WorldWideScience

Sample records for defense information analysis

  1. Analysis to Inform Defense Planning Despite Austerity

    Science.gov (United States)

    2014-01-01

    envisions going to policymakers (top yellow diamond ) to discuss what capabilities they wish to pursue further given results of the first-cut analysis...envisions going to policymakers to discuss what capabilities they wish to pursue further given results of the first-cut analysis (top yellow diamond ...2008; and related discussion from a larger workshop held by OSD (Acquisition, Technology, and Logistics) ( Porter , Bracken, and Kneece, 2007). 89

  2. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  3. Information Analysis Centers in the Department of Defense. Revision

    Science.gov (United States)

    1987-07-01

    electric rockets, ramjets, space vehicles and gun propulsion systems. This includes chemical synthesis; thermochemistry ; combustion phenomena; physical...equipment testability, and worst case analysis and currently teaches over 1000 government/industry personnel each year. RAC is recognized as a leading

  4. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  5. Defense Management: Comprehensive Cost Information and Analysis of Alternatives Needed to Assess Military Posture in Asia

    Science.gov (United States)

    2011-05-01

    dependents, and/or military forces located in Misawa, Yokota, Camp Zama, Yokusuka, Atsugi, Iwakuni , Kadena, and Futenma (see fig. 6). For example...Japan Air Defense Command headquarters to Yokota Air Base, relocating a carrier air wing from Atsugi to Iwakuni , consolidating several Marine Corps...Dollars) Estimated costse Posture initiative United States Japan Total Japan Carrier air wing ,moving from Atsugi to Iwakuni Not yet estimateda

  6. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  7. Defense Technical Information Center thesaurus

    Energy Technology Data Exchange (ETDEWEB)

    Dickert, J.H. [ed.] [comp.

    1996-10-01

    This DTIC Thesaurus provides a basic multidisciplinary subject term vocabulary used by DTIC to index and retrieve scientific and technical information from its various data bases and to aid DTIC`s users in their information storage and retrieval operations. It includes an alphabetical posting term display, a hierarchy display, and a Keywork Out of Context (KWOC) display.

  8. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  9. 32 CFR 37.1030 - What information must I report to the Defense Technical Information Center?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What information must I report to the Defense Technical Information Center? 37.1030 Section 37.1030 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing...

  10. An Analysis of Proposed Alternatives to the Defense Technical Information Center’s Announcement Products and Services

    Science.gov (United States)

    1985-10-01

    from NTIS," Library Journal , CX, No. 1 (1985): 29. "National Library of Medicine Offers Subsets of MEDLINE," Online Review, VIII, No. 6 (1984...Sandra Young - Defense Nuclear Agency - 25 Jan 85 -41- BIBLIOGRAPHY "Data tiles on floppies coming soon from NT1S." Library Journal , CX, No. 1 (1985

  11. Information on Japanese Defensive Installations and Tactics

    Science.gov (United States)

    1945-01-01

    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  12. 76 FR 50461 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Types of...

    Science.gov (United States)

    2011-08-15

    ... Defense Acquisition Regulations System Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Types of Contracts AGENCY: Defense Acquisition Regulations System, Department of... information collection requirement. SUMMARY: In compliance with Section 3506(c)(2)(A) of the...

  13. Bilingual Cancer Information: Access Is the First Line of Defense

    Science.gov (United States)

    Boudreault, Patrick; Palmer, Christina

    2015-01-01

    Information about cancer, the disease that kills more Americans than any other except heart disease, is essential. In some ways, information is our first line of defense. It allows us to identify individual risk factors, to note when a problem means we should see a professional, and to avoid activities that might put us at risk. However,…

  14. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  15. Incentives and Information Quality in Defense Management.

    Science.gov (United States)

    1976-08-01

    American Economic Review , Vol. 62, No. 5, December 1972; Kenneth J. Arrow, Infor-mation and Economic Behavior, Harvard University, Cam- bridge, Mass...Technical Report No. 14, September 1973; and F. A. Hayek, "The Use of Knowledge in Society," The American Economic Review , Vol. 35, No. 4...vs. ’X-Efficiency, "’ The American Economic Review , Vol. 56, No. 3, June 1966, pp. 392-415. For examples treating comparable government or nonprofit

  16. A Content Analysis of Defense Budget Rhetoric

    Science.gov (United States)

    2011-06-01

    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  17. Defense Satellite Communications: DOD Needs Additional Information to Improve Procurements

    Science.gov (United States)

    2015-07-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 31 19a. NAME OF RESPONSIBLE PERSON a. REPORT...information available, DOD spent over $1 billion leasing commercial SATCOM. In prior work, GAO found that some major DOD users of commercial...Committee on Armed Services United States Senate The Department of Defense (DOD) leases commercial satellite communications (SATCOM) to support a variety

  18. 32 CFR 37.1025 - Must I report information to the Defense Assistance Awards Data System?

    Science.gov (United States)

    2010-07-01

    ... SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award Reporting Information About the Award § 37.1025 Must I report information to the Defense... 32 National Defense 1 2010-07-01 2010-07-01 false Must I report information to the...

  19. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  20. OVERTURES TO REDUCING ROMANIAN MINISTRY OF NATIONAL DEFENSE TENUITY IN INFORMATION RESOURCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Lucian BIBO

    2014-10-01

    Full Text Available Information Resources Management (IRM means planning, budgeting, organizing, directing, training and controlling information. It encompasses both information itself and related resources such as personnel, equipment, funds and technology. For many organizations, information and the technology that supports it represent their most valuable, but often least understood assets. The Romanian Ministry of National Defense (MoND has to face this fragile issue, too. Hence an analysis of the AS IS situation is more than necessary if future endeavors in the field are to succeed. Moreover, the identification of possible solutions and of their likely constraints is another aim of this article

  1. 32 CFR 37.895 - How is the final performance report to be sent to the Defense Technical Information Center?

    Science.gov (United States)

    2010-07-01

    ... to the Defense Technical Information Center? 37.895 Section 37.895 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT... How is the final performance report to be sent to the Defense Technical Information Center?...

  2. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  3. Analysis of Defense Products Contract Trends, 1990-2014

    Science.gov (United States)

    2015-04-30

    Analysis of Defense Products Contract Trends , 1990–2014 Andrew Hunter—is a senior fellow in the International Security Program and director of the Defense...a decade, the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies (CSIS) has analyzed and reported on trends ...countervailing trend of divestments, including Northrop Grumman’s divestment of its shipbuilding business into Huntington Ingalls Industries. As

  4. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ..., Wright-Patterson AFB, Ohio-- Editing/routing of logistics transactions, network interoperability and e... of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed...

  5. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  6. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  7. 75 FR 58347 - Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors

    Science.gov (United States)

    2010-09-24

    ...; ] DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors AGENCY: Forest Service, USDA. ACTION: Notice; request for comment. SUMMARY: In... interested individuals and organizations on the new information collection, Overcoming Barriers to...

  8. Defense Information Systems Agency Management of Trouble Tickets for Electronic Commerce/Electronic Data Interchange

    Science.gov (United States)

    2007-11-02

    received, 15 were requests for quotes. The causes were break down of modems, and failure of computer equipment and software at the Columbus and Ogden...transaction identified on the trouble ticket? Yes 15 No 115 7. Do you have access to the trouble ticket resolution diary at Ogden NEP? Yes 10 No 120 8...Information Systems Agency, Arlington, VA Defense Megacenter Columbus , OH Defense Megacenter Mechanicsburg, PA Defense Megacenter Ogden, UT Non

  9. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    Science.gov (United States)

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  10. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  11. 40 CFR 2.214 - Defense of Freedom of Information Act suits; participation by affected business.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Defense of Freedom of Information Act... Freedom of Information Act suits; participation by affected business. (a) In making final confidentiality... Information Act for disclosure of that information, EPA will: (1) Notify each affected business of the...

  12. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike- Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike- Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...fostered the database system and representation of data in a hierarchy (Galliers & Leidner, 2003). Soon the limits of hierarchies were identified and

  13. 信息安全视角下人防面临的威胁分析%Analysis on the Civil Air Defense Threat under the Perspective of Information Security

    Institute of Scientific and Technical Information of China (English)

    平亮

    2015-01-01

    信息防护是人民防空安全防护的重要组成部分,涉及的内容广泛,是一项系统工程,包括物理层安全、系统层安全、网络层安全和管理层安全等.%Information protection is an important part of the civil air defense. It is a system engineering that involves extensively, generally includes the physical security, system security, network layer, application layer and security management, etc.

  14. Defense programs occurrence analysis report for third quarter CY-1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-12-01

    The quarterly Defense Programs Occurrence Analysis Report (DPOAR) is compiled by the Office of Self-Assessment and Emergency Management (DP-9). It utilizes the Occurrence Reporting and Processing System (ORPS) data to assess the quality and effectiveness of the reporting process and the significance of the occurrences. In addition, areas where further improvement and corrective actions are necessary is fully demonstrated by an analysis of the data. The results of the assessment may also be used as the basis for conducting other evaluations such as the diagnostic and augmented evaluations. This quarterly report provides feedback to DOE/DP and contractor management to improve the control of operations and achieve a higher standard of excellence. The report analyzes one year of ORPS data at the end of each calendar quarter, therefore, the performance of DP Field Offices and facilities will be continuously compared to their past quarter and yearly performances. During this assessment from 1 October 1990 through 30 September 1991, there were a number of initiatives that were undertaken by Field Office management to improve the overall performance and the quality of the Occurrence Reporting and Processing System. These initiatives include the training of their staff for self-assessment activities. These intiatives can be found in the programs implemented according to the DOE Conduct of Operations and Occurrence Reporting and Processing of Operations Information Orders. These initiatives were found to be, based on the ORPS data, stronger at Albuquerque, Nevada, Oak Ridge Field Offices and Richland DP facilities.

  15. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  16. Encounter-based worms: Analysis and Defense

    CERN Document Server

    Tanachaiwiwat, Sapon

    2007-01-01

    Encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose the worm interaction approach that relies upon automated beneficial worm generation aiming to alleviate problems of worm propagations in such networks. To understand the dynamic of worm interactions and its performance, we mathematically model worm interactions based on major worm interaction factors including worm interaction types, network characteristics, and node characteristics using ordinary differential equations and analyze their effects on our proposed metrics. We validate our proposed model using extensive synthetic and trace-driven simulations. We find that, all worm interaction factors significantly affect the pattern of worm propagations. For example, immunization linearly decrea...

  17. Reentrant phase transitions and defensive alliances in social dilemmas with informed strategies

    CERN Document Server

    Szolnoki, Attila

    2015-01-01

    Knowing the strategy of an opponent in a competitive environment conveys obvious evolutionary advantages. But this information is costly, and the benefit of being informed may not necessarily offset the additional cost. Here we introduce social dilemmas with informed strategies, and we show that this gives rise to two cyclically dominant triplets that form defensive alliances. The stability of these two alliances is determined by the rotation velocity of the strategies within each triplet. A weaker strategy in a faster rotating triplet can thus overcome an individually stronger competitor. Fascinating spatial patterns favor the dominance of a single defensive alliance, but enable also the stable coexistence of both defensive alliances in very narrow regions of the parameter space. A continuous reentrant phase transition reveals before unseen complexity behind the stability of strategic alliances in evolutionary social dilemmas.

  18. Total Quality Management Implementation at the Defense Technical Information Center

    Science.gov (United States)

    1989-09-01

    improvement programs. -- 7- 14. SUBJECT TERMS 15. NUMBER OF PAGES TOM ( Total Quality Management ), Continuous Process Improvement, ________ Collection and...TECHNICAL INFORMATION CENTER September 1989 Approved for Public Release; Distribution is Unlimited. I8 . 22 ~89 9 29 0 22 TOTAL QUALITY MANAGEMENT IMPLEMENTATION...technical information support, services, and products to the DoD research and development community. The DTIC Total Quality Management (TQM

  19. Canonical Information Analysis

    DEFF Research Database (Denmark)

    Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg

    2015-01-01

    Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables is ...... airborne data. The simulation study shows that canonical information analysis is as accurate as and much faster than algorithms presented in previous work, especially for large sample sizes. URL: http://www.imm.dtu.dk/pubdb/p.php?6270...

  20. Reengineering the Department of Defense: the Corporate Information Management initiative

    OpenAIRE

    Ott, Michael F.

    1994-01-01

    Approved for public release, distribution unlimited In order to operate effectively in the 1990s and beyond. the DoD must improve its management and business processes. To accomplish this. the DoD has just released its "Corporate Information Management (CIM) Strategic Plan for the 21st Century." A number of independent studies, relating to CIM, have also recently been completed. This paper compares and evaluates the CIM Strategic Plan, the independent studies, and recognized methodologies ...

  1. Department of Defense Synchronization and Coordination via Joint Information Environment

    Science.gov (United States)

    2013-03-01

    characterized the strategic environment as one that is volatile, uncertain, complex, and ambiguous ( VUCA ). The events also present broad National Security...information technology,”1 has facilitated free nations, open markets, and social growth throughout the world . It has also enabled nations, non-state...and businesses, and the massive grids that power our nation; the classified military and intelligence networks that keep us safe and the World Wide

  2. Criminal Prohibitions on the Publication of Classified Defense Information

    Science.gov (United States)

    2013-09-09

    Affairs Elizabeth King explained that “State Department cables by their nature contain everyday analysis and candid assessments that any government...WikiLeaks Shine Light Into Secret Diplomatic Channels, NY TIMES. 25 The Guardian states that the earliest of the cables is from 1966. See The US...role.53 The contractor, Stephen Kim, was at the time of the disclosure a senior adviser for intelligence detailed to the State Department’s arms

  3. 计算机网络信息安全纵深防护模型分析%ANALYSIS OF A DEFENSE-IN-DEPTH MODEL OF INFORMATION SECURITY IN COMPUTER NETWORKS

    Institute of Scientific and Technical Information of China (English)

    黄卢记; 栾江峰; 肖军

    2012-01-01

    To satisfy needs for information security in computer networks, a defense-in-depth secure model was made in terms of logic and technology. The technologies and their relationship were described and analyzed to illustrate the functions they play and the layer they are located in the model.%以计算机网络上需要进行安全防护的信息本体为出发点,从技术和逻辑角度建立一个综合多种计算机网络信息安全技术的纵深防护安全模型,并对其中用到的安全技术进行了深入浅出的介绍和分析,阐述了不同的计算机网络信息安全技术在安全防护中所处的层次和所起的作用.

  4. Analysis to Support Execution of the Defense Environmental International Cooperation (DEIC) Program

    Science.gov (United States)

    2012-05-01

    IDA Document D-4605 May 2012 Analysis to Support Execution of the Defense Environmental International Cooperation ( DEIC ) Program Susan L. Clark...Execution of the Defense Environmental International Cooperation ( DEIC ) Program Susan L. Clark-Sestak iii Executive Summary The Defense...Environmental International Cooperation ( DEIC ) program is managed by the Director of Environmental Readiness and Safety (ERS) in the Office of the Deputy

  5. SDIO (Strategic Defense Initiative Office) Technical Information Management Center Bibliography of Unclassified Documents: January - December 1988

    Science.gov (United States)

    1988-12-01

    Electromagnetic Beam Algebra Stream Physic Radial Collision Equation Axial Density Velocity Dimension Accession #: 1054 AD #: ADA179909 TITLE: Wide...Codoped Crystals Author(s): Rotman , S.R.; Hartman, F.X. Date: 03/01/88 Pages:63 Report #: M-405 Corp. Author: Institute For Defense Analysis, 1801 N

  6. Evaluation of DoD Information Analysis Centers Program: Representative Sample Study - Benefits to DoD from Use of DoD Information Analysis Centers

    Science.gov (United States)

    1990-06-01

    Defense Electronics Supply Center L. CoL Donald Haverkamp, Defense Electronics Supply Center Ms. Sara Williams , Defense Electronics Supply Center and...Kaman Sciences Corporation Dr. Cho-Yen Ho, Director P. O. Box 120 HTMIAC/ CINDAS Utica, NY 13503 Purdue University (315) 336-0937 2595 Yeager Road FAX...COMPOSITES RELIABILITY ANALYSIS CENTER INFORMATION ANALYSIS (RAC) CENTER (MMCIAC) Steven J. Flint, Technical Director Mr. William McNamara, Director

  7. Functional analysis of Arabidopsis WRKY25 transcription factor in plant defense against Pseudomonas syringae

    Directory of Open Access Journals (Sweden)

    Klessig Daniel F

    2007-01-01

    Full Text Available Abstract Background A common feature of plant defense responses is the transcriptional regulation of a large number of genes upon pathogen infection or treatment with pathogen elicitors. A large body of evidence suggests that plant WRKY transcription factors are involved in plant defense including transcriptional regulation of plant host genes in response to pathogen infection. However, there is only limited information about the roles of specific WRKY DNA-binding transcription factors in plant defense. Results We analyzed the role of the WRKY25 transcription factor from Arabidopsis in plant defense against the bacterial pathogen Pseudomonas syringae. WRKY25 protein recognizes the TTGACC W-box sequences and its translational fusion with green fluorescent protein is localized to the nucleus. WRKY25 expression is responsive to general environmental stress. Analysis of stress-induced WRKY25 in the defense signaling mutants npr1, sid2, ein2 and coi1 further indicated that this gene is positively regulated by the salicylic acid (SA signaling pathway and negatively regulated by the jasmonic acid signaling pathway. Two independent T-DNA insertion mutants for WRKY25 supported normal growth of a virulent strain of P. syringae but developed reduced disease symptoms after infection. By contrast, Arabidopsis constitutively overexpressing WRKY25 supported enhanced growth of P. syringae and displayed increased disease symptom severity as compared to wild-type plants. These WRKY25-overexpressing plants also displayed reduced expression of the SA-regulated PR1 gene after the pathogen infection, despite normal levels of free SA. Conclusion The nuclear localization and sequence-specific DNA-binding activity support that WRKY25 functions as a transcription factor. Based on analysis of both T-DNA insertion mutants and transgenic overexpression lines, stress-induced WRKY25 functions as a negative regulator of SA-mediated defense responses to P. syringae. This

  8. 22 CFR 130.10 - Information to be furnished by applicant or supplier to the Directorate of Defense Trade Controls.

    Science.gov (United States)

    2010-04-01

    ... supplier to the Directorate of Defense Trade Controls. 130.10 Section 130.10 Foreign Relations DEPARTMENT... § 130.10 Information to be furnished by applicant or supplier to the Directorate of Defense Trade... business of the applicant or supplier, as the case may be, and, if applicable, the employer and title;...

  9. 77 FR 29443 - 60-Day Notice of Two Proposed Directorate of Defense Trade Controls Information Collections...

    Science.gov (United States)

    2012-05-17

    ... collection: The export, temporary import, temporary export and brokering of defense articles, defense... Export Control Act. Those of the public who manufacture or export defense articles, defense services, and... personal delivery. Dated: May 14, 2012. Robert S. Kovac, Managing Director of Defense Trade...

  10. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  11. Improving Department of Defense Global Distribution Performance Through Network Analysis

    Science.gov (United States)

    2016-06-01

    consideration given the origin. The new method includes the origin information. Using parametric and non- parametric statistical tests and data analysis...Using parametric and non- parametric statistical tests and data analysis techniques, we show that the addition of requisition origin information...apply a weighting scale to those elements. Kunadhamrak and Hanaoka constructed a multi-criteria metric using a combination of a fuzzy- 12

  12. Reappraising Defense Organization: An Analysis Based on the Defense Organization Study of 1977-1980,

    Science.gov (United States)

    1983-01-01

    or all of the current structure and there- by presents the opportunity for some external entity to begin, like Moses, with a tabula rasa , the...fundamental role of the Department of Defense (DOD) has been to "provide for the common defence," as described in the US Constitution. This...be strengthened. Chapter 5 focuses on the military depart- ments, with particular emphasis on the role of the service secretar- ies. It recommends

  13. Lexical Link Analysis (LLA) Application: Improving Web Service to Defense Acquisition Visibility Environment (DAVE)

    Science.gov (United States)

    2015-05-01

    1 LEXICAL LINK ANALYSIS (LLA) APPLICATION: IMPROVING WEB SERVICE TO DEFENSE ACQUISITION VISIBILITY ENVIRONMENT(DAVE) May 13-14, 2015 Dr. Ying...Improving Web Service to Defense Acquisition Visibility Environment (DAVE) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...to install the LLA/CLA/SSA system as a web service in the Defense Acquisition Visibility Environment (DAVE) test bed via the AT&L eBusiness Center

  14. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    Science.gov (United States)

    2007-12-01

    Industry Mergers. 15 April 1997. Suhan, Kensinger, Keown , and Martin , “Do Strategic Alliances Create Value,” Journal of Financial Economics, 46 2 (1997...aerospace and defense contractors (Lockheed- Martin , Northrop-Grumman, Boeing, Raytheon, and General Dynamics) (See the figures in the Appendix...overhead costs. Also in 1993, Norman R. Augustine, then CEO of Lockheed Martin , headed an effort involving other major defense industry executives

  15. Analysis of government policies to support sustainable domestic defense industries

    OpenAIRE

    2015-01-01

    Approved for public release; distribution is unlimited Armed forces all over the world need military equipment to support their security missions. Having a domestic defense industry is one approach that countries use to supply their armed forces’ requirements. The successful development of a domestic defense industry depends on many factors, but perhaps the most significant variable is the government. Because governments are both buyers and suppliers of national security, government polici...

  16. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  17. Overcoming Information Aesthetics: In Defense of a Non-Quantitative Informational Understanding of Artworks

    Directory of Open Access Journals (Sweden)

    Rodrigo Hernández-Ramírez

    2016-11-01

    Full Text Available Attempts to describe aesthetic artefacts through informational models have existed at least since the late 1950s; but they have not been as successful as their proponents expected nor are they popular among art scholars because of their (mostly quantitative nature. However, given how information technology has deeply shifted every aspect of our world, it is fair to ask whether aesthetic value continues to be immune to informational interpretations. This paper discusses the ideas of the late Russian biophysicist, Mikhail Volkenstein concerning art and aesthetic value. It contrasts them with Max Bense’s ‘information aesthetics’, and with contemporary philosophical understandings of information. Overall, this paper shows that an informational but not necessarily quantitative approach serves not only as an effective means to describe our interaction with artworks, but also contributes to explain why purely quantitative models struggle to formalise aesthetic value. Finally, it makes the case that adopting an informational outlook helps overcome the ‘analogue vs digital’ dichotomy by arguing the distinction is epistemological rather than ontological, and therefore the two notions need not be incompatible.

  18. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  19. 武器装备采办管理的信息不对称研究%On Information Asymmetry in Defense Acquisition Management

    Institute of Scientific and Technical Information of China (English)

    刘洁; 赵澄谋; 姬鹏宏

    2003-01-01

    The acquisition of defense systems is a complicated process, in which various types of information asym-metry exist, this further contributes to the risks of defense acquisition programs. In this paper, a brief introduction to the information non-symmetry theory is given, issues regarding information non-symmetry in the process of defense system ac-quisition are analyzed, and solutions to these issues are proposed from the perspective of process control & management and information building.

  20. Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service

    Science.gov (United States)

    2002-04-01

    thank both LtCol Ide, LtCol Jim Jovene and Majs Jeffery “Can” Scott, Scott “Sleepy” Schlieper and Kurt “Coyote” Austin for their support after my...information stolen never ascertained. Using the Internet as a vector, a hacker from Argentina hacked into computers at the Naval Research Laboratory

  1. DTIC (Defense Technical Information Center) Model Action Plan for Incorporating DGIS (DOD Gateway Information System) Capabilities.

    Science.gov (United States)

    1986-05-01

    countries; wide subject coverage including aerospace, aeronautics, computers, metallurgy, and robotics. (DIALOG) C. AGRICULTURE AGRICOLA - U. S...Meteorology, environmental sciences. F. BEHAVIORAL AND SOCIAL SCIENCES ABI/INFORM - Management and business . (BRS, DIALOG, SDC) America: History and Life - U...Management Contents - Business and management-related topics to aid decision making and forecasting. (BRS, DIALOG, SDC) 9 MLA Bibliography - Modern

  2. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  3. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  4. Department of Defenses 2015 Retirement Plan Cost Analysis

    Science.gov (United States)

    2016-06-01

    incentive and recruitment bonuses. The base continuation pay will be equal to 12 2.5 times the SMs monthly basic pay (MCRMC, 2015). FERS employees do not...Department of Defense FERS Federal Employees Retirement System FY Fiscal Year FY16$ Fiscal Year 2016 Constant Dollars MCRMC Military...current retirement system rewards service members (SMs) who pursue a long term military career, it ignores the majority of SMs who fall short of the 20

  5. Analysis of Defense Products Contract Trends, 1990-2014

    Science.gov (United States)

    2015-05-14

    updated, including those for back years. As a consequence, the dollar totals for a given year may have changed since the data was downloaded...classified in FPDS. • All dollar figures are in constant 2014 dollars . csis.org/diig | Defense Products Contract Obligations by Component, 2008-2014 3...in then-year dollars ). • Upon further investigation, CSIS discovered that these missing obligations are a mix of contracts entirely missing from

  6. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    Science.gov (United States)

    2015-06-01

    Companies in US and Their Sales Sales Number of Companies 41 products that reflect consumers’ tastes and preferences, and prices that reflect the...SUSTAINABLE DOMESTIC DEFENSE INDUSTRIES 5. FUNDING NUMBERS 6. AUTHOR(S) Roni Marzah and Budi Setiawan 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND

  7. Offense-defense theory analysis of Russian cyber capability

    OpenAIRE

    Medvedev, Sergei A.

    2015-01-01

    Approved for public release; distribution is unlimited The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cybe...

  8. Root defense analysis against Fusarium oxysporum reveals new regulators to confer resistance

    OpenAIRE

    Chen, Yi Chung; Wong, Chin Lin; Muzzi, Frederico; Vlaardingerbroek, Ido; Kidd, Brendan N; Peer M Schenk

    2014-01-01

    Fusarium oxysporum is a root-infecting fungal pathogen that causes wilt disease on a broad range of plant species, including Arabidopsis thaliana. Investigation of the defense response against this pathogen had primarily been conducted using leaf tissue and little was known about the root defense response. In this study, we profiled the expression of root genes after infection with F. oxysporum by microarray analysis. In contrast to the leaf response, root tissue did not show a strong inducti...

  9. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  10. Information Security Risk Analysis

    CERN Document Server

    Peltier, Thomas R

    2010-01-01

    Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.

  11. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  12. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  13. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  14. Proteomic Analysis of Cucumber Defense Rresponses Induced by Propamocarb

    Institute of Scientific and Technical Information of China (English)

    WU Peng; QIN Zhi-wei; WU Tao; ZHOU Xiu-yan; XIN Ming; GUO Qian-qian

    2013-01-01

    Propamocarb is an agricultural chemical that has been widely used to protect cucumber plants from downy mildew. To understand the mechanisms of cucumber defense responses to propamocarb, we investigated the physiological and proteomic responses of the cucumber line D0351 with propamocarb application. We found that after treatment with propamocarb, the activities of detoxifying enzymes (glutathione reductase, GR; glutathione S-tramsferase, GST) and soluble sugar content of cucumber fruit were signiifcantly increased, but malonaldehyde (MDA) content was signiifcantly reduced. To identify components of propamocarb responsive signaling, we compared the high resolution two-dimensional gel electrophoresis (2-DE) protein proifles of control and propamocarb-treated fruits, and identiifed 18 differentially expressed (13 up-regulated and 5 down-regulated) proteins induced by propamocarb which were determined by matrix-assisted laser desorption/ionization time-of-lfight mass spectrometry (MALDI-TOF-MS). The majority of the proteins had functions related to detoxication, energy and transport, protein biosynthesis, regulating reactions and defending against stresses. A real-time quantitative reverse transcriptional-polymerase chain reaction (qRT-PCR) was used to compare transcript and protein accumulation patterns for 18 candidate proteins, and the expression of 14 was consistent at both transcript and protein levels. The responses of cucumber proteome to propamocarb seemed complex; the identified proteins may play an important role in regulating adaptation activities following exposure to propamocarb. Data presented herein may shed light on understanding cucumber fruit defense responses under propamocarb treatment.

  15. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  16. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    Science.gov (United States)

    2001-03-01

    maintenance mechanism. Current practices in some networks of stripping mobile code out of incoming email and disabling Java and JavaScript are stopgap...rapid engagement of appropriate traps and traces. Active Code Beacons . Attacks that rely on covert target responses could theoretically be co- opted by...the infusion of active code beacons in the return traffic - beacons that would provide attribution information. Research is needed to develop this and

  17. Information Flow Analysis for VHDL

    DEFF Research Database (Denmark)

    Tolstrup, Terkel Kristian; Nielson, Flemming; Nielson, Hanne Riis

    2005-01-01

    We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow analysis as required by the international standard Common Criteria. The goal of the analysis is to identify the entire...... information flow through the VHDL program. The result of the analysis is presented as a non-transitive directed graph that connects those nodes (representing either variables or signals) where an information flow might occur. We compare our approach to that of Kemmerer and conclude that our approach yields...

  18. Defense Technical Information Center Indexing Quality Baseline Analysis

    Science.gov (United States)

    1994-06-27

    M77 grenade assembly;weapons systems assembly process; safety pin removal process in grenades for weapons systems. 17. Neural networks in...user file @str@ %grenade and %assemb end @str@ %grenade and % safety pin %safety and %pin %device %fastening %fastener end Searcher D...assembl %fabricat %manufact de=$fabrication end Searcher C @swu@ % grenade kw=%grenade de = %grenade and % safety pin kw=%safety ping kw

  19. Defense Contracts: DOD’s Requests for Information from Contractors to Assess Prices

    Science.gov (United States)

    2015-08-01

    reasonableness of prices including reviewing prices paid previously for the same item, market research, or, under certain conditions, an analysis of cost ...unless an exception applies.4 Exceptions to submitting certified cost or pricing data include contracts • based on adequate price competition...Rate Proposal, information from the technical evaluator, and market research.10 • The Navy requested contractor cost data and pricing information for a

  20. 78 FR 70025 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-11-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review. Withdrawal of purchasing system approval would necessitate Government consent to individual...

  1. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    Science.gov (United States)

    2010-06-01

    represents the specific groups. The count shows the response composition of each group. The more important numbers in this table is the ChiSquare ...approximation and the probability of ChiSquare . 4.5.1 Hypothesis 1a Analysis Ho = there is alignment between the Strategic Information System

  2. 78 FR 30898 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Science.gov (United States)

    2013-05-23

    ... Technical Data and Computer Software--Small Business Innovation Research (SBIR) Program. In accordance with... Regulation Supplement; Rights in Technical Data and Computer Software AGENCY: Defense Acquisition Regulations... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software...

  3. 78 FR 48331 - Defense Federal Acquisition Regulation Supplement: Release of Fundamental Research Information...

    Science.gov (United States)

    2013-08-08

    ... the Under Secretary of Defense for Acquisition, Technology and Logistics (AT&L) in a memorandum on... Executive Orders (E.O.s) 12866 and 13563 direct agencies to assess all costs and benefits of available... impacts, and equity). E.O. 13563 emphasizes the importance of quantifying both costs and benefits, of...

  4. 78 FR 19467 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-04-01

    ... Number: Defense Federal Acquisition Regulation Supplement (DFARS), Appendix I, DoD Pilot Mentor-Protege... purposes of the DoD Pilot Mentor-Protege Program have been met. The purposes of the Program are to (1) provide incentives to major DoD contractors to assist protege firms in enhancing their capabilities...

  5. 75 FR 20825 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; DoD Pilot...

    Science.gov (United States)

    2010-04-21

    ... Regulation Supplement; DoD Pilot Mentor-Protege Program AGENCY: Defense Acquisition Regulations System... Acquisition Regulation Supplement (DFARS) Appendix I, DoD Pilot Mentor-Protege Program; OMB Control Number... Mentor-Protege Program have been met. The purposes of the Program are to (1) provide incentives to...

  6. Epistasis analysis using information theory.

    Science.gov (United States)

    Moore, Jason H; Hu, Ting

    2015-01-01

    Here we introduce entropy-based measures derived from information theory for detecting and characterizing epistasis in genetic association studies. We provide a general overview of the methods and highlight some of the modifications that have greatly improved its power for genetic analysis. We end with a few published studies of complex human diseases that have used these measures.

  7. A case's root cause analysis of osteofascial compartment syndrome induced by radial artery puncture and its defensive strategy

    Institute of Scientific and Technical Information of China (English)

    Feng-Ying Kang; Yang Yang; Yu-Ping Tong; Ya-Li Hu; Ning-Ning Xue

    2016-01-01

    Objective: The objective of this study was to reduce or avoid the occurrence of the cases of osteofascial compartment syndrome induced by a radial artery puncture for arterial blood gas analysis. Methods: We analyzed an adverse event using cheese model analysis, “fish bone” analysis, root cause analysis, and other methods. Results: There are three root causes leading to an adverse event:operation technique, assessment of the disease, and informing patient families. However, there are many reasons to promote the occurrence and development of the event. Conclusions: We should analyze and manage the adverse events in patients from the point of view of a system. Developing the measures of a system defense can enhance patient safety and create a good safety culture.

  8. Gene expression analysis during cassava defense response to bacterial blight disease

    Directory of Open Access Journals (Sweden)

    Soto-Suárez Mauricio

    2006-12-01

    Full Text Available Cassava bacterial blight (CBB caused by Xanthomonas axonopodis pv. manihotis (Xam is a destructive disease in the South América and África and yield losses range between 12 and 100%. Cytochemistry and biochemistry of defense response to CBB have been well studied. However, the response of the plant to pathogen attack at the molecular and cellular level remains uncharacterized. Identification of genes associated with defense responses is one of most critical steps leading to the elucidation of disease resistance mechanisms in cassava. In this study, we identified differentially expressed genes during pathogen attack by subtractive hybridization, using the Differential Subtraction Chain method (DSC. A population of cDNA obtained from infected plants was used as ";treatment"; and a population of cDNA obtained from healthy plants was used as ";control";. 1536 clones were isolated from the resistant varieties (MBRA 685 and SG 107-35. Of these, 110 randomly selected clones were sequenced and a homology search was conducted. The sequence analysis showed that 14 cDNA clones shared homology with plant genes involved in defense responses, 70 clones were either homologous to plant genes of unknown function or showed no homology, representing new genes potentially involved in cassava defense responses. A cDNA microarray was constructed by spotting the clones identified from our subtractive libraries. Other clones potentially involved in cassava defense responses were also included. The cassava defense cDNA microarray was used to confirm the differential expression of the clones. Keywords: cassava, bacterial blight, gene expression, subtractive library, microarrays.

  9. Defensive Information Operations in Support of the Marine Air Ground Task Force

    Science.gov (United States)

    2007-11-02

    Report INFOSEC Information Security INFOSYS Information Systems IO Information Operations ISMO Information Systems Management Office...scanning software. “ Much of the success of the Information Systems Management Office ( ISMO ) team comes from educating the Marines on these dangers and

  10. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    evidenced in our other case studies. However, with the rapid production and deployment of the vehicles in 2007–2008, the operators began to experience...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...The program sponsors of the Patriot also desired to take advantage of technological innovation and information superiority to enhance overall

  11. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  12. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  13. Quantitative Indicators for Defense Analysis. Volume II. Technical Report

    Science.gov (United States)

    1975-06-01

    34*"WTOiw«* piB ^ r- ••’ ’ ’■’.WH""" - "«.JH QUAURANT II Hot War JIoL ]War land i Cold I |Criscs War iThreaten ed - Crisis 1...34The Political Analysis of Negotiations," World Politics 26. 3 (April). ^(1971) The Politics of Trade Negotiations Between Africa and the EEC

  14. A Turnover Analysis for Department of Defense Physicians

    Science.gov (United States)

    1988-06-01

    Finally, some psychological studies conducted by both Abraham Maslow and Frederick Herzberg in the specific areas of job satisfaction and motivation...hierarchy will be motivated by different factors. [Ref. 10] Herzberg developed a theory called the "two factor theory" which relates job satisfaction to...analysis and theories developed by both Maslow and Herzberg , namely the "hierarchy of needs" and the "two factor" S theories which support the

  15. Congressionally-Direct Homeland Defense and Civil Support Threat Information Collection

    Science.gov (United States)

    2008-09-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) St. Mary’s University of San Antonio 1 Camino Santa Maria Street San Antonio, TX 78228-5433 8...law Start/End Dates: 10-12 October 2006 Location: University of Guadalajara at Ocotlan, Mexico Attendees: Jeffrey Addicott, Roberto Rosas ...the Ministry of Defense and the Legal Affairs Office of the French Embassy in Lima , Peru with the diplomatic chancellery as the diplomat’s personal

  16. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  17. Root defense analysis against Fusarium oxysporum reveals new regulators to confer resistance

    Science.gov (United States)

    Chen, Yi Chung; Wong, Chin Lin; Muzzi, Frederico; Vlaardingerbroek, Ido; Kidd, Brendan N.; Schenk, Peer M.

    2014-01-01

    Fusarium oxysporum is a root-infecting fungal pathogen that causes wilt disease on a broad range of plant species, including Arabidopsis thaliana. Investigation of the defense response against this pathogen had primarily been conducted using leaf tissue and little was known about the root defense response. In this study, we profiled the expression of root genes after infection with F. oxysporum by microarray analysis. In contrast to the leaf response, root tissue did not show a strong induction of defense-associated gene expression and instead showed a greater proportion of repressed genes. Screening insertion mutants from differentially expressed genes in the microarray uncovered a role for the transcription factor ETHYLENE RESPONSE FACTOR72 (ERF72) in susceptibility to F. oxysporum. Due to the role of ERF72 in suppressing programmed cell death and detoxifying reactive oxygen species (ROS), we examined the pub22/pub23/pub24 U-box type E3 ubiquitin ligase triple mutant which is known to possess enhanced ROS production in response to pathogen challenge. We found that the pub22/23/24 mutant is more resistant to F. oxysporum infection, suggesting that a heightened innate immune response provides protection against F. oxysporum. We conclude that root-mediated defenses against soil-borne pathogens can be provided at multiple levels. PMID:24998294

  18. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    Science.gov (United States)

    2016-06-01

    to be used up beyond recovery or repair—and provides these items to the services when requisitioned in support of approximately 2,400 weapon...distribution functions for depot maintenance operations varies across the services . For example, the Air Force and DLA have agreed to a local recovery ...DEFENSE INVENTORY Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations Report

  19. Information Analysis of DNA Sequences

    CERN Document Server

    Mohammed, Riyazuddin

    2010-01-01

    The problem of differentiating the informational content of coding (exons) and non-coding (introns) regions of a DNA sequence is one of the central problems of genomics. The introns are estimated to be nearly 95% of the DNA and since they do not seem to participate in the process of transcription of amino-acids, they have been termed "junk DNA." Although it is believed that the non-coding regions in genomes have no role in cell growth and evolution, demonstration that these regions carry useful information would tend to falsify this belief. In this paper, we consider entropy as a measure of information by modifying the entropy expression to take into account the varying length of these sequences. Exons are usually much shorter in length than introns; therefore the comparison of the entropy values needs to be normalized. A length correction strategy was employed using randomly generated nucleonic base strings built out of the alphabet of the same size as the exons under question. Our analysis shows that intron...

