonic acid- and ethylene pathways that result in an altered transcriptome, with the expression of genes involved in perception of pathogens and associated cellular re-programming in support of defense. Furthermore, infection assays with the pathogen Pseudomonas syringae pv. tabaci confirmed the establishment of a functional anti-microbial environment in planta.

  18. IBR5 Modulates Temperature-Dependent, R Protein CHS3-Mediated Defense Responses in Arabidopsis.

    Directory of Open Access Journals (Sweden)

    Jingyan Liu

    2015-10-01

    Full Text Available Plant responses to low temperature are tightly associated with defense responses. We previously characterized the chilling-sensitive mutant chs3-1 resulting from the activation of the Toll and interleukin 1 receptor-nucleotide binding-leucine-rich repeat (TIR-NB-LRR-type resistance (R protein harboring a C-terminal LIM (Lin-11, Isl-1 and Mec-3 domains domain. Here we report the identification of a suppressor of chs3, ibr5-7 (indole-3-butyric acid response 5, which largely suppresses chilling-activated defense responses. IBR5 encodes a putative dual-specificity protein phosphatase. The accumulation of CHS3 protein at chilling temperatures is inhibited by the IBR5 mutation. Moreover, chs3-conferred defense phenotypes were synergistically suppressed by mutations in HSP90 and IBR5. Further analysis showed that IBR5, with holdase activity, physically associates with CHS3, HSP90 and SGT1b (Suppressor of the G2 allele of skp1 to form a complex that protects CHS3. In addition to the positive role of IBR5 in regulating CHS3, IBR5 is also involved in defense responses mediated by R genes, including SNC1 (Suppressor of npr1-1, Constitutive 1, RPS4 (Resistance to P. syringae 4 and RPM1 (Resistance to Pseudomonas syringae pv. maculicola 1. Thus, the results of the present study reveal a role for IBR5 in the regulation of multiple R protein-mediated defense responses.

  19. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  20. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  1. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  2. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  3. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  4. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  5. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  6. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  7. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  8. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  9. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  10. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  11. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  12. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  13. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  14. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  15. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  16. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  17. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  19. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  20. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  1. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  2. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  3. MMPI Profiles and Code Types of Responsible and Non-Responsible Criminal Defendants.

    Science.gov (United States)

    Kurlychek, Robert T.; Jordan, L.

    1980-01-01

    Compared MMPI profiles and two-point code types of criminal defendants (N=50) pleading a defense of "not responsible due to mental disease or defect." A sign test was computed, treating the clinical scales as matched pairs, and a significant difference was found; the nonresponsible group profile was more elevated. (Author)

  4. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  5. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  6. Avian Antimicrobial Host Defense Peptides: From Biology to Therapeutic Applications

    Directory of Open Access Journals (Sweden)

    Guolong Zhang

    2014-02-01

    Full Text Available Host defense peptides (HDPs are an important first line of defense with antimicrobial and immunomoduatory properties. Because they act on the microbial membranes or host immune cells, HDPs pose a low risk of triggering microbial resistance and therefore, are being actively investigated as a novel class of antimicrobials and vaccine adjuvants. Cathelicidins and β-defensins are two major families of HDPs in avian species. More than a dozen HDPs exist in birds, with the genes in each HDP family clustered in a single chromosomal segment, apparently as a result of gene duplication and diversification. In contrast to their mammalian counterparts that adopt various spatial conformations, mature avian cathelicidins are mostly α-helical. Avian β-defensins, on the other hand, adopt triple-stranded β-sheet structures similar to their mammalian relatives. Besides classical β-defensins, a group of avian-specific β-defensin-related peptides, namely ovodefensins, exist with a different six-cysteine motif. Like their mammalian counterparts, avian cathelicidins and defensins are derived from either myeloid or epithelial origin expressed in a majority of tissues with broad-spectrum antibacterial and immune regulatory activities. Structure-function relationship studies with several avian HDPs have led to identification of the peptide analogs with potential for use as antimicrobials and vaccine adjuvants. Dietary modulation of endogenous HDP synthesis has also emerged as a promising alternative approach to disease control and prevention in chickens.