  20. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    Energy Technology Data Exchange (ETDEWEB)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable

  1. Information Infrastructure Development Recommendations through Analysis of Current Information Technology Infrastructure, Plans and Policies

    Science.gov (United States)

    2007-11-02

    information society , and the military influence on information and communication technologies development; a review of the policy, objectives, concepts and methods, and the resources outlined in the Information Technology Management Strategic Plan, the Defense Information Infrastructure Master Plan, and the Global and National Information Infrastructure

  2. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  3. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges; Rapport annuel 2004. Defense, securite, energie, information, sante. Le CEA au coeur des grands defis europeens

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  4. Metabolomic analysis of primary metabolites in citrus leaf during defense responses.

    Science.gov (United States)

    Asai, Tomonori; Matsukawa, Tetsuya; Kajiyama, Shin'ichiro

    2017-03-01

    Mechanical damage is one of the unavoidable environmental stresses to plant growth and development. Plants induce a variety of reactions which defend against natural enemies and/or heal the wounded sites. Jasmonic acid (JA) and salicylic acid (SA), defense-related plant hormones, are well known to be involved in induction of defense reactions and play important roles as signal molecules. However, defense related metabolites are so numerous and diverse that roles of individual compounds are still to be elucidated. In this report, we carried out a comprehensive analysis of metabolic changes during wound response in citrus plants which are one of the most commercially important fruit tree families. Changes in amino acid, sugar, and organic acid profiles in leaves were surveyed after wounding, JA and SA treatments using gas chromatography-mass spectrometry (GC/MS) in seven citrus species, Citrus sinensis, Citrus limon, Citrus paradisi, Citrus unshiu, Citrus kinokuni, Citrus grandis, and Citrus hassaku. GC/MS data were applied to multivariate analyses including hierarchical cluster analysis (HCA), primary component analysis (PCA), and orthogonal partial least squares-discriminant analysis (OPLS-DA) to extract stress-related compounds. HCA showed the amino acid cluster including phenylalanine and tryptophan, suggesting that amino acids in this cluster are concertedly regulated during responses against treatments. OPLS-DA exhibited that tryptophan was accumulated after wounding and JA treatments in all species tested, while serine was down regulated. Our results suggest that tryptophan and serine are common biomarker candidates in citrus plants for wound stress. Copyright © 2016 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  5. 76 FR 38089 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-06-29

    ... through the supply chain. DoD believes that most ] information passed down the supply chain will not... recommendations on the proposed information collection should be sent to Ms. Jasmeet Seehra at the Office of Management and Budget, Desk Officer for DoD, Room 10236, New Executive Office Building, Washington, DC...

  6. Defense Technical Information Center Managed Services for DoD Generated Datasets

    Science.gov (United States)

    2010-03-03

    creating their own. ISO/ IEC 11179 (formally known as the ISO/ IEC 11179 Metadata Registry (MDR) standard) is an international standard for representing...Observations Agrmet / Agrimet Cloud/Merged Analysis- Real Time Nephanalysis (RTNEPH) GHCN Precipitation GPCP Precipitation Joint Lightning Legates... Lightning Snow Analysis Snow Climatology Summary Of The Day Surface Weather Observations Upper Air Analysis - (GFS) Upper Air

  7. A preliminary analysis of climate change effect on long-term risk-based design of flood defense

    Science.gov (United States)

    Wang, L.; Van Gelder, P. H. A. J. M.; Vrijling, J. K.

    2012-04-01

    The lifetime of a flood defense usually lasts for decades or centuries. The future flood probabilistic distribution is not stationary due to climate change. Therefore in the long-term design of flood defense systems, the effect of climate change should be taken into account. The design height of Bengbu dike segment (about 10 km) along Huai River in China is studied as an example to explore the potential effects of climate change on long-term risk-based design. The economic-optimal design height of the dike is determined based on cost-benefit analysis. In this analysis the incremental investments in more safety are balanced with the reduction of the risk. Since climate change will result in the change of flood probability and hence the change of flooding risk, the optimal height might be shifted. To describe the possible future climate, the ensemble prediction of Global Climate Models (GCMs) is used in the study. River runoff series, which is required in deriving annual probability of peak runoff, is obtained by forcing a hydrological model with each GCM climate prediction. Then the probability of high water level in the river is derived based on the relationship between water level and peak runoff. The probability of flooding is assumed to equal to the exceedance probability of the high water level in the river. The possible future flood risk is calculated based on the flooding probability estimates, and is corresponding to each member of the GCMs ensemble. The result will provide information about the significance of potential effects of climate change on the long-term design of flood defense. With comparison to the baseline period, the shift of risk curve in future will be shown on the cost-benefit diagram as well as the change of economic optimal design dike height. As it is a preliminary analysis in this study a sensitivity analysis will be carried out. The sensitivity of use of GCMs ensemble, the damage value and the investment cost will be investigated.

  8. Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices

    Science.gov (United States)

    2014-03-01

    information system NGEN Next Generation Enterprise Network PMBOK ® Project Management Body of Knowledge TMIP-J Theater Medical Information Program...Management Institute’s Guide to the Project Management Body of Knowledge ( PMBOK ®), and assessed each of the 3 programs against these criteria.14 To...1) requirements management and (2) project monitoring and control best practices, as defined by CMMI-ACQ and PMBOK ®. We also assessed these

  9. Issues With Access to Acquisition Data and Information in the Department of Defense: Policy and Practice

    Science.gov (United States)

    2016-04-30

    U.S. Navy, UK MoD, and the Australian DoD. Riposo’s projects have covered reviews of domestic and foreign acquisition programs, Department acquisition...permission of the firm that owns the information to use it. The process of getting permission to use the information can be time- consuming , may...government and nongovernment employees in the acquisition process. We identified their basis in law and policy and determined whether the policy

  10. Bibliographic Networks and Microcomputer Applications for Aerospace and Defense Scientific and Technical Information.

    Science.gov (United States)

    1986-10-01

    dial-up access to information so that users can place and track book orders. EBSCO and FAXON offer on-line subscription services, claims requesting...between a user’s terminal and the remote host " Direct information from a user’s terminal to intermediate programs and then into a remote data base (e.g...must emphasize competition among the host of potential vendors, but must promote open access to technical data covering protected software so that

  11. [Information analysis of spinal ganglia].

    Science.gov (United States)

    Lobko, P I; Kovaleva, D V; Kovalchuk, I E; Pivchenko, P G; Rudenok, V V; Davydova, L A

    2000-01-01

    Information parameters (entropia and redundancy) of cervical and thoracic spinal ganglia of albino rat foetuses, mature animals (cat and dog) and human subjects were analysed. Information characteristics of spinal ganglia were shown to be level-specified and to depend on their functional peculiarities. Information parameters of thoracic spinal ganglia of man and different animals are specie specified and may be used in assessment of morphological structures as information systems.

  12. Mandatory Procedures for Major Defense Acquisition Programs (MDAPs) and Major Automated Information System (MAIS) Acquisition Programs.

    Science.gov (United States)

    2007-11-02

    at the subcontract levels will be developed. 3.3.1.1 Commercial and Non-Developmental Items Market research and analysis shall be conducted to...a military and a civil application. Market research and analysis should be conducted to identify and evaluate possible dual use technologies and

  13. INFORMATION SYSTEM OF THE FINANCIAL ANALYSIS

    OpenAIRE

    MIRELA MONEA

    2013-01-01

    Financial analysis provides the information necessary for decision making, and also helps both the external and internal users of these. The results of the financial analysis work are dependent on the quality, accuracy, relevance and effectiveness of the information collected, and processed. Essential sources of information for financial analysis are financial statements, which are considered the raw material of financial analysis. One of the financial statements -the balance sheet - provi...

  14. Department of Defense Freedom of Information Act Executive Order 13392 Improvement Plan

    Science.gov (United States)

    2006-06-14

    Improving Agency Disclosure of Information A.1. Introduction. DoD administers the largest, globally decentralized FOIA Program in the Federal...Specialized FOIA software (FOIA Xpress , FACTS, etc.) Web or Server based processing system Multitrack processing system E-FOIA - Please check all that

  15. 75 FR 20825 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Part 211...

    Science.gov (United States)

    2010-04-21

    ..., or packing if the offeror chooses to propose such alternates. Propose Single Process Initiative (SPI... previously developed items. DoD uses the information to verify Government acceptance of an SPI process as a...) Single Process Initiative (SPI) processes in lieu of military or Federal specifications. The provision...

  16. 76 FR 66889 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-10-28

    ... within industry, nor does it address cyber intrusion reporting for that information. DoD published an... on March 3, 2010, to provide the public an opportunity for input into the initial rulemaking process...) Names and email addresses of persons attending; (3) Last four digits of social security number for each...

  17. User Feedback Mechanisms for Defense Technical Information Center Services and Products. Phase I,

    Science.gov (United States)

    1983-01-02

    8 3DTIC. Annual Users Conference . ,1981, p. 1. 84Marilyn Killebrew Gell, "Washington Update," Library Journal , - February 15, 1981, p. 399. 85~lp.39...34 Information Reports and Bibliographies, Vol. 5, No. 5, (October, 1976), 2-16. Gell, Marilyn Killebrew. "Washington Update." Library Journal , February

  18. 76 FR 72916 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2011-11-28

    ... notice are available electronically on the Internet at: http://www.acq.osd.mil/dpap/dfars/index.htm... to provide for protection of information or activities with national security significance. As such...: Businesses or other for-profit and not-for-profit institutions. Number of Respondents: 300. Responses...

  19. Arabidopsis transcriptome analysis reveals key roles of melatonin in plant defense systems.

    Directory of Open Access Journals (Sweden)

    Sarah Weeda

    Full Text Available Melatonin is a ubiquitous molecule and exists across kingdoms including plant species. Studies on melatonin in plants have mainly focused on its physiological influence on growth and development, and on its biosynthesis. Much less attention has been drawn to its affect on genome-wide gene expression. To comprehensively investigate the role(s of melatonin at the genomics level, we utilized mRNA-seq technology to analyze Arabidopsis plants subjected to a 16-hour 100 pM (low and 1 mM (high melatonin treatment. The expression profiles were analyzed to identify differentially expressed genes. 100 pM melatonin treatment significantly affected the expression of only 81 genes with 51 down-regulated and 30 up-regulated. However, 1 mM melatonin significantly altered 1308 genes with 566 up-regulated and 742 down-regulated. Not all genes altered by low melatonin were affected by high melatonin, indicating different roles of melatonin in regulation of plant growth and development under low and high concentrations. Furthermore, a large number of genes altered by melatonin were involved in plant stress defense. Transcript levels for many stress receptors, kinases, and stress-associated calcium signals were up-regulated. The majority of transcription factors identified were also involved in plant stress defense. Additionally, most identified genes in ABA, ET, SA and JA pathways were up-regulated, while genes pertaining to auxin responses and signaling, peroxidases, and those associated with cell wall synthesis and modifications were mostly down-regulated. Our results indicate critical roles of melatonin in plant defense against various environmental stresses, and provide a framework for functional analysis of genes in melatonin-mediated signaling pathways.

  20. Biomechanical Analysis of Defensive Cutting Actions During Game Situations: Six Cases in Collegiate Soccer Competitions

    Directory of Open Access Journals (Sweden)

    Sasaki Shogo

    2015-06-01

    Full Text Available The strengths of interpersonal dyads formed by the attacker and defender in one-on-one situations are crucial for performance in team ball sports such as soccer. The purpose of this study was to analyze the kinematics of one-on-one defensive movements in soccer competitions, and determine the relationships between lower limb kinematics and the center of mass translation during cutting actions. Six defensive scenes in which a player was responding to an offender’s dribble attack were selected for analysis. To reconstruct the three-dimensional kinematics of the players, we used a photogrammetric model-based image-matching technique. The hip and knee kinematics were calculated from the matched skeleton model. In addition, the center of mass height was expressed as a ratio of each participant’s body height. The relationships between the center of mass height and the kinematics were determined by the Pearson’s product-moment correlation coefficient. The normalized center of mass height at initial contact was correlated with the vertical center of mass displacement (r = 0.832, p = 0.040 and hip flexion angle at initial contact (r = −0.823, p = 0.044. This suggests that the lower center of mass at initial contact is an important factor to reduce the downwards vertical center of mass translation during defensive cutting actions, and that this is executed primarily through hip flexion. It is therefore recommended that players land with an adequately flexed hip at initial contact during one-on-one cutting actions to minimize the vertical center of mass excursion.

  1. Canonical analysis based on mutual information

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg; Vestergaard, Jacob Schack

    2015-01-01

    combinations with the information theoretical measure mutual information (MI). We term this type of analysis canonical information analysis (CIA). MI allows for the actual joint distribution of the variables involved and not just second order statistics. While CCA is ideal for Gaussian data, CIA facilitates...

  2. Information needs analysis principles and practice in information organizations

    CERN Document Server

    Dorner, Daniel G; Calvert, Philip J

    2010-01-01

    If you want to provide an information service that truly fulfils your users' needs, this book is essential reading. The book supports practitioners in developing an information needs analysis strategy and offers the necessary professional skills and techniques to do so.

  3. How to Get It: A Guide to Defense - Related Information Resources (Librarians’ Edition, July 1998)

    Science.gov (United States)

    1998-07-01

    Technical Reports (TR) Bibliographic Database T-12 HOW TO GET IT TR-48 See: Index to Records of the United States Strategic Bombing Survey (TR-48) TRAC ...Vuorimiehentie 5, Espoo P.O. Box 1000 FIN -02044 VTT Notes: Performs technical and technoeconomic research and development work in electronics, information...technology, automation, chemical technology, energy manufacturing technology. Jure Database - Reports published in VTT publication series from 1943

  4. Defense Health Care: Additional Information Needed about Mental Health Provider Staffing Needs

    Science.gov (United States)

    2015-01-01

    Members, and Military Families (Aug. 31, 2012). Page 2 GAO-15-184 DOD Mental Health Staffing of mental health providers.4 These...improve these services. See Executive Order 13625, Improving Access to Mental Health Services for Veterans, Service Members, and Military Families ...beneficiary population has missing information for one or more risk factor data elements. PHRAMS assigns these individuals to an “unknown” group

  5. Assessing and Evaluating Department of Defense Efforts to Inform, Influence, and Persuade: Desk Reference

    Science.gov (United States)

    2015-01-01

    audience will react to various dimensions of a product—message, imagery, lan- guage, music , and so forth. Matthew Warshaw recalled a few cases in which...practitio- ners. The May 2011 version of DoD Directive 3600.01 defines atmospherics as “informa- tion regarding the surrounding or pervading mood , environment...HUMINT and can include “polling, surveys, opinion research, spot reports, and consolidation of other information relevant to prevailing moods

  6. Defense Technical Information Center’s 2010 Student Paper Competition: The Winning Papers

    Science.gov (United States)

    2010-05-05

    business executives (Auster & Choo, 1994; Boyd & Fulk , 2001; de Alwis, Majid, & Chaudry, 2006; Wetherbe, 1991). This group is a melange of the two...environment for information (Auster & Choo, 1994; de Alwis et al., 2006), and time spent scanning increases as task complexity increases (Boyd & Fulk , 2001...Trends 43 (2) 1994: The Library in Corporate Intelligence Activities: 206-225. Boyd, B., Fulk , J. (2001). Executive Scanning and Perceived

  7. Defense Inventory: DOD Needs Additional Information for Managing War Reserve Levels of Meals Ready to Eat

    Science.gov (United States)

    2015-05-01

    affect future demand. Without obtaining this information from the military services, DLA may be limited in its ability to optimize the supply chain ...future demand, DLA may be limited in its ability to optimize the supply chain across the department. Forecasting demand for supplies has been a long...across the department. DLA uses various supply - chain strategies to balance cost with readiness in meeting the need for items identified as WRM and needed

  8. Secure Information Sharing in a Defense Support to Civil Authorities Environment

    Science.gov (United States)

    2009-03-12

    Controlled Information (CUI), however CUI is not in general usage yet. 4 John Elting , Swords Around a Throne (London, Collier MacMillan Publishers 1988...Research shows Cyber Attack Could cost US 50 times more than Katrina”, Market Wire, July 2007 Available at http://findarticles.com/p/ articles /mi_pwwi... articles /2002/03/03/IT-security-calls-for-collaboration.aspx Accessed on 7 February 2009. 21 organization. This team of 10 – 12 soldiers has the same

  9. Information Assurance and the Defense in Depth: A Study of Infosec Warriors and Infosec Cowboys

    Science.gov (United States)

    2003-01-01

    him unique insights into the challenges of information assurance. 26 Survey Structure Steiner Kvale described two metaphors of interviewers in his...knowledge ( Kvale 1996, 3-5). For the purpose of this study, the researcher attempted to be both miner and traveler. Each interview was structured around a...questions according to one of the five responses contained in Table 3. These basic responses, mined by the researcher ( Kvale 1996, 4), were entered into

  10. Information Acquisition, Analysis and Integration

    Science.gov (United States)

    2016-08-03

    Nov 1998; Nov 1998. 4. TITLE. Enter title and subtitle with volume number and part number, if applicable. On classified documents, enter the title...e.g. U, C, S, etc. If this form contains classified information, stamp classification level on the top and bottom of this page. 17. LIMITATION OF...1833, 2015. 11. M. Fiori and G. Sapiro, “On spectral properties for graph match- ing and graph isomorphism problems,” Information and Inference: A

  11. Geographic Information System Data Analysis

    Science.gov (United States)

    Billings, Chad; Casad, Christopher; Floriano, Luis G.; Hill, Tracie; Johnson, Rashida K.; Locklear, J. Mark; Penn, Stephen; Rhoulac, Tori; Shay, Adam H.; Taylor, Antone; hide

    1995-01-01

    Data was collected in order to further NASA Langley Research Center's Geographic Information System(GIS). Information on LaRC's communication, electrical, and facility configurations was collected. Existing data was corrected through verification, resulting in more accurate databases. In addition, Global Positioning System(GPS) points were used in order to accurately impose buildings on digitized images. Overall, this project will help the Imaging and CADD Technology Team (ICTT) prove GIS to be a valuable resource for LaRC.

  12. Content analysis in information flows

    Energy Technology Data Exchange (ETDEWEB)

    Grusho, Alexander A. [Institute of Informatics Problems of Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova str., 44/2, Moscow (Russian Federation); Faculty of Computational Mathematics and Cybernetics, Moscow State University, Moscow (Russian Federation); Grusho, Nick A.; Timonina, Elena E. [Institute of Informatics Problems of Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova str., 44/2, Moscow (Russian Federation)

    2016-06-08

    The paper deals with architecture of content recognition system. To analyze the problem the stochastic model of content recognition in information flows was built. We proved that under certain conditions it is possible to solve correctly a part of the problem with probability 1, viewing a finite section of the information flow. That means that good architecture consists of two steps. The first step determines correctly certain subsets of contents, while the second step may demand much more time for true decision.

  13. Site Team Review: Petition for Degree-Granting Authority by National Defense University, School for Information Resources Management (iCollege)

    Science.gov (United States)

    US Department of Education, 2010

    2010-01-01

    On November 3, 2010, a site team from the National Advisory Committee on Institutional Quality and Integrity (NACIQI) and the U.S. Department of Education conducted a visit to National Defense University's (University) School for Information Resources Management (IRMC or iCollege) at Ft. McNair in Washington, DC. The purpose of the visit was to…

  14. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  15. 32 CFR Appendix C to Part 516 - Department of Defense Directive 5405.2, Release of Official Information in Litigation and...

    Science.gov (United States)

    2010-07-01

    ... of Official Information in Litigation and Testimony by DoD Personnel as Witnesses C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Pt. 516, App. C Appendix C to Part 516—Department of Defense... Code, Sections 301, 552, and 552a (b) Title 10, United States Code, Section 133 (c) DoD Directive...

  16. Defense Management: More Reliable Cost Estimates and Further Planning Needed to Inform the Marine Corps Realignment Initiatives in the Pacific

    Science.gov (United States)

    2013-06-01

    remaining on Okinawa. Page 16 GAO-13-360 Defense Management Carrier Air Wing 5, a Navy unit paired with the aircraft carrier USS George...The Honorable Thad Cochran Ranking Member Subcommittee on Defense Committee on Appropriations United States Senate The Honorable Tim Johnson

  17. Textual Analysis of Intangible Information

    NARCIS (Netherlands)

    A.J. Moniz (Andy)

    2016-01-01

    markdownabstractTraditionally, equity investors have relied upon the information reported in firms’ financial accounts to make their investment decisions. Due to the conservative nature of accounting standards, firms cannot value their intangible assets such as corporate culture, brand value and rep

  18. Textual Analysis of Intangible Information

    NARCIS (Netherlands)

    A.J. Moniz (Andy)

    2016-01-01

    markdownabstractTraditionally, equity investors have relied upon the information reported in firms’ financial accounts to make their investment decisions. Due to the conservative nature of accounting standards, firms cannot value their intangible assets such as corporate culture, brand value and

  19. Textual Analysis of Intangible Information

    NARCIS (Netherlands)

    A.J. Moniz (Andy)

    2016-01-01

    markdownabstractTraditionally, equity investors have relied upon the information reported in firms’ financial accounts to make their investment decisions. Due to the conservative nature of accounting standards, firms cannot value their intangible assets such as corporate culture, brand value and rep

  20. An Analysis of Defense Information and Information Technology Articles: A Sixteen-Year Perspective

    Science.gov (United States)

    2009-03-01

    evaluating existing journals, researchers can appraise the intellectual health of a given discipline (Das & Handfield , 1997). In this study...Das and Handfield conducted a similar study. They analyzed research in the field of purchasing over a ten year period from 1987 to 1997. They...in research areas (Das & Handfield , 1997). Other researchers have utilized the literature review concept to identify specific issues, trends

  1. Cancer Patients' Informational Needs: Qualitative Content Analysis.

    Science.gov (United States)

    Heidari, Haydeh; Mardani-Hamooleh, Marjan

    2016-12-01

    Understanding the informational needs of cancer patients is a requirement to plan any educative care program for them. The aim of this study was to identify Iranian cancer patients' perceptions of informational needs. The study took a qualitative approach. Semi-structured interviews were held with 25 cancer patients in two teaching hospitals in Iran. Transcripts of the interviews underwent conventional content analysis, and categories were extracted. The results came under two main categories: disease-related informational needs and information needs related to daily life. Disease-related informational needs had two subcategories: obtaining information about the nature of disease and obtaining information about disease prognosis. Information needs related to daily life also had two subcategories: obtaining information about healthy lifestyle and obtaining information about regular activities of daily life. The findings provide deep understanding of cancer patients' informational needs in Iran.

  2. Linear systems analysis of activating processes of complement system as a defense mechanism.

    Science.gov (United States)

    Hirayama, H; Yoshii, K; Ojima, H; Kawai, N; Gotoh, S; Fukuyama, Y

    1996-01-01

    The complement system is an important element of the host defense mechanism, although its kinetics and characteristics as a system are still unclear. We have investigated its temporal changes and system properties from the view point of system engineering. The temporal changes of sequential activating processes of the system were expressed by 26 non-linear differential equations using reported values of rate constants and serum concentration for each component. The intermediate products in the activating processes increased parabolically while the membrane attack component as the final product, increased linearly. The little change in inactive precursors afforded validity for system linearization. Linear systems analysis revealed that the system which was insensitive to the changes in rate constants was unstable. The system became stable when the feed-back input from the final product was set to operate on the first step of the activating processes. Seven uncontrollable variables were insensitive to changes in rate constants or system optimization that minimized the changes in concentrations of components in the complement system. The singular values of the complement system were reduced and the impulse responses of the system were improved when the system was optimized. When stronger minimization was imposed on the changes of concentration of the components in the complement system, the singular values were reduced more, the magnitude of the impulse responses was depressed further and the responses terminated earlier than those when the elements in the weighting matrix of concentration of the components were set to be unity. By this potent minimization, the influences of changes in rate constants on the singular values were diminished. The present theoretical analysis is presented to evaluate the ability of defense mechanism of complement system.

  3. Expression analysis of chitinase upon challenge inoculation to Alternaria wounding and defense inducers in Brassica juncea

    Directory of Open Access Journals (Sweden)

    Sandhya Rawat

    2017-03-01

    Full Text Available Chitinases are the hydrolytic enzymes which belong to the pathogenesis-related (PR protein family and play an important role not only in plant defense but also in various abiotic stresses. However, only a limited number of chitinase genes have been characterised in B. juncea. In this study, we have characterised B. juncea class IV chitinase gene (accession no EF586206 in response to fungal infection, salicylic acid (SA, jasmonic acid (JA treatments and wounding. Gene expression studies revealed that the transcript levels of Bjchitinase (BjChp gene increases significantly both in local and distal tissues after Alternaria infection. Bjchitinase gene was also induced by jasmonic acid and wounding but moderately by salicylic acid. A 2.5 kb class IV chitinase promoter of this gene was isolated from B. juncea by Genome walking (accession no KF055403.1. In-silico analysis of this promoter revealed a number of conserved cis-regulatory elements related to defense, wounding and signalling molecules like SA, and JA. For validation, chitinase promoter was fused to the GUS gene, and the resultant construct was then introduced into Arabidopsis plants. Histochemical analysis of T2 transgenic Arabidopsis plants showed that higher GUS activity in leaves after fungal infection, wounding and JA treatment but weakly by SA. GUS activity was seen in meristematic tissues, young leaves, seeds and siliques. Finally investigation has led to the identification of a pathogen-inducible, developmentally regulated and organ-specific promoter. Present study revealed that Bjchitinase (BjChp promoter is induced during biotic and environmental stress and it can be used in developing finely tuned transgenics.

  4. An Analysis of Rapid Technology Transfer Solutions and Best Practices for Use by the Department of Defense

    OpenAIRE

    Holden, Dennis R.

    2010-01-01

    Approved for public release; distribution is unlimited The DoD is burdened by an Integrated Defense Acquisition, Technology, and Logistics Life Cycle Management System that is designed to acquire large systems, such as ships, and that takes years to complete. Information technology evolves at a rapid pace because it is driven by industry. The DoD acquisition system is therefore at odds with industry development, at least with respect to information technology. Acquisition of informatio...

  5. Digital Array Radar for Ballistic Missile Defense and Counter-Stealth Systems Analysis and Parameter Tradeoff Study

    Science.gov (United States)

    2006-09-14

    Missile BMD Ballistic Missile Defense CAS Computer Algebra System CDD Capability Development Document CONOPS Concept of Operations CONUS Continental...this section. Analysis and calculations described in this section were conducted using Waterloo Maple® 7 Computer Algebra System (CAS). Initially...When two or more electromagnetic waves combine, their electric fields are integrated vectorially at each point in space for any

  6. 电网企业网络信息安全的威胁与攻防新技术研究%Threat to network information security and study on new defense technologies in power grid enterprises

    Institute of Scientific and Technical Information of China (English)

    龙震岳; 钱扬; 邹洪; 陈锐忠

    2015-01-01

    With the continuous development of management informationization of the power grid enterprises,automatic power grid operation and intelligent electrical equipment,the information security has become more important. For the serious situation of network information security,the new-type defense technologies are studied,which are consisted of advanced persistent threat (APT) protection technology and vulnerability scanning technology. Combining with the advantages and disadvantages of these technologies,the strategy of defense effectiveness analysis based on the minimum attack cost is proposed,which can compute the defense capability of the network.%随着电网企业管理信息化、电网运行自动化、电力设备智能化的不断发展,电网企业信息安全愈发重要.在此针对网络信息安全的严峻形势,通过研究电网企业出现的新型攻防技术,包括高级持续威胁(APT)防护技术、漏洞扫描技术等的优缺点,给出基于最小攻击代价的防御有效性分析策略,并计算网络的防御能力.

  7. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  8. An Analysis of the Relationship Between the Professionalism of Defense Acquisition Program Managers and Program Outcomes

    Science.gov (United States)

    2011-11-30

    for example, Fox & Miller, 2006; Kronenberg , 1990) have noted the high level of complexity in defense acquisition programs. Several interviewees in...CA: Berrett–Koehler. Kronenberg , P. S. (1990). Public administration and the Defense Department: Examination of a prototype. In G. Wamsley et al

  9. The Department of Defense Acquisition Workforce: Background, Analysis, and Questions for Congress

    Science.gov (United States)

    2016-07-29

    Congressional Research Service Summary Congress and the executive branch have long been frustrated with waste, mismanagement, and fraud in defense...have long been frustrated with perceived waste, mismanagement, and fraud in defense acquisitions and have spent significant resources attempting to...the limited purpose of receiving training for the performance of acquisition-related functions and duties. (Italics added .) While considered part of

  10. Generalized Full-Information Item Bifactor Analysis

    Science.gov (United States)

    Cai, Li; Yang, Ji Seung; Hansen, Mark

    2011-01-01

    Full-information item bifactor analysis is an important statistical method in psychological and educational measurement. Current methods are limited to single-group analysis and inflexible in the types of item response models supported. We propose a flexible multiple-group item bifactor analysis framework that supports a variety of…

  11. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  12. Informational analysis involving application of complex information system

    Science.gov (United States)

    Ciupak, Clébia; Vanti, Adolfo Alberto; Balloni, Antonio José; Espin, Rafael

    The aim of the present research is performing an informal analysis for internal audit involving the application of complex information system based on fuzzy logic. The same has been applied in internal audit involving the integration of the accounting field into the information systems field. The technological advancements can provide improvements to the work performed by the internal audit. Thus we aim to find, in the complex information systems, priorities for the work of internal audit of a high importance Private Institution of Higher Education. The applied method is quali-quantitative, as from the definition of strategic linguistic variables it was possible to transform them into quantitative with the matrix intersection. By means of a case study, where data were collected via interview with the Administrative Pro-Rector, who takes part at the elaboration of the strategic planning of the institution, it was possible to infer analysis concerning points which must be prioritized at the internal audit work. We emphasize that the priorities were identified when processed in a system (of academic use). From the study we can conclude that, starting from these information systems, audit can identify priorities on its work program. Along with plans and strategic objectives of the enterprise, the internal auditor can define operational procedures to work in favor of the attainment of the objectives of the organization.

  13. Shape design sensitivity analysis using domain information

    Science.gov (United States)

    Seong, Hwal-Gyeong; Choi, Kyung K.

    1985-01-01

    A numerical method for obtaining accurate shape design sensitivity information for built-up structures is developed and demonstrated through analysis of examples. The basic character of the finite element method, which gives more accurate domain information than boundary information, is utilized for shape design sensitivity improvement. A domain approach for shape design sensitivity analysis of built-up structures is derived using the material derivative idea of structural mechanics and the adjoint variable method of design sensitivity analysis. Velocity elements and B-spline curves are introduced to alleviate difficulties in generating domain velocity fields. The regularity requirements of the design velocity field are studied.

  14. Construction of the Disciplinary System of Defense S & T Information Science & Its Core Field Research%装备科技情报学科体系构筑与核心领域研究

    Institute of Scientific and Technical Information of China (English)

    符福峘

    2003-01-01

    Five issues regarding the construction of the disciplinary system of defense S & T information science are discussed, i. e. the concept and the research subject; the basic factors; the research object and major fields; the na-ture and academic position; and the function and mission. It's pointed out that strengthening the research on the theoreti-cal system of defense S & T information science and using this system to guide information practice and promote the devel-opment of defense S & T information undertakings are of great significance.

  15. Proteomic analysis of Daphnia magna hints at molecular pathways involved in defensive plastic responses

    Science.gov (United States)

    2014-01-01

    Background Phenotypic plasticity in defensive traits occurs in many species when facing heterogeneous predator regimes. The waterflea Daphnia is well-known for showing a variety of these so called inducible defences. However, molecular mechanisms underlying this plasticity are poorly understood so far. We performed proteomic analysis on Daphnia magna exposed to chemical cues of the predator Triops cancriformis. D. magna develops an array of morphological changes in the presence of Triops including changes of carapace morphology and cuticle hardening. Results Using the 2D-DIGE technique, 1500 protein spots could be matched and quantified. We discovered 179 protein spots with altered intensity when comparing Triops exposed animals to a control group, and 69 spots were identified using nano-LC MS/MS. Kairomone exposure increased the intensity of spots containing muscle proteins, cuticle proteins and chitin-modifying enzymes as well as enzymes of carbohydrate and energy metabolism. The yolk precursor protein vitellogenin decreased in abundance in 41 of 43 spots. Conclusion Identified proteins may be either directly involved in carapace stability or reflect changes in energy demand and allocation costs in animals exposed to predator kairomones. Our results present promising candidate proteins involved in the expression of inducible defences in Daphnia and enable further in depth analysis of this phenomenon. PMID:24762235

  16. The DEFENSE (debris Flows triggEred by storms - nowcasting system): An early warning system for torrential processes by radar storm tracking using a Geographic Information System (GIS)

    Science.gov (United States)

    Tiranti, Davide; Cremonini, Roberto; Marco, Federica; Gaeta, Armando Riccardo; Barbero, Secondo

    2014-09-01

    Debris flows, responsible for economic losses and occasionally casualties in the alpine region, are mainly triggered by heavy rains characterized by hourly peaks of varying intensity, depending on the features of the basin under consideration. By integrating a recent classification of alpine basins with the radar storm tracking method, an innovative early warning system called DEFENSE (DEbris Flows triggEred by storms - Nowcasting SystEm) was developed using a Geographical Information System (GIS). Alpine catchments were classified into three main classes based on the weathering capacity of the bedrock into clay or clay-like minerals, the amount of which, in unconsolidated material, directly influences the debris flow rheology, and thus the sedimentary processes, the alluvial fan architecture, as well as the triggering frequency and seasonal occurrence probability of debris flows. Storms were identified and tracked by processing weather radar observations; subsequently, rainfall intensities and storm severity were estimated over each classified basin. Due to rainfall threshold values determined for each basin class, based on statistical analysis of historical records, an automatic corresponding warning could be issued to municipalities.

  17. ANALYSIS APPROACHES TO EVALUATION OF INFORMATION PROTECTION

    Directory of Open Access Journals (Sweden)

    Zyuzin A. S.

    2015-03-01

    Full Text Available The article is devoted to an actual problem of information systems’ security assessment and the importance of objective quantitative assessment results receiving. The author offers the creation of complex system of information security with system approach, which will be used at each stage of information system’s life cycle. On the basis of this approach the author formulates the general scheme of an information security assessment of information system, and also the principles of an assessment’s carrying out method choice. In this work the existing methods of a quantitative assessment based on object-oriented methods of the system analysis, and also the objectivity of the received estimates on the basis of this approach are considered. On the basis of the carried-out analysis, serious shortcomings of the used modern techniques of an information systems’ security assessment are allocated, then the idea of the scientific and methodical device providing the increase of objectivity and complexity of an information assessment means on the basis of expert data formalization creation necessity was formulated. The possibility of this approach application for expeditious receiving a quantitative information security assessment in the conditions security threat’s dynamics changes, functioning and developments of information system is considered. The problem definition of automated information systems’ security assessment is executed, and the general technique of protection means of information in systems of this type was formulated

  18. INFORMATION SYSTEM OF THE FINANCIAL ANALYSIS

    Directory of Open Access Journals (Sweden)

    MIRELA MONEA

    2013-12-01

    Full Text Available Financial analysis provides the information necessary for decision making, and also helps both the external and internal users of these. The results of the financial analysis work are dependent on the quality, accuracy, relevance and effectiveness of the information collected, and processed. Essential sources of information for financial analysis are financial statements, which are considered the raw material of financial analysis. One of the financial statements -the balance sheet - provides information about assets, liabilities, equity, liquidity, solvency, risk, financial flexibility. The profit and loss account is a synthesis accounting document, part of the financial statement reporting enterprise financial performances during of a specified accounting period and summarizes all revenues earned and expenses of an accounting period and reports the results.

  19. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  20. Information Management in the Department of Defense: The Role of Librarians. Proceedings of the Military Librarians Workshop (24th) 15-17 October 1980, held at Monterey, California

    Science.gov (United States)

    1983-07-01

    you, I have asked Paul Klinefelter to read my speech. Furthermore, I want to extend to you an invitation: If you are in Washington and wish to talk to...Challenge and the Opportunity, and what your role is. I’m familiar with the very honorable history of this Workshop and the considerable record of...accomplishment in its twenty-four year history . That oeriod has seen librarians and technical information specialists acquire an importance to the Defense

  1. Information Work Analysis: An Approach to Research on Information Interactions and Information Behaviour in Context

    Science.gov (United States)

    Huvila, Isto

    2008-01-01

    Introduction: A work roles and role theory-based approach to conceptualise human information activity, denoted information work analysis is discussed. The present article explicates the approach and its special characteristics and benefits in comparison to earlier methods of analysing human information work. Method: The approach is discussed in…

  2. An analysis of socio/cultural impact of CIM on the Department of Defense and possible implementation strategy

    OpenAIRE

    Hantjis, William M.; Kelley, Donald A.

    1991-01-01

    Approved for public release; distribution is unlimited The Corporate Information Management (CIM) initiave in the Department of Defense (DoD) is an attempt to eliminate duplicate Automatic Data Processing ( ADP) systems through the standardization of functional area requirements across all DoD agencies. CIM initiative management recognized that the DoD organizational culture might impact or be impacted by such an all-encompassing initiative. The purpose of this thesis is to estima...

  3. Value of Information Analysis in Structural Safety

    DEFF Research Database (Denmark)

    Konakli, Katerina; Faber, Michael Havbro

    2014-01-01

    of structural systems. In this context, experiments may refer to inspections or techniques of structural health monitoring. The Value of Information concept provides a powerful tool for determining whether the experimental cost is justified by the expected benefit and for identifying the optimal among different......Pre-posterior analysis can be used to assess the potential of an experiment to enhance decision making by providing information on parameters characterized by uncertainty. The present paper describes a framework for pre-posterior analysis for support of decisions related to maintenance...... and quality of information and the probabilistic dependencies between components of a system....

  4. Mathematical Analysis of Evolution, Information, and Complexity

    CERN Document Server

    Arendt, Wolfgang

    2009-01-01

    Mathematical Analysis of Evolution, Information, and Complexity deals with the analysis of evolution, information and complexity. The time evolution of systems or processes is a central question in science, this text covers a broad range of problems including diffusion processes, neuronal networks, quantum theory and cosmology. Bringing together a wide collection of research in mathematics, information theory, physics and other scientific and technical areas, this new title offers elementary and thus easily accessible introductions to the various fields of research addressed in the book.

  5. Crime analysis using open source information

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Shah, Azhar Ali;

    2015-01-01

    In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show...

  6. Crime analysis using open source information

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Shah, Azhar Ali

    2015-01-01

    In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show...

  7. Requirements Analysis for Information-Intensive Systems

    Science.gov (United States)

    Callender, E. D.; Hartsough, C.; Morris, R. V.; Yamamoto, Y.

    1986-01-01

    Report discusses role of requirements analysis in development of information-intensive systems. System examined from variety of human viewpoints during design, development, and implementation. Such examination, called requirements analysis, ensures system simultaneously meets number of distinct but interacting needs. Viewpoints defined and integrated to help attain objectives.

  8. Gene expression analysis during cassava defense response to bacterial blight disease

    OpenAIRE

    2006-01-01

    Cassava bacterial blight (CBB) caused by Xanthomonas axonopodis pv. manihotis (Xam) is a destructive disease in the South América and África and yield losses range between 12 and 100%. Cytochemistry and biochemistry of defense response to CBB have been well studied. However, the response of the plant to pathogen attack at the molecular and cellular level remains uncharacterized. Identification of genes associated with defense responses is one of most critical steps leading to the elucidation ...

  9. 分布式信息安全防御系统的设计与实现%Design and Realization of Distributed Information Security Defense System

    Institute of Scientific and Technical Information of China (English)

    王国鑫; 朱宪花

    2012-01-01

    In allusion to the United Threat Management(UTM)'s problems of single point failure and stability of equipment etc., a distributed information security defense system is designed. This system is tree multi-level management structure, it can be divided into three parts, including proactive defense platform, monitoring nodes and host monitoring module. They separately undertake different information system defense tasks. So it can effectively relieve the safety management burden of the gateway, thus solve the problems of single point failure and system stability. This helps to solve hybrid network security threats.%针对统一威胁管理(UTM)的单点失效、设备稳定性等问题,设计一种分布式信息安全防御系统.该系统为树形多级管理结构,可分为主动防御平台、监控节点、主机监控模块3个部分,分别承担不同的信息系统防御任务.实验结果表明,该系统可有效地减轻网关处的安全管理负担,解决单点失效及系统稳定性问题,适用于防御混合型网络安全威胁.

  10. Proteome Analysis for Defense Response of Apple Leaves Induced by Alternaria Blotch ,Alternaria alternata Apple Pathotype

    Institute of Scientific and Technical Information of China (English)

    Caixia Zhang; Zhuang Li; Liyi Zhang; Yi Tian; Guodong Kang; Ying Chen; Peihua Cong

    2012-01-01

    Apple (Ma/us domestica) is considered a model fruit plant owing to its world-wide economic importance,and a large number of cultivars dominate world fruit production.To date,the cultivation of apple has been limited by many kinds of fungal diseases,and among the many fungal diseases affecting apple trees,Alternaria blotch,the disease caused by Alternaria alternata apple pathotype,is spreading worldwide and results in severe negative effect on apple production.Currently,management of a fungal disease such as Alternaria blotch mainly through traditional chemical control agents instead of using resistant cultivars.As in apple,the molecular mechanism of disease resistance against A.altemata apple pathotype has not been illustrated clearly,although most of the genes have been identified in apple,little is known about the biological roles for each protein in that plant.Considering that apple Altemaria blotch is the usual diseases influencing apple production,further studies about the interaction mechanism between the pathogen and its host,particularly some host self-defense response mechanisms which closely related to the anti-disease properties of apple should be performed.In this work we aimed to generate fundamental insights into the plant' s defense responses to infection with Altemaria blotch using a proteomics approach,to aid in the development and breeding of high-quality disease-resistant apple varieties.One seedlings which derived from the cross of ‘Huacui’ and ‘Golden Delicious’,with highly resistant,were chosen to be hosts for this study.The sample leaves were inoculated with spore suspension of A.altemata apple pathotype,and the control samples were treated with water instead of inoculums.Following inoculation,the samples were harvested 48 h after inoculation.The whole experiment was repeated three times in order to get a reliable result.The total soluble protein extracts prepared using modified phenol-precipitation procedures.Total protein extracts

  11. Risk Analysis of Accounting Information System Infrastructure

    OpenAIRE

    MIHALACHE, Arsenie-Samoil

    2011-01-01

    National economy and security are fully dependent on information technology and infrastructure. At the core of the information infrastructure society relies on, we have the Internet, a system designed initially as a scientists’ forum for unclassified research. The use of communication networks and systems may lead to hazardous situations that generate undesirable effects such as communication systems breakdown, loss of data or taking the wrong decisions. The paper studies the risk analysis of...

  12. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  13. 国防专利技术转移信息不对称及对策研究%Causes and Countermeasures of Information Asymmetry in Defense Patent Technology Transfer

    Institute of Scientific and Technical Information of China (English)

    武剑; 郑绍钰

    2016-01-01

    转移主体双方信息不对称是制约国防专利技术向民用领域转移的主要障碍.在分析国防专利技术转移信息不对称表现的基础上,剖析其背后的原因,并从转移相配套的解密机制、信息平台业务拓展以及审批与评价机制的建立完善等方面针对性地提出解决对策.%The information asymmetry of transfer of both entities poses a major restriction for the transfer of national defense patented technology to civil applications.Based on the analysis on the in-formation asymmetry of main entities of national defense patented technology transfer,the paper ana-lyzes the reasons behind and brings out countermeasures of transfer of corresponding decryption mechanism,expansion of information platform business and the establishment and completion of ap-proval and evaluation mechanism.

  14. Point Information Gain and Multidimensional Data Analysis

    Directory of Open Access Journals (Sweden)

    Renata Rychtáriková

    2016-10-01

    Full Text Available We generalize the point information gain (PIG and derived quantities, i.e., point information gain entropy (PIE and point information gain entropy density (PIED, for the case of the Rényi entropy and simulate the behavior of PIG for typical distributions. We also use these methods for the analysis of multidimensional datasets. We demonstrate the main properties of PIE/PIED spectra for the real data with the examples of several images and discuss further possible utilizations in other fields of data processing.

  15. In defense of psychosomatic theory: A critical analysis of Allison and Heshkas critical analysis

    NARCIS (Netherlands)

    Strien, T. van

    1995-01-01

    This article analyses Allison and Heshka's (International Journal of Eating Disorders, 13, 289–295, 1993.) critical analysis of studies supporting psychosomatic theory. Questionned first is, Allison and Heshka's contention that the obese overreport emotional eating as a result of effects of demand c

  16. Defense Logistics. Lack of Key Information May Impede DOD’s Ability to Improve Supply Chain Management

    Science.gov (United States)

    2009-01-01

    Military operations in Iraq and Afghanistan have focused attention on the performance of the Department of Defense’s (DOD) supply chain management...According to DOD, it spent approximately $178 billion on its supply chain in fiscal year 2007. As a result of weaknesses in DOD’s management of its... supply chain , this area has been on GAO’s list of high-risk federal government programs since 1990. DOD released its Logistics Roadmap in July 2008 to

  17. An Approach to the Design of a Management Information System: Development Procedure for the Indonesian Defense Logistics Staff.

    Science.gov (United States)

    1983-09-01

    DEVELOPMENT PROCEDURE FOR THENMINDONESIAN EFENSE LOGISTICS STAFF E. Sudaryanto Wreksomindojo Major, Indonesia Army LSSR 61-83 DTICELECTE >.. NOV 8 1983 C...PROCEDURE FOR THE INDONESIAN DEFENSE LOGISTICS STAFF E. Sudaryanto Wreksomindojo -Major, Indonesia Army LSSR 61-83 Apprr ’-;,, .; e 1. . ,: ;r...PERFORMING O0G. REPORT NUMBER 1. AUTHOR(*) 8. CONTRACT OR GRANT NUMBER(s) E. Sudaryanto Wreksomindojo " " Major, Indonesia Army _ -." -** PERFORMING 10

  18. In defense of psychosomatic theory: a critical analysis of Allison and Heshka's critical analysis.

    Science.gov (United States)

    Van Strien, T

    1995-04-01

    This article analyses Allison and Heshka's (Internal Journal of Eating Disorders, 13, 289-295, 1993.) critical analysis of studies supporting psychosomatic theory. Questionned first is, Allison and Heshka's contention that the obese overreport emotional eating as a result of effects of demand characteristics, social desirability, and interpersonal expectancies. These effects, however, indicate that a more plausible response would be an underreport of emotional eating. Also addressed is Allison and Heshka's (Eating Disorders: The Journal of Treatment and Prevention, 1, 31-38, 1993.) contention that a high correlation between a measurement instrument and a measure of social desirability invalidates that measurement instrument. Finally, in a rebuttal of Allison and Heshka's critical analysis of studies supporting psychosomatic theory, it is elaborated why emotional eating explains so little variance in weight gain and obesity.

  19. Information theory applications for biological sequence analysis.

    Science.gov (United States)

    Vinga, Susana

    2014-05-01

    Information theory (IT) addresses the analysis of communication systems and has been widely applied in molecular biology. In particular, alignment-free sequence analysis and comparison greatly benefited from concepts derived from IT, such as entropy and mutual information. This review covers several aspects of IT applications, ranging from genome global analysis and comparison, including block-entropy estimation and resolution-free metrics based on iterative maps, to local analysis, comprising the classification of motifs, prediction of transcription factor binding sites and sequence characterization based on linguistic complexity and entropic profiles. IT has also been applied to high-level correlations that combine DNA, RNA or protein features with sequence-independent properties, such as gene mapping and phenotype analysis, and has also provided models based on communication systems theory to describe information transmission channels at the cell level and also during evolutionary processes. While not exhaustive, this review attempts to categorize existing methods and to indicate their relation with broader transversal topics such as genomic signatures, data compression and complexity, time series analysis and phylogenetic classification, providing a resource for future developments in this promising area.

  20. In defense of psychosomatic theory: A critical analysis of Allison and Heshkas critical analysis

    OpenAIRE

    van Strien, T.

    1995-01-01

    This article analyses Allison and Heshka's (International Journal of Eating Disorders, 13, 289–295, 1993.) critical analysis of studies supporting psychosomatic theory. Questionned first is, Allison and Heshka's contention that the obese overreport emotional eating as a result of effects of demand characteristics, social desirability, and interpersonal expectancies. These effects, however, indicate that a more plausible response would be an underreport of emotional eating. Also addressed is A...

  1. Simultaneous transcriptome analysis of Colletotrichum gloeosporioides and tomato fruit pathosystem reveals novel fungal pathogenicity and fruit defense strategies.

    Science.gov (United States)

    Alkan, Noam; Friedlander, Gilgi; Ment, Dana; Prusky, Dov; Fluhr, Robert

    2015-01-01

    The fungus Colletotrichum gloeosporioides breaches the fruit cuticle but remains quiescent until fruit ripening signals a switch to necrotrophy, culminating in devastating anthracnose disease. There is a need to understand the distinct fungal arms strategy and the simultaneous fruit response. Transcriptome analysis of fungal-fruit interactions was carried out concurrently in the appressoria, quiescent and necrotrophic stages. Conidia germinating on unripe fruit cuticle showed stage-specific transcription that was accompanied by massive fruit defense responses. The subsequent quiescent stage showed the development of dendritic-like structures and swollen hyphae within the fruit epidermis. The quiescent fungal transcriptome was characterized by activation of chromatin remodeling genes and unsuspected environmental alkalization. Fruit response was portrayed by continued highly integrated massive up-regulation of defense genes. During cuticle infection of green or ripe fruit, fungi recapitulate the same developmental stages but with differing quiescent time spans. The necrotrophic stage showed a dramatic shift in fungal metabolism and up-regulation of pathogenicity factors. Fruit response to necrotrophy showed activation of the salicylic acid pathway, climaxing in cell death. Transcriptome analysis of C. gloeosporioides infection of fruit reveals its distinct stage-specific lifestyle and the concurrent changing fruit response, deepening our perception of the unfolding fungal-fruit arms and defenses race.

  2. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    helping with formatting the final report iv ARMY INFORMATION OPERATIONS OFFICER NEEDS ANALYSIS REPORT EXECUTIVE SUMMARY Research...time.” One IO officer suggested the IPO try to get a access the database that has all the old APA reports archived as a way to look at assessment

  3. Enhancing genomics information retrieval through dimensional analysis.

    Science.gov (United States)

    Hu, Qinmin; Huang, Jimmy Xiangji

    2013-06-01

    We propose a novel dimensional analysis approach to employing meta information in order to find the relationships within the unstructured or semi-structured document/passages for improving genomics information retrieval performance. First, we make use of the auxiliary information as three basic dimensions, namely "temporal", "journal", and "author". The reference section is treated as a commensurable quantity of the three basic dimensions. Then, the sample space and subspaces are built up and a set of events are defined to meet the basic requirement of dimensional homogeneity to be commensurable quantities. After that, the classic graph analysis algorithm in the Web environments is applied on each dimension respectively to calculate the importance of each dimension. Finally, we integrate all the dimension networks and re-rank the outputs for evaluation. Our experimental results show the proposed approach is superior and promising.

  4. Patterns of Creation and Discovery: An Analysis of Defense Laboratory Patenting and Innovation

    Science.gov (United States)

    2013-01-01

    expensive scientific instruments like the Superconducting Super Collider or the Large Hadron Collider (e.g. Office of Technology Assessment (1991)), as...ggplot2: Elegant Graphics for Data Analysis (2nd ed.). Springer. Widavsky, A. B. (1987). Speaking Truth to Power: The Art and Policy Analisis ...major investment in resources requiring determining the sample frame, gathering contact information, developing the survey instrument , and following

  5. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  6. Gap analysis: transition of health care from Department of Defense to Department of Veterans Affairs.

    Science.gov (United States)

    Randall, Marjorie J

    2012-01-01

    This study examined the effectiveness of Public Law 110-181, "National Defense Authorization Act of Fiscal Year 2008, Title XVI-Wounded Warriors Matter," as it relates to health care for returning Operation Enduring Freedom and Operation Iraqi Freedom (OEF/OIF) combat veterans. Specifically, it examined the gap between the time an OEF/OIF combat service member left active service and subsequently obtained health care within the Veteran Affairs (VA) Healthcare System, and which factors influenced or impeded the veteran from obtaining health care sooner. Data were collected from 376 OEF/OIF combat veterans who sought health care at the Nashville or Murfreesboro VA Medical Centers. A questionnaire was designed exclusively for this study. The average time gap for an OEF/OIF combat veteran to transition from Department of Defense to VA health care was 3.83 months (SD 7.17). Twenty-six percent of respondents reported there were factors that impeded them from coming to the VA sooner. Factors included lack of knowledge about VA benefits, transportation/distance, perceptions of losing military career, seeking help as sign of weakness, and VA reputation. The study provided some evidence to support that Department of Defense and VA are meeting mandates for providing seamless transition of health care set forth by "Public Law 110-181, National Defense Authorization Act of Fiscal Year 2008."

  7. Analysis of rhizosphere bacterial communities in Arabidopsis: impact of plant defense signaling

    NARCIS (Netherlands)

    Doornbos, R.F.

    2009-01-01

    In the rhizosphere, numerous microbial and plant-microbe interactions occur. Of special interest is the ability of specific rhizosphere bacteria to elicit induced systemic resistance (ISR), a state of enhanced defensive capacity of the plant that is effective against a wide range of pathogens. The g

  8. Transcriptome Analysis Reveals Candidate Genes involved in Blister Blight defense in Tea (Camellia sinensis (L) Kuntze)

    Science.gov (United States)

    Jayaswall, Kuldip; Mahajan, Pallavi; Singh, Gagandeep; Parmar, Rajni; Seth, Romit; Raina, Aparnashree; Swarnkar, Mohit Kumar; Singh, Anil Kumar; Shankar, Ravi; Sharma, Ram Kumar

    2016-07-01

    To unravel the molecular mechanism of defense against blister blight (BB) disease caused by an obligate biotrophic fungus, Exobasidium vexans, transcriptome of BB interaction with resistance and susceptible tea genotypes was analysed through RNA-seq using Illumina GAIIx at four different stages during ~20-day disease cycle. Approximately 69 million high quality reads were assembled de novo, yielding 37,790 unique transcripts with more than 55% being functionally annotated. Differentially expressed, 149 defense related transcripts/genes, namely defense related enzymes, resistance genes, multidrug resistant transporters, transcription factors, retrotransposons, metacaspases and chaperons were observed in RG, suggesting their role in defending against BB. Being present in the major hub, putative master regulators among these candidates were identified from predetermined protein-protein interaction network of Arabidopsis thaliana. Further, confirmation of abundant expression of well-known RPM1, RPS2 and RPP13 in quantitative Real Time PCR indicates salicylic acid and jasmonic acid, possibly induce synthesis of antimicrobial compounds, required to overcome the virulence of E. vexans. Compendiously, the current study provides a comprehensive gene expression and insights into the molecular mechanism of tea defense against BB to serve as a resource for unravelling the possible regulatory mechanism of immunity against various biotic stresses in tea and other crops.

  9. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    Science.gov (United States)

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  10. Relationships among CFTR expression, HCO3- secretion, and host defense may inform gene- and cell-based cystic fibrosis therapies.

    Science.gov (United States)

    Shah, Viral S; Ernst, Sarah; Tang, Xiao Xiao; Karp, Philip H; Parker, Connor P; Ostedgaard, Lynda S; Welsh, Michael J

    2016-05-10

    Cystic fibrosis (CF) is caused by mutations in the gene encoding the cystic fibrosis transmembrane conductance regulator (CFTR) anion channel. Airway disease is the major source of morbidity and mortality. Successful implementation of gene- and cell-based therapies for CF airway disease requires knowledge of relationships among percentages of targeted cells, levels of CFTR expression, correction of electrolyte transport, and rescue of host defense defects. Previous studies suggested that, when ∼10-50% of airway epithelial cells expressed CFTR, they generated nearly wild-type levels of Cl(-) secretion; overexpressing CFTR offered no advantage compared with endogenous expression levels. However, recent discoveries focused attention on CFTR-mediated HCO3 (-) secretion and airway surface liquid (ASL) pH as critical for host defense and CF pathogenesis. Therefore, we generated porcine airway epithelia with varying ratios of CF and wild-type cells. Epithelia with a 50:50 mix secreted HCO3 (-) at half the rate of wild-type epithelia. Likewise, heterozygous epithelia (CFTR(+/-) or CFTR(+/∆F508)) expressed CFTR and secreted HCO3 (-) at ∼50% of wild-type values. ASL pH, antimicrobial activity, and viscosity showed similar relationships to the amount of CFTR. Overexpressing CFTR increased HCO3 (-) secretion to rates greater than wild type, but ASL pH did not exceed wild-type values. Thus, in contrast to Cl(-) secretion, the amount of CFTR is rate-limiting for HCO3 (-) secretion and for correcting host defense abnormalities. In addition, overexpressing CFTR might produce a greater benefit than expressing CFTR at wild-type levels when targeting small fractions of cells. These findings may also explain the risk of airway disease in CF carriers.

  11. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  12. Advanced materials: Information and analysis needs

    Energy Technology Data Exchange (ETDEWEB)

    Curlee, T.R.; Das, S.; Lee, R.; Trumble, D.

    1990-09-01

    This report presents the findings of a study to identify the types of information and analysis that are needed for advanced materials. The project was sponsored by the US Bureau of Mines (BOM). It includes a conceptual description of information needs for advanced materials and the development and implementation of a questionnaire on the same subject. This report identifies twelve fundamental differences between advanced and traditional materials and discusses the implications of these differences for data and analysis needs. Advanced and traditional materials differ significantly in terms of physical and chemical properties. Advanced material properties can be customized more easily. The production of advanced materials may differ from traditional materials in terms of inputs, the importance of by-products, the importance of different processing steps (especially fabrication), and scale economies. The potential for change in advanced materials characteristics and markets is greater and is derived from the marriage of radically different materials and processes. In addition to the conceptual study, a questionnaire was developed and implemented to assess the opinions of people who are likely users of BOM information on advanced materials. The results of the questionnaire, which was sent to about 1000 people, generally confirm the propositions set forth in the conceptual part of the study. The results also provide data on the categories of advanced materials and the types of information that are of greatest interest to potential users. 32 refs., 1 fig., 12 tabs.

  13. Functional analysis of plant idioblasts (Myrosin cells) and their role in defense, development and growth.

    OpenAIRE

    Borgen, Birgit Hafeld

    2002-01-01

    Glucosinolates are natural plant products known as flavor compounds, cancerpreventing agents, and biopesticides. There is a strong interest in controlling the level of glucosinolates to improve flavor and nutritional qualities of food crops and to study the physiological role of glucosinolates in plants. The role of the myrosinaseglucosinolate system in plant defense-related reactions of Cruciferae is accepted. As metabolism of glucosinolates in healthy intact plants has been reported, this i...

  14. Analysis of methods. [information systems evolution environment

    Science.gov (United States)

    Mayer, Richard J. (Editor); Ackley, Keith A.; Wells, M. Sue; Mayer, Paula S. D.; Blinn, Thomas M.; Decker, Louis P.; Toland, Joel A.; Crump, J. Wesley; Menzel, Christopher P.; Bodenmiller, Charles A.

    1991-01-01

    Information is one of an organization's most important assets. For this reason the development and maintenance of an integrated information system environment is one of the most important functions within a large organization. The Integrated Information Systems Evolution Environment (IISEE) project has as one of its primary goals a computerized solution to the difficulties involved in the development of integrated information systems. To develop such an environment a thorough understanding of the enterprise's information needs and requirements is of paramount importance. This document is the current release of the research performed by the Integrated Development Support Environment (IDSE) Research Team in support of the IISEE project. Research indicates that an integral part of any information system environment would be multiple modeling methods to support the management of the organization's information. Automated tool support for these methods is necessary to facilitate their use in an integrated environment. An integrated environment makes it necessary to maintain an integrated database which contains the different kinds of models developed under the various methodologies. In addition, to speed the process of development of models, a procedure or technique is needed to allow automatic translation from one methodology's representation to another while maintaining the integrity of both. The purpose for the analysis of the modeling methods included in this document is to examine these methods with the goal being to include them in an integrated development support environment. To accomplish this and to develop a method for allowing intra-methodology and inter-methodology model element reuse, a thorough understanding of multiple modeling methodologies is necessary. Currently the IDSE Research Team is investigating the family of Integrated Computer Aided Manufacturing (ICAM) DEFinition (IDEF) languages IDEF(0), IDEF(1), and IDEF(1x), as well as ENALIM, Entity

  15. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    Science.gov (United States)

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  16. Department of Defense Cost Analysis Symposium (26th) on Cost Analysis in an Uncertain Defense Environment Held in Washington, DC on 9-11 September 1992

    Science.gov (United States)

    1992-09-09

    ANALYSIS SYMPOSIUM BANQUET MENU Garden Salad Combination Entree: Roast Prime Rib of Beef, Au Jus and Grilled Pacific Swordfish with Herbed Butter...Acosta, Ph.D. Directorate for Systems & Cost Analysis U.S. Army Aviation Systems Command St. Louis, Missourii (314) 263-1184 U I I USING SEER- SEX ; A...review of past research has generally shown a positive linkage between TQM and profits. However, this past research was qualitative in nature and

  17. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  18. An analysis of the effect of STEM initiatives on socially responsible diversity management in the US aerospace and defense industry

    Science.gov (United States)

    Johnson-Oliver, Patrick

    Workforce diversity is a growing concern at a global level and enlightened economic self-interest and corporate image compels industries to leverage it as a competitive advantage. The US aerospace and defense industry (US ADI) addresses workforce diversity through socially responsible diversity management. Prior research into the topic of approaching workforce diversity as a business rationale and a moral imperative has been limited. Scharmer and Kaufer's (2013) Theory U guided this longitudinal explanatory quantitative study, leading from the future as it emerged relative to socially responsible diversity management to compel industry to remove blind spots and co-create an economy that benefits all by promoting workforce diversity as a dual agenda. This study filled a research gap investigating the business case for diversity as a dual agenda in aerospace industry science, technology, engineering, and mathematics (STEM) disciplines. The study also investigated the America COMPETES Act as a moderator of the relationship between historically black colleges and universities (HBCUs) and industry. Data was retrieved for secondary data analysis from the National Science Foundation (NSF) and other public government services and agency websites. Two hypotheses were tested using quantitative analysis including descriptive statistics, linear regression, ANOVA, and two factor analysis. The statistical results were analyzed and deductive logic employed to develop conclusions for the study. There was a significant relationship found between both predictors and socially responsible diversity management. The results reinforce the necessity for the aerospace defense industry to promote the dual agenda of the business case for diversity as complementary; not as competing mandates.

  19. Information analysis for modeling and representation of meaning

    OpenAIRE

    Uda, Norihiko

    1994-01-01

    In this dissertation, information analysis and an information model called the Semantic Structure Model based on information analysis are explained for semantic processing. Methods for self organization of information are also described. In addition, Information-Base Systems for thinking support of research and development in non linear optical materials are explained. As a result of information analysis, general properties of information and structural properties of concepts become clear. Ge...

  20. Magnitude estimation and runout analysis of a rockslide for the construction of a defensive structure

    Science.gov (United States)

    Gigli, G.; Casagli, N.; Lombardi, L.; Nocentini, M.; Balducci, M.; Venanti, L.

    2009-04-01

    to the greater lateral friction in the western portion of the wedge. This deformational behaviour has been confirmed by a wireless real time monitoring system installed for the time of failure forecast. Laboratory tests and stability analyses of the unstable wedge allowed us to hypothesize a sudden and brittle failure behavior, which can be associated to a long runout distance. Both empirical (energy line approach) and numerical methods (DAN-W and DAN3D softwares) were employed for estimating the runout distance and debris intensity distribution associated with the failure of the main block. The results of this analysis indicate that the potential rockslide will likely reach the nearest road. The estimated velocity, debris depth, and kinetic energy of the moving mass can be used to project defensive structures at the base of the artificial slope.

  1. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  2. Improving information retrieval in functional analysis.

    Science.gov (United States)

    Rodriguez, Juan C; González, Germán A; Fresno, Cristóbal; Llera, Andrea S; Fernández, Elmer A

    2016-12-01

    Transcriptome analysis is essential to understand the mechanisms regulating key biological processes and functions. The first step usually consists of identifying candidate genes; to find out which pathways are affected by those genes, however, functional analysis (FA) is mandatory. The most frequently used strategies for this purpose are Gene Set and Singular Enrichment Analysis (GSEA and SEA) over Gene Ontology. Several statistical methods have been developed and compared in terms of computational efficiency and/or statistical appropriateness. However, whether their results are similar or complementary, the sensitivity to parameter settings, or possible bias in the analyzed terms has not been addressed so far. Here, two GSEA and four SEA methods and their parameter combinations were evaluated in six datasets by comparing two breast cancer subtypes with well-known differences in genetic background and patient outcomes. We show that GSEA and SEA lead to different results depending on the chosen statistic, model and/or parameters. Both approaches provide complementary results from a biological perspective. Hence, an Integrative Functional Analysis (IFA) tool is proposed to improve information retrieval in FA. It provides a common gene expression analytic framework that grants a comprehensive and coherent analysis. Only a minimal user parameter setting is required, since the best SEA/GSEA alternatives are integrated. IFA utility was demonstrated by evaluating four prostate cancer and the TCGA breast cancer microarray datasets, which showed its biological generalization capabilities.

  3. Deep sequencing analysis reveals a TMV mutant with a poly(A) tract reduces host defense responses in Nicotiana benthamiana.

    Science.gov (United States)

    Guo, Song; Wong, Sek-Man

    2017-07-15

    Tobacco mosaic virus (TMV) possesses an upstream pseudoknotted domain (UPD), which is important for replication. After substituting the UPD with an internal poly(A) tract (43 nt), a mutant TMV-43A was constructed. TMV-43A replicated slower than TMV and induced a non-lethal mosaic symptom in Nicotiana benthamiana. In this study, deep sequencing was performed to detect the differences of small RNA profiles between TMV- and TMV-43A-infected N. benthamiana. The results showed that TMV-43A produced lesser amount of virus-derived interfering RNAs (vsiRNAs) than that of TMV. However, the distributions of vsiRNAs generation hotspots between TMV and TMV-43A were similar. Expression of genes related to small RNA biogenesis in TMV-43A-infected N. benthamiana was significantly lower than that of TMV, which leads to generation of lesser vsiRNAs. The expressions of host defense response genes were up-regulated after TMV infection, as compared to TMV-43A-infected plants. Host defense response to TMV-43A infection was lower than that to TMV. The absence of UPD might contribute to the reduced host response to TMV-43A. Our study provides valuable information in the role of the UPD in eliciting host response genes after TMV infection in N. benthamiana. (187 words). Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.

  5. Exploiting salient semantic analysis for information retrieval

    Science.gov (United States)

    Luo, Jing; Meng, Bo; Quan, Changqin; Tu, Xinhui

    2016-11-01

    Recently, many Wikipedia-based methods have been proposed to improve the performance of different natural language processing (NLP) tasks, such as semantic relatedness computation, text classification and information retrieval. Among these methods, salient semantic analysis (SSA) has been proven to be an effective way to generate conceptual representation for words or documents. However, its feasibility and effectiveness in information retrieval is mostly unknown. In this paper, we study how to efficiently use SSA to improve the information retrieval performance, and propose a SSA-based retrieval method under the language model framework. First, SSA model is adopted to build conceptual representations for documents and queries. Then, these conceptual representations and the bag-of-words (BOW) representations can be used in combination to estimate the language models of queries and documents. The proposed method is evaluated on several standard text retrieval conference (TREC) collections. Experiment results on standard TREC collections show the proposed models consistently outperform the existing Wikipedia-based retrieval methods.

  6. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  7. Transcriptional Analysis of The Adaptive Digestive System of The Migratory Locust in Response to Plant Defensive Protease Inhibitors

    Science.gov (United States)

    Spit, Jornt; Holtof, Michiel; Badisco, Liesbet; Vergauwen, Lucia; Vogel, Elise; Knapen, Dries; vanden Broeck, Jozef

    2016-09-01

    Herbivorous insects evolved adaptive mechanisms to compensate for the presence of plant defensive protease inhibitors (PI) in their food. The underlying regulatory mechanisms of these compensatory responses remain largely elusive. In the current study, we investigated the initiation of this adaptive response in the migratory locust, Locusta migratoria, via microarray analysis of gut tissues. Four hours after dietary uptake of PIs, 114 and 150 transcripts were respectively found up- or downregulated. The results suggest a quick trade-off between compensating for potential loss of digestive activity on the one hand, and stress tolerance, defense, and structural integrity of the gut on the other hand. We additionally addressed the role of a group of related upregulated hexamerin-like proteins in the PI-induced response. Simultaneous knockdown of corresponding transcripts by means of RNA interference resulted in a reduced capacity of the locust nymphs to cope with the effects of PI. Moreover, since insect hexamerins have been shown to bind Juvenile Hormone (JH), we also investigated the effect of JH on the proteolytic digestion in L. migratoria. Our results indicate that JH has a stimulatory effect on the expression of three homologous chymotrypsin genes, while knocking down the JH receptor (methoprene tolerant) led to opposite effects.

  8. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  9. Modeling uncertainty in geographic information and analysis

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Uncertainty modeling and data quality for spatial data and spatial analyses are im-portant topics in geographic information science together with space and time in geography,as well as spatial analysis. In the past two decades,a lot of efforts have been made to research the uncertainty modeling for spatial data and analyses. This paper presents our work in the research. In particular,four progresses in the re-search are given out: (a) from determinedness-to uncertainty-based representation of geographic objects in GIS; (b) from uncertainty modeling for static data to dy-namic spatial analyses; (c) from modeling uncertainty for spatial data to models; and (d) from error descriptions to quality control for spatial data.

  10. Formal Concept Analysis for Information Retrieval

    CERN Document Server

    Qadi, Abderrahim El; Ennouary, Yassine

    2010-01-01

    In this paper we describe a mechanism to improve Information Retrieval (IR) on the web. The method is based on Formal Concepts Analysis (FCA) that it is makes semantical relations during the queries, and allows a reorganizing, in the shape of a lattice of concepts, the answers provided by a search engine. We proposed for the IR an incremental algorithm based on Galois lattice. This algorithm allows a formal clustering of the data sources, and the results which it turns over are classified by order of relevance. The control of relevance is exploited in clustering, we improved the result by using ontology in field of image processing, and reformulating the user queries which make it possible to give more relevant documents.

  11. Astrophysical data analysis with information field theory

    Energy Technology Data Exchange (ETDEWEB)

    Enßlin, Torsten, E-mail: ensslin@mpa-garching.mpg.de [Max Planck Institut für Astrophysik, Karl-Schwarzschild-Straße 1, D-85748 Garching, Germany and Ludwig-Maximilians-Universität München, Geschwister-Scholl-Platz 1, D-80539 München (Germany)

    2014-12-05

    Non-parametric imaging and data analysis in astrophysics and cosmology can be addressed by information field theory (IFT), a means of Bayesian, data based inference on spatially distributed signal fields. IFT is a statistical field theory, which permits the construction of optimal signal recovery algorithms. It exploits spatial correlations of the signal fields even for nonlinear and non-Gaussian signal inference problems. The alleviation of a perception threshold for recovering signals of unknown correlation structure by using IFT will be discussed in particular as well as a novel improvement on instrumental self-calibration schemes. IFT can be applied to many areas. Here, applications in in cosmology (cosmic microwave background, large-scale structure) and astrophysics (galactic magnetism, radio interferometry) are presented.

  12. Astrophysical data analysis with information field theory

    CERN Document Server

    Enßlin, Torsten

    2014-01-01

    Non-parametric imaging and data analysis in astrophysics and cosmology can be addressed by information field theory (IFT), a means of Bayesian, data based inference on spatially distributed signal fields. IFT is a statistical field theory, which permits the construction of optimal signal recovery algorithms. It exploits spatial correlations of the signal fields even for nonlinear and non-Gaussian signal inference problems. The alleviation of a perception threshold for recovering signals of unknown correlation structure by using IFT will be discussed in particular as well as a novel improvement on instrumental self-calibration schemes. IFT can be applied to many areas. Here, applications in in cosmology (cosmic microwave background, large-scale structure) and astrophysics (galactic magnetism, radio interferometry) are presented.

  13. Center for information management and intelligence of the School of Public Legal Defense of the State of Bahia

    Directory of Open Access Journals (Sweden)

    Barbara Coelho Neves

    2012-04-01

    Full Text Available This paper presents the experience report about the implementation of the Center for Information Management and Intelligence administered by the Library of the Public Defender of the State of Bahia. The Center aims to corroborate the information stock, based on capturing the tacit knowledge of public Defenders of DPE. Aspires to social inclusion and the preservation of memory used in human rights activities defensoriais developed. The biggest benefit of creating the Center for Information Management and Intelligence is to provide the availability of information gained by the defenders in a structured way, to all persons interested in the topics defensoriais seized through legal experiences, conferences, training courses, seminars, workshops , Among others. The Center for Information Management and Intelligence of the DPE Library is an important way to efficiently connect "those who know" with those who "need to know" and converting personal knowledge into the organization's memory. For this, the proposal develops the collection, storage, management and dissemination of knowledge with a methodology based on models of the authors Nonaka and Takeuchi, with the help of teenagers "apprentices" in fulfillment of socio-educational measure the Mother City Foundation.

  14. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  15. 76 FR 64960 - Extension of Agency Information Collection Activity Under OMB Review: Flight Crew Self-Defense...

    Science.gov (United States)

    2011-10-19

    ... Management and Budget (OMB) control number 1652-0028, abstracted below to OMB for review and approval of an... using appropriate automated, electronic, mechanical, or other technological collection techniques or... the registration information against a sign-in sheet provided in the classroom. TSA also...

  16. Department of Defense Energy and Logistics: Implications of Historic and Future Cost, Risk, and Capability Analysis

    Science.gov (United States)

    Tisa, Paul C.

    Every year the DoD spends billions satisfying its large petroleum demand. This spending is highly sensitive to uncontrollable and poorly understood market forces. Additionally, while some stakeholders may not prioritize its monetary cost and risk, energy is fundamentally coupled to other critical factors. Energy, operational capability, and logistics are heavily intertwined and dependent on uncertain security environment and technology futures. These components and their relationships are less understood. Without better characterization, future capabilities may be significantly limited by present-day acquisition decisions. One attempt to demonstrate these costs and risks to decision makers has been through a metric known as the Fully Burdened Cost of Energy (FBCE). FBCE is defined as the commodity price for fuel plus many of these hidden costs. The metric encouraged a valuable conversation and is still required by law. However, most FBCE development stopped before the lessons from that conversation were incorporated. Current implementation is easy to employ but creates little value. Properly characterizing the costs and risks of energy and putting them in a useful tradespace requires a new framework. This research aims to highlight energy's complex role in many aspects of military operations, the critical need to incorporate it in decisions, and a novel framework to do so. It is broken into five parts. The first describes the motivation behind FBCE, the limits of current implementation, and outlines a new framework that aids decisions. Respectively, the second, third, and fourth present a historic analysis of the connections between military capabilities and energy, analyze the recent evolution of this conversation within the DoD, and pull the historic analysis into a revised framework. The final part quantifies the potential impacts of deeply uncertain futures and technological development and introduces an expanded framework that brings capability, energy, and

  17. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

    Science.gov (United States)

    2016-04-30

    Szafran Abstract Acquisition data lay the foundational role for decision-making, management , and oversight of the weapon-systems acquisition...2015). This data- management strategy fails to address the complete managerial prerogatives of the USD(AT&L) and the Better Buying Power initiatives...with information managers and our literature review on Master Data Management found that data governance plays a key role in the success of acquisition

  18. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    OpenAIRE

    Mihai-Gabriel IONITA; Victor-Valeriu PATRICIU

    2016-01-01

    Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices aroun...

  19. Department of Defense Technical Architecture Framework for Information Management. Volume 1-8: Overview. Version 3.0.

    Science.gov (United States)

    1996-04-30

    Portability Guide (XPG), an open environment based on standards. X/Open also brands products. Volume 4 DoD Standards-Based Architecture Version 3.0...Open Portability Guide (XPG), an open environment based on standards. X/Open also brands products. Volume 4 DoD Standards-Based Architecture Version...Interface Style Guide 30 April 1996 Nes, F. 1986. "Space, Color, and Typography on Visual Display Terminals." Behavior and Information Technology 5(2

  20. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  1. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections.