  7. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  8. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  9. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  10. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  11. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  12. The U.S. Arms Embargo of 1975-1978 and Its Effects on the Development of the Turkish Defense Industry

    Science.gov (United States)

    2014-09-01

    Turkish Defense Industry 15. NUMBER OF PAGES 93 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION...Organization CPI consumer price inflation DIEC Defense Industry Executive Committee DP Democrat Party EEC European Economic Community EOKA...sugar, and flour . With the return of men to their homes after World War I and the Independence War, Turkey experienced a dramatic increase in

  13. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  14. Coding Variation in ANGPTL4, LPL, and SVEP1 and the Risk of Coronary Disease

    NARCIS (Netherlands)

    Stitziel, Nathan O; Stirrups, Kathleen E; Masca, Nicholas G D; Erdmann, Jeanette; Ferrario, Paola G; König, Inke R; Weeke, Peter E; Webb, Thomas R; Auer, Paul L; Schick, Ursula M; Lu, Yingchang; Zhang, He; Dube, Marie-Pierre; Goel, Anuj; Farrall, Martin; Peloso, Gina M; Won, Hong-Hee; Do, Ron; van Iperen, Erik; Kanoni, Stavroula; Kruppa, Jochen; Mahajan, Anubha; Scott, Robert A; Willenberg, Christina; Braund, Peter S; van Capelleveen, Julian C; Doney, Alex S F; Donnelly, Louise A; Asselta, Rosanna; Merlini, Piera A; Duga, Stefano; Marziliano, Nicola; Denny, Josh C; Shaffer, Christian M; El-Mokhtari, Nour Eddine; Franke, Andre; Gottesman, Omri; Heilmann, Stefanie; Hengstenberg, Christian; Hoffman, Per; Holmen, Oddgeir L; Hveem, Kristian; Jansson, Jan-Håkan; Jöckel, Karl-Heinz; Kessler, Thorsten; Kriebel, Jennifer; Laugwitz, Karl L; Marouli, Eirini; Martinelli, Nicola; McCarthy, Mark I; Van Zuydam, Natalie R; Meisinger, Christa; Esko, Tõnu; Mihailov, Evelin; Escher, Stefan A; Alvar, Maris; Moebus, Susanne; Morris, Andrew D; Müller-Nurasyid, Martina; Nikpay, Majid; Olivieri, Oliviero; Lemieux Perreault, Louis-Philippe; AlQarawi, Alaa; Robertson, Neil R; Akinsanya, Karen O; Reilly, Dermot F; Vogt, Thomas F; Yin, Wu; Asselbergs, Folkert W; Kooperberg, Charles; Jackson, Rebecca D; Stahl, Eli; Strauch, Konstantin; Varga, Tibor V; Waldenberger, Melanie; Zeng, Lingyao; Kraja, Aldi T; Liu, Chunyu; Ehret, George B; Newton-Cheh, Christopher; Chasman, Daniel I; Chowdhury, Rajiv; Ferrario, Marco; Ford, Ian; Jukema, J Wouter; Kee, Frank; Kuulasmaa, Kari; Nordestgaard, Børge G; Perola, Markus; Saleheen, Danish; Sattar, Naveed; Surendran, Praveen; Tregouet, David; Young, Robin; Howson, Joanna M M; Butterworth, Adam S; Danesh, John; Ardissino, Diego; Bottinger, Erwin P; Erbel, Raimund; Franks, Paul W; Girelli, Domenico; Hall, Alistair S; Hovingh, G Kees; Kastrati, Adnan; Lieb, Wolfgang; Meitinger, Thomas; Kraus, William E; Shah, Svati H; McPherson, Ruth; Orho-Melander, Marju; Melander, Olle; Metspalu, Andres; Palmer, Colin N A; Peters, Annette; Rader, Daniel; Reilly, Muredach P; Loos, Ruth J F; Reiner, Alex P; Roden, Dan M; Tardif, Jean-Claude; Thompson, John R; Wareham, Nicholas J; Watkins, Hugh; Willer, Cristen J; Kathiresan, Sekkar; Deloukas, Panos; Samani, Nilesh J; Schunkert, Heribert

    BACKGROUND: The discovery of low-frequency coding variants affecting the risk of coronary artery disease has facilitated the identification of therapeutic targets. METHODS: Through DNA genotyping, we tested 54,003 coding-sequence variants covering 13,715 human genes in up to 72,868 patients with

  15. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  16. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  17. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  18. Defense programs beryllium good practice guide

    Energy Technology Data Exchange (ETDEWEB)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  19. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  20. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.