  2. Defense Travel System: An Analysis of the System’s Reservation Module

    Science.gov (United States)

    2008-03-01

    Weekly, 63(6), 20-20. Retrieved October 19, 2007, from EBSCOhost Research database . Margasak, Larry. (2006, November). Pentagon Travel System...was supposed to capture all flights information in the database . The problem with this process is that it is not reliable. The commercial product...arrival/departure times, flight routes, airports, connecting flights, etc.). 4 Travel database that contains applicable flight and airfare information

  3. Engineering the Business of Defense Acquisition: An Analysis of Program Office Processes

    Science.gov (United States)

    2015-04-30

    5000.02. While it is important to better understand the interactions and decision-making that occurs within a program office, the dependent nature... Amaral & Uzzi, 2007). Specialization has a limiting function, in that the specialists in a PMO are measured by, and capable of addressing only...varies depending on the nature of the internal formal and informal processes. Eisenhardt (1989) noted that more information, considered simultaneously

  4. Networking Effect Analysis of Ship-Airplane Cooperating Air Defense System%舰机协同防空体系网络化效应分析

    Institute of Scientific and Technical Information of China (English)

    陈国生; 刘钢; 贾子英

    2011-01-01

    针对舰机海上协同防空作战体系网络化效应难以度量的问题,提出舰机协同组网概念,建立舰机协同组网网络环模型.将舰机协同防空区域进行划分,通过核心子网络在不同防空区域的转移以及邻接矩阵Perron-Frobenius特征值(PFE)的计算,分析了舰机协同防空体系的网络化效应.该分析方法简单,将其应用在舰机协同防空体系网络化效应分析是有效的.%To solve the question of measuring networking effect for ship-airplane cooperating air defense system, the definition of ship-airplane cooperating networking is proposed, and the networking loop model of ship-airplane cooperating networking is established. The ship-airplane cooperating air defense area is divided, through the core sub-networking shifting in different air defense area and the computation of adjoin matrix Perron-Frobeniu eigenvalue(PFE), the networking effect of ship-airplane cooperating air defense system is analyzed. This analysis method is simple and effective on analyzing networking effect of ship-airplane cooperating air defense system.

  5. The Influence of Organisational Defensive Patterns on Innovation Capacity and Learning of Information and Communication Technology: An Empirical Study in Hong Kong Transport Sector

    Science.gov (United States)

    Yau, Hon Keung; Cheng, Alison Lai Fong

    2010-01-01

    Organisational defensive patterns, including skilled incompetence, organisational defensive routines and fancy footwork, are considered to be a hindrance to effective learning and innovation capacity building in all organisations. The purpose of this research is to investigate: 1) the perceptions of the influence of organisational defensive…

  6. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  7. The System of Demand Analysis for URAV Based on Offense and Defense

    Directory of Open Access Journals (Sweden)

    Guodong Jin

    2013-01-01

    Full Text Available Because of its advantage of zero casualties Unmanned Reconnaissance Aerial Vehicle (URAV plays an important role in battlefield monitoring and information acquiring, thus caught great attention of the world. URAV is developed fast in our country, yet no scientific assessment methods was ever given due to different fight needs of armed forces. Considering demand of the missile artillery about the martial information, the model of information requirement of combat force, reconnaissance ability of URAV, survivability of URAV, and task reliability of URAV were constructed respectively. Synthesizing mathematic models above, the model of developing demand was constructed about URAV equipment. It simulated and calculated some URAV equipment developing scales, and explores a way of settling the problem of URAV equipment developing demand.

  8. An Economic Analysis of Commercially Based Tactical Vehicles Acquisition for the Department of Defense

    Science.gov (United States)

    2001-12-01

    item is based on market research and analysis of the marketplace. Through in-depth market research, the agency must determine to what extent... research and analysis shall be conducted to determine the availability, suitability, operational supportability, interoperability, and ease of...access to commercial markets with increased competition, better prices, new market entrants, and access to leading edge technology. However, market

  9. Modeling and Analysis of Information Product Maps

    Science.gov (United States)

    Heien, Christopher Harris

    2012-01-01

    Information Product Maps are visual diagrams used to represent the inputs, processing, and outputs of data within an Information Manufacturing System. A data unit, drawn as an edge, symbolizes a grouping of raw data as it travels through this system. Processes, drawn as vertices, transform each data unit input into various forms prior to delivery…

  10. Comprehensive analysis of information dissemination in disasters

    Science.gov (United States)

    Zhang, N.; Huang, H.; Su, Boni

    2016-11-01

    China is a country that experiences a large number of disasters. The number of deaths caused by large-scale disasters and accidents in past 10 years is around 900,000. More than 92.8 percent of these deaths could be avoided if there were an effective pre-warning system deployed. Knowledge of the information dissemination characteristics of different information media taking into consideration governmental assistance (information published by a government) in disasters in urban areas, plays a critical role in increasing response time and reducing the number of deaths and economic losses. In this paper we have developed a comprehensive information dissemination model to optimize efficiency of pre-warning mechanics. This model also can be used for disseminating information for evacuees making real-time evacuation plans. We analyzed every single information dissemination models for pre-warning in disasters by considering 14 media: short message service (SMS), phone, television, radio, news portals, Wechat, microblogs, email, newspapers, loudspeaker vehicles, loudspeakers, oral communication, and passive information acquisition via visual and auditory senses. Since governmental assistance is very useful in a disaster, we calculated the sensitivity of governmental assistance ratio. The results provide useful references for information dissemination during disasters in urban areas.

  11. Information Retrieval Interaction: an Analysis of Models

    Directory of Open Access Journals (Sweden)

    Farahnaz Sadoughi

    2012-03-01

    Full Text Available Information searching process is an interactive process; thus users has control on searching process, and they can manage the results of the search process. In this process, user's question became more mature, according to retrieved results. In addition, on the side of the information retrieval system, there are some processes that could not be realized, unless by user. Practically, this issue, is egregious in “Interaction” -i.e. process of user connection to other system elements- and in “Relevance judgment”. This paper had a glance to existence of “Interaction” in information retrieval, in first. Then the tradition model of information retrieval and its strenght and weak points were reviewed. Finally, the current models of interactive information retrieval includes: Belkin episodic model, Ingwersen cognitive model, Sarasevic stratified model, and Spinks interactive feedback model were elucidated.

  12. Analysis of information systems for hydropower operations

    Science.gov (United States)

    Sohn, R. L.; Becker, L.; Estes, J.; Simonett, D.; Yeh, W. W. G.

    1976-01-01

    The operations of hydropower systems were analyzed with emphasis on water resource management, to determine how aerospace derived information system technologies can increase energy output. Better utilization of water resources was sought through improved reservoir inflow forecasting based on use of hydrometeorologic information systems with new or improved sensors, satellite data relay systems, and use of advanced scheduling techniques for water release. Specific mechanisms for increased energy output were determined, principally the use of more timely and accurate short term (0-7 days) inflow information to reduce spillage caused by unanticipated dynamic high inflow events. The hydrometeorologic models used in predicting inflows were examined to determine the sensitivity of inflow prediction accuracy to the many variables employed in the models, and the results used to establish information system requirements. Sensor and data handling system capabilities were reviewed and compared to the requirements, and an improved information system concept outlined.

  13. Türk Savunma Sanayi Firmaları Vizyon ve Misyon İfadelerinin İçerik Analizi (The Content Analysis of Vision and Mission Statements in Turkish Defense Industry Firms)

    OpenAIRE

    Metin OCAK; Murat GÜLER; H. Nejat BASIM

    2016-01-01

    In this research, components used in mission and vision statements by Turkish Defense Industry Firms and their relations with national defense industry guidance documents are examined. For this reason 87 vision and 79 mission statements which mentioned on the web pages of 148 Turkish Defense Industry Firms’ are taken into consideration. A qualitative research design phenomenology was used and the data were analyzed through content analysis in this study. At the end of the analy...

  14. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  15. A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

    Directory of Open Access Journals (Sweden)

    Rustu Yilmaz

    2016-05-01

    Full Text Available Universities are the leading institutions that are the sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every area. Therefore, universities are expected to be institutions where information and information management are used efficiently. In the present study, the topics such as infrastructure, operation, application, information, policy and human-based information security at universities were examined within the scope of the information security standards which are highly required and intended to be available at each university today, and then a comparative analysis was conducted specific to Turkey. Within the present study, the Microsoft Security Assessment Tool developed by Microsoft was used as the risk analysis tool. The analyses aim to enable the universities to compare their information systems with the information systems of other universities within the scope of the information security awareness, and to make suggestions in this regard.

  16. Global proteomic analysis of Chelidonium majus and Corydalis cava (Papaveraceae) extracts revealed similar defense-related protein compositions.

    Science.gov (United States)

    Nawrot, Robert; Zauber, Henrik; Schulze, Waltraud X

    2014-04-01

    Chelidonium majus and Corydalis cava are phylogenetically closely related (Papaveraceae family). The medicinal and pharmaceutical interest in these plants is based on their synthesis of pharmaceutically important compounds, such as alkaloids, flavonoids, phenolic acids and proteins. C. majus shoot and C. cava tuber extracts have been used in traditional folk medicine to treat many diseases, such as fungal, bacterial and viral infections, liver disorders, fever, post-traumatic, colic, abdominal and menstrual pains and even cancer. This study attempts to perform a global comparative proteomic analysis of pharmacologically important extracts from these two closely related unsequenced plant species to gain insights into the protein basis of these plant organs and to compare their common and specific proteomic compositions. We used a shotgun proteomic approach combined with label-free protein quantitation according to the exponentially modified protein abundance index (emPAI). In total, a mean number of 228 protein identification results were recorded in C. cava tuber extracts and about 1240 in C. majus shoot extracts. Comparative analysis revealed a similar stress and defense-related protein composition of pharmacologically active plant species and showed the presence of different pathogenesis-related and low molecular inducible antimicrobial peptides. These findings could form the basis for further elucidation of the mechanism of the strong pharmacological activities of these medicinal plant extracts. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Price Analysis on Commercial Item Purchases Within the Department of Defense

    Science.gov (United States)

    2013-10-02

    analysis supports the assertion from contracting personnel that they do not have adequate time to do proper price analysis. Competition, 34 Mkt ...Services) Competition Mkt Research Previous Prices Price List Similar Items CO’s Knowledge IGCE Any other basis Acquisition Research Program Graduate...Figure 22). 64 55 Total Number of Mkt Research Reports MRR in File No MRR in file NO YES Acquisition Research Program Graduate School of

  18. 78 FR 38096 - Fatality Analysis Reporting System Information Collection

    Science.gov (United States)

    2013-06-25

    ... Number NHTSA-2012-0168] Fatality Analysis Reporting System Information Collection AGENCY: National... comments on the following proposed collections of information: (1) Title: Fatal Analysis Reporting System... damage associated with motor vehicle accidents. The Fatality Analysis Reporting System (FARS) is a major...

  19. A Situational Analysis of Information Management in Selected ...

    African Journals Online (AJOL)

    A Situational Analysis of Information Management in Selected Government ... with respect to their ability to effectively manage information within the Vision 2030 ... projects to be implemented in six foundation areas of the Kenya Vision 2030, ...

  20. A Predictive Analysis of the Department of Defense Distribution System Utilizing Random Forests

    Science.gov (United States)

    2016-06-01

    Bremerton, WA Priority Material Office (PMO). He focuses on shipments to PACOM, United States Central Command (CENTCOM), United States European ...Slone, RE (2004) Leading a supply chain turnaround. Harvard Business Review . 82(10): 114–121. Therneau T, Atkinson B, Ripley B (2015) rpart. Recursive...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching

  1. Function analysis for waste information systems

    Energy Technology Data Exchange (ETDEWEB)

    Sexton, J.L.; Neal, C.T.; Heath, T.C.; Starling, C.D.

    1996-04-01

    This study has a two-fold purpose. It seeks to identify the functional requirements of a waste tracking information system and to find feasible alternatives for meeting those requirements on the Oak Ridge Reservation (ORR) and the Portsmouth (PORTS) and Paducah (PGDP) facilities; identify options that offer potential cost savings to the US government and also show opportunities for improved efficiency and effectiveness in managing waste information; and, finally, to recommend a practical course of action that can be immediately initiated. In addition to identifying relevant requirements, it also identifies any existing requirements that are currently not being completely met. Another aim of this study is to carry out preliminary benchmarking by contacting representative companies about their strategic directions in waste information. The information obtained from representatives of these organizations is contained in an appendix to the document; a full benchmarking effort, however, is beyond the intended scope of this study.

  2. Applying Galois compliance for data analysis in information systems

    Directory of Open Access Journals (Sweden)

    Kozlov Sergey

    2016-03-01

    Full Text Available The article deals with the data analysis in information systems. The author discloses the possibility of using Galois compliance to identify the characteristics of the information system structure. The author reveals the specificity of the application of Galois compliance for the analysis of information system content with the use of invariants of graph theory. Aspects of introduction of mathematical apparatus of Galois compliance for research of interrelations between elements of the adaptive training information system of individual testing are analyzed.

  3. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  4. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  5. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  6. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  7. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  8. Exploring health information technology education: an analysis of the research.

    Science.gov (United States)

    Virgona, Thomas

    2012-01-01

    This article is an analysis of the Health Information Technology Education published research. The purpose of this study was to examine selected literature using variables such as journal frequency, keyword analysis, universities associated with the research and geographic diversity. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of Health Information Technology. The keyword analysis suggests that Health Information Technology research has evolved from establishing concepts and domains of health information systems, technology and management to contemporary issues such as education, outsourcing, web services and security. The research findings have implications for educators, researchers, journal.

  9. Department of Defense In-House RDT&E Activities, FY97, Management Analysis Report

    Science.gov (United States)

    1998-05-01

    Radiography with Californium Source - Automatic Scanning Densitometer - X-omat Automatic Film Processor - Conventional Ultrasonics - Eddy Current...Inspection - Magnetic Particle Inspection - Computer Aided Ultrasonic Inspection - Holographic Interferometry - Impactoscope - Magnetic Flux Leakage...fracture analysis/prediction with National Institute of Standards and Technology (NIST). 16. Evaluate new periodontic and endodontic treatment

  10. Information Behavior of Defense Scientific and Technological Information Users Based on "S-R" Model%“S-R’模型的国防科技信息用户情报行为研究

    Institute of Scientific and Technical Information of China (English)

    雷帅

    2011-01-01

    针对国防科技信息用户情报行为研究问题,借助行为心理学中的“S-R”理论,在对其基本模型进行扩展的基础上构建出用户情报行为研究的扩展模型,从中挖掘出用户情报行为影响三要素,然后依据“S-R”扩展模型对国防科技信息用户情报行为进行分析。在分析的基础上,提出针对国防科技信息机构应对新形势挑战的三点启示。%To study the information behavior of defense scientific and technological information (DS&TI) users, draw support from the "S-R" theory of behavioristic psychology and build a "S-R" model for the study on information behavior of users through expanding th

  11. Sources of Weapon System Cost Growth. Analysis of 35 Major Defense Acquisition Programs

    Science.gov (United States)

    2008-01-01

    Resource Management Program of RAND Proj- iii ect AIR FORCE. The project’s technical monitor is Jay Jordan, Techni- cal Director of the Air Force Cost...and for his long-term support of Project AIR FORCE’s acquisi- tion and cost analysis research. Richard Hartley (SAF/FMC) and Jay Jordan from the Air...Wickman (1993), Tyson, Nelson, and Utech (1992), Shaw (1982), Tyson et al. (1989), Asher and Maggelet (1984), and Drezner et al. (1993) studied cost

  12. A Mathematical Analysis of Conflict Prevention Information

    Science.gov (United States)

    Maddalon, Jeffrey M.; Butler, Ricky W.; Munoz, Cesar A.; Dowek, Gilles

    2009-01-01

    In air traffic management, conflict prevention information refers to the guidance maneuvers, which if taken, ensure that an aircraft's path is conflict-free. These guidance maneuvers take the form of changes to track angle or ground speed. Conflict prevention information may be assembled into prevention bands that advise the crew on maneuvers that should not be taken. Unlike conflict resolution systems, which presume that the aircraft already has a conflict, conflict prevention systems show conflicts for any maneuver, giving the pilot confidence that if a maneuver is made, then no near-term conflicts will result. Because near-term conflicts can lead to safety concerns, strong verification of information correctness is required. This paper presents a mathematical framework to analyze the correctness of algorithms that produce conflict prevention information incorporating an arbitrary number of traffic aircraft and with both a near-term and intermediate-term lookahead times. The framework is illustrated with a formally verified algorithm for 2-dimensional track angle prevention bands.

  13. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  14. Disentangling detoxification: gene expression analysis of feeding mountain pine beetle illuminates molecular-level host chemical defense detoxification mechanisms.

    Science.gov (United States)

    Robert, Jeanne A; Pitt, Caitlin; Bonnett, Tiffany R; Yuen, Macaire M S; Keeling, Christopher I; Bohlmann, Jörg; Huber, Dezene P W

    2013-01-01

    The mountain pine beetle, Dendroctonus ponderosae, is a native species of bark beetle (Coleoptera: Curculionidae) that caused unprecedented damage to the pine forests of British Columbia and other parts of western North America and is currently expanding its range into the boreal forests of central and eastern Canada and the USA. We conducted a large-scale gene expression analysis (RNA-seq) of mountain pine beetle male and female adults either starved or fed in male-female pairs for 24 hours on lodgepole pine host tree tissues. Our aim was to uncover transcripts involved in coniferophagous mountain pine beetle detoxification systems during early host colonization. Transcripts of members from several gene families significantly increased in insects fed on host tissue including: cytochromes P450, glucosyl transferases and glutathione S-transferases, esterases, and one ABC transporter. Other significantly increasing transcripts with potential roles in detoxification of host defenses included alcohol dehydrogenases and a group of unexpected transcripts whose products may play an, as yet, undiscovered role in host colonization by mountain pine beetle.

  15. Disentangling detoxification: gene expression analysis of feeding mountain pine beetle illuminates molecular-level host chemical defense detoxification mechanisms.

    Directory of Open Access Journals (Sweden)

    Jeanne A Robert

    Full Text Available The mountain pine beetle, Dendroctonus ponderosae, is a native species of bark beetle (Coleoptera: Curculionidae that caused unprecedented damage to the pine forests of British Columbia and other parts of western North America and is currently expanding its range into the boreal forests of central and eastern Canada and the USA. We conducted a large-scale gene expression analysis (RNA-seq of mountain pine beetle male and female adults either starved or fed in male-female pairs for 24 hours on lodgepole pine host tree tissues. Our aim was to uncover transcripts involved in coniferophagous mountain pine beetle detoxification systems during early host colonization. Transcripts of members from several gene families significantly increased in insects fed on host tissue including: cytochromes P450, glucosyl transferases and glutathione S-transferases, esterases, and one ABC transporter. Other significantly increasing transcripts with potential roles in detoxification of host defenses included alcohol dehydrogenases and a group of unexpected transcripts whose products may play an, as yet, undiscovered role in host colonization by mountain pine beetle.

  16. Defense Technical Information Center Thesaurus

    Science.gov (United States)

    2000-10-01

    circuits+ Mycobacterium Myoneural junction Nanostructures BT Mycobacteriaceae+ use Neuromuscular transmission (1-JUL-1999) NT Mycobacterium leprae RT...Nanotechnology Mycobacterium tuberculosis Myopathy use all Muscles Nanotechnology Mycobacterium leprae Pathology (i-OCT-1995) BT Mycobacterium+ RT...Mycobacterium (5)Shigella dysenteriae (5)Mycobacterium leprae (5)Shigella flexneri (5)Mycobacterium tuberculosis (5)Shigella paradysenteriae (3

  17. Defense Healthcare Information Assurance Program

    Science.gov (United States)

    2001-06-01

    34* Computerized Patient Record Institute ( CPRI ) annual conference in Washington D.C. "* American Telemedicine Association (ATA) annual conference...TATRC) 3 May-00 Phoenix, AZ ATA Conference ATI I Awd + 4 Pittsburgh, PA IPR #1 ATI, SEI, ADL, 6 LMES, HOST, KRM, (TATRC) Jul-00 Washington, DC CPRI

  18. An Analysis of Second-Tier Arms Producing Countries’ Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    Science.gov (United States)

    2008-03-01

    and those that rem of offsets to establish a defense industrial base in the recipient country defense offsets extensively since the 1970s (Perlo...the British/French Jaguar, the British/German/ Italian Tornado, and the French/German Alpha Jet emerged from Thus, the U.S. succeeded in achieving...Other indications of Brazil’s failure to establish self- production which were discussed in Chapter II include the Italian and components to equip their

  19. Price Analysis on Commercial Items Purchases Within the Department of Defense

    Science.gov (United States)

    2014-04-30

    other basis, 5 Competition, 34 CO’s Knowledge, 4 IGCE, 30 Competition Mkt Research Previous Prices Mkt Research, 15 Similar Items, 26 Previous...used? 14 What price analysis methods are being used? 15 Competition, 34 Mkt  Research, 15 Previous Prices, 49 Price List, 14 Similar Items, 26 CO’s...Knowledge,  4 IGCE, 30 Any other basis, 5 Price Justification (Supply & Services) Competition Mkt  Research Previous Prices Price List Similar Items CO’s

  20. Natural Resource Information System, design analysis

    Science.gov (United States)

    1972-01-01

    The computer-based system stores, processes, and displays map data relating to natural resources. The system was designed on the basis of requirements established in a user survey and an analysis of decision flow. The design analysis effort is described, and the rationale behind major design decisions, including map processing, cell vs. polygon, choice of classification systems, mapping accuracy, system hardware, and software language is summarized.

  1. DEACTIVATION AND DECOMMISSIONING PLANNING AND ANALYSIS WITH GEOGRAPHIC INFORMATION SYSTEMS

    Energy Technology Data Exchange (ETDEWEB)

    Bollinger, J; William Austin, W; Larry Koffman, L

    2007-09-17

    From the mid-1950's through the 1980's, the U.S. Department of Energy's Savannah River Site produced nuclear materials for the weapons stockpile, for medical and industrial applications, and for space exploration. Although SRS has a continuing defense-related mission, the overall site mission is now oriented toward environmental restoration and management of legacy chemical and nuclear waste. With the change in mission, SRS no longer has a need for much of the infrastructure developed to support the weapons program. This excess infrastructure, which includes over 1000 facilities, will be decommissioned and demolished over the forthcoming years. Dispositioning facilities for decommissioning and deactivation requires significant resources to determine hazards, structure type, and a rough-order-of-magnitude estimate for the decommissioning and demolition cost. Geographic information systems (GIS) technology was used to help manage the process of dispositioning infrastructure and for reporting the future status of impacted facilities.

  2. Neurodynamics analysis of brain information transmission

    Institute of Scientific and Technical Information of China (English)

    Ru-bin WANG; Zhi-kang ZHANG; Chi K. Tse

    2009-01-01

    This paper proposes a model of neural networks consisting of populations of perceptive neurons, inter-neurons, and motor neurons according to the theory of stochastic phase resetting dynamics. According to this model, the dynamical characteristics of neural networks are studied in three coupling cases, namely, series and parallel coupling, series coupling, and unilateral coupling. The results show that the indentified structure of neural networks enables the basic characteristics of neural information processing to be described in terms of the actions of both the optional motor and the reflected motor. The excitation of local neural networks is caused by the action of the optional motor. In particular, the excitation of the neural population caused by the action of the optional motor in the motor cortex is larger than that caused by the action of the reflected motor. This phenomenon indicates that there are more neurons participating in the neural information processing and the excited synchronization motion under the action of the optional motor.

  3. Dissertation Defense: Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional validation by test only mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions.Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations. This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics predictions

  4. Dissertation Defense Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional "validation by test only" mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions. Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in "Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations". This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics

  5. Hydrogen Technical Analysis -- Dissemination of Information

    Energy Technology Data Exchange (ETDEWEB)

    George Kervitsky, Jr.

    2006-03-20

    SENTECH is a small energy and environmental consulting firm providing technical, analytical, and communications solutions to technology management issues. The activities proposed by SENTECH focused on gathering and developing communications materials and information, and various dissemination activities to present the benefits of hydrogen energy to a broad audience while at the same time establishing permanent communications channels to enable continued two-way dialog with these audiences in future years. Effective communications and information dissemination is critical to the acceptance of new technology. Hydrogen technologies face the additional challenge of safety preconceptions formed primarily as a result of the crash of the Hindenburg. Effective communications play a key role in all aspects of human interaction, and will help to overcome the perceptual barriers, whether of safety, economics, or benefits. As originally proposed SENTECH identified three distinct information dissemination activities to address three distinct but important audiences; these formed the basis for the task structure used in phases 1 and 2. The tasks were: (1) Print information--Brochures that target the certain segment of the population and will be distributed via relevant technical conferences and traditional distribution channels. (2) Face-to-face meetings--With industries identified to have a stake in hydrogen energy. The three industry audiences are architect/engineering firms, renewable energy firms, and energy companies that have not made a commitment to hydrogen (3) Educational Forums--The final audience is students--the future engineers, technicians, and energy consumers. SENTECH will expand on its previous educational work in this area. The communications activities proposed by SENTECH and completed as a result of this cooperative agreement was designed to compliment the research and development work funded by the DOE by presenting the technical achievements and validations

  6. Information architecture. Volume 2, Part 1: Baseline analysis summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The Department of Energy (DOE) Information Architecture, Volume 2, Baseline Analysis, is a collaborative and logical next-step effort in the processes required to produce a Departmentwide information architecture. The baseline analysis serves a diverse audience of program management and technical personnel and provides an organized way to examine the Department`s existing or de facto information architecture. A companion document to Volume 1, The Foundations, it furnishes the rationale for establishing a Departmentwide information architecture. This volume, consisting of the Baseline Analysis Summary (part 1), Baseline Analysis (part 2), and Reference Data (part 3), is of interest to readers who wish to understand how the Department`s current information architecture technologies are employed. The analysis identifies how and where current technologies support business areas, programs, sites, and corporate systems.

  7. Information architecture. Volume 2, Part 1: Baseline analysis summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The Department of Energy (DOE) Information Architecture, Volume 2, Baseline Analysis, is a collaborative and logical next-step effort in the processes required to produce a Departmentwide information architecture. The baseline analysis serves a diverse audience of program management and technical personnel and provides an organized way to examine the Department`s existing or de facto information architecture. A companion document to Volume 1, The Foundations, it furnishes the rationale for establishing a Departmentwide information architecture. This volume, consisting of the Baseline Analysis Summary (part 1), Baseline Analysis (part 2), and Reference Data (part 3), is of interest to readers who wish to understand how the Department`s current information architecture technologies are employed. The analysis identifies how and where current technologies support business areas, programs, sites, and corporate systems.

  8. Synthesis and analysis of three-dimensional video information

    Science.gov (United States)

    Katys, P. G.; Katys, Georgy P.

    2005-02-01

    The principles of design, the basis of functioning and characteristics of 3-dimensional (3D) visual information systems synthesis and analysis are analyzed. In the first part of paper the modern state of 3D video information synthesis and reproduction systems development is considered, like: stereoscopic, auto-stereoscopic, and holographic. In the second part the principles of machine-vision systems are considered, that the analysis of 3D video-information are realized.

  9. INFORMATION ARCHITECTURE ANALYSIS USING BUSINESS INTELLIGENCE TOOLS BASED ON THE INFORMATION NEEDS OF EXECUTIVES

    Directory of Open Access Journals (Sweden)

    Fabricio Sobrosa Affeldt

    2013-08-01

    Full Text Available Devising an information architecture system that enables an organization to centralize information regarding its operational, managerial and strategic performance is one of the challenges currently facing information technology. The present study aimed to analyze an information architecture system developed using Business Intelligence (BI technology. The analysis was performed based on a questionnaire enquiring as to whether the information needs of executives were met during the process. A theoretical framework was applied consisting of information architecture and BI technology, using a case study methodology. Results indicated that the transaction processing systems studied did not meet the information needs of company executives. Information architecture using data warehousing, online analytical processing (OLAP tools and data mining may provide a more agile means of meeting these needs. However, some items must be included and others modified, in addition to improving the culture of information use by company executives.

  10. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  11. The Role Of Contested And Uncontested Passes In Evaluating Defensive Basketball Efficiency

    Directory of Open Access Journals (Sweden)

    James T. Bartholomew

    2011-11-01

    Full Text Available The global economic impact of basketball is measured in tens of billions of dollars and requires the efficient use of resources to maximize success on and off the court. Today, coaches, players, investors, and owners need to take full advantage of modern analytical methods and digital video software capabilities to make the most efficient use of a team’s resources. This research is the first in a series that makes full use of modern analytic methods and begins to define new defensive and offensive criteria to supplement the decades old game box score performance information. Data envelopment analysis and statistical methods are used to evaluate two new defensive performance metrics on defensive efficiency. The two new defensive metrics are contested and uncontested passes that are fully defined in the article’s appendix. Future research will expand the sample size and allow for more comprehensive models of basketball team defensive efficiency.

  12. 基于不确定信息的无人机攻防博弈策略研究%Study on UAV Offensive/Defensive Game Strategy Based on Uncertain Information

    Institute of Scientific and Technical Information of China (English)

    陈侠; 刘敏; 胡永新

    2012-01-01

    The offensive/defensive problem of unmanned aerial vehicle (UAV) in an uncertain environment was presented by analyzing the uncertain information of target value and damage probability. An offensive/defensive payoff function of UAV in the case of uncertain information was established based on the information value of friend and enemy' s missiles, and the offensive/defensive game payoff matrix was built. The Nash equilibrium of the game was obtained by combining the particle swarm optimization algorithm and the interval number multiple attribute ranking method in the case of uncertain information. A new method for UAV offensive/defensive game to achieve optimal strategy was proposed. Finally the feasibility and effectiveness of the method was verified by simulation.%通过分析实际战场中目标价值和毁伤概率信息的不确定性,提出了不确定信息条件下需要解决的无人机(UAV)攻防博弈问题.以敌我双方发射导弹的价值信息为依据,建立基于不确定信息的多UAV攻防对抗的支付函数,构建攻防双方博弈支付矩阵.将粒子群算法和区间数多属性方案排序方法相结合,给出基于不确定信息下博弈纳什均衡求解方法,为不确定环境下UAV攻防博弈实现最优策略提供了新方法.最后,进行了仿真实验,验证了该方法的可行性和有效性.

  13. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  14. Information Systems Vulnerability: A Systems Analysis Perspective

    Science.gov (United States)

    1996-06-01

    D.F. Haasl, and F.F. Goldberg, “Fault Tree Handbook, ” NUREG -0492, U.S. Nuclear Regulatory Commission, Washington, D. C., January 1981. J.B. Dugan...Symposium, 1996. G.B. Varnado, W.H. Horton, and P.R. Lobner, “Modular Fault Tree Analysis Procedures Guide, ” SAND83-0963, NUREG /CR-3268, Prepared by...D.W. Whitehead, “Microcomputer Applications of and Modifications to the Modular Fault Trees, ” SAND89-1887, NUREG /CR-4838, Prepared by Sandia National

  15. On the DDoS defense mechanism analysis%关于DDoS防御机制分析

    Institute of Scientific and Technical Information of China (English)

    简校荣

    2013-01-01

      DDoS攻击是当前因特网面临的主要威胁之一。据相关统计显示,DDoS攻击在近年来的数量一直呈上升趋势,人们在实践中充分认识到了DDoS攻击的破坏性,其能够使得整个网络瘫痪好几个小时。随着诸如Trinoo、TFN2K等DDoS攻击工具的广泛传播,计算机网络在面临DDoS攻击方面的风险不断增加。本篇文章就这个对网络造成巨大威胁的DDoS进行了深入的研究,并科学分析了关于DDoS防御机制。%DDoS attack is one of the main threats in the current Internet. According to related statistics, DDoS attacks in recent years, the number has been on the upward trend, people fully understand the practice to devastating DDoS attacks, the paralysis of the entire network can be made several hours. With the widespread DDoS attack tools such as Trinoo, TFN2K, increasing the risk of computer network faced DDoS attacks. This article poses a great threat to the network DDoS-depth research and scientific analysis on DDoS defense mechanisms.

  16. Contaminant remediation decision analysis using information gap theory

    CERN Document Server

    Harp, Dylan R

    2011-01-01

    Decision making under severe lack of information is a ubiquitous situation in nearly every applied field of engineering, policy, and science. A severe lack of information precludes our ability to determine a frequency of occurrence of events or conditions that impact the decision; therefore, decision uncertainties due to a severe lack of information cannot be characterized probabilistically. To circumvent this problem, information gap (info-gap) theory has been developed to explicitly recognize and quantify the implications of information gaps in decision making. This paper presents a decision analysis based on info-gap theory developed for a contaminant remediation scenario. The analysis provides decision support in determining the fraction of contaminant mass to remove from the environment in the presence of a lack of information related to the contaminant mass flux into an aquifer. An info-gap uncertainty model is developed to characterize uncertainty due to a lack of information concerning the contaminant...

  17. Fundamental procedures of geographic information analysis

    Science.gov (United States)

    Berry, J. K.; Tomlin, C. D.

    1981-01-01

    Analytical procedures common to most computer-oriented geographic information systems are composed of fundamental map processing operations. A conceptual framework for such procedures is developed and basic operations common to a broad range of applications are described. Among the major classes of primitive operations identified are those associated with: reclassifying map categories as a function of the initial classification, the shape, the position, or the size of the spatial configuration associated with each category; overlaying maps on a point-by-point, a category-wide, or a map-wide basis; measuring distance; establishing visual or optimal path connectivity; and characterizing cartographic neighborhoods based on the thematic or spatial attributes of the data values within each neighborhood. By organizing such operations in a coherent manner, the basis for a generalized cartographic modeling structure can be developed which accommodates a variety of needs in a common, flexible and intuitive manner. The use of each is limited only by the general thematic and spatial nature of the data to which it is applied.

  18. Analysis of the NATO Fleet Air-Defense System%北约舰队防空体系分析

    Institute of Scientific and Technical Information of China (English)

    齐强; 王瑞麒

    2001-01-01

    介绍了以美国为首的北约舰队防空体系的构成、任务和主要防御对象。对北约舰队防空体系的最新发展动向进行了分析。针对目前北约舰队防空体系中的薄弱环节,提出了突防的具体构想。%This paper introduces the construction, tasks ,targets and analyzed the future developing tendency of the fleet air-defense system of NATO led by U.S.. According to the weak links of the defense system,this paper presents a idea to break through the defense net.

  19. Analysis and Design: Accounting Information System in Purchasing and Supplying

    Directory of Open Access Journals (Sweden)

    Noerlina Noerlina

    2011-05-01

    Full Text Available The purpose of the research are the purchase and material supply process are the main process of the company and it will determine the operational company, so it needs an accounting information system to help them in the planning and taking the best decision. Research methods used are data and information collected which using the analysis and design method. This method needs to support the design of accounting information system in the company. The result are there’s still any weaknesses happened that will hamper the operational company.Index Terms - Analysis and Design, Accounting Information System, Purchasing, Supply.

  20. Propositional Analysis: A Tool for Library and Information Science Research.

    Science.gov (United States)

    Allen, Bryce

    1989-01-01

    Reviews the use of propositional analysis in library and information science research. Evidence that different analysts produce similar judgments about texts and use the method consistently over time is presented, and it is concluded that propositional analysis is a reliable and valid research method. An example of an analysis is appended. (32…

  1. Evaluation of health information systems research in information systems research: A meta-analysis.

    Science.gov (United States)

    Haried, Peter; Claybaugh, Craig; Dai, Hua

    2017-04-01

    Given the importance of the health-care industry and the promise of health information systems, researchers are encouraged to build on the shoulders of giants as the saying goes. The health information systems field has a unique opportunity to learn from and extend the work that has already been done by the highly correlated information systems field. As a result, this research article presents a past, present and future meta-analysis of health information systems research in information systems journals over the 2000-2015 time period. Our analysis reviewed 126 articles on a variety of topics related to health information systems research published in the "Senior Scholars" list of the top eight ranked information systems academic journals. Across the selected information systems academic journals, our findings compare research methodologies applied, health information systems topic areas investigated and research trends. Interesting results emerge in the range and evolution of health information systems research and opportunities for health information systems researchers and practitioners to consider moving forward.

  2. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  3. Applying Recursive Sensitivity Analysis to Multi-Criteria Decision Models to Reduce Bias in Defense Cyber Engineering Analysis

    Science.gov (United States)

    2015-10-28

    Considerable research has been conducted on the topic of decision aiding methods such as Multi -criteria and Multi - objective Decision Analysis to...the best compromise solution amongst multiple or infinite possibilities. This is generally known as Multi - Objective Decision Making (MODM). For the...from those of the program manager, resource sponsor, or even the user. This research focuses on the use of recursive sensitivity analysis to mitigate

  4. Medical Image Analysis by Cognitive Information Systems - a Review.

    Science.gov (United States)

    Ogiela, Lidia; Takizawa, Makoto

    2016-10-01

    This publication presents a review of medical image analysis systems. The paradigms of cognitive information systems will be presented by examples of medical image analysis systems. The semantic processes present as it is applied to different types of medical images. Cognitive information systems were defined on the basis of methods for the semantic analysis and interpretation of information - medical images - applied to cognitive meaning of medical images contained in analyzed data sets. Semantic analysis was proposed to analyzed the meaning of data. Meaning is included in information, for example in medical images. Medical image analysis will be presented and discussed as they are applied to various types of medical images, presented selected human organs, with different pathologies. Those images were analyzed using different classes of cognitive information systems. Cognitive information systems dedicated to medical image analysis was also defined for the decision supporting tasks. This process is very important for example in diagnostic and therapy processes, in the selection of semantic aspects/features, from analyzed data sets. Those features allow to create a new way of analysis.

  5. Sequence/structural analysis of xylem proteome emphasizes pathogenesis-related proteins, chitinases and β-1, 3-glucanases as key players in grapevine defense against Xylella fastidiosa

    Directory of Open Access Journals (Sweden)

    Sandeep Chakraborty

    2016-05-01

    Full Text Available Background. Xylella fastidiosa, the causative agent of various plant diseases including Pierce’s disease in the US, and Citrus Variegated Chlorosis in Brazil, remains a continual source of concern and economic losses, especially since almost all commercial varieties are sensitive to this Gammaproteobacteria. Differential expression of proteins in infected tissue is an established methodology to identify key elements involved in plant defense pathways. Methods. In the current work, we developed a methodology named CHURNER that emphasizes relevant protein functions from proteomic data, based on identification of proteins with similar structures that do not necessarily have sequence homology. Such clustering emphasizes protein functions which have multiple copies that are up/down-regulated, and highlights similar proteins which are differentially regulated. As a working example we present proteomic data enumerating differentially expressed proteins in xylem sap from grapevines that were infected with X. fastidiosa. Results. Analysis of this data by CHURNER highlighted pathogenesis related PR-1 proteins, reinforcing this as the foremost protein function in xylem sap involved in the grapevine defense response to X. fastidiosa. β-1, 3-glucanase, which has both anti-microbial and anti-fungal activities, is also up-regulated. Simultaneously, chitinases are found to be both up and down-regulated by CHURNER, and thus the net gain of this protein function loses its significance in the defense response. Discussion. We demonstrate how structural data can be incorporated in the pipeline of proteomic data analysis prior to making inferences on the importance of individual proteins to plant defense mechanisms. We expect CHURNER to be applicable to any proteomic data set.

  6. The informed society: an analysis of the public's information-seeking behavior regarding coastal flood risks.

    Science.gov (United States)

    Kellens, Wim; Zaalberg, Ruud; De Maeyer, Philippe

    2012-08-01

    Recent flood risk management puts an increasing emphasis on the public's risk perception and its preferences. It is now widely recognized that a better knowledge of the public's awareness and concern about risks is of vital importance to outline effective risk communication strategies. Models such as Risk Information Seeking and Processing address this evolution by considering the public's needs and its information-seeking behavior with regard to risk information. This study builds upon earlier information-seeking models and focuses on the empirical relationships between information-seeking behavior and the constructs of risk perception, perceived hazard knowledge, response efficacy, and information need in the context of coastal flood risks. Specific focus is given to the mediating role of information need in the model and to the differences in information-seeking behavior between permanent and temporary residents. By means of a structured on-line questionnaire, a cross-sectional survey was carried out in the city of Ostend, one of the most vulnerable places to coastal flooding on the Belgian coast. Three hundred thirteen respondents participated in the survey. Path analysis reveals that information need does not act as a mediator in contrast to risk perception and perceived knowledge. In addition, it is shown that risk perception and perceived hazard knowledge are higher for permanent than temporary residents, leading to increased information-seeking behavior among the former group. Implications for risk communication are discussed. © 2012 Society for Risk Analysis.

  7. An Investigation Of Organizational Information Security Risk Analysis

    Directory of Open Access Journals (Sweden)

    Zack Jourdan

    2010-12-01

    Full Text Available Despite a growing number and variety of information security threats, many organizations continue to neglect implementing information security policies and procedures.  The likelihood that an organization’s information systems can fall victim to these threats is known as information systems risk (Straub & Welke, 1998.  To combat these threats, an organization must undergo a rigorous process of self-analysis. To better understand the current state of this information security risk analysis (ISRA process, this study deployed a questionnaire using both open-ended and closed ended questions administered to a group of information security professionals (N=32.  The qualitative and quantitative results of this study show that organizations are beginning to conduct regularly scheduled ISRA processes.  However, the results also show that organizations still have room for improvement to create idyllic ISRA processes. 

  8. Analysis Of Demand For Informal And Formal Credit Among Small ...

    African Journals Online (AJOL)

    Analysis Of Demand For Informal And Formal Credit Among Small Scale Cassava ... The result of ordinary least square regression model revealed that farm size ... Thus, formal credit market reform in the form of favourable interest rate to ...

  9. Complexity and information flow analysis for multi-threaded programs

    Science.gov (United States)

    Ngo, Tri Minh; Huisman, Marieke

    2017-01-01

    This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitative and quantitative security analysis, to check whether a multi-threaded program is secure or not. In this paper, besides reviewing classical analysis models, we present a novel model of quantitative analysis where the attacker is able to select the scheduling policy. This model does not follow the traditional information-theoretic channel setting. Our analysis first studies what extra information an attacker can get if he knows the scheduler's choices, and then integrates this information into the transition system modeling the program execution. Via a case study, we compare this approach with the traditional information-theoretic models, and show that this approach gives more intuitive-matching results.

  10. Causal Analysis/Diagnosis Decision Information System (CADDIS)

    Science.gov (United States)

    The Causal Analysis/Diagnosis Decision Information System, or CADDIS, is a website developed to help scientists and engineers in the Regions, States, and Tribes conduct causal assessments in aquatic systems.

  11. Complexity and information flow analysis for multi-threaded programs

    Science.gov (United States)

    Ngo, Tri Minh; Huisman, Marieke

    2017-07-01

    This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitative and quantitative security analysis, to check whether a multi-threaded program is secure or not. In this paper, besides reviewing classical analysis models, we present a novel model of quantitative analysis where the attacker is able to select the scheduling policy. This model does not follow the traditional information-theoretic channel setting. Our analysis first studies what extra information an attacker can get if he knows the scheduler's choices, and then integrates this information into the transition system modeling the program execution. Via a case study, we compare this approach with the traditional information-theoretic models, and show that this approach gives more intuitive-matching results.

  12. Water Information Management & Analysis System (WIMAS) v 4.0

    Data.gov (United States)

    Kansas Data Access and Support Center — The Water Information Management and Analysis System (WIMAS) is an ArcView based GIS application that allows users to query Kansas water right data maintained by the...

  13. A Shield of Blows or Rubber Dagger: An Analysis of an Operational Concept for NATO after Forward Defense.

    Science.gov (United States)

    1991-05-12

    National Security Program Discussion Paper Series , (Cambridge, Mass., Harvard University, 1990), p. 149. Here after refered to as: Drew et al. NATO Beyond...Beyond Forward Defense: Facing an Unreliable Enemy in an Uncertain Environment." National Security Program Discussion Paper Series 90-01, Harvard

  14. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting Service • Defense Health Agency • Defense Human Resource Activity • Defense

  15. Information Foraging Theory: A Framework for Intelligence Analysis

    Science.gov (United States)

    2014-11-01

    Applying information foraging theory to ntelligence analysis This section lays out a plan for the application of IFT to the military...psychologist, 53(5), 533. [24] Wells, V. K. (2012). Foraging: An ecology model of consumer behaviour ? Marketing Theory , 12,117-136. [25] Mantovani, G. (2001...discrete information sources, and the use of semantic cues to enhance the search process. A plan for the application of Information Foraging Theory to the

  16. Bayesian imperfect information analysis for clinical recurrent data

    OpenAIRE

    Chang CK; Chang CC

    2014-01-01

    Chih-Kuang Chang,1 Chi-Chang Chang2 1Department of Cardiology, Jen-Ai Hospital, Dali District, Taichung, Taiwan; 2School of Medical Informatics, Chung Shan Medical University, Information Technology Office of Chung Shan Medical University Hospital, Taichung, TaiwanAbstract: In medical research, clinical practice must often be undertaken with imperfect information from limited resources. This study applied Bayesian imperfect information-value analysis to realistic situations to produce likelih...

  17. Analysis of safeguards information treatment system at the facility level

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Doo; Song, Dae Yong; Kwack, Eun Ho

    2000-12-01

    Safeguards Information Treatment System(SITS) at the facility level is required to implement efficiently the obligations under the Korea-IAEA Safeguards Agreement, bilateral agreements with other countries and domestic law. In this report, the analysis of information, which the SITS treats, and operation environment of SITS including the review of the relationship between safeguards information are described. SITS will be developed to cover the different accounting procedures and methods applied at the various facilities under IAEA safeguards.

  18. A time sequence analysis on the informal information flow mechanism of microblogging

    Institute of Scientific and Technical Information of China (English)

    Yuan; HU; Xiaoli; LIAO; Andong; WU

    2011-01-01

    Microblog is a new Internet featured product,which has seen a rapid development in recent years.Researchers from different countries are making various technical analyses on microblogging applications.In this study,through using the natural language processing(NLP)and data mining,we analyzed the information content transmitted via a microblog,users’social networks and their interactions,and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses,we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging.

  19. 数字化校园信息安全立体防御体系的探索与实践%Exploration and practice of tridimensional information security defense system in digital campus

    Institute of Scientific and Technical Information of China (English)

    张新刚; 田燕

    2012-01-01

    For the serious breakage behaviors, aiming at the education information-based application resulted from the network attacks which are becoming more and more complicated, the traditional static, unilateral and passive information security defense system has already not been satisfied with the security requirements under new-type application environment. To resolve these problems a three-dimensional hierarchy information security model is put forward including physical security, network security, data security and content security. It can safeguard the confidentiality, controllability of information security and so on. An active digital campus defense model APPDRRCC is put forward and security policies are designed in different stages to achieve the the active defense in the whole process from the early risk evaluation to the terminal trace. The experimental results in the campus show that the digital campus tridimensional security defense system can achieve tridimen-sional, dynamic and active defense. So the scheme is effective and feasible.%针对数字化校园中日益复杂多样化的网络攻击对教育信息化应用造成的严重破坏行为,传统的静态化、片面化的被动型信息安全防御体系已经无法满足新型应用环境下的安全需求.对此,从信息安全的4个层次——物理安全、网络安全、数据安全和内容安全出发,提出了数字化校园信息安全立体防御层次化安全模型,保障了信息安全的机密性、可控性等安全属性.在该模型中的网络安全层,提出了数字化校园网络安全全过程主动防护模型APPDRRCC,设计了各阶段的安全防护策略,实现了从前期的风险评估到后期的追踪反击全过程主动防御.该模型在校园网中的实际应用结果表明:数字化校园信息安全立体防御体系能够实现防御的立体化、动态化和主动性,该方案是有效、可行的.

  20. Online Information About Harmful Tobacco Constituents: A Content Analysis.

    Science.gov (United States)

    Margolis, Katherine A; Bernat, Jennifer K; Keely O'Brien, Erin; Delahanty, Janine C

    2017-10-01

    Tobacco products and smoke contain more than 7000 chemicals (ie, constituents). Research shows that consumers have poor understanding of tobacco constituents and find communication about them to be confusing. The current content analysis describes how information is communicated about tobacco constituents online in terms of source, target audience, and message. A search was conducted in September 2015 using tobacco constituent and tobacco terms and identified 226 relevant Web sites for coding. Web sites were coded for type, target audience, reading level, constituent information, type of tobacco product, health effects, and emotional valence by two coders who independently coded half of the sample. There was a 20% overlap to assess interrater reliability, which was high (κ = .83, p content and presentation of information related to tobacco constituents. The US Food and Drug Administration (FDA) is required to publicly display a list of tobacco constituents in tobacco products and tobacco smoke by brand. However, little is known about tobacco constituent information available to the public. This is the first systematic content analysis of online information about tobacco constituents. The analysis reveals that although information about tobacco constituents is available online, large information gaps exist, including incomplete information about tobacco constituent-related health effects. This study highlights opportunities to improve the content and presentation of public information related to tobacco constituents.

  1. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  2. Agricultural information dissemination using ICTs: A review and analysis of information dissemination models in China

    Directory of Open Access Journals (Sweden)

    Yun Zhang

    2016-03-01

    Full Text Available Over the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs. Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer.

  3. Information Security Analysis Using Game Theory and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Schlicher, Bob G [ORNL; Abercrombie, Robert K [ORNL

    2012-01-01

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  4. Informativeness of the CODIS STR loci for admixture analysis.

    Science.gov (United States)

    Barnholtz-Sloan, Jill S; Pfaff, Carrie L; Chakraborty, Ranajit; Long, Jeffrey C

    2005-11-01

    Population admixture (or ancestry) is used as an approach to gene discovery in complex diseases, particularly when the disease prevalence varies widely across geographic populations. Admixture analysis could be useful for forensics because an indication of a perpetrator's ancestry would narrow the pool of suspects for a particular crime. The purpose of this study was to use Fisher's information to identify informative sets of markers for admixture analysis. Using published founding population allele frequencies we test three marker sets for efficacy for estimating admixture: the FBI CODIS Core STR loci, the HGDP-CEPH Human Genome Diversity Cell Line Panel and the set of 39 ancestry informative SNPS from the Shriver lab at Pennsylvania State University. We conclude that the FBI CODIS Core STR set is valid for admixture analysis, but not the most precise. We recommend using a combination of the most informative markers from the HGDP-CEPH and Shriver loci sets.

  5. Content Analysis in Library and Information Science Research.

    Science.gov (United States)

    Allen, Bryce; Reser, David

    1990-01-01

    Describes ways in which content analysis is being used in library and information science research. Methodological concerns are addressed, including selection of target documents, selection of samples to be analyzed, selection of categories for analysis, and elimination of researcher bias to assure reliability. (35 references) (LRW)

  6. A DSRPCL-SVM Approach to Informative Gene Analysis

    Institute of Scientific and Technical Information of China (English)

    Wei Xiong; Zhibin Cai; Jinwen Ma

    2008-01-01

    Microarray data based tumor diagnosis is a very interesting topic in bioinformatics. One of the key problems is the discovery and analysis of informative genes of a tumor. Although there are many elaborate approaches to this problem, it is still difficult to select a reasonable set of informative genes for tumor diagnosis only with microarray data. In this paper, we classify the genes expressed through microarray data into a number of clusters via the distance sensitive rival penalized competitive learning (DSRPCL) algorithm and then detect the informative gene cluster or set with the help of support vector machine (SVM). Moreover, the critical or powerful informative genes can be found through further classifications and detections on the obtained informative gene clusters. It is well demonstrated by experiments on the colon, leukemia, and breast cancer datasets that our proposed DSRPCL-SVM approach leads to a reasonable selection of informative genes for tumor diagnosis.

  7. 刑事辩护法律障碍探析%Analysis of Legal Obstacles of Criminal Defense

    Institute of Scientific and Technical Information of China (English)

    邓雅芬

    2016-01-01

    The criminal defense lawyer is responsible for the maintenance of criminal suspects and the defendant's legal interests and personal rights , but the criminal defense lawyers in the criminal proceedings are faced with the lack of defense rights , security measures and the judicial interpretation of the legal issues for the reason of the transmission system of legal culture , the legislative idea and the judicial system of constraints . The renewal of judicial idea , the further perfection of the lawyer's right , the improvement of the legal status of the legal system , and the realization of the legal status of the criminal defense lawyer and the legal status of the district attorney and the smooth exercise of the right of lawyers is an urgent task at present .%刑事辩护律师承担着维护犯罪嫌疑人、被告人的合法利益及人身权利的重大使命,但刑事辩护律师在刑事诉讼中面临着辩护权利不足、保障措施缺失及司法解释立法化等法律问题,究其原因是传统的法律文化、立法观念和司法制度的制约导致。更新司法理念、进一步完备律师权利、提高律师社会地位、完善法律制度体系,从而真正实现刑事辩护律师与公诉人的诉讼权利平等、保障律师权利的顺利行使,是当下刻不容缓的工作。

  8. An analytical approach to air defense: cost, effectiveness and SWOT analysis of employing fighter aircraft and modern SAM systems

    Science.gov (United States)

    Kus, Orcun; Kocaman, Ibrahim; Topcu, Yucel; Karaca, Volkan

    2012-05-01

    The problem of defending a specific airspace is among the main issues a military commander to solve. Proper protection of own airspace is crucial for mission success at the battlefield. The military doctrines of most world armed forces involve two main options of defending the airspace. One of them is utilizing formations of fighter aircraft, which is a flexible choice. The second option is deploying modern SAM (Surface to Air Missile) systems, which is more expansive. On the other hand the decision makers are to cope with miscellaneous restrictions such as the budgeting problems. This study defines air defense concept according to modern air warfare doctrine. It considers an air defense scenario over an arbitrary airspace and compares the performance and cost-effectiveness of employing fighter aircraft and SAM systems. It also presents SWOT (Strenghts - Weakness - Opportunities - Threats) analyses of air defense by fighter aircraft and by modern SAMs and tries to point out whichever option is better. We conclude that deploying SAMs has important advantages over using fighter aircraft by means of interception capacity within a given time period and is cost-effective.

  9. An information flow analysis of a distributed information system for space medical support.

    Science.gov (United States)

    Zhang, Tao; Aranzamendez, Gina; Rinkus, Susan; Gong, Yang; Rukab, Jamie; Johnson-Throop, Kathy A; Malin, JaneT; Zhang, Jiajie

    2004-01-01

    In this study, we applied the methodology grounded in human-centered distributed cognition principles to the information flow analysis of a highly intensive, distributed and complex environment--the Biomedical Engineer (BME) console system at NASA Johnson Space Center. This system contains disparate human and artificial agents and artifacts. Users and tasks of this system were analyzed. An ethnographic study and a detailed communication pattern analysis were conducted to gain deeper insight and better understanding of the information flow patterns and the organizational memory of the current BME console system. From this study, we identified some major problems and offered recommendations to improve the efficiency and effectiveness of this system. We believe that this analysis methodology can be used in other distributed information systems, such as a healthcare environment.

  10. Türk Savunma Sanayi Firmaları Vizyon ve Misyon İfadelerinin İçerik Analizi (The Content Analysis of Vision and Mission Statements in Turkish Defense Industry Firms

    Directory of Open Access Journals (Sweden)

    Metin OCAK

    2016-08-01

    Full Text Available In this research, components used in mission and vision statements by Turkish Defense Industry Firms and their relations with national defense industry guidance documents are examined. For this reason 87 vision and 79 mission statements which mentioned on the web pages of 148 Turkish Defense Industry Firms’ are taken into consideration. A qualitative research design phenomenology was used and the data were analyzed through content analysis in this study. At the end of the analysis, it is identified that there are common 14 components in vision statements and 13 common components in mission statements. Also it is discovered that some of the components are relevant with components mentioned in the national defense industry guidance documents.

  11. Hybrid Information Flow Analysis for Programs with Arrays

    Directory of Open Access Journals (Sweden)

    Gergö Barany

    2016-07-01

    Full Text Available Information flow analysis checks whether certain pieces of (confidential data may affect the results of computations in unwanted ways and thus leak information. Dynamic information flow analysis adds instrumentation code to the target software to track flows at run time and raise alarms if a flow policy is violated; hybrid analyses combine this with preliminary static analysis. Using a subset of C as the target language, we extend previous work on hybrid information flow analysis that handled pointers to scalars. Our extended formulation handles arrays, pointers to array elements, and pointer arithmetic. Information flow through arrays of pointers is tracked precisely while arrays of non-pointer types are summarized efficiently. A prototype of our approach is implemented using the Frama-C program analysis and transformation framework. Work on a full machine-checked proof of the correctness of our approach using Isabelle/HOL is well underway; we present the existing parts and sketch the rest of the correctness argument.

  12. Informational Analysis for Compressive Sampling in Radar Imaging

    Directory of Open Access Journals (Sweden)

    Jingxiong Zhang

    2015-03-01

    Full Text Available Compressive sampling or compressed sensing (CS works on the assumption of the sparsity or compressibility of the underlying signal, relies on the trans-informational capability of the measurement matrix employed and the resultant measurements, operates with optimization-based algorithms for signal reconstruction and is thus able to complete data compression, while acquiring data, leading to sub-Nyquist sampling strategies that promote efficiency in data acquisition, while ensuring certain accuracy criteria. Information theory provides a framework complementary to classic CS theory for analyzing information mechanisms and for determining the necessary number of measurements in a CS environment, such as CS-radar, a radar sensor conceptualized or designed with CS principles and techniques. Despite increasing awareness of information-theoretic perspectives on CS-radar, reported research has been rare. This paper seeks to bridge the gap in the interdisciplinary area of CS, radar and information theory by analyzing information flows in CS-radar from sparse scenes to measurements and determining sub-Nyquist sampling rates necessary for scene reconstruction within certain distortion thresholds, given differing scene sparsity and average per-sample signal-to-noise ratios (SNRs. Simulated studies were performed to complement and validate the information-theoretic analysis. The combined strategy proposed in this paper is valuable for information-theoretic orientated CS-radar system analysis and performance evaluation.

  13. Information

    CERN Document Server

    Ritchie, L David

    1991-01-01

    This volume thoroughly covers the sub-field of information, and is one of the first in a series which synthesizes the research literature on major concepts in the field of communication. Each concise volume includes a research definition (concept explication) and presents a state-of-the-art analysis of theory and empirical findings related to the concept. After defining the word `information', the author contrasts non-linear and reflexive ideas about human communication with linear perspectives. Information is equated with uncertainty. The result presents a pattern for the process of conceptua

  14. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  15. Stationary Time Series Analysis Using Information and Spectral Analysis

    Science.gov (United States)

    1992-09-01

    spectral density function of the time series. The spectral density function f(w), 0 < w < 1, is defined as the Fourier transform of...series with spectral density function f(w). 4 An important result of Pinsker [(1964), p. 196] can be interpreted as providing a for- mula for asymptotic...Analysis Papers, Holden-Day, San Francisco, California. Parzen, E. (1958) "On asymptotically efficient consistent estimates of the spectral density function

  16. Noun-Phrase Analysis in Unrestricted Text for Information Retrieval

    OpenAIRE

    Evans, David A.; Zhai, Chengxiang

    1996-01-01

    Information retrieval is an important application area of natural-language processing where one encounters the genuine challenge of processing large quantities of unrestricted natural-language text. This paper reports on the application of a few simple, yet robust and efficient noun-phrase analysis techniques to create better indexing phrases for information retrieval. In particular, we describe a hybrid approach to the extraction of meaningful (continuous or discontinuous) subcompounds from ...

  17. Defense Acquisition Review Journal. Volume 14, Number 1, February 2007

    Science.gov (United States)

    2007-02-01

    faculty.fuqua.duke.edu/~clemen/ bio/ mhd /mhdpref.htm Department for Communities and Local Government (DCLG) (2000, December). Multi-criteria analysis manual...http://www.courses.vcu.edu/MATH327/ (under “Schedule” under “ Lecture Slide”). Keeney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives...theory class 9: Revising judgment in the light of new information & risk and uncertainty management. Unpublished lecture notes. DefeNse aCquisiTion

  18. Performance of the Carbon Dioxide Information Analysis Center (CDIAC)

    Energy Technology Data Exchange (ETDEWEB)

    Stoss, F.W. [Univ. of Tennessee, Knoxville, TN (United States). Environment, Energy, and Resources Center; Jones, S.B. [Oak Ridge National Lab., TN (United States)

    1993-11-01

    The Carbon Dioxide Information Analysis Center (CDIAC) provides information and data resources in support of the US Department of Energy`s Global Change Research Program. CDIAC also serves as a resource of global change information for a broader international commonly of researchers, policymakers, managers, educators, and students. The number of requests for CDIAC`s data products, information services, and publications has grown over the years and represents multidisciplinary interests in the physical, life, and social sciences and from diverse work settings in government, business, and academia. CDIAC`s staff addresses thousands of requests yearly for data and information resources. In response to these requests, CDIAC has distributed tens of thousands of data products, technical reports, newsletters, and other information resources worldwide since 1982. This paper describes CDIAC, examines CDIAC`s user community, and describes CDIAC`s response to requests for information. The CDIAC Information System, which serves as a comprehensive PC-based inventory and information management tracking system, is also described.

  19. Performance Analysis of Information Services in a Grid Environment

    Directory of Open Access Journals (Sweden)

    Giovanni Aloisio

    2004-10-01

    Full Text Available The Information Service is a fundamental component in a grid environment. It has to meet a lot of requirements such as access to static and dynamic information related to grid resources, efficient and secure access to dynamic data, decentralized maintenance, fault tolerance etc., in order to achieve better performance, scalability, security and extensibility. Currently there are two different major approaches. One is based on a directory infrastructure and another one on a novel approach that exploits a relational DBMS. In this paper we present a performance comparison analysis between Grid Resource Information Service (GRIS and Local Dynamic Grid Catalog relational information service (LDGC, providing also information about two projects (iGrid and Grid Relational Catalog in the grid data management area.

  20. Analysis of information systems for hydropower operations: Executive summary

    Science.gov (United States)

    Sohn, R. L.; Becker, L.; Estes, J.; Simonett, D.; Yeh, W.

    1976-01-01

    An analysis was performed of the operations of hydropower systems, with emphasis on water resource management, to determine how aerospace derived information system technologies can effectively increase energy output. Better utilization of water resources was sought through improved reservoir inflow forecasting based on use of hydrometeorologic information systems with new or improved sensors, satellite data relay systems, and use of advanced scheduling techniques for water release. Specific mechanisms for increased energy output were determined, principally the use of more timely and accurate short term (0-7 days) inflow information to reduce spillage caused by unanticipated dynamic high inflow events. The hydrometeorologic models used in predicting inflows were examined in detail to determine the sensitivity of inflow prediction accuracy to the many variables employed in the models, and the results were used to establish information system requirements. Sensor and data handling system capabilities were reviewed and compared to the requirements, and an improved information system concept was outlined.

  1. Information delivery manuals to facilitate it supported energy analysis

    DEFF Research Database (Denmark)

    Mondrup, Thomas Fænø; Karlshøj, Jan; Vestergaard, Flemming

    In response to continuing Building Information Modeling (BIM) progress, building performance simulation tools such as IESVE are being utilized to explore construction projects and influence design decisions with increasing frequency. To maximize the potential of these tools, a specification...... of information exchange and digital workflows is required. This paper presents the preliminary findings of an ongoing study aimed at developing an Information Delivery Manual (IDM) for IT supported energy analysis at concept design phase. The IDM development is based on: (1) a review of current approaches (2...

  2. Similarity Measures, Author Cocitation Analysis, and Information Theory

    CERN Document Server

    Leydesdorff, Loet

    2009-01-01

    The use of Pearson's correlation coefficient in Author Cocitation Analysis was compared with Salton's cosine measure in a number of recent contributions. Unlike the Pearson correlation, the cosine is insensitive to the number of zeros. However, one has the option of applying a logarithmic transformation in correlation analysis. Information calculus is based on both the logarithmic transformation and provides a non-parametric statistics. Using this methodology one can cluster a document set in a precise way and express the differences in terms of bits of information. The algorithm is explained and used on the data set which was made the subject of this discussion.

  3. CISAPS: Complex Informational Spectrum for the Analysis of Protein Sequences

    Directory of Open Access Journals (Sweden)

    Charalambos Chrysostomou

    2015-01-01

    Full Text Available Complex informational spectrum analysis for protein sequences (CISAPS and its web-based server are developed and presented. As recent studies show, only the use of the absolute spectrum in the analysis of protein sequences using the informational spectrum analysis is proven to be insufficient. Therefore, CISAPS is developed to consider and provide results in three forms including absolute, real, and imaginary spectrum. Biologically related features to the analysis of influenza A subtypes as presented as a case study in this study can also appear individually either in the real or imaginary spectrum. As the results presented, protein classes can present similarities or differences according to the features extracted from CISAPS web server. These associations are probable to be related with the protein feature that the specific amino acid index represents. In addition, various technical issues such as zero-padding and windowing that may affect the analysis are also addressed. CISAPS uses an expanded list of 611 unique amino acid indices where each one represents a different property to perform the analysis. This web-based server enables researchers with little knowledge of signal processing methods to apply and include complex informational spectrum analysis to their work.

  4. Relationships among CFTR expression, HCO3− secretion, and host defense may inform gene- and cell-based cystic fibrosis therapies

    Science.gov (United States)

    Shah, Viral S.; Ernst, Sarah; Tang, Xiao Xiao; Karp, Philip H.; Parker, Connor P.; Ostedgaard, Lynda S.; Welsh, Michael J.

    2016-01-01

    Cystic fibrosis (CF) is caused by mutations in the gene encoding the cystic fibrosis transmembrane conductance regulator (CFTR) anion channel. Airway disease is the major source of morbidity and mortality. Successful implementation of gene- and cell-based therapies for CF airway disease requires knowledge of relationships among percentages of targeted cells, levels of CFTR expression, correction of electrolyte transport, and rescue of host defense defects. Previous studies suggested that, when ∼10–50% of airway epithelial cells expressed CFTR, they generated nearly wild-type levels of Cl− secretion; overexpressing CFTR offered no advantage compared with endogenous expression levels. However, recent discoveries focused attention on CFTR-mediated HCO3− secretion and airway surface liquid (ASL) pH as critical for host defense and CF pathogenesis. Therefore, we generated porcine airway epithelia with varying ratios of CF and wild-type cells. Epithelia with a 50:50 mix secreted HCO3− at half the rate of wild-type epithelia. Likewise, heterozygous epithelia (CFTR+/− or CFTR+/∆F508) expressed CFTR and secreted HCO3− at ∼50% of wild-type values. ASL pH, antimicrobial activity, and viscosity showed similar relationships to the amount of CFTR. Overexpressing CFTR increased HCO3− secretion to rates greater than wild type, but ASL pH did not exceed wild-type values. Thus, in contrast to Cl− secretion, the amount of CFTR is rate-limiting for HCO3− secretion and for correcting host defense abnormalities. In addition, overexpressing CFTR might produce a greater benefit than expressing CFTR at wild-type levels when targeting small fractions of cells. These findings may also explain the risk of airway disease in CF carriers. PMID:27114540

  5. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  6. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    Science.gov (United States)

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  7. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  8. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  9. Similarity Measures, Author Cocitation Analysis, and Information Theory

    OpenAIRE

    Leydesdorff, Loet

    2009-01-01

    The use of Pearson's correlation coefficient in Author Cocitation Analysis was compared with Salton's cosine measure in a number of recent contributions. Unlike the Pearson correlation, the cosine is insensitive to the number of zeros. However, one has the option of applying a logarithmic transformation in correlation analysis. Information calculus is based on both the logarithmic transformation and provides a non-parametric statistics. Using this methodology one can cluster a document set in...

  10. A Distributed Flocking Approach for Information Stream Clustering Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2006-01-01

    Intelligence analysts are currently overwhelmed with the amount of information streams generated everyday. There is a lack of comprehensive tool that can real-time analyze the information streams. Document clustering analysis plays an important role in improving the accuracy of information retrieval. However, most clustering technologies can only be applied for analyzing the static document collection because they normally require a large amount of computation resource and long time to get accurate result. It is very difficult to cluster a dynamic changed text information streams on an individual computer. Our early research has resulted in a dynamic reactive flock clustering algorithm which can continually refine the clustering result and quickly react to the change of document contents. This character makes the algorithm suitable for cluster analyzing dynamic changed document information, such as text information stream. Because of the decentralized character of this algorithm, a distributed approach is a very natural way to increase the clustering speed of the algorithm. In this paper, we present a distributed multi-agent flocking approach for the text information stream clustering and discuss the decentralized architectures and communication schemes for load balance and status information synchronization in this approach.

  11. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  12. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  13. Bayesian imperfect information analysis for clinical recurrent data

    Directory of Open Access Journals (Sweden)

    Chang CK

    2014-12-01

    Full Text Available Chih-Kuang Chang,1 Chi-Chang Chang2 1Department of Cardiology, Jen-Ai Hospital, Dali District, Taichung, Taiwan; 2School of Medical Informatics, Chung Shan Medical University, Information Technology Office of Chung Shan Medical University Hospital, Taichung, TaiwanAbstract: In medical research, clinical practice must often be undertaken with imperfect information from limited resources. This study applied Bayesian imperfect information-value analysis to realistic situations to produce likelihood functions and posterior distributions, to a clinical decision-making problem for recurrent events. In this study, three kinds of failure models are considered, and our methods illustrated with an analysis of imperfect information from a trial of immunotherapy in the treatment of chronic granulomatous disease. In addition, we present evidence toward a better understanding of the differing behaviors along with concomitant variables. Based on the results of simulations, the imperfect information value of the concomitant variables was evaluated and different realistic situations were compared to see which could yield more accurate results for medical decision-making. Keywords: Bayesian value-of-information, recurrent events, chronic granulomatous disease

  14. Information System Development Model: Theories Analysis and Guidelines

    Science.gov (United States)

    Nayan, Norshita Mat; Badioze Zaman, Halimah

    Development of information system project is one of the IT projects which have been developed to offer the best facilities for publics. Process of system development will go through its own life cycle and every process must be refined in order to fulfill aims and objectives. Eventhough information system development is always correlate with failure but a few key factors will help the systems to succeed. There are multiple success factors being discussed by other researches in the information system development but failure figure still at the higher side. The main purpose of this research is to discuss processes involved in the development of information system which positively contribute towards its success. Model of information system development which has been developed (PADM Model) consists of four fundamental processes; planning, requirement analysis, design and maintenance. All processes will be monitored by a main process namely quality as the key performance indicator. Quality plays a vital role in assessing the ability of information system developed in order to fulfill users' expectations. Analysis of theory can be used as a guideline and measurement base towards the system with hope that percentage of failure will reduce subsequently.

  15. Webometric Analysis of Departments of Librarianship and Information Science.

    Science.gov (United States)

    Thomas, Owen; Willett, Peter

    2000-01-01

    Describes a webometric analysis of linkages to library and information science (LIS) department Web sites in United Kingdom universities. Concludes that situation data are not well suited to evaluation of LIS departments and that departments can boost Web site visibility by hosting a wide range of materials. (Author/LRW)

  16. Design and application of pulse information acquisition and analysis ...

    African Journals Online (AJOL)

    Design and application of pulse information acquisition and analysis system with dynamic ... Log in or Register to get access to full text downloads. ... Methods: To use some flexible sensors to catch the radial artery pressure pulse wave and utilize ... and dynamic recognition, and it was applied to serve for ten healthy adults.

  17. Need for information metrics: with examples from document analysis

    Science.gov (United States)

    Nartker, Thomas A.

    1994-03-01

    We present an argument that progress in Information Science is inhibited by our incomplete perception of the nature of the field. An agenda for research is proposed which, we believe, will lead to more rapid progress. Specific examples are given from the field of Document Analysis.

  18. Digital Avionics Information System (DAIS): Training Requirements Analysis Model (TRAMOD).

    Science.gov (United States)

    Czuchry, Andrew J.; And Others

    The training requirements analysis model (TRAMOD) described in this report represents an important portion of the larger effort called the Digital Avionics Information System (DAIS) Life Cycle Cost (LCC) Study. TRAMOD is the second of three models that comprise an LCC impact modeling system for use in the early stages of system development. As…

  19. Noun-Phrase Analysis in Unrestricted Text for Information Retrieval

    CERN Document Server

    Evans, D A; Evans, David A.; Zhai, Chengxiang

    1996-01-01

    Information retrieval is an important application area of natural-language processing where one encounters the genuine challenge of processing large quantities of unrestricted natural-language text. This paper reports on the application of a few simple, yet robust and efficient noun-phrase analysis techniques to create better indexing phrases for information retrieval. In particular, we describe a hybrid approach to the extraction of meaningful (continuous or discontinuous) subcompounds from complex noun phrases using both corpus statistics and linguistic heuristics. Results of experiments show that indexing based on such extracted subcompounds improves both recall and precision in an information retrieval system. The noun-phrase analysis techniques are also potentially useful for book indexing and automatic thesaurus extraction.

  20. De novo Transcriptome Analysis Reveals Distinct Defense Mechanisms by Young and Mature Leaves of Hevea brasiliensis (Para Rubber Tree).

    Science.gov (United States)

    Fang, Yongjun; Mei, Hailiang; Zhou, Binhui; Xiao, Xiaohu; Yang, Meng; Huang, Yacheng; Long, Xiangyu; Hu, Songnian; Tang, Chaorong

    2016-09-13

    Along with changes in morphology in the course of maturation, leaves of Hevea brasiliensis become more resistant to leaf diseases, including the South American Leaf Blight (SALB), a devastating fungal disease of this economically important tree species. To understand the underlying mechanisms of this defense, and to identify the candidate genes involved, we sequenced the Hevea leaf transcriptome at four developmental stages (I to IV) by Illumina sequencing. A total of 62.6 million high-quality reads were generated, and assembled into 98,796 unique transcripts. We identified 3,905 differentially expressed genes implicated in leaf development, 67.8% (2,651) of which were during the transition to leaf maturation. The genes involved in cyanogenic metabolism, lignin and anthocyanin biosynthesis were noteworthy for their distinct patterns of expression between developing leaves (stages I to III) and mature leaves (stage IV), and the correlation with the change in resistance to SALB and the Oidium/Colletotrichum leaf fall. The results provide a first profile of the molecular events that relate to the dynamics of leaf morphology and defense strategies during Hevea leaf development. This dataset is beneficial to devising strategies to engineer resistance to leaf diseases as well as other in-depth studies in Hevea tree.

  1. A temporal analysis of the relationships between social stress, humoral immune response and glutathione-related antioxidant defenses.

    Science.gov (United States)

    Gonçalves, Luciane; Dafre, Alcir Luiz; Carobrez, Sonia Gonçalves; Gasparotto, Odival Cezar

    2008-10-10

    The exposure to different kinds of stress impacts on the reactive oxygen species production with potential risk to the integrity of the tissues. Psychological or biological stress is responsible for a significant increase in the oxidative stress markers and also for activation of the antioxidant defense system. In this study, we analyzed the relationships between social stress, humoral immune response and glutathione-related antioxidant defenses. Groups of male Swiss mice were subjected to different lengths of social stress exposure (social confrontation) which varied from 1 up to 13 days. As a biological stressor, 10(9) sheep red blood cells (SRBC)/mL were injected by intraperitoneal route. As controls, animals not subjected to social stress and/or injected with vehicle solution were used. The serum samples and the cerebral cortex were collected at 4 h, 3, 5, 7, 9, 11, and 13 days after the end of social confrontation. The results indicated that the antioxidant enzymes activities were affected by psychological as well as by biological stressor. These alterations were dependent on the timing of stress exposure which resulted in a positive or in a negative correlation between the antibody titres to SRBC and antioxidant enzymes. We also discuss the possible role of SRBC injection in the modulation of the effects of psychosocial stress on antioxidant metabolism.

  2. Multiscale Analysis of Information Dynamics for Linear Multivariate Processes

    CERN Document Server

    Faes, Luca; Stramaglia, Sebastiano; Nollo, Giandomenico; Stramaglia, Sebastiano

    2016-01-01

    In the study of complex physical and physiological systems represented by multivariate time series, an issue of great interest is the description of the system dynamics over a range of different temporal scales. While information-theoretic approaches to the multiscale analysis of complex dynamics are being increasingly used, the theoretical properties of the applied measures are poorly understood. This study introduces for the first time a framework for the analytical computation of information dynamics for linear multivariate stochastic processes explored at different time scales. After showing that the multiscale processing of a vector autoregressive (VAR) process introduces a moving average (MA) component, we describe how to represent the resulting VARMA process using state-space (SS) models and how to exploit the SS model parameters to compute analytical measures of information storage and information transfer for the original and rescaled processes. The framework is then used to quantify multiscale infor...

  3. ERISTAR: Earth Resources Information Storage, Transformation, Analysis, and Retrieval

    Science.gov (United States)

    1972-01-01

    The National Aeronautics and Space Administration (NASA) and the American Society for Engineering Education (ASEE) have sponsored faculty fellowship programs in systems engineering design for the past several years. During the summer of 1972 four such programs were conducted by NASA, with Auburn University cooperating with Marshall Space Flight Center (MSFC). The subject for the Auburn-MSFC design group was ERISTAR, an acronym for Earth Resources Information Storage, Transformation, Analysis and Retrieval, which represents an earth resources information management network of state information centers administered by the respective states and linked to federally administered regional centers and a national center. The considerations for serving the users and the considerations that must be given to processing data from a variety of sources are described. The combination of these elements into a national network is discussed and an implementation plan is proposed for a prototype state information center. The compatibility of the proposed plan with the Department of Interior plan, RALI, is indicated.

  4. Environmental Quality Information Analysis Center multi-year plan

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, R.G. [RDG, Inc. (United States); Das, S. [Oak Ridge National Lab., TN (United States); Walsh, T.E. [Florida Univ., Gainesville, FL (United States)

    1992-09-01

    An information analysis center (IAC) is a federal resource that provides technical information for a specific technology field. An IAC links an expert technical staff with an experienced information specialist group, supported by in-house or external data bases to provide technical information and maintain a corporate knowledge in a technical area. An IAC promotes the rapid transfer of technology among its users and provides assistance in adopting new technology and predicting and assessing emerging technology. This document outlines the concept, requirements, and proposed development of an Environmental Quality IAC (EQIAC). An EQIAC network is composed of several nodes, each of which has specific technology capabilities. This document outlines strategic and operational objectives for the phased development of one such node of an EQIAC network.

  5. Comparative Analysis of Splice Site Regions by Information Content

    Institute of Scientific and Technical Information of China (English)

    T. Shashi Rekha; Chanchal K. Mitra

    2006-01-01

    We have applied concepts from information theory for a comparative analysis of donor (gt) and acceptor (ag) splice site regions in the genes of five different organisms by calculating their mutual information content (relative entropy) over a selected block of nucleotides. A similar pattern that the information content decreases as the block size increases was observed for both regions in all the organisms studied. This result suggests that the information required for splicing might be contained in the consensus of ~6-8 nt at both regions. We assume from our study that even though the nucleotides are showing some degrees of conservation in the flanking regions of the splice sites, certain level of variability is still tolerated,which leads the splicing process to occur normally even if the extent of base pairing is not fully satisfied. We also suggest that this variability can be compensated by recognizing different splice sites with different spliceosomal factors.

  6. A Theoretical Analysis of the Art of Attack and Defense of Chinese Martial Arts%对中国武术技击性的理论解读

    Institute of Scientific and Technical Information of China (English)

    刘永光; 袁秋宝

    2015-01-01

    武术不仅是一种身体活动,而且也是一种文化生活,它不但能使从事者强身健体,精神世界得到充实,而且也能使观者赏心悦目,受到感染和激发,发愤图强。本文对中国武术技击性的历史特征进行探讨,通过对古代武术和现代武术的比较,从而提出武术在继承发展中技击性衰退这一现象,并对其衰退现象的原因进行分析,从而得出现代武术技击性的建构取向。%Martial art is not only a physical exercise,but also a kind of cultural life.It can not only build up practitioners’body,fulfill their spiritual world,but also arouse audiences’interest and attention and encourage them to work hard,as martial arts is pleasant both to their eyes and mind.This dissertation explores historical features of the art of attack and defense of Chinese martial arts.Through comparing ancient martial arts with modern martial arts,the dissertation uncovers the recession of the art of attack and defense of Chinese martial arts in inheriting and developing and conducts an analysis on the reasons for the recession.At last this dissertation puts forward the direction of constructing the art of attack and defense of modern martial arts.

  7. Full Information Item Factor Analysis of the FCI

    Science.gov (United States)

    Hagedorn, Eric

    2010-02-01

    Traditional factor analytical methods, principal factors or principal components analysis, are inappropriate techniques for analyzing dichotomously scored responses to standardized tests or concept inventories because they lead to artifactual factors often referred to as ``difficulty factors.'' Full information item factor analysis (Bock, Gibbons and Muraki, 1988) based on Thurstone's multiple factor model and calculated using marginal maximum likelihood estimation, is an appropriate technique for such analyses. Force Concept Inventory (Hestenes, Wells and Swackhamer, 1992) data from 1582 university students completing an introductory physics course, was analyzed using the full information item factor analysis software TESTFACT v. 4. Analyzing the statistical significance of successive factors added to the model, using chi-squared statistics, led to a six factor model interpretable in terms of the conceptual dimensions of the FCI. )

  8. Sentiment analysis using common-sense and context information.

    Science.gov (United States)

    Agarwal, Basant; Mittal, Namita; Bansal, Pooja; Garg, Sonal

    2015-01-01

    Sentiment analysis research has been increasing tremendously in recent times due to the wide range of business and social applications. Sentiment analysis from unstructured natural language text has recently received considerable attention from the research community. In this paper, we propose a novel sentiment analysis model based on common-sense knowledge extracted from ConceptNet based ontology and context information. ConceptNet based ontology is used to determine the domain specific concepts which in turn produced the domain specific important features. Further, the polarities of the extracted concepts are determined using the contextual polarity lexicon which we developed by considering the context information of a word. Finally, semantic orientations of domain specific features of the review document are aggregated based on the importance of a feature with respect to the domain. The importance of the feature is determined by the depth of the feature in the ontology. Experimental results show the effectiveness of the proposed methods.

  9. Health information systems in Africa: descriptive analysis of data sources, information products and health statistics.

    Science.gov (United States)

    Mbondji, Peter Ebongue; Kebede, Derege; Soumbey-Alley, Edoh William; Zielinski, Chris; Kouvividila, Wenceslas; Lusamba-Dikassa, Paul-Samson

    2014-05-01

    To identify key data sources of health information and describe their availability in countries of the World Health Organization (WHO) African Region. An analytical review on the availability and quality of health information data sources in countries; from experience, observations, literature and contributions from countries. Forty-six Member States of the WHO African Region. No participants. The state of data sources, including censuses, surveys, vital registration and health care facility-based sources. In almost all countries of the Region, there is a heavy reliance on household surveys for most indicators, with more than 121 household surveys having been conducted in the Region since 2000. Few countries have civil registration systems that permit adequate and regular tracking of mortality and causes of death. Demographic surveillance sites function in several countries, but the data generated are not integrated into the national health information system because of concerns about representativeness. Health management information systems generate considerable data, but the information is rarely used because of concerns about bias, quality and timeliness. To date, 43 countries in the Region have initiated Integrated Disease Surveillance and Response. A multitude of data sources are used to track progress towards health-related goals in the Region, with heavy reliance on household surveys for most indicators. Countries need to develop comprehensive national plans for health information that address the full range of data needs and data sources and that include provision for building national capacities for data generation, analysis, dissemination and use. © The Royal Society of Medicine.

  10. Implantation of a safety management system information under the ISO 27001: risk analysis information

    Directory of Open Access Journals (Sweden)

    José Gregorio Arévalo Ascanio

    2015-11-01

    Full Text Available In this article the structure of the business of the city of Ocaña is explored with the aim of expanding the information and knowledge of the main variables of the productive activity of the municipality, its entrepreneurial spirit, technological development and productive structure. For this, a descriptive research was performed to identify economic activity in its various forms and promote the implementation of administrative practices consistent with national and international references.The results allowed to establish business weaknesses, including information, which once identified are used to design spaces training, acquisition of abilities and employers management practices in consistent with the challenges of competitiveness and stay on the market.As of the results was collected information regarding technological component companies of the productive fabric of the city, for which the application of tools for the analysis of information systems is proposed using the ISO 27001: 2005, using most appropriate technologies to study organizations that protect their most important asset information: information.

  11. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  12. Serious Games: Defense Advanced Research Projects Agency: An Interview with Innovation Information Office Program Manager CAPT Russell Shilling, PhD.

    Science.gov (United States)

    2012-04-01

    Dr. Shilling received his Doctor of Philosophy in Experimental Psychology (Auditory Psychophysics/Neuroscience) from the University of North Carolina at Greensboro in 1992 and his Bachelor of Arts in Psychology at Wake Forest University in 1985. In 1993 he graduated with top honors from Aerospace Experimental Psychologist training-Naval Flight Surgeon Class 93002. In 1996, he served as an Assistant/Associate Professor at the U.S. Air Force Academy in the Department of Behavioral Sciences and Leadership. In 2000, he arrived at the Naval Postgraduate School as an Associate Professor in the Operations Research and Systems Engineering Departments and became Technical Director for Immersive Technologies in the Modeling, Virtual Environments, and Simulation Institute. His military decorations include the Defense Superior Service Medal, Meritorious Service Medal (three awards), the Navy Commendation Medal, and the Navy Achievement Medal. He is also the recipient of the American Hospital Association's 2009 Executive Award for Excellence.

  13. Online nutrition information for pregnant women: a content analysis.

    Science.gov (United States)

    Storr, Tayla; Maher, Judith; Swanepoel, Elizabeth

    2016-06-29

    Pregnant women actively seek health information online, including nutrition and food-related topics. However, the accuracy and readability of this information have not been evaluated. The aim of this study was to describe and evaluate pregnancy-related food and nutrition information available online. Four search engines were used to search for pregnancy-related nutrition web pages. Content analysis of web pages was performed. Web pages were assessed against the 2013 Australian Dietary Guidelines to assess accuracy. Flesch-Kincaid (F-K), Simple Measure of Gobbledygook (SMOG), Gunning Fog Index (FOG) and Flesch reading ease (FRE) formulas were used to assess readability. Data was analysed descriptively. Spearman's correlation was used to assess the relationship between web page characteristics. Kruskal-Wallis test was used to check for differences among readability and other web page characteristics. A total of 693 web pages were included. Web page types included commercial (n = 340), not-for-profit (n = 113), blogs (n = 112), government (n = 89), personal (n = 36) and educational (n = 3). The accuracy of online nutrition information varied with 39.7% of web pages containing accurate information, 22.8% containing mixed information and 37.5% containing inaccurate information. The average reading grade of all pages analysed measured by F-K, SMOG and FOG was 11.8. The mean FRE was 51.6, a 'fairly difficult to read' score. Only 0.5% of web pages were written at or below grade 6 according to F-K, SMOG and FOG. The findings suggest that accuracy of pregnancy-related nutrition information is a problem on the internet. Web page readability is generally difficult and means that the information may not be accessible to those who cannot read at a sophisticated level. © 2016 John Wiley & Sons Ltd.

  14. On the Strategic Information Analysis for Macro-management Decision Service%论为宏观管理决策服务的战略情报研究

    Institute of Scientific and Technical Information of China (English)

    符福峘

    2003-01-01

    Four issues related with strategic information analysis for macro-managemgement decision are discussed.First, the features and functions; second, the scope and the requirement; thirdly, the development trend and the exist-ing problems; fourthly, the policies and principles. It's pointed out that strengthening the strategic information analysiswork is of great significance in the new era for the development of national economy and modernization of defense construc-tion.

  15. IMMAN: free software for information theory-based chemometric analysis.

    Science.gov (United States)

    Urias, Ricardo W Pino; Barigye, Stephen J; Marrero-Ponce, Yovani; García-Jacas, César R; Valdes-Martiní, José R; Perez-Gimenez, Facundo

    2015-05-01

    The features and theoretical background of a new and free computational program for chemometric analysis denominated IMMAN (acronym for Information theory-based CheMoMetrics ANalysis) are presented. This is multi-platform software developed in the Java programming language, designed with a remarkably user-friendly graphical interface for the computation of a collection of information-theoretic functions adapted for rank-based unsupervised and supervised feature selection tasks. A total of 20 feature selection parameters are presented, with the unsupervised and supervised frameworks represented by 10 approaches in each case. Several information-theoretic parameters traditionally used as molecular descriptors (MDs) are adapted for use as unsupervised rank-based feature selection methods. On the other hand, a generalization scheme for the previously defined differential Shannon's entropy is discussed, as well as the introduction of Jeffreys information measure for supervised feature selection. Moreover, well-known information-theoretic feature selection parameters, such as information gain, gain ratio, and symmetrical uncertainty are incorporated to the IMMAN software ( http://mobiosd-hub.com/imman-soft/ ), following an equal-interval discretization approach. IMMAN offers data pre-processing functionalities, such as missing values processing, dataset partitioning, and browsing. Moreover, single parameter or ensemble (multi-criteria) ranking options are provided. Consequently, this software is suitable for tasks like dimensionality reduction, feature ranking, as well as comparative diversity analysis of data matrices. Simple examples of applications performed with this program are presented. A comparative study between IMMAN and WEKA feature selection tools using the Arcene dataset was performed, demonstrating similar behavior. In addition, it is revealed that the use of IMMAN unsupervised feature selection methods improves the performance of both IMMAN and WEKA

  16. Plants versus fungi and oomycetes: pathogenesis, defense and counter-defense in the proteomics era.

    Science.gov (United States)

    El Hadrami, Abdelbasset; El-Bebany, Ahmed F; Yao, Zhen; Adam, Lorne R; El Hadrami, Ismailx; Daayf, Fouad

    2012-01-01

    Plant-fungi and plant-oomycete interactions have been studied at the proteomic level for many decades. However, it is only in the last few years, with the development of new approaches, combined with bioinformatics data mining tools, gel staining, and analytical instruments, such as 2D-PAGE/nanoflow-LC-MS/MS, that proteomic approaches thrived. They allow screening and analysis, at the sub-cellular level, of peptides and proteins resulting from plants, pathogens, and their interactions. They also highlight post-translational modifications to proteins, e.g., glycosylation, phosphorylation or cleavage. However, many challenges are encountered during in planta studies aimed at stressing details of host defenses and fungal and oomycete pathogenicity determinants during interactions. Dissecting the mechanisms of such host-pathogen systems, including pathogen counter-defenses, will ensure a step ahead towards understanding current outcomes of interactions from a co-evolutionary point of view, and eventually move a step forward in building more durable strategies for management of diseases caused by fungi and oomycetes. Unraveling intricacies of more complex proteomic interactions that involve additional microbes, i.e., PGPRs and symbiotic fungi, which strengthen plant defenses will generate valuable information on how pathosystems actually function in nature, and thereby provide clues to solving disease problems that engender major losses in crops every year.

  17. Latent morpho-semantic analysis : multilingual information retrieval with character n-grams and mutual information.

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Brett William; Chew, Peter A.; Abdelali, Ahmed (New Mexico State University)

    2008-08-01

    We describe an entirely statistics-based, unsupervised, and language-independent approach to multilingual information retrieval, which we call Latent Morpho-Semantic Analysis (LMSA). LMSA overcomes some of the shortcomings of related previous approaches such as Latent Semantic Analysis (LSA). LMSA has an important theoretical advantage over LSA: it combines well-known techniques in a novel way to break the terms of LSA down into units which correspond more closely to morphemes. Thus, it has a particular appeal for use with morphologically complex languages such as Arabic. We show through empirical results that the theoretical advantages of LMSA can translate into significant gains in precision in multilingual information retrieval tests. These gains are not matched either when a standard stemmer is used with LSA, or when terms are indiscriminately broken down into n-grams.

  18. Intelligent Data Analysis in the EMERCOM Information System

    Science.gov (United States)

    Elena, Sharafutdinova; Tatiana, Avdeenko; Bakaev, Maxim

    2017-01-01

    The paper describes an information system development project for the Russian Ministry of Emergency Situations (MES, whose international operations body is known as EMERCOM), which was attended by the representatives of both the IT industry and the academia. Besides the general description of the system, we put forward OLAP and Data Mining-based approaches towards the intelligent analysis of the data accumulated in the database. In particular, some operational OLAP reports and an example of multi-dimensional information space based on OLAP Data Warehouse are presented. Finally, we outline Data Mining application to support decision-making regarding security inspections planning and results consideration.

  19. Food labelled Information: An Empirical Analysis of Consumer Preferences

    Directory of Open Access Journals (Sweden)

    Alessandro Banterle

    2012-12-01

    Full Text Available This paper aims at analysing which kinds of currently labelled information are of interest and actually used by consumers, and which additional kinds could improve consumer choices. We investigate the attitude of consumers with respect to innovative strategies for the diffusion of product information, as smart-labels for mobile-phones. The empirical analysis was organised in focus groups followed by a survey on 240 consumers. Results show that the most important nutritional claims are vitamins, energy and fat content. Consumers show a high interest in the origin of the products, GMOs, environmental impact, animal welfare and type of breeding.

  20. COMPILATION AND ANALYSIS OF LEXICAL RESOURCES IN INFORMATION SCIENCE.

    Science.gov (United States)

    Information Science --thesauri, vocabularies, term lists and classification schemes. These resources were analysed with the purpose of tabulating the occurrence of terms. The study, therefore, was aimed at a quantitative review of lexical aids to information science language with the objective of determining its content and the frequency with which concepts have been recorded. This analysis, accomplished from a matrix using the IBM S 360/40 has enabled the researchers to quantify the terminology and to prepare a series of tables illustrating the

  1. [Analysis of information sources in the journal, Atencion Primaria].

    Science.gov (United States)

    Aleixandre, R; Giménez Sánchez, J V; Terrada Ferrandis, M L; López Piñero, J M

    1996-03-31

    To contribute to improving the understanding of the information bases of Spanish scientific production in the primary care field; to aid international contacts and the diffusion of information among doctors in our country. A bibliometric analysis of the bibliographic references of the studies published in the journal Atención Primaria during 1991. A data base, managed by dBASE IV, was created. The Unit of Documental Analysis and Bibliometry of the Institute of Documental and Historical Studies in Science (University of Valencia-CSIC). 2,615 bibliographic references in 205 studies contained in volume 8 of Atención Primaria. References from journal articles (68%) and books (26%) predominated. There were a large number of references from Spanish publications (45%) as against Northamerican (27%) and British (15%). There were few references from other European countries or Latin America. Information was quickly out of date (4 year semiperiod; Price index 50%). High proportion of self-quotations from the journal. The major role of the journal Atención Primaria in communicating information in the primary care field was underlined. The small amount of information from Latin America and E.U. countries (except Great Britain) highlights the isolation of Spain from these countries, which can be explained by the limits of the primary care field itself. There was also little use of information to which access was more difficult for primary care doctors, such as doctoral theses, congress papers or reports. Moreover this is a field with a high percentage of recent literature and rapidly out-of-date information.

  2. Identification and Expression Analysis of Candidate Genes Associated with Defense Responses to Phytophthora capsici in Pepper Line “PI 201234”

    Directory of Open Access Journals (Sweden)

    Pingyong Wang

    2015-05-01

    Full Text Available Phytophthora capsici (Leonian, classified as an oomycete, seriously threatens the production of pepper (Capsicum annuum. Current understanding of the defense responses in pepper to P. capsici is limited. In this study, RNA-sequencing analysis was utilized to identify differentially expressed genes in the resistant line “PI 201234”, with 1220 differentially expressed genes detected. Of those genes, 480 were up-regulated and 740 were down-regulated, with 211 candidate genes found to be involved in defense responses based on the gene annotations. Furthermore, the expression patterns of 12 candidate genes were further validated via quantitative real-time PCR (qPCR. These genes were found to be significantly up-regulated at different time points post-inoculation (6 hpi, 24 hpi, and 5 dpi in the resistant line “PI 201234” and susceptible line “Qiemen”. Seven genes were found to be involved in cell wall modification, phytoalexin biosynthesis, symptom development, and phytohormone signaling pathways, thus possibly playing important roles in combating exogenous pathogens. The genes identified herein will provide a basis for further gene cloning and functional verification studies and will aid in an understanding of the regulatory mechanism of pepper resistance to P. capsici.

  3. Comparative Analysis of Defense Responses in Chocolate Spot-Resistant and -Susceptible Faba Bean (Vicia faba) Cultivars Following Infection by the Necrotrophic Fungus Botrytis fabae

    Science.gov (United States)

    El-Komy, Mahmoud H.

    2014-01-01

    In this study, resistance responses were investigated during the interaction of Botrytis fabae with two faba bean cultivars expressing different levels of resistance against this pathogen, Nubaria (resistant) and Giza 40 (susceptible). Disease severity was assessed on leaves using a rating scale from 1 to 9. Accumulation levels of reactive oxygen species (ROS), lipid peroxidation and antioxidant enzymes (superoxide dismutase, catalase and ascorbate peroxidase) were measured in leaf tissues at different times of infection. The expression profiles of two pathogenesis-related proteins (PRPs) encoded by the genes PR-1 and β-1,3-glucanase were also investigated using reverse transcription RT-PCR analysis. The accumulation of these defense responses was induced significantly in both cultivars upon infection with B. fabae compared with un-inoculated controls. The resistant cultivar showed weaker necrotic symptom expression, less ROS accumulation, a lower rate of lipid peroxidation and higher activity of the enzymatic ROS scavenging system compared with susceptible cultivar. Interestingly, ROS accumulated rapidly in the resistant leaf tissues and peaked during the early stages of infection, whereas accumulation was stronger and more intense in the susceptible tissues in later stages. Moreover, the response of the resistant cultivar to infection was earlier and stronger, exhibiting high transcript accumulation of the PR genes. These results indicated that the induction of oxidant/antioxidant responses and the accumulation of PRPs are part of the faba bean defense mechanism against the necrotrophic fungus B. fabae with a different intensity and timing of induction, depending on the resistance levels. PMID:25506300

  4. Solving Reality Problems by Using Mutual Information Analysis

    Directory of Open Access Journals (Sweden)

    Chia-Ju Liu

    2014-01-01

    Full Text Available Cross-mutual information (CMI can calculate to time series for thousands of sampled points from corticocortical connection among different functional states of brain in Alzheimer’s disease (AD patients. The aim of this study was to use mutual information analysis in the multichannel EEG to predict the probability of AD disease. Considering the correlation between AD disease and ageing effect, the participants were 9 AD patients and 45 normal cases involving teenagers, young people and elders. This data revealed that both right frontal and temporo-parietal are differences between normal and AD participants. Besides, this study found the theta band is the main frequency to separate AD patients from all participants. Furthermore, this study suggested a higher distinguishable method by mutual information to predict the possibility AD patients.

  5. Analysis of Annotation on Documents for Recycling Information

    Science.gov (United States)

    Nakai, Tomohiro; Kondo, Nobuyuki; Kise, Koichi; Matsumoto, Keinosuke

    In order to make collaborative business activities fruitful, it is essential to know characteristics of organizations and persons in more details and to gather information relevant to the activities. In this paper, we describe a notion of “information recycle" that actualizes these requirements by analyzing documents. The key of recycling information is to utilize annotations on documents as clues for generating users' profiles and for weighting contents in the context of the activities. We also propose a method of extracting annotations on paper documents just by pressing one button with the help of techniques of camera-based document image analysis. Experimental results demonstrate that it is fundamentally capable of acquiring annotations on paper documents on condition that their electronic versions without annotations are available for the processing.

  6. Information technology portfolio in supply chain management using factor analysis

    Directory of Open Access Journals (Sweden)

    Ahmad Jaafarnejad

    2013-11-01

    Full Text Available The adoption of information technology (IT along with supply chain management (SCM has become increasingly a necessity among most businesses. This enhances supply chain (SC performance and helps companies achieve the organizational competitiveness. IT systems capture and analyze information and enable management to make decisions by considering a global scope across the entire SC. This paper reviews the existing literature on IT in SCM and considers pertinent criteria. Using principal component analysis (PCA of factor analysis (FA, a number of related criteria are divided into smaller groups. Finally, SC managers can develop an IT portfolio in SCM using mean values of few extracted components on the relevance –emergency matrix. A numerical example is provided to explain details of the proposed method.

  7. Crime Mapping and Geographical Information Systems in Crime Analysis

    Directory of Open Access Journals (Sweden)

    Murat Dağlar

    2016-04-01

    Full Text Available As essential apparatus in crime analysis, crime mapping and Geographical Information Systems (GIS are being progressively more accepted by police agencies. Development in technology and the accessibility of geographic data sources make it feasible for police departments to use GIS and crime mapping. GIS and crime mapping can be utilized as devices to discover reasons contributing to crime, and hence let law enforcement agencies proactively take action against the crime problems before they become challenging. The purpose of this study is to conduct a literature review of Geographical Information System and Crime Mapping in Crime Analysis and to propose policy recommendations regarding to implementation of crime mapping and GIS. To achieve this purpose, first a historical evaluation of GIS and crime mapping will be rendered and then the importance of place will be explained in terms of assessing crime problems accurately.

  8. Structural Simulations and Conservation Analysis -Historic Building Information Model (HBIM

    Directory of Open Access Journals (Sweden)

    C. Dore

    2015-02-01

    Full Text Available In this paper the current findings to date of the Historic Building Information Model (HBIM of the Four Courts in Dublin are presented. The Historic Building Information Model (HBIM forms the basis for both structural and conservation analysis to measure the impact of war damage which still impacts on the building. The laser scan survey was carried out in the summer of 2014 of the internal and external structure. After registration and processing of the laser scan survey, the HBIM was created of the damaged section of the building and is presented as two separate workflows in this paper. The first is the model created from historic data, the second a procedural and segmented model developed from laser scan survey of the war damaged drum and dome. From both models structural damage and decay simulations will be developed for documentation and conservation analysis.

  9. Information Retrieval and Graph Analysis Approaches for Book Recommendation.

    Science.gov (United States)

    Benkoussas, Chahinez; Bellot, Patrice

    2015-01-01

    A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model) and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval approach to related document network comprised of social links. We called Directed Graph of Documents (DGD) a network constructed with documents and social information provided from each one of them. Specifically, this work tackles the problem of book recommendation in the context of INEX (Initiative for the Evaluation of XML retrieval) Social Book Search track. A series of reranking experiments demonstrate that combining retrieval models yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments.

  10. A Brief Analysis to Informal Chatting on the Phone

    Institute of Scientific and Technical Information of China (English)

    金晓瑜

    2005-01-01

    An analysis to the telephoning chat is often ignored by analysts as it is very common and very colloquial.In my opinion,however,it differs to the spoken language life in some aspects. For example, it has two parties connected by a line, the speakers talks in deferent places and may do different things.So in analyzing the discourse,such as field, tenor, and mode, skipping and coherence, reference and presupposition in to analyze the informal chatting on the phone.It also mentlors some practical applications of the analysis to this style of discourse in the conclusion part.

  11. Cognitive Dimensions Analysis of Interfaces for Information Seeking

    CERN Document Server

    Golovchinsky, Gene

    2009-01-01

    Cognitive Dimensions is a framework for analyzing human-computer interaction. It is used for meta-analysis, that is, for talking about characteristics of systems without getting bogged down in details of a particular implementation. In this paper, I discuss some of the dimensions of this theory and how they can be applied to analyze information seeking interfaces. The goal of this analysis is to introduce a useful vocabulary that practitioners and researchers can use to describe systems, and to guide interface design toward more usable and useful systems

  12. Carbon Dioxide Information Analysis Center: FY 1991 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M.; Stoss, F.W.

    1992-06-01

    During the course of a fiscal year, Oak Ridge National Laboratory's Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specially publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIAC's staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC's staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1990 to September 30, 1991. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC's response to those inquiries. An analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, factsheets, specially publications, and reprints is provided. Comments and descriptions of CDIAC's information management systems, professional networking, and special bilateral agreements are also described.

  13. Carbon Dioxide Information Analysis Center: FY 1991 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M.; Stoss, F.W.

    1992-06-01

    During the course of a fiscal year, Oak Ridge National Laboratory`s Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specially publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIAC`s staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC`s staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1990 to September 30, 1991. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC`s response to those inquiries. An analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, factsheets, specially publications, and reprints is provided. Comments and descriptions of CDIAC`s information management systems, professional networking, and special bilateral agreements are also described.

  14. Carbon Dioxide Information Analysis Center: FY 1992 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M. [Oak Ridge National Lab., TN (United States). Carbon Dioxide Information Analysis Center; Stoss, F.W. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center

    1993-03-01

    During the course of a fiscal year, Oak Ridge National Laboratory`s Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specialty publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIACs staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC`s staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1991 to September 30, 1992. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC`s response to those inquiries. As analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, fact sheets, specialty publications, and reprints is provided. Comments and descriptions of CDIAC`s information management systems, professional networking, and special bilateral agreements are also described.

  15. Fusion of Multimodal Information in Music Content Analysis

    OpenAIRE

    Essid, Slim; Richard, Gaël

    2012-01-01

    Music is often processed through its acoustic realization. This is restrictive in the sense that music is clearly a highly multimodal concept where various types of heterogeneous information can be associated to a given piece of music (a musical score, musicians' gestures, lyrics, user-generated metadata, etc.). This has recently led researchers to apprehend music through its various facets, giving rise to "multimodal music analysis" studies. This article gives a synthetic overview of methods...

  16. [Analysis of utilization of information in the journal Medicina Clinica].

    Science.gov (United States)

    Aleixandre, R; Giménez Sánchez, J V; Terrada, M L; López Piñero, J M

    1994-09-10

    Scientific communication knowledge is specifically based in the analysis of the bibliographic references inside the publications. Pattern and laws determining the information consumption in the items of the journal Medicina Clinica are investigated in the present study as its own aim. An analysis was performed on the 13,286 references downloaded from 618 papers published by the journal in 1990. With dBASE IV was generated a database for the management of the information; data was distributed in several tables through criteria of age, documentary types, countries, journals and Bradford zones. The analysed references belong to 1,241 different journals, 110 from Spain. Being two thirds of the total sum, the publications from United States and United Kingdom have received more citations than those from Spain. The publications from european countries, like France, Germany and Italy, are scarcely present. Bradford core is constituted by the journals Medicina Clinica and The Lancet. The analysis of the bibliographic references available from the articles in this journal is able to produce knowledge on the information consumption by the practitioners; its usefulness as a complementary utility to the Indice de Citas e Indicadores Bibliométricos de Revistas Españolas de Medicina Interna y sus especialidades 1990 must be considered.

  17. Directory of Federally Supported Information Analysis Centers, 1979. Fourth Edition.

    Science.gov (United States)

    1979-01-01

    controlled by (DASIAC) Headquarters, DNA . General Electric Tempo 816 State St. SERVICES: Provides consulting and advisory Santa Barbara, Calif. 93102...makes materials available to qualified users; assists in organizing, announcing, and conducting SPONSOR: Defense Nuclear Agency ( DNA ). seminars...and Greenland flora; Antarctic lichen mission to visit the Center should be addressed to and plant fossil collections. the Security Office of the

  18. Design and Implementation of Electric Power Information Security Attack and Defense Platform%电力信息安全实验室攻防演练平台的设计与应用

    Institute of Scientific and Technical Information of China (English)

    么利中; 伟平

    2014-01-01

    随着电力公司信息化快速发展,特别是SG-ERP的实施,信息系统的基础性、全局性作用越来越强。文章论述了信息安全攻防演练平台采用的基于Hook的主机监视技术、隐藏技术、虚拟机管理技术。文章通过对信息安全现状的需求分析,给出了信息安全攻防演练平台的总体架构和各部分功能描述,重点讲述了管理模块、攻防考试模块、培训演练模块和数据日志模块的构成及其设计与实现过程。通过对系统的运行进行测试,验证了各项功能的合理性和可用性。%With the fast development of informationization of electric power enterprises, especially after the implementation of SG-ERP, information system increasingly plays a basic and global role. In this paper, some techniques adopted in information security attack and defense platform are elaborated, including hook-based host computer monitoring technique, concealing technique, virtual machine management technique. Through analyzing the present information security situation, the overall framework of the platform is put forward and the functions of each part are described, the constitution, design and implementing procedure of management module, attack and defense examination module, training and drilling module and data daily record module are demonstrated with focus. By testing the system operation, the rationality and feasibility of each function are veriifed.

  19. A qualitative content analysis of global health engagements in Peacekeeping and Stability Operations Institute's stability operations lessons learned and information management system.

    Science.gov (United States)

    Nang, Roberto N; Monahan, Felicia; Diehl, Glendon B; French, Daniel

    2015-04-01

    Many institutions collect reports in databases to make important lessons-learned available to their members. The Uniformed Services University of the Health Sciences collaborated with the Peacekeeping and Stability Operations Institute to conduct a descriptive and qualitative analysis of global health engagements (GHEs) contained in the Stability Operations Lessons Learned and Information Management System (SOLLIMS). This study used a summative qualitative content analysis approach involving six steps: (1) a comprehensive search; (2) two-stage reading and screening process to identify first-hand, health-related records; (3) qualitative and quantitative data analysis using MAXQDA, a software program; (4) a word cloud to illustrate word frequencies and interrelationships; (5) coding of individual themes and validation of the coding scheme; and (6) identification of relationships in the data and overarching lessons-learned. The individual codes with the most number of text segments coded included: planning, personnel, interorganizational coordination, communication/information sharing, and resources/supplies. When compared to the Department of Defense's (DoD's) evolving GHE principles and capabilities, the SOLLIMS coding scheme appeared to align well with the list of GHE capabilities developed by the Department of Defense Global Health Working Group. The results of this study will inform practitioners of global health and encourage additional qualitative analysis of other lessons-learned databases.

  20. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  1. Structured information analysis for human reliability analysis of emergency tasks in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Won Dea; Kim, Jae Whan; Park, Jin Kyun; Ha, Jae Joo [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2000-02-01

    More than twenty HRA (Human Reliability Analysis) methodologies have been developed and used for the safety analysis in nuclear field during the past two decades. However, no methodology appears to have universally been accepted, as various limitations have been raised for more widely used ones. One of the most important limitations of conventional HRA is insufficient analysis of the task structure and problem space. To resolve this problem, we suggest SIA (Structured Information Analysis) for HRA. The proposed SIA consists of three parts. The first part is the scenario analysis that investigates the contextual information related to the given task on the basis of selected scenarios. The second is the goals-means analysis to define the relations between the cognitive goal and task steps. The third is the cognitive function analysis module that identifies the cognitive patterns and information flows involved in the task. Through the three-part analysis, systematic investigation is made possible from the macroscopic information on the tasks to the microscopic information on the specific cognitive processes. It is expected that analysts can attain a structured set of information that helps to predict the types and possibility of human error in the given task. 48 refs., 12 figs., 11 tabs. (Author)

  2. Structured information analysis for human reliability analysis of emergency tasks in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Won Dea; Kim, Jae Whan; Park, Jin Kyun; Ha, Jae Joo [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2000-02-01

    More than twenty HRA (Human Reliability Analysis) methodologies have been developed and used for the safety analysis in nuclear field during the past two decades. However, no methodology appears to have universally been accepted, as various limitations have been raised for more widely used ones. One of the most important limitations of conventional HRA is insufficient analysis of the task structure and problem space. To resolve this problem, we suggest SIA (Structured Information Analysis) for HRA. The proposed SIA consists of three parts. The first part is the scenario analysis that investigates the contextual information related to the given task on the basis of selected scenarios. The second is the goals-means analysis to define the relations between the cognitive goal and task steps. The third is the cognitive function analysis module that identifies the cognitive patterns and information flows involved in the task. Through the three-part analysis, systematic investigation is made possible from the macroscopic information on the tasks to the microscopic information on the specific cognitive processes. It is expected that analysts can attain a structured set of information that helps to predict the types and possibility of human error in the given task. 48 refs., 12 figs., 11 tabs. (Author)

  3. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  4. Validity of Self-Report Measures of Defense Mechanisms

    Science.gov (United States)

    Mehlman; Slane

    1994-06-01

    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  5. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  6. Clinical decision support tools: analysis of online drug information databases

    Directory of Open Access Journals (Sweden)

    Seamon Matthew J

    2007-03-01

    Full Text Available Abstract Background Online drug information databases are used to assist in enhancing clinical decision support. However, the choice of which online database to consult, purchase or subscribe to is likely made based on subjective elements such as history of use, familiarity, or availability during professional training. The purpose of this study was to evaluate clinical decision support tools for drug information by systematically comparing the most commonly used online drug information databases. Methods Five commercially available and two freely available online drug information databases were evaluated according to scope (presence or absence of answer, completeness (the comprehensiveness of the answers, and ease of use. Additionally, a composite score integrating all three criteria was utilized. Fifteen weighted categories comprised of 158 questions were used to conduct the analysis. Descriptive statistics and Chi-square were used to summarize the evaluation components and make comparisons between databases. Scheffe's multiple comparison procedure was used to determine statistically different scope and completeness scores. The composite score was subjected to sensitivity analysis to investigate the effect of the choice of percentages for scope and completeness. Results The rankings for the databases from highest to lowest, based on composite scores were Clinical Pharmacology, Micromedex, Lexi-Comp Online, Facts & Comparisons 4.0, Epocrates Online Premium, RxList.com, and Epocrates Online Free. Differences in scope produced three statistical groupings with Group 1 (best performers being: Clinical Pharmacology, Micromedex, Facts & Comparisons 4.0, Lexi-Comp Online, Group 2: Epocrates Premium and RxList.com and Group 3: Epocrates Free (p Conclusion Online drug information databases, which belong to clinical decision support, vary in their ability to answer questions across a range of categories.

  7. Information-Theoretical Complexity Analysis of Selected Elementary Chemical Reactions

    Science.gov (United States)

    Molina-Espíritu, M.; Esquivel, R. O.; Dehesa, J. S.

    We investigate the complexity of selected elementary chemical reactions (namely, the hydrogenic-abstraction reaction and the identity SN2 exchange reaction) by means of the following single and composite information-theoretic measures: disequilibrium (D), exponential entropy(L), Fisher information (I), power entropy (J), I-D, D-L and I-J planes and Fisher-Shannon (FS) and Lopez-Mancini-Calbet (LMC) shape complexities. These quantities, which are functionals of the one-particle density, are computed in both position (r) and momentum (p) spaces. The analysis revealed that the chemically significant regions of these reactions can be identified through most of the single information-theoretic measures and the two-component planes, not only the ones which are commonly revealed by the energy, such as the reactant/product (R/P) and the transition state (TS), but also those that are not present in the energy profile such as the bond cleavage energy region (BCER), the bond breaking/forming regions (B-B/F) and the charge transfer process (CT). The analysis of the complexities shows that the energy profile of the abstraction reaction bears the same information-theoretical features of the LMC and FS measures, however for the identity SN2 exchange reaction does not hold a simple behavior with respect to the LMC and FS measures. Most of the chemical features of interest (BCER, B-B/F and CT) are only revealed when particular information-theoretic aspects of localizability (L or J), uniformity (D) and disorder (I) are considered.

  8. Patent portfolio analysis model based on legal status information

    Institute of Scientific and Technical Information of China (English)

    Xuezhao; WANG; Yajuan; ZHAO; Jing; ZHANG; Ping; ZHAO

    2014-01-01

    Purpose:This research proposes a patent portfolio analysis model based on the legal status information to chart out a competitive landscape in a particular field,enabling organizations to position themselves within the overall technology landscape.Design/methodology/approach:Three indicators were selected for the proposed model:Patent grant rate,valid patents rate and patent maintenance period.The model uses legal status information to perform a qualitative evaluation of relative values of the individual patents,countries or regions’ technological capabilities and competitiveness of patent applicants.The results are visualized by a four-quadrant bubble chart To test the effectiveness of the model,it is used to present a competitive landscape in the lithium ion battery field.Findings:The model can be used to evaluate the values of the individual patents,highlight countries or regions’ positions in the field,and rank the competitiveness of patent applicants in the field.Research limitations:The model currently takes into consideration only three legal status indicators.It is actually feasible to introduce more indicators such as the reason for invalid patents and the distribution of patent maintenance time and associate them with those in the proposed model.Practical implications:Analysis of legal status information in combination of patent application information can help an organization to spot gaps in its patent claim coverage,as well as evaluate patent quality and maintenance situation of its granted patents.The study results can be used to support technology assessment,technology innovation and intellectual property management.Originality/value:Prior studies attempted to assess patent quality or competitiveness by using either single patent legal status indicator or comparative analysis of the impacts of each indicator.However,they are insufficient in presenting the combined effects of the evaluation indicators.Using our model,it appears possible to get a

  9. Differential transcriptome analysis of leaves of tea plant (Camellia sinensis) provides comprehensive insights into the defense responses to Ectropis oblique attack using RNA-Seq.

    Science.gov (United States)

    Wang, Ya-Nan; Tang, Lei; Hou, Yan; Wang, Ping; Yang, Hua; Wei, Chao-Ling

    2016-07-01

    Tea is a very popular and healthy nonalcoholic beverage worldwide. As an evergreen woody plant, the cultivation of tea plants (Camellia sinensis) is challenged by biotic stresses, and one of which is feeding of Ectropis oblique. In China, E. oblique infestation causes serious damages in many tea cultivation areas. Tea plants have evolved sophisticated strategies to cope with attack by E. oblique. To elucidate the molecular mechanisms of the response to E. oblique in tea plants, the differential gene expression profiles between the E. oblique damage-induced tea plants and undamaged control using RNA sequencing (RNA-Seq) were obtained. A total of 1859 differentially expressed genes were identified, including 949 upregulated and 910 downregulated genes. Overall, 90 signal transduction genes, 100 anti-insect responsive transcription factors, 50 genes related to phenylpropanoid biosynthesis, 41 unigenes related to herbivore-induced plant volatiles (HIPVs) biosynthesis, and 8 caffeine biosynthesis genes were found to be differentially regulated. Metabolic pathway analysis indicated that plant secondary metabolites and the signaling pathways may play an important role in defense against insects, and a closer examination at the expression of some crucial genes revealed differential expression patterns after feeding by E. oblique. Furthermore, quantitative RT-PCR (qRT-PCR) analysis further confirmed the results of RNA-Seq. Our dataset provides the most comprehensive sequence resource available for studying the resistance to E. oblique in tea, which will benefit our understanding of the overall mechanisms underlying inducible defenses responses, and may be useful to create novel prevention measures against insects to reduce pesticide usage in eco-friendly tea farming.

  10. Principal Component Analysis - A Powerful Tool in Computing Marketing Information

    Directory of Open Access Journals (Sweden)

    Constantin C.

    2014-12-01

    Full Text Available This paper is about an instrumental research regarding a powerful multivariate data analysis method which can be used by the researchers in order to obtain valuable information for decision makers that need to solve the marketing problem a company face with. The literature stresses the need to avoid the multicollinearity phenomenon in multivariate analysis and the features of Principal Component Analysis (PCA in reducing the number of variables that could be correlated with each other to a small number of principal components that are uncorrelated. In this respect, the paper presents step-by-step the process of applying the PCA in marketing research when we use a large number of variables that naturally are collinear.

  11. Analysis of the roles of NrdR and DnaB from Streptococcus pyogenes in response to host defense.

    Science.gov (United States)

    Zhang, Yan; Okada, Ryo; Isaka, Masanori; Tatsuno, Ichiro; Isobe, Ken-Ichi; Hasegawa, Tadao

    2015-03-01

    Toxic shock syndrome caused by Streptococcus pyogenes (S. pyogenes) is a re-emerging infectious disease. Many virulence-associated proteins play important roles in its pathogenesis and the production of these proteins is controlled by many regulatory factors. CovS is one of the most important two-component sensor proteins in S. pyogenes, and it has been analyzed extensively. Our recent analyses revealed the existence of a transposon between covS and nrdR in several strains, and we speculated that this insertion has some importance. Hence, we examined the significances of the NrdR stand-alone regulator and DnaB, which is encoded by the gene located immediately downstream of nrdR in S. pyogenes infection. We established an nrdR-only knockout strain, and both nrdR and partial dnaB knockout strain. These established knockout strains exhibited a deteriorated response to H2 O2 exposure. nrdR and partial dnaB knockout strain was more easily killed by human polynuclear blood cells, but the nrdR-only knockout strain had no significant difference compared to wild type in contrast to the combined knockout strain. In addition, the mouse infection model experiment illustrated that nrdR and partial dnaB knockout strain, but not the nrdR-only knockout strain, was less virulent compared with the parental strain. These results suggest that DnaB is involved in response to host defense.

  12. 手机病毒防御技术解析%The Technical Analysis of Defense of Mobile Phone Virus

    Institute of Scientific and Technical Information of China (English)

    王舸; 刘进

    2012-01-01

    随着3G网络的推进和智能手机的不断普及,上网卡的大量使用及流量型业务的快速增长,将传统互联网的安全问题带进了通信网络,针对手机的恶意行为也逐渐浮出水面,严重影响了用户的正常使用,也影响了运营商的网络环境、公司收益及社会声誉.长远来看,手机病毒防御将会是通信运营商互联网业务面临的头号挑战.%Along with the promotion of 3G network and popularization of intelligent mobile phone, extensive use of network card and rapid growth of flow type business, the security issues of traditional Internet are brought into the communication network. The malicious behavior for the mobile phone is gradually surfaced, which seriously affect the user's normal use, also affect the operators' network environment, company revenue and social reputation. In the long run, defense of mobile phone virus will be the number one challenge faced by communications operators Internet business.

  13. Effect of tacrolimus on the cauda epididymis in rats: analysis of epididymal biochemical markers or antioxidant defense enzymes.

    Science.gov (United States)

    Hisatomi, Akihiko; Sakuma, Shozo; Fujiwara, Michio; Seki, Jiro

    2008-01-14

    The effect of tacrolimus on epididymal biochemical markers was investigated following single daily subcutaneous doses of 1, 2 and 3 mg kg(-1) day(-1) for 2 weeks to male adult rats. The tacrolimus 2 and 3 mg kg(-1) day(-1) groups showed a significant and dose-dependent decrease in sperm count in the cauda epididymis. Among tissue levels of L-carnitine, alpha-glucosidase and acid phosphatase, only L-carnitine level in the cauda epididymis was significantly reduced in the tacrolimus 3 mg kg(-1)day(-1) group. However, no significant difference was seen in the plasma L-carnitine. It was suggested that lowering of L-carnitine in the cauda epididymis was attributable to the adverse effect on epididymal function to transport and/or concentrate L-carnitine. Since L-carnitine has been reported to have antioxidant potential, antioxidant defense enzymes in the cauda epididymis such as superoxide dismutase (SOD), catalase, glutathione peroxidase and glutathione reductase were evaluated. The results showed no significant differences in activities, confirming that the treatment with tacrolimus did not affect the activities of these antioxidant enzymes. In conclusion, this study indicates that tacrolimus induces a decrease in L-carnitine level in the cauda epididymis, which is probably caused by impairment of epididymal function to transport and/or concentrate L-carnitine from bloodstream, and a decrease in sperm count.

  14. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  15. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  16. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  17. Information Problem Solving: Analysis of a Complex Cognitive Skill

    NARCIS (Netherlands)

    S. Brand-Gruwel; I. Wopereis; Y. Vermetten

    2004-01-01

    textabstractIn (higher) education students are often faced with information problems: tasks or assignments which require the student to identify information needs, locate corresponding information sources, extract and organize relevant information from each source, and synthesize information from a

  18. Information Problem Solving: Analysis of a Complex Cognitive Skill

    NARCIS (Netherlands)

    S. Brand-Gruwel; I. Wopereis; Y. Vermetten

    2004-01-01

    textabstractIn (higher) education students are often faced with information problems: tasks or assignments which require the student to identify information needs, locate corresponding information sources, extract and organize relevant information from each source, and synthesize information from a

  19. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  20. The cytochrome P450 genes of channel catfish: their involvement in disease defense responses as revealed by meta-analysis of RNA-Seq datasets

    Science.gov (United States)

    Zhang, Jiaren; Yao, Jun; Wang, Ruijia; Zhang, Yu; Liu, Shikai; Sun, Luyang; Jiang, Yanliang; Feng, Jianbin; Liu, Nannan; Nelson, David; Waldbieser, Geoff; Liu, Zhanjiang

    2015-01-01

    Background Cytochrome P450s (CYPs) encode one of the most diverse enzyme superfamily in nature. They catalyze oxidative reactions of endogenous molecules and exogenous chemicals. Methods We identified CYPs genes through in silico analysis using EST, RNA-Seq and genome databases of channel catfish. Phylogenetic analyses and conserved syntenic analyses were conducted to determine their identities and orthologies. Meta-analysis of RNA-Seq databases was conducted to analyze expression profile of CYP genes following bacterial infection. Results A full set of 61 CYP genes were identified and characterized in channel catfish. Phylogenetic tree and conserved synteny provided strong evidence of their identities and orthorlogy. Lineage-specific gene duplication was evident in a number of clans in channel catfish. CYP46A1 is missing in the catfish genome as observed with syntenic analysis and RT-PCR analysis. Thirty CYPs were found up- or down-regulated in liver, while seven and eight CYPs were observed regulated in intestine and gill following bacterial infection. Conclusion We systematically identified and characterized a full set of 61 CYP genes in channel catfish and studied their expression profiles after bacterial infection. Strikingly large numbers of CYP genes appear to be involved in the bacterial defense processes. General significance This work provides an example to systematically study CYP genes in non-model species. Moreover, it provides a basis for further toxicological and physiological studies in channel catfish. PMID:24780645

  1. Least Dependent Component Analysis Based on Mutual Information

    CERN Document Server

    Stögbauer, H; Astakhov, S A; Grassberger, P; St\\"ogbauer, Harald; Kraskov, Alexander; Astakhov, Sergey A.; Grassberger, Peter

    2004-01-01

    We propose to use precise estimators of mutual information (MI) to find least dependent components in a linearly mixed signal. On the one hand this seems to lead to better blind source separation than with any other presently available algorithm. On the other hand it has the advantage, compared to other implementations of `independent' component analysis (ICA) some of which are based on crude approximations for MI, that the numerical values of the MI can be used for: (i) estimating residual dependencies between the output components; (ii) estimating the reliability of the output, by comparing the pairwise MIs with those of re-mixed components; (iii) clustering the output according to the residual interdependencies. For the MI estimator we use a recently proposed k-nearest neighbor based algorithm. For time sequences we combine this with delay embedding, in order to take into account non-trivial time correlations. After several tests with artificial data, we apply the resulting MILCA (Mutual Information based ...

  2. Use of historical information in extreme storm surges frequency analysis

    Science.gov (United States)

    Hamdi, Yasser; Duluc, Claire-Marie; Deville, Yves; Bardet, Lise; Rebour, Vincent

    2013-04-01

    The prevention of storm surge flood risks is critical for protection and design of coastal facilities to very low probabilities of failure. The effective protection requires the use of a statistical analysis approach having a solid theoretical motivation. Relating extreme storm surges to their frequency of occurrence using probability distributions has been a common issue since 1950s. The engineer needs to determine the storm surge of a given return period, i.e., the storm surge quantile or design storm surge. Traditional methods for determining such a quantile have been generally based on data from the systematic record alone. However, the statistical extrapolation, to estimate storm surges corresponding to high return periods, is seriously contaminated by sampling and model uncertainty if data are available for a relatively limited period. This has motivated the development of approaches to enlarge the sample extreme values beyond the systematic period. The nonsystematic data occurred before the systematic period is called historical information. During the last three decades, the value of using historical information as a nonsystematic data in frequency analysis has been recognized by several authors. The basic hypothesis in statistical modeling of historical information is that a perception threshold exists and that during a giving historical period preceding the period of tide gauging, all exceedances of this threshold have been recorded. Historical information prior to the systematic records may arise from high-sea water marks left by extreme surges on the coastal areas. It can also be retrieved from archives, old books, earliest newspapers, damage reports, unpublished written records and interviews with local residents. A plotting position formula, to compute empirical probabilities based on systematic and historical data, is used in this communication paper. The objective of the present work is to examine the potential gain in estimation accuracy with the

  3. Analysis of Information Leakage in Quantum Key Agreement

    Institute of Scientific and Technical Information of China (English)

    LIU Sheng-li; ZHENG Dong; CHENG Ke-fei

    2006-01-01

    Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described:sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.

  4. Environmental Quality Information Analysis Center (EQIAC) operating procedures handbook

    Energy Technology Data Exchange (ETDEWEB)

    Walsh, T.E. (Florida Univ., Gainesville, FL (United States)); Das, S. (Oak Ridge National Lab., TN (United States))

    1992-08-01

    The Operating Procedures Handbook of the Environmental Quality Information Analysis Center (EQIAC) is intended to be kept current as EQIAC develops and evolves. Its purpose is to provide a comprehensive guide to the mission, infrastructure, functions, and operational procedures of EQIAC. The handbook is a training tool for new personnel and a reference manual for existing personnel. The handbook will be distributed throughout EQIAC and maintained in binders containing current dated editions of the individual sections. The handbook will be revised at least annually to reflect the current structure and operational procedures of EQIAC. The EQIAC provides information on environmental issues such as compliance, restoration, and environmental monitoring do the Air Force and DOD contractors.

  5. Deep and Structured Robust Information Theoretic Learning for Image Analysis.

    Science.gov (United States)

    Deng, Yue; Bao, Feng; Deng, Xuesong; Wang, Ruiping; Kong, Youyong; Dai, Qionghai

    2016-07-07

    This paper presents a robust information theoretic (RIT) model to reduce the uncertainties, i.e. missing and noisy labels, in general discriminative data representation tasks. The fundamental pursuit of our model is to simultaneously learn a transformation function and a discriminative classifier that maximize the mutual information of data and their labels in the latent space. In this general paradigm, we respectively discuss three types of the RIT implementations with linear subspace embedding, deep transformation and structured sparse learning. In practice, the RIT and deep RIT are exploited to solve the image categorization task whose performances will be verified on various benchmark datasets. The structured sparse RIT is further applied to a medical image analysis task for brain MRI segmentation that allows group-level feature selections on the brain tissues.

  6. Probabilistic analysis of the human transcriptome with side information

    CERN Document Server

    Lahti, Leo

    2011-01-01

    Understanding functional organization of genetic information is a major challenge in modern biology. Following the initial publication of the human genome sequence in 2001, advances in high-throughput measurement technologies and efficient sharing of research material through community databases have opened up new views to the study of living organisms and the structure of life. In this thesis, novel computational strategies have been developed to investigate a key functional layer of genetic information, the human transcriptome, which regulates the function of living cells through protein synthesis. The key contributions of the thesis are general exploratory tools for high-throughput data analysis that have provided new insights to cell-biological networks, cancer mechanisms and other aspects of genome function. A central challenge in functional genomics is that high-dimensional genomic observations are associated with high levels of complex and largely unknown sources of variation. By combining statistical ...

  7. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  8. Climate Informed Low Flow Frequency Analysis Using Nonstationary Modeling

    Science.gov (United States)

    Liu, D.; Guo, S.; Lian, Y.

    2014-12-01

    Stationarity is often assumed for frequency analysis of low flows in water resources management and planning. However, many studies have shown that flow characteristics, particularly the frequency spectrum of extreme hydrologic events,were modified by climate change and human activities and the conventional frequency analysis without considering the non-stationary characteristics may lead to costly design. The analysis presented in this paper was based on the more than 100 years of daily flow data from the Yichang gaging station 44 kilometers downstream of the Three Gorges Dam. The Mann-Kendall trend test under the scaling hypothesis showed that the annual low flows had significant monotonic trend, whereas an abrupt change point was identified in 1936 by the Pettitt test. The climate informed low flow frequency analysis and the divided and combined method are employed to account for the impacts from related climate variables and the nonstationarities in annual low flows. Without prior knowledge of the probability density function for the gaging station, six distribution functions including the Generalized Extreme Values (GEV), Pearson Type III, Gumbel, Gamma, Lognormal, and Weibull distributions have been tested to find the best fit, in which the local likelihood method is used to estimate the parameters. Analyses show that GEV had the best fit for the observed low flows. This study has also shown that the climate informed low flow frequency analysis is able to exploit the link between climate indices and low flows, which would account for the dynamic feature for reservoir management and provide more accurate and reliable designs for infrastructure and water supply.

  9. Implementation of a drainage information, analysis and management system

    Directory of Open Access Journals (Sweden)

    J.N. Meegoda

    2017-04-01

    Full Text Available An integrated drainage information, analysis and management system (DIAMS was developed and implemented for the New Jersey Department of Transportation (NJDOT. The purpose of the DIAMS is to provide a useful tool for managers to evaluate drainage infrastructure, to facilitate the determination of the present costs of preserving those infrastructures, and to make decisions regarding the optimal use of their infrastructure budgets. The impetus for DIAMS is the culvert information management system (CIMS, which is developed to manage the data for culvert pipes. DIAMS maintains and summarizes accumulated inspection data for all types of drainage infrastructure assets, including pipes, inlet/outlet structures, outfalls and manufactured treatment devices. DIAMS capabilities include identifying drainage infrastructure, maintaining inspection history, mapping locations, predicting service life based on the current condition states, and assessing present asset value. It also includes unit cost values of 72 standard items to estimate the current cost for new assets with the ability to adjust for future inflation. In addition, DIAMS contains several different repair, rehabilitation and replacement options to remedy the drainage infrastructure. DIAMS can analyze asset information and determine decisions to inspect, rehabilitate, replace or do nothing at the project and network levels by comparing costs with risks and failures. Costs may be optimized to meet annual maintenance budget allocations by prioritizing drainage infrastructure needing inspection, cleaning and repair. DIAMS functional modules include vendor data uploading, asset identification, system administration and financial analysis. Among the significant performance feature of DIAMS is its proactive nature, which affords decision makers the means of conducting a comprehensive financial analysis to determine the optimal proactive schedule for the proper maintenance actions and to prioritize them

  10. Information findability: An informal study to explore options for improving information findability for the systems analysis group

    Energy Technology Data Exchange (ETDEWEB)

    Stoecker, Nora Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-03-01

    A Systems Analysis Group has existed at Sandia National Laboratories since at least the mid-1950s. Much of the groups work output (reports, briefing documents, and other materials) has been retained, along with large numbers of related documents. Over time the collection has grown to hundreds of thousands of unstructured documents in many formats contained in one or more of several different shared drives or SharePoint sites, with perhaps five percent of the collection still existing in print format. This presents a challenge. How can the group effectively find, manage, and build on information contained somewhere within such a large set of unstructured documents? In response, a project was initiated to identify tools that would be able to meet this challenge. This report documents the results found and recommendations made as of August 2013.

  11. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  12. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  13. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  14. Rapid automatic keyword extraction for information retrieval and analysis

    Science.gov (United States)

    Rose, Stuart J [Richland, WA; Cowley,; E, Wendy [Richland, WA; Crow, Vernon L [Richland, WA; Cramer, Nicholas O [Richland, WA

    2012-03-06

    Methods and systems for rapid automatic keyword extraction for information retrieval and analysis. Embodiments can include parsing words in an individual document by delimiters, stop words, or both in order to identify candidate keywords. Word scores for each word within the candidate keywords are then calculated based on a function of co-occurrence degree, co-occurrence frequency, or both. Based on a function of the word scores for words within the candidate keyword, a keyword score is calculated for each of the candidate keywords. A portion of the candidate keywords are then extracted as keywords based, at least in part, on the candidate keywords having the highest keyword scores.

  15. Analysis of Internet Information on Lateral Lumbar Interbody Fusion.

    Science.gov (United States)

    Belayneh, Rebekah; Mesfin, Addisu

    2016-07-01

    Lateral lumbar interbody fusion (LLIF) is a surgical technique that is being increasingly used. The authors' objective was to examine information on the Internet pertaining to the LLIF technique. An analysis was conducted of publicly accessible websites pertaining to LLIF. The following search engines were used: Google (www.google.com), Bing (www.bing.com), and Yahoo (www.yahoo.com). DuckDuckGo (www.duckduckgo.com) was an additional search engine used due to its emphasis on generating accurate and consistent results while protecting searchers' privacy and reducing advertisements. The top 35 websites providing information on LLIF from the 4 search engines were identified. A total of 140 websites were evaluated. Each web-site was categorized based on authorship (academic, private, medical industry, insurance company, other) and content of information. Using the search term lateral lumbar interbody fusion, 174,000 Google results, 112,000 Yahoo results, and 112,000 Bing results were obtained. DuckDuckGo does not display the number of results found for a search. From the top 140 websites collected from each website, 78 unique websites were identified. Websites were authored by a private medical group in 46.2% of the cases, an academic medical group in 26.9% of the cases, and the biomedical industry in 5.1% of the cases. Sixty-eight percent of websites reported indications, and 24.4% reported contraindications. Benefits of LLIF were reported by 69.2% of websites. Thirty-six percent of websites reported complications of LLIF. Overall, the quality of information regarding LLIF on the Internet is poor. Spine surgeons and spine societies can assist in improving the quality of the information on the Internet regarding LLIF. [Orthopedics. 2016; 39(4):e701-e707.].

  16. Readability analysis of online health information about overactive bladder.

    Science.gov (United States)

    Koo, Kevin; Shee, Kevin; Yap, Ronald L

    2017-09-01

    Despite the prevalence of overactive bladder (OAB) and the widespread accessibility of patient education information on the Internet, the readability of this information and its potential impact on patient decision-making are not known. This study evaluates the readability of OAB material online in the context of website ownership and the Health on the Net standard for information reliability. Three Internet search platforms were queried daily with OAB-related keywords for 30 days. Readability analysis was performed using the SMOG test, Dale-Chall readability formula, and Fry readability graph. Websites were stratified by ownership type and Health on the Net certification to compare readability metrics. After 270 total searches, 57 websites were analyzed. Mean SMOG reading grade was 10.7 (SD = 1.6) and 10.1 in an adjusted calculation to reduce overestimation from medical jargon. Mean Dale-Chall score was 9.2 (SD = 0.9), or grade 13-15. Mean Fry graph coordinates (177 syllables, 5.9 sentences) corresponded to grade 15. Only seven sites (12%) were predicted to be readable by the average adult with an eighth-grade reading level. Mean reading grades were not significantly different between academic versus commercial sites and Health on the Net-certified versus non-certified sites. A large majority of online information about OAB treatment exceeds the reading ability of most adults. Neither websites sponsored by academic institutions nor those certified by the Health on the Net standard have easier readability. The readability of health information online may be distinct from reliability in the context of urological literacy. © 2017 Wiley Periodicals, Inc.

  17. Comparative Analysis of Defense Responses in Chocolate Spot-Resistant and -Susceptible Faba Bean (Vicia faba Cultivars Following Infection by the Necrotrophic Fungus Botrytis fabae

    Directory of Open Access Journals (Sweden)

    Mahmoud H. El-Komy

    2014-12-01

    Full Text Available In this study, resistance responses were investigated during the interaction of Botrytis fabae with two faba bean cultivars expressing different levels of resistance against this pathogen, Nubaria (resistant and Giza 40 (susceptible. Disease severity was assessed on leaves using a rating scale from 1 to 9. Accumulation levels of reactive oxygen species (ROS, lipid peroxidation and antioxidant enzymes (superoxide dismutase, catalase and ascorbate peroxidase were measured in leaf tissues at different times of infection. The expression profiles of two pathogenesis-related proteins (PRPs encoded by the genes PR-1 and β-1,3-glucanase were also investigated using reverse transcription RT-PCR analysis. The accumulation of these defense responses was induced significantly in both cultivars upon infection with B. fabae compared with un-inoculated controls. The resistant cultivar showed weaker necrotic symptom expression, less ROS accumulation, a lower rate of lipid peroxidation and higher activity of the enzymatic ROS scavenging system compared with susceptible cultivar. Interestingly, ROS accumulated rapidly in the resistant leaf tissues and peaked during the early stages of infection, whereas accumulation was stronger and more intense in the susceptible tissues in later stages. Moreover, the response of the resistant cultivar to infection was earlier and stronger, exhibiting high transcript accumulation of the PR genes. These results indicated that the induction of oxidant/antioxidant responses and the accumulation of PRPs are part of the faba bean defense mechanism against the necrotrophic fungus B. fabae with a different intensity and timing of induction, depending on the resistance levels.

  18. Topical report on release scenario analysis of long-term management of high-level defense waste at the Hanford Site

    Energy Technology Data Exchange (ETDEWEB)

    Wallace, R.W.; Landstrom, D.K.; Blair, S.C.; Howes, B.W.; Robkin, M.A.; Benson, G.L.; Reisenauer, A.E.; Walters, W.H.; Zimmerman, M.G.

    1980-11-01

    Potential release scenarios for the defense high-level waste (HLW) on the Hanford Site are presented. Presented in this report are the three components necessary for evaluating the various alternatives under consideration for long-term management of Hanford defense HLW: identification of scenarios and events which might directly or indirectly disrupt radionuclide containment barriers; geotransport calculations of waste migration through the site media; and consequence (dose) analyses based on groundwater and air pathways calculations. The scenarios described in this report provide the necessary parameters for radionuclide transport and consequence analysis. Scenarios are categorized as either bounding or nonbounding. Bounding scenarios consider worst case or what if situations where an actual and significant release of waste material to the environment would happen if the scenario were to occur. Bounding scenarios include both near-term and long-term scenarios. Near-term scenarios are events which occur at 100 years from 1990. Long term scenarios are potential events considered to occur at 1000 and 10,000 years from 1990. Nonbounding scenarios consider events which result in insignificant releases or no release at all to the environment. Three release mechanisms are described in this report: (1) direct exposure of waste to the biosphere by a defined sequence of events (scenario) such as human intrusion by drilling; (2) radionuclides contacting an unconfined aquifer through downward percolation of groundwater or a rising water table; and (3) cataclysmic or explosive release of radionuclides by such mechanisms as meteorite impact, fire and explosion, criticality, or seismic events. Scenarios in this report present ways in which these release mechanisms could occur at a waste management facility. The scenarios are applied to the two in-tank waste management alternatives: in-situ disposal and continued present action.

  19. Analysis of the association between isokinetic knee strength with offensive and defensive jumping capacity in high-level female volleyball athletes.

    Science.gov (United States)

    Sattler, Tine; Sekulic, Damir; Esco, Michael R; Mahmutovic, Ifet; Hadzic, Vedran

    2015-09-01

    Isokinetic-knee-strength was hypothesized to be an important factor related to jumping performance. However, studies examining this relation among elite female athletes and sport-specific jumps are lacking. This investigation determined the influence of isokinetic-knee flexor/extensor strength measures on spike-jump (offensive) and block-jump (defensive) performance among high-level female volleyball players. Cross-sectional laboratory study. Eighty-two female volleyball athletes (age = 21.3 ± 3.8 years, height = 175.4 ± 6.76 cm, and weight = 68.29 ± 8.53 kg) volunteered to participate in this study. The studied variables included spike-jump and block-jump performance and a set of isokinetic tests to evaluate the eccentric and concentric strength capacities of the knee extensors (quadriceps - Q), and flexors (hamstring - H) for both legs. Both jumping tests showed high intra-session reliability (ICC of 0.87 and 0.95 for spike-jump and block-jump, respectively). The athletes were clustered into three achievement-groups based on their spike-jump and block-jump performances. For the block-jump, ANOVA identified significant differences between achievement-groups for all isokinetic variables except the Right-Q-Eccentric-Strength. When observed for spike-jump, achievement-groups differed significantly in all tests but Right-H-Concentric-Strength. Discriminant canonical analysis showed that the isokinetic-strength variables were more associated with block-jump then spike-jump-performance. The eccentric isokinetic measures were relatively less important determinants of block-jump than for the spike-jump performance. Data support the hypothesis of the importance of isokinetic strength measures for the expression of rapid muscular performance in volleyball. The results point to the necessity of the differential approach in sport training for defensive and offensive duties. Copyright © 2014 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  20. Determining the Frequency of Defensive Medicine Among General Practitioners in Southeast Iran

    Directory of Open Access Journals (Sweden)

    Mahmood Moosazadeh

    2014-04-01

    Full Text Available Background Defensive medicine prompts physicians not to admit high-risk patients who need intensive care. This phenomenon not only decreases the quality of healthcare services, but also wastes scarce health resources. Defensive medicine occurs in negative and positive forms. Hence, the present study aimed to determine frequency of positive and negative defensive medicine behaviors and their underlying factors among general practitioners in Southeast Iran. Methods The present cross-sectional study was performed among general practitioners in Southeast Iran. 423 subjects participated in the study on a census basis and a questionnaire was used for data collection. Data analysis was carried out using descriptive and analytical statistics through SPSS 20. Results The majority of participants were male (58.2%. The mean age of physicians was 40 ± 8.5. The frequency of positive and negative defensive medicine among general practitioners in Southeast Iran was 99.8% and 79.2% respectively. A significant relationship was observed between working experience, being informed of law suits against their colleagues, and committing defensive medicine behavior (P< 0.001. Conclusion The present study indicated high frequency of defensive medicine behavior in the Southeast Iran. So, it calls policy-makers special attention to improve the status quo.

  1. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  2. Analysis of Financial Markets' Fluctuation by Textual Information

    Science.gov (United States)

    Izumi, Kiyoshi; Goto, Takashi; Matsui, Tohgoroh

    In this study, we proposed a new text-mining methods for long-term market analysis. Using our method, we analyzed monthly price data of financial markets; Japanese government bond market, Japanese stock market, and the yen-dollar market. First we extracted feature vectors from monthly reports of Bank of Japan. Then, trends of each market were estimated by regression analysis using the feature vectors. As a result, determination coefficients were over 75%, and market trends were explained well by the information that was extracted from textual data. We compared the predictive power of our method among the markets. As a result, the method could estimate JGB market best and the stock market is the second.

  3. A Brief Analysis to Informal Chatting on the Phone

    Institute of Scientific and Technical Information of China (English)

    金晓瑜

    2005-01-01

    An analysis to the telephoning chat is often ignored by analysts as it is very common and very colloquial. In my opinion, however, it differs to the spoken language in daily life in some aspects. For example, it has two parties connected by a line, the speakers talks in deferent places and may do different things. So in analyzing the discourse, such factors as field, tenor, and mode, skipping and coherence, reference and presupposition in study the context are to be emphasized. The third part of this paper gives an example to show one method to analyze the informal chatting on the phone. It also mentions some practical applications of the analysis to this style of discourse in the conclusion part.

  4. Time-series analysis of Music: Perceptual and Information Dynamics

    Directory of Open Access Journals (Sweden)

    Marcus T. Pearce

    2011-12-01

    Full Text Available Dean and Bailes (2010 provide a tutorial on the use of time-series analysis in research on music perception and a study of the influence of acoustic factors on real-time perception of music. They illustrate their approach with a detailed case study of an electroacoustic composition by Trevor Wishart. In this commentary, I discuss four aspects of Dean and Bailes’ presentation: first, the importance of focusing on dynamic changes in musical structure; second, the benefits of computer-generated music for research on music perception; third, the need for caution in averaging responses from multiple listeners; and finally, the role of time-series analysis in understanding computational information-dynamic models of music cognition.

  5. An Examination of Canadian Information Professionals' Involvement in the Provision of Business Information Synthesis and Analysis Services

    Science.gov (United States)

    Patterson, Liane; Martzoukou, Konstantina

    2012-01-01

    The present study investigated the processes information professionals, working in a business environment, follow to meet business clients' information needs and particularly their involvement in information synthesis and analysis practices. A combination of qualitative and quantitative data was collected via a survey of 98 information…

  6. Visualization techniques for computer network defense

    Science.gov (United States)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  7. Visualization Techniques for Computer Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Beaver, Justin M [ORNL; Steed, Chad A [ORNL; Patton, Robert M [ORNL; Cui, Xiaohui [ORNL; Schultz, Matthew A [ORNL

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  8. Analysis of system trustworthiness based on information flow noninterference theory

    Institute of Scientific and Technical Information of China (English)

    Xiangying Kong; Yanhui Chen; Yi Zhuang

    2015-01-01

    The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer-ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans-fer. To solve this problem, the impact of the system state on trust-worthiness of software is investigated, the run-time mutual interfer-ence behavior of software entities is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat-form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Final y, the monitor hypothesis is extended to the dynamic monitor hypothe-sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation.

  9. ASPECTS OF COMPANY PERFORMANCE ANALYSIS BASED ON RELEVANT FINANCIAL INFORMATION AND NONFINANCIAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Popa Dorina

    2012-07-01

    Full Text Available The main objective of our work is the conceptual description of the performance of an economic entity in financial and non-financial terms. During our approach we have shown that it is not sufficient to analyze the performance of a company only in financial terms as the performance reflected in financial reports sometimes do not coincide with the real situation of the company. In this case the cause of the differences has to be found among the influences of other nonfinancial information. Mainly following the great financial scandals the distrust in the reliability of financial-accounting information has eroded strongly and thus the business performance measurement cannot be the exclusive domain of the criteria of financial analysis, but must be done in a comprehensive way, based both on financial criteria and on non-financial ones (intangible assets, social responsibility of the company. Using non-financial criteria have led to the occurrence of new types of analysis, namely extra-financial analysis. Thus, enterprise performance is not subject to material and financial resources managed and controlled by the entities, but to the complex of intangible resources that companies created by thier previous work. The extra-financial analysis has to face difficulties arising mainly from the existence of non-financial indicators very little normalized, and from the lack of uniformity of the practice in the field. In determining the extra-financial performance indicators one has to observe the manifestation and the evolution of the company’s relationships with its partners / environment. In order to analyze the performance measurement by financial and nonfinancial indicators we chose as a case study a company in Bihor county, listed on Bucharest Stock Exchange. The results of our study show that the Romanian entities are increasingly interested in measuring performance and after the extra-financial analysis we concluded that the company had set

  10. Staffing for Cyberspace Operations: Summary of Analysis

    Science.gov (United States)

    2016-08-01

    information , including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services , Directorate for Information Operations...Analysis and Integration , Office of the Secretary of Defense Cost Assessment and Program Evaluation; and the Director, Acquisition Resources and...findings and recommendations of a full-length report containing classified information .1 It is meant to make the key elements of the analysis accessible

  11. SUCCESS CONCEPT ANALYSIS APPLIED TO THE INFORMATION TECHNOLOGY PROJECT MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Cassio C. Montenegro Duarte

    2012-05-01

    Full Text Available This study evaluates the concept of success in project management that is applicable to the IT universe, from the classical theory associated with the techniques of project management. Therefore, it applies the theoretical analysis associated to the context of information technology in enterprises as well as the classic literature of traditional project management, focusing on its application in business information technology. From the literature developed in the first part of the study, four propositions were prepared for study which formed the basis for the development of the field research with three large companies that develop projects of Information Technology. The methodology used in the study predicted the development of the multiple case study. Empirical evidence suggests that the concept of success found in the classical literature in project management adjusts to the environment management of IT projects. Showed that it is possible to create the model of standard IT projects in order to replicate it in future derivatives projects, which depends on the learning acquired at the end of a long and continuous process and sponsorship of senior management, which ultimately results in its merger into the company culture.

  12. FLEXIBILITY ANALYSIS IN AN INFORMATION ECONOMY: STRUCTURAL EQUATION MODELING

    Directory of Open Access Journals (Sweden)

    Ricardo da Silva

    2006-11-01

    Full Text Available This paper analyzes the new concept of flexibility in organizations – of relevance both at micro and macro level. Information Economy (IE modern function is specifically analyzed. The purpose of this paper is not limited to the study of information economy flexibility, but extends its focus to other areas of organization and economic studies, having as reference the proposed model. Although not covering all aspects regarding objectives and hypotheses, results obtained demonstrate that subsequent studies can lead to success experiences, since the models presented are: stability in relation to the deviations presented in the resulting equations; values that are very close to what is desirable for adjustment indexes, factorial loads, t-values, extracted variances and reliability; as well as other necessary aspects for the application of the technique. The approach focuses the analysis of information economy flexibility based on structural equations modeling to serve as reference for the development of adaptation phenomenon studies in relation to structures, strategies and organizational processes, against the environmental dynamics contemporary society is faced with.

  13. ARN: Analysis and Visualization System for Adipogenic Regulation Network Information.

    Science.gov (United States)

    Huang, Yan; Wang, Li; Zan, Lin-Sen

    2016-12-16

    Adipogenesis is the process of cell differentiation through which preadipocytes become adipocytes. Lots of research is currently ongoing to identify genes, including their gene products and microRNAs, that correlate with fat cell development. However, information fragmentation hampers the identification of key regulatory genes and pathways. Here, we present a database of literature-curated adipogenesis-related regulatory interactions, designated the Adipogenesis Regulation Network (ARN, http://210.27.80.93/arn/), which currently contains 3101 nodes (genes and microRNAs), 1863 regulatory interactions, and 33,969 expression records associated with adipogenesis, based on 1619 papers. A sentence-based text-mining approach was employed for efficient manual curation of regulatory interactions from approximately 37,000 PubMed abstracts. Additionally, we further determined 13,103 possible node relationships by searching miRGate, BioGRID, PAZAR and TRRUST. ARN also has several useful features: i) regulatory map information; ii) tests to examine the impact of a query node on adipogenesis; iii) tests for the interactions and modes of a query node; iv) prediction of interactions of a query node; and v) analysis of experimental data or the construction of hypotheses related to adipogenesis. In summary, ARN can store, retrieve and analyze adipogenesis-related information as well as support ongoing adipogenesis research and contribute to the discovery of key regulatory genes and pathways.

  14. Department of Defense Small Business (SB) Program: A Knowledge-Level Analysis of How Customer Education Relates to Meeting SB Goals

    Science.gov (United States)

    2014-12-01

    7 B. SMALL BUSINESS PROGRAM OVERVIEW ...........................................7 1. Women -Owned Small ...of Defense DSB Director of Small Business DTRA Defense Threat Reduction Agency EDWOSB economically disadvantaged women -owned small businesses EO...USTRANSCOM U.S. Transportation Command VOSB veteran-owned small business WMD weapons of mass destruction WOSB women -owned small business xiv

  15. An Analysis of the Best Available Unmanned Ground Vehicle in the Current Market with Respect to the Requirements of the Turkish Ministry of National Defense

    Science.gov (United States)

    2011-12-01

    TURKISH MND ...................................................................................61 1. History of the Turkish Defense Industry...readers with a background on UGVs and to conduct UGV market research. Chapter III introduces the history of the Turkish defense industry and the Under...SLAM cartography , indoor/outdoor localization, and a follower/leader module. Open architecture is dependent upon a Multi- Agent System (MAS) that

  16. A procedure for seiche analysis with Bayesian information criterion

    Science.gov (United States)

    Aichi, Masaatsu

    2016-04-01

    Seiche is a standing wave in enclosed or semi-enclosed water body. Its amplitude irregularly changes in time due to weather condition etc. Then, extracting seiche signal is not easy by usual methods for time series analysis such as fast Fourier transform (FFT). In this study, a new method for time series analysis with Bayesian information criterion was developed to decompose seiche, tide, long-term trend and residual components from time series data of tide stations. The method was developed based on the maximum marginal likelihood estimation of tide amplitudes, seiche amplitude, and trend components. Seiche amplitude and trend components were assumed that they gradually changes as second derivative in time was close to zero. These assumptions were incorporated as prior distributions. The variances of prior distributions were estimated by minimizing Akaike-Bayes information criterion (ABIC). The frequency of seiche was determined by Newton method with initial guess by FFT. The accuracy of proposed method was checked by analyzing synthetic time series data composed of known components. The reproducibility of the original components was quite well. The proposed method was also applied to the actual time series data of sea level observed by tide station and the strain of coastal rock masses observed by fiber Bragg grating sensor in Aburatsubo Bay, Japan. The seiche in bay and its response of rock masses were successfully extracted.

  17. An information theory analysis of spatial decisions in cognitive development.

    Science.gov (United States)

    Scott, Nicole M; Sera, Maria D; Georgopoulos, Apostolos P

    2015-01-01

    Performance in a cognitive task can be considered as the outcome of a decision-making process operating across various knowledge domains or aspects of a single domain. Therefore, an analysis of these decisions in various tasks can shed light on the interplay and integration of these domains (or elements within a single domain) as they are associated with specific task characteristics. In this study, we applied an information theoretic approach to assess quantitatively the gain of knowledge across various elements of the cognitive domain of spatial, relational knowledge, as a function of development. Specifically, we examined changing spatial relational knowledge from ages 5 to 10 years. Our analyses consisted of a two-step process. First, we performed a hierarchical clustering analysis on the decisions made in 16 different tasks of spatial relational knowledge to determine which tasks were performed similarly at each age group as well as to discover how the tasks clustered together. We next used two measures of entropy to capture the gradual emergence of order in the development of relational knowledge. These measures of "cognitive entropy" were defined based on two independent aspects of chunking, namely (1) the number of clusters formed at each age group, and (2) the distribution of tasks across the clusters. We found that both measures of entropy decreased with age in a quadratic fashion and were positively and linearly correlated. The decrease in entropy and, therefore, gain of information during development was accompanied by improved performance. These results document, for the first time, the orderly and progressively structured "chunking" of decisions across the development of spatial relational reasoning and quantify this gain within a formal information-theoretic framework.

  18. An Information Theory Analysis of Spatial Decisions in Cognitive Development

    Directory of Open Access Journals (Sweden)

    Nicole M Scott

    2015-02-01

    Full Text Available Performance in a cognitive task can be considered as the outcome of a decision-making process operating across various knowledge domains or aspects of a single domain. Therefore, an analysis of these decisions in various tasks can shed light on the interplay and integration of these domains (or elements within a single domain as they are associated with specific task characteristics. In this study, we applied an information theoretic approach to assess quantitatively the gain of knowledge across various elements of the cognitive domain of spatial, relational knowledge, as a function of development. Specifically, we examined changing spatial relational knowledge from ages five to ten years. Our analyses consisted of a two-step process. First, we performed a hierarchical clustering analysis on the decisions made in 16 different tasks of spatial relational knowledge to determine which tasks were performed similarly at each age group as well as to discover how the tasks clustered together. We next used two measures of entropy to capture the gradual emergence of order in the development of relational knowledge. These measures of cognitive entropy were defined based on two independent aspects of chunking, namely (1 the number of clusters formed at each age group, and (2 the distribution of tasks across the clusters. We found that both measures of entropy decreased with age in a quadratic fashion and were positively and linearly correlated. The decrease in entropy and, therefore, gain of information during development was accompanied by improved performance. These results document, for the first time, the orderly and progressively structured chunking of decisions across the development of spatial relational reasoning and quantify this gain within a formal information-theoretic framework.

  19. Inspection of the Defense Prisoner of War/Missing in Action Office

    Science.gov (United States)

    2016-05-05

    Valuation OFFICE OF THE INSPECTOR GENERAL INSPECTION OF THE DEFENSE PRISONER OF WAR/MISSING IN ACTION OFFICE Report No. 96-023 November...Information Systems Agency Defense Prisoner of War/Missing in Action Office Defense Supply Service Washington Equal Employment Opportunity Equal...Prisoner of War/Missing in Action Under Secretary of Defense (Policy) Washington Headquarters Services INSPECTOR GENERAL DEPARTMENT OF DEFENSE

  20. Analysis of Mining Terrain Deformation Characteristics with Deformation Information System

    Science.gov (United States)

    Blachowski, Jan; Milczarek, Wojciech; Grzempowski, Piotr

    2014-05-01

    Mapping and prediction of mining related deformations of the earth surface is an important measure for minimising threat to surface infrastructure, human population, the environment and safety of the mining operation itself arising from underground extraction of useful minerals. The number of methods and techniques used for monitoring and analysis of mining terrain deformations is wide and increasing with the development of geographical information technologies. These include for example: terrestrial geodetic measurements, global positioning systems, remote sensing, spatial interpolation, finite element method modelling, GIS based modelling, geological modelling, empirical modelling using the Knothe theory, artificial neural networks, fuzzy logic calculations and other. The aim of this paper is to introduce the concept of an integrated Deformation Information System (DIS) developed in geographic information systems environment for analysis and modelling of various spatial data related to mining activity and demonstrate its applications for mapping and visualising, as well as identifying possible mining terrain deformation areas with various spatial modelling methods. The DIS concept is based on connected modules that include: the spatial database - the core of the system, the spatial data collection module formed by: terrestrial, satellite and remote sensing measurements of the ground changes, the spatial data mining module for data discovery and extraction, the geological modelling module, the spatial data modeling module with data processing algorithms for spatio-temporal analysis and mapping of mining deformations and their characteristics (e.g. deformation parameters: tilt, curvature and horizontal strain), the multivariate spatial data classification module and the visualization module allowing two-dimensional interactive and static mapping and three-dimensional visualizations of mining ground characteristics. The Systems's functionality has been presented on

  1. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  2. From paragraph to graph: latent semantic analysis for information visualization.

    Science.gov (United States)

    Landauer, Thomas K; Laham, Darrell; Derr, Marcia

    2004-04-01

    Most techniques for relating textual information rely on intellectually created links such as author-chosen keywords and titles, authority indexing terms, or bibliographic citations. Similarity of the semantic content of whole documents, rather than just titles, abstracts, or overlap of keywords, offers an attractive alternative. Latent semantic analysis provides an effective dimension reduction method for the purpose that reflects synonymy and the sense of arbitrary word combinations. However, latent semantic analysis correlations with human text-to-text similarity judgments are often empirically highest at approximately 300 dimensions. Thus, two- or three-dimensional visualizations are severely limited in what they can show, and the first and/or second automatically discovered principal component, or any three such for that matter, rarely capture all of the relations that might be of interest. It is our conjecture that linguistic meaning is intrinsically and irreducibly very high dimensional. Thus, some method to explore a high dimensional similarity space is needed. But the 2.7 x 10(7) projections and infinite rotations of, for example, a 300-dimensional pattern are impossible to examine. We suggest, however, that the use of a high dimensional dynamic viewer with an effective projection pursuit routine and user control, coupled with the exquisite abilities of the human visual system to extract information about objects and from moving patterns, can often succeed in discovering multiple revealing views that are missed by current computational algorithms. We show some examples of the use of latent semantic analysis to support such visualizations and offer views on future needs.

  3. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  4. cDNA-AFLP analysis reveals that maize resistance to Bipolaris maydis is associated with the induction of multiple defense-related genes

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The fungal pathogen Bipolaris maydis invades by direct penetration into maize leaf veins. In order to understand the resistance mechanism of maize to B. maydis strain 523, cDNA-AFLP (amplified fragment length polymorphism) analysis was conducted to compare the changes in mRNA transcripts in response to B. maydis infection between a highly disease-resistant (HDR) line and a susceptible (S) line. 13 cDNA fragments derived from the genes showing enhanced expression after fungal infection, named HDR genes, were isolated from the HDR line. Northern blot analysis showed that 5 HDR genes were induced by fungal infection in the HDR, but not the S lines. The 5 HDR genes showed homology to previously characterized genes involved in disease resistance. A full-length HDR10 cDNA was isolated. It had a capacity to encode a protein of 284 amino acids. The deduced amino acid sequence of the HDR10 gene was homologous to a fungal infection-induced protein from Cicer arietinum and a hypersensitive response protein from maize, respectively. These results suggest that maize resistance to B. maydis infection in the HDR line may be mediated by the induction of multiple defense-related genes.``

  5. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  6. A Case Analysis Explaining the Main Factors that Contribute to ROK’s Decision Making in Procurement of Defense Articles

    Science.gov (United States)

    2008-05-01

    theories represent a “pattern” of interconnected thoughts or parts linked to a whole ( Lincoln and Guba , 1985). Neuman provides additional information...South Korea, 2005. Lincoln , Y. S., & Guba , E. G. Proposals that work: A Guide for Planning Dissertations and Grant Proposals (2nd ed.), Newbury Park...2005. Bak, Sung Il. A study on the Dominion of Dokdo . Mokpo marine college, Chunnam South Korea, 2005. Bloomfield, Lincoln P. Jr. “Status of U.S

  7. System Requirements Analysis and Technological Support for the Ballistic Missile Defense System (BMDS) - FY07 Progress Report

    Science.gov (United States)

    2007-07-01

    formal requirement for a distributed-system protocol ( leader election ) operating with non- ideal communication links. The proof-of-concept prototype is as...in OMNeT++ Figure 5 shows the top-level statechart of a leader election (LE) module. The top-level statechart consists of four states, the...component under test using events, time, and data information specified in the component. The likelihood of success of the leader - election requirement

  8. Deming's Management Philosophy and the defense industrial base.

    OpenAIRE

    Graff, David Jacques

    1991-01-01

    Approved for public release: distribution is unlimited The purpose of this thesis is to analyze why firms are leaving the defense industrial base and to determine if Dr. Edwards Deming's Management Philosophy can offer a more constructive way of doing business in the Defense Acquisition System. A comparative analysis was conducted between industry's reasons for wanting to leave the defense sector and Deming's Management Philosophy. This analysis determined if adoption of Deming's Managemen...

  9. Automation of Large-scale Computer Cluster Monitoring Information Analysis

    Science.gov (United States)

    Magradze, Erekle; Nadal, Jordi; Quadt, Arnulf; Kawamura, Gen; Musheghyan, Haykuhi

    2015-12-01

    High-throughput computing platforms consist of a complex infrastructure and provide a number of services apt to failures. To mitigate the impact of failures on the quality of the provided services, a constant monitoring and in time reaction is required, which is impossible without automation of the system administration processes. This paper introduces a way of automation of the process of monitoring information analysis to provide the long and short term predictions of the service response time (SRT) for a mass storage and batch systems and to identify the status of a service at a given time. The approach for the SRT predictions is based on Adaptive Neuro Fuzzy Inference System (ANFIS). An evaluation of the approaches is performed on real monitoring data from the WLCG Tier 2 center GoeGrid. Ten fold cross validation results demonstrate high efficiency of both approaches in comparison to known methods.

  10. Economic Efficiency Analysis for Information Technology in Developing Countries

    Directory of Open Access Journals (Sweden)

    Ghassan F. Issa

    2009-01-01

    Full Text Available Problem statement: The introduction of Information Technology (IT to government institutions in developing countries bears a great deal of risk of failure. The lack of qualified personnel, lack of financial support and the lack of planning and proper justification are just few of the causes of projects failure. Study presented in this study focused on the justification issue of IT projects through the application of Cost Benefit Analysis (CBA as part of a comprehensive Economic Efficiency Analysis (EEA of IT Projects, thus providing management with a decision making tool which highlights existing and future problems and reduces the risk of failure. Approach: Cost-Benefit Analysis (CBA based on Economic Efficiency Analysis (EEA was performed on selected IT projects from ministries and key institutions in the government of Jordan using a well established approach employed by the Federal Government of Germany (KBSt approach. The approach was then modified and refined to suit the needs of developing countries so that it captured all the relevant elements of cost and benefits both quantitatively and qualitatively and includes a set of guidelines for data collection strategy. Results: When IT projects were evaluated using CBA, most cases yielded negative Net Present Value (NPV, even though, some cases showed some reduction in operation cost starting from the third year of project life. However, when the CBA was applied as a part of a comprehensive EEA by introducing qualitative aspects and urgency criteria, proper justification for new projects became feasible. Conclusion: The modified EEA represented a systematic approach which was well suited for the government of Jordan as a developing country. This approach was capable of dealing with the justification issue, evaluation of existing systems and the urgency of replacing legacy systems. This study explored many of the challenges and inherited problems existing in the public sectors of developing

  11. Mediating Informal Care Online: Findings from an Extensive Requirements Analysis

    Directory of Open Access Journals (Sweden)

    Christiane Moser

    2015-05-01

    Full Text Available Organizing and satisfying the increasing demand for social and informal care for older adults is an important topic. We aim at building a peer-to-peer exchange platform that empowers older adults to benefit from receiving support for daily activities and reciprocally offering support to others. In situated interviews and within a survey we investigated the requirements and needs of 246 older adults with mild impairments. Additionally, we conducted an interpretative role analysis of older adults’ collaborative care processes (i.e., support exchange practices in order to identify social roles and understand the inherent expectations towards the execution of support. We will describe our target group in the form of personas and different social roles, as well as user requirements for establishing a successful peer-to-peer collaboration. We also consider our finding from the perspective of social capital theory that allows us to describe in our requirements how relationships provide valuable social resources (i.e., social capital for informal and social care.

  12. Proceedings of the 1985 Annual DTIC (Defense Technical Information Center) Users Conference Held in Alexandria, Virginia on 23-25 October 1985

    Science.gov (United States)

    1985-10-01

    Aeromedical Research Lab. • Institute of Dental Research . Institute of Surgical Research ■"• Letterman Army Insti- tute of Research — Medical...Springfield, VA 22150 Dolores M. Angniano U.S. Army TRADOC Systems Analysis ATOR-TSL WSMR, NM 88002 Katherine E. Armendt IIT Research

  13. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  14. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  15. 76 FR 37371 - Agency Information Collection: Comment Request for National Gap Analysis Program Evaluation

    Science.gov (United States)

    2011-06-27

    ... (ICR) for a new collection of information: National Gap Analysis Program Evaluation. This notice....S. Geological Survey Agency Information Collection: Comment Request for National Gap Analysis Program Evaluation AGENCY: United States Geological Survey (USGS), Interior. ACTION: Notice of a...

  16. 32 CFR 48.501 - General information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false General information. 48.501 Section 48.501 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN RETIRED SERVICEMAN'S FAMILY PROTECTION PLAN Annuity § 48.501 General information. Except as provided...

  17. Intelligent acoustic data fusion technique for information security analysis

    Science.gov (United States)

    Jiang, Ying; Tang, Yize; Lu, Wenda; Wang, Zhongfeng; Wang, Zepeng; Zhang, Luming

    2017-08-01

    Tone is an essential component of word formation in all tonal languages, and it plays an important role in the transmission of information in speech communication. Therefore, tones characteristics study can be applied into security analysis of acoustic signal by the means of language identification, etc. In speech processing, fundamental frequency (F0) is often viewed as representing tones by researchers of speech synthesis. However, regular F0 values may lead to low naturalness in synthesized speech. Moreover, F0 and tone are not equivalent linguistically; F0 is just a representation of a tone. Therefore, the Electroglottography (EGG) signal is collected for deeper tones characteristics study. In this paper, focusing on the Northern Kam language, which has nine tonal contours and five level tone types, we first collected EGG and speech signals from six natural male speakers of the Northern Kam language, and then achieved the clustering distributions of the tone curves. After summarizing the main characteristics of tones of Northern Kam, we analyzed the relationship between EGG and speech signal parameters, and laid the foundation for further security analysis of acoustic signal.

  18. Collaborative for Historical Information and Analysis: Vision and Work Plan

    Directory of Open Access Journals (Sweden)

    Vladimir Zadorozhny

    2013-02-01

    Full Text Available This article conveys the vision of a world-historical dataset, constructed in order to provide data on human social affairs at the global level over the past several centuries. The construction of this dataset will allow the routine application of tools developed for analyzing “Big Data” to global, historical analysis. The work is conducted by the Collaborative for Historical Information and Analysis (CHIA. This association of groups at universities and research institutes in the U.S. and Europe includes five groups funded by the National Science Foundation for work to construct infrastructure for collecting and archiving data on a global level. The article identifies the elements of infrastructure-building, shows how they are connected, and sets the project in the context of previous and current efforts to build large-scale historical datasets. The project is developing a crowd-sourcing application for ingesting and documenting data, a broad and flexible archive, and a “data hoover” process to locate and gather historical datasets for inclusion. In addition, the article identifies four types of data and analytical questions to be explored through this data resource, addressing development, governance, social structure, and the interaction of social and natural variables.

  19. Bayesian Information-Gap Decision Analysis Applied to a CO2 Leakage Problem

    Science.gov (United States)

    O'Malley, D.; Vesselinov, V. V.

    2014-12-01

    We describe a decision analysis in the presence of uncertainty that combines a non-probabilistic approach (information-gap decision theory) with a probabilistic approach (Bayes' theorem). Bayes' theorem is one of the most popular techniques for probabilistic uncertainty quantification (UQ). It is effective in many situations, because it updates our understanding of the uncertainties by conditioning on real data using a mathematically rigorous technique. However, the application of Bayes' theorem in science and engineering is not always rigorous. There are two reasons for this: (1) We can enumerate the possible outcomes of dice-rolling, but not the possible outcomes of real-world contamination remediation; (2) We can precisely determine conditional probabilities for coin-tossing, but substantial uncertainty surrounds the conditional probabilities for real-world contamination remediation. Of course, Bayes' theorem is rigorously applicable beyond dice-rolling and coin-tossing, but even in cases that are constructed to be simple with ostensibly good probabilistic models, applying Bayes' theorem to the real world may not work as well as one might expect. Bayes' theorem is rigorously applicable only if all possible events can be described, and their conditional probabilities can be derived rigorously. Outside of this domain, it may still be useful, but its use lacks at least some rigor. The information-gap approach allows us to circumvent some of the highlighted shortcomings of Bayes' theorem. In particular, it provides a way to account for possibilities beyond those described by our models, and a way to deal with uncertainty in the conditional distribution that forms the core of Bayesian analysis. We have developed a three-tiered technique enables one to make scientifically defensible decisions in the face of severe uncertainty such as is found in many geologic problems. To demonstrate the applicability, we apply the technique to a CO2 leakage problem. The goal is to

  20. 75 FR 57906 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2010-09-23

    ... appraisals and make recommendations to the Director, DCAA, regarding final performance ratings and... INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management Division, Defense Contract Audit... of the Secretary Membership of the Defense Contract Audit Agency Senior Executive Service...

  1. Analysis of Information Content in High-Spectral Resolution Sounders using Subset Selection Analysis

    Science.gov (United States)

    Velez-Reyes, Miguel; Joiner, Joanna

    1998-01-01

    In this paper, we summarize the results of the sensitivity analysis and data reduction carried out to determine the information content of AIRS and IASI channels. The analysis and data reduction was based on the use of subset selection techniques developed in the linear algebra and statistical community to study linear dependencies in high dimensional data sets. We applied the subset selection method to study dependency among channels by studying the dependency among their weighting functions. Also, we applied the technique to study the information provided by the different levels in which the atmosphere is discretized for retrievals and analysis. Results from the method correlate well with intuition in many respects and point out to possible modifications for band selection in sensor design and number and location of levels in the analysis process.

  2. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  3. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  4. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Applications of Geographic Information System (GIS) analysis of Lake Uluabat.

    Science.gov (United States)

    Hacısalihoğlu, Saadet; Karaer, Feza; Katip, Aslıhan

    2016-06-01

    Lake Uluabat is one of the most important wetlands in Turkey because of its rich biodiversity, lying on a migratory bird route with almost all its shores being covered by submerged plants. The lake has been protected by the Ramsar Convention since 1998. However, the Lake is threatened by natural and anthropogenic stressors as a consequence of its location. Geographic Information System (GIS) analysis is a tool that has been widely used, especially for water quality management in recent years. This study aimed to investigate the water quality and determined most polluted points using GIS analysis of the lake. Temperature, pH, dissolved oxygen, chemical oxygen demand, Kjeldahl nitrogen, total phosphorus, chlorophyll-a, arsenic, boron, iron, and manganese were monitored monthly from June 2008 to May 2009, with the samples taken from 8 points in the lake. Effect of pH, relation of temperature, and Chl-a with other water quality parameters and metals are designated as statistically significant. Data were mapped using ArcGIS 9.1 software and were assessed according to the Turkish Water Pollution Control Regulations (TWPCR). The research also focused on classifying and mapping the water quality in the lake by using the spatial analysis functions of GIS. As a result, it was determined that Lake Uluabat belonged to the 4th class, i.e., highly polluted water, including any water of lower quality. A remarkable portion of the pollution in the water basin was attributed to domestic wastewater discharges, industrial and agricultural activities, and mining.

  7. Longitudinal analysis of new information types in clinical notes.

    Science.gov (United States)

    Zhang, Rui; Pakhomov, Serguei; Melton, Genevieve B

    2014-01-01

    It is increasingly recognized that redundant information in clinical notes within electronic health record (EHR) systems is ubiquitous, significant, and may negatively impact the secondary use of these notes for research and patient care. We investigated several automated methods to identify redundant versus relevant new information in clinical reports. These methods may provide a valuable approach to extract clinically pertinent information and further improve the accuracy of clinical information extraction systems. In this study, we used UMLS semantic types to extract several types of new information, including problems, medications, and laboratory information. Automatically identified new information highly correlated with manual reference standard annotations. Methods to identify different types of new information can potentially help to build up more robust information extraction systems for clinical researchers as well as aid clinicians and researchers in navigating clinical notes more effectively and quickly identify information pertaining to changes in health states.

  8. ANALYSIS ON AGRICULTRUAL INFORMATION DEMAND --Case of Jilin Province

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hui-min; JIANG Hui-ming

    2005-01-01

    With the rapid development of agricultural informalization in the world, the demand of agricultural information has been a focus in the international agriculture and information fields. Based on the investigation, this paper presented the four characteristics of the demand of agricultural information in China, including regionality, seasonality, great potential demand and variation in kind and level. The factors influencing the demand of agricultural information were analyzed by the Optimized Less Square (OLS) method. The result shows that, of all factors influcing agricultural information demand, the most important one is economy, the second is facility of information pass,and knowledge and education of user, credit of agricultural information service system and production situation follow. Taking Jilin Province as an example, this article also elaborated the agricultural information demand status, and deduced the regression model of agricultural information demand and verified it by the survey in rural Jilin.

  9. Functional genomic analysis of constitutive and inducible defense responses to Fusarium verticillioides infection in maize genotypes with contrasting ear rot resistance.

    Science.gov (United States)

    Lanubile, Alessandra; Ferrarini, Alberto; Maschietto, Valentina; Delledonne, Massimo; Marocco, Adriano; Bellin, Diana

    2014-08-25

    Fusarium verticillioides causes ear rot in maize (Zea mays L.) and accumulation of mycotoxins, that affect human and animal health. Currently, chemical and agronomic measures to control Fusarium ear rot are not very effective and selection of more resistant genotypes is a desirable strategy to reduce contaminations. A deeper knowledge of molecular events and genetic basis underlying Fusarium ear rot is necessary to speed up progress in breeding for resistance. A next-generation RNA-sequencing approach was used for the first time to study transcriptional changes associated with F. verticillioides inoculation in resistant CO441 and susceptible CO354 maize genotypes at 72 hours post inoculation. More than 100 million sequence reads were generated for inoculated and uninoculated control plants and analyzed to measure gene expression levels. Comparison of expression levels between inoculated vs. uninoculated and resistant vs. susceptible transcriptomes revealed a total number of 6,951 differentially expressed genes. Differences in basal gene expression were observed in the uninoculated samples. CO441 genotype showed a higher level of expression of genes distributed over all functional classes, in particular those related to secondary metabolism category. After F. verticillioides inoculation, a similar response was observed in both genotypes, although the magnitude of induction was much greater in the resistant genotype. This response included higher activation of genes involved in pathogen perception, signaling and defense, including WRKY transcription factors and jasmonate/ethylene mediated defense responses. Interestingly, strong differences in expression between the two genotypes were observed in secondary metabolism category: pathways related to shikimate, lignin, flavonoid and terpenoid biosynthesis were strongly represented and induced in the CO441 genotype, indicating that selection to enhance these traits is an additional strategy for improving resistance

  10. Information Problem Solving: Analysis of a Complex Cognitive Skill

    OpenAIRE

    Brand-Gruwel, S.; Wopereis, I.; Vermetten, Y.

    2004-01-01

    textabstractIn (higher) education students are often faced with information problems: tasks or assignments which require the student to identify information needs, locate corresponding information sources, extract and organize relevant information from each source, and synthesize information from a variety of sources. It is often assumed that students master this complex cognitive skill all by themselves. In our point of view, however, explicit and intensive education is required. In order to...

  11. Analysis of Information Quality in event triggered Smart Grid Control

    DEFF Research Database (Denmark)

    Kristensen, Thomas le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2015-01-01

    dependability of existing networks. We develop models for network delays and information dynamics, and uses these to model information quality for three given information access schemes in an event triggered control scenario. We analyse the impact of model parameters, and show how optimal choice of information...... access scheme depends on network conditions as well as trade-offs between information quality, network resources and control reactivity....

  12. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting ...UNCLASSIFIED 4 Program Description The Defense Enterprise Accounting and Management System (DEAMS) is a key part of the United States Air Force (USAF

  13. Tracing cattle breeds with principal components analysis ancestry informative SNPs.

    Directory of Open Access Journals (Sweden)

    Jamey Lewis

    Full Text Available The recent release of the Bovine HapMap dataset represents the most detailed survey of bovine genetic diversity to date, providing an important resource for the design and development of livestock production. We studied this dataset, comprising more than 30,000 Single Nucleotide Polymorphisms (SNPs for 19 breeds (13 taurine, three zebu, and three hybrid breeds, seeking to identify small panels of genetic markers that can be used to trace the breed of unknown cattle samples. Taking advantage of the power of Principal Components Analysis and algorithms that we have recently described for the selection of Ancestry Informative Markers from genomewide datasets, we present a decision-tree which can be used to accurately infer the origin of individual cattle. In doing so, we present a thorough examination of population genetic structure in modern bovine breeds. Performing extensive cross-validation experiments, we demonstrate that 250-500 carefully selected SNPs suffice in order to achieve close to 100% prediction accuracy of individual ancestry, when this particular set of 19 breeds is considered. Our methods, coupled with the dense genotypic data that is becoming increasingly available, have the potential to become a valuable tool and have considerable impact in worldwide livestock production. They can be used to inform the design of studies of the genetic basis of economically important traits in cattle, as well as breeding programs and efforts to conserve biodiversity. Furthermore, the SNPs that we have identified can provide a reliable solution for the traceability of breed-specific branded products.

  14. The system for statistical analysis of logistic information

    Directory of Open Access Journals (Sweden)

    Khayrullin Rustam Zinnatullovich

    2015-05-01

    Full Text Available The current problem for managers in logistic and trading companies is the task of improving the operational business performance and developing the logistics support of sales. The development of logistics sales supposes development and implementation of a set of works for the development of the existing warehouse facilities, including both a detailed description of the work performed, and the timing of their implementation. Logistics engineering of warehouse complex includes such tasks as: determining the number and the types of technological zones, calculation of the required number of loading-unloading places, development of storage structures, development and pre-sales preparation zones, development of specifications of storage types, selection of loading-unloading equipment, detailed planning of warehouse logistics system, creation of architectural-planning decisions, selection of information-processing equipment, etc. The currently used ERP and WMS systems did not allow us to solve the full list of logistics engineering problems. In this regard, the development of specialized software products, taking into account the specifics of warehouse logistics, and subsequent integration of these software with ERP and WMS systems seems to be a current task. In this paper we suggest a system of statistical analysis of logistics information, designed to meet the challenges of logistics engineering and planning. The system is based on the methods of statistical data processing.The proposed specialized software is designed to improve the efficiency of the operating business and the development of logistics support of sales. The system is based on the methods of statistical data processing, the methods of assessment and prediction of logistics performance, the methods for the determination and calculation of the data required for registration, storage and processing of metal products, as well as the methods for planning the reconstruction and development

  15. Situated student learning and spatial informational analysis for environmental problems

    Science.gov (United States)

    Olsen, Timothy Paul

    Ninth and tenth grade high school Biology student research teams used spatial information analysis tools to site a prairie restoration plot on a 55 acre campus during a four-week environment unit. Students made use of innovative technological practices by applying geographic information systems (GIS) approaches to solving environmental and land use problems. Student learning was facilitated by starting with the students' initial conceptions of computing, local landscape and biological environment, and then by guiding them through a problem-based science project process. The project curriculum was framed by the perspective of legitimate peripheral participation (Lave & Wenger, 1991) where students were provided with learning opportunities designed to allow them to act like GIS practitioners. Sociocultural lenses for learning were employed to create accounts of human mental processes that recognize the essential relationship between these processes and their cultural, historical, and institutional settings (Jacob, 1997; Wertsch, 1991). This research investigated how student groups' meaning-making actions were mediated by GIS tools on the periphery of a scientific community of practice. Research observations focused on supporting interpretations of learners' socially constructed actions and the iterative building of assertions from multiple sources. These included the artifacts students produced, the tools they used, the cultural contexts that constrained their activity, and how people begin to adopt ways of speaking (speech genres) of the referent community to negotiate meanings and roles. Students gathered field observations and interpreted attributes of landscape entities from the GIS data to advocate for an environmental decision. However, even while gaining proficiencies with GIS tools, most students did not begin to appropriate roles from the GIS community of practice. Students continued to negotiate their project actions simply as school exercises motivated by

  16. Success story in software engineering using NIAM (Natural language Information Analysis Methodology)

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, S.M.; Eaton, D.S.

    1995-10-01

    To create an information system, we employ NIAM (Natural language Information Analysis Methodology). NIAM supports the goals of both the customer and the analyst completely understanding the information. We use the customer`s own unique vocabulary, collect real examples, and validate the information in natural language sentences. Examples are discussed from a successfully implemented information system.

  17. Time course of information representation of macaque AIP neurons in hand manipulation task revealed by information analysis.

    Science.gov (United States)

    Sakaguchi, Yutaka; Ishida, Fumihiko; Shimizu, Takashi; Murata, Akira

    2010-12-01

    We used mutual information analysis of neuronal activity in the macaque anterior intraparietal area (AIP) to examine information processing during a hand manipulation task. The task was to reach-to-grasp a three-dimensional (3D) object after presentation of a go signal. Mutual information was calculated between the spike counts of individual neurons in 50-ms-wide time bins and six unique shape classifications or 15 one-versus-one classifications of these shapes. The spatiotemporal distribution of mutual information was visualized as a two-dimensional image ("information map") to better observe global profiles of information representation. In addition, a nonnegative matrix factorization technique was applied for extracting its structure. Our major finding was that the time course of mutual information differed significantly according to different classes of task-related neurons. This strongly suggests that different classes of neurons were engaged in different information processing stages in executing the hand manipulation task. On the other hand, our analysis revealed the heterogeneous nature of information representation of AIP neurons. For example, "information latency" (or information onset) varied among individual neurons even in the same neuron class and the same shape classification. Further, some neurons changed "information preference" (i.e., shape classification with the largest amount of information) across different task periods. These suggest that neurons encode different information in the different task periods. Taking the present result together with previous findings, we used a Gantt chart to propose a hypothetical scheme of the dynamic interactions between different types of AIP neurons.

  18. Enhancing multilingual latent semantic analysis with term alignment information.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.; Bader, Brett William

    2008-08-01

    Latent Semantic Analysis (LSA) is based on the Singular Value Decomposition (SVD) of a term-by-document matrix for identifying relationships among terms and documents from co-occurrence patterns. Among the multiple ways of computing the SVD of a rectangular matrix X, one approach is to compute the eigenvalue decomposition (EVD) of a square 2 x 2 composite matrix consisting of four blocks with X and XT in the off-diagonal blocks and zero matrices in the diagonal blocks. We point out that significant value can be added to LSA by filling in some of the values in the diagonal blocks (corresponding to explicit term-to-term or document-to-document associations) and computing a term-by-concept matrix from the EVD. For the case of multilingual LSA, we incorporate information on cross-language term alignments of the same sort used in Statistical Machine Translation (SMT). Since all elements of the proposed EVD-based approach can rely entirely on lexical statistics, hardly any price is paid for the improved empirical results. In particular, the approach, like LSA or SMT, can still be generalized to virtually any language(s); computation of the EVD takes similar resources to that of the SVD since all the blocks are sparse; and the results of EVD are just as economical as those of SVD.

  19. Catchment delineation and morphometric analysis using geographical information system.

    Science.gov (United States)

    Kumar, Manoj; Kumar, Rohitashw; Singh, P K; Singh, Manjeet; Yadav, K K; Mittal, H K

    2015-01-01

    The geographical information system (GIS) has emerged as an efficient tool in delineation of drainage patterns of watershed planning and management. The morphometric parameters of basins can address linear, areal and relief aspects. The study deals with the integrated watershed management of Baliya micro-watersheds, located in the Udaipur district of Rajasthan, India. Morphometric analysis in hydrological investigation is an important aspect and it is inevitable in the development and management of drainage basins. The determination of linear, areal and relief parameters indicate fairly good significance. The low value of the bifurcation ratio of 4.19 revealed that the drainage pattern has not been distorted by structural disturbance. The high value of the elongation ratio (0.68) compared to the circulatory ratio (0.27) indicates an elongated shape of the watershed. The high value of drainage density (5.39 km/km(2)) and stream frequency (12.32) shows that the region has impermeable subsoil material under poor vegetative cover with a low relief factor. The morphometric parameters of relief ratio (0.041) and relative relief (0.99%) show that the watershed can be treated using GIS techniques to determine the morphometric presence of dendritic drainage pattern, with a view to selecting the soil and water conservation measures and water harvesting.

  20. Understanding Informal Group Learning in Online Communities through Discourse Analysis

    Science.gov (United States)

    Ziegler, Mary F.; Paulus, Trena; Woodside, Marianne

    2014-01-01

    Since informal learning occurs outside of formal learning environments, describing informal learning and how it takes place can be a challenge for researchers. Past studies have typically oriented to informal learning as an individual, reflective process that can best be understood through the learners' retrospective accounts about their…

  1. In silico analysis of sequential, structural and functional diversity of wheat cystatins and its implication in plant defense.

    Science.gov (United States)

    Dutt, Shriparna; Singh, V K; Marla, Soma S; Kumar, Anil

    2010-03-01

    Phytocystatins constitute a multigene family that regulates the activity of endogenous and/or exogenous cysteine proteinases. Cereal crops like wheat are continuously threatened by a multitude of pathogens, therefore cystatins offer to play a pivotal role in deciding the plant response. In order to study the need of having diverse specificities and activities of various cystatins, we conducted comparative analysis of six wheat cystatins (WCs) with twelve rice, seven barley, one sorghum and ten corn cystatin sequences employing different bioinformatics tools. The obtained results identified highly conserved signature sequences in all the cystatins considered. Several other motifs were also identified, based on which the sequences could be categorized into groups in congruence with the phylogenetic clustering. Homology modeling of WCs revealed 3D structural topology so well shared by other cystatins. Protein-protein interaction of WCs with papain supported the notion that functional diversity is a con-sequence of existing differences in amino acid residues in highly conserved as well as relatively less conserved motifs. Thus there is a significant conservation at the sequential and structural levels; however, concomitant variations maintain the functional diversity in this protein family, which constantly modulates itself to reciprocate the diversity while counteracting the cysteine proteinases.

  2. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    Science.gov (United States)

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  3. Early transcriptome analyses of Z-3-Hexenol-treated zea mays revealed distinct transcriptional networks and anti-herbivore defense potential of green leaf volatiles.

    Science.gov (United States)

    Engelberth, Jurgen; Contreras, Claudia Fabiola; Dalvi, Chinmay; Li, Ting; Engelberth, Marie

    2013-01-01

    Green leaf volatiles (GLV), which are rapidly emitted by plants in response to insect herbivore damage, are now established as volatile defense signals. Receiving plants utilize these molecules to prime their defenses and respond faster and stronger when actually attacked. To further characterize the biological activity of these compounds we performed a microarray analysis of global gene expression. The focus of this project was to identify early transcriptional events elicited by Z-3-hexenol (Z-3-HOL) as our model GLV in maize (Zea mays) seedlings. The microarray results confirmed previous studies on Z-3-HOL -induced gene expression but also provided novel information about the complexity of Z-3-HOL -induced transcriptional networks. Besides identifying a distinct set of genes involved in direct and indirect defenses we also found significant expression of genes involved in transcriptional regulation, Ca(2+)-and lipid-related signaling, and cell wall reinforcement. By comparing these results with those obtained by treatment of maize seedlings with insect elicitors we found a high degree of correlation between the two expression profiles at this early time point, in particular for those genes related to defense. We further analyzed defense gene expression induced by other volatile defense signals and found Z-3-HOL to be significantly more active than methyl jasmonate, methyl salicylate, and ethylene. The data presented herein provides important information on early genetic networks that are activated by Z-3-HOL and demonstrates the effectiveness of this compound in the regulation of typical plant defenses against insect herbivores in maize.

  4. The informed society: an analysis of the public's information-seeking behavior regarding coastal flood risks

    OpenAIRE

    Kellens, W.; Zaalberg, R.; P. De Maeyer

    2012-01-01

    Recent flood risk management puts an increasing emphasis on the public's risk perception and its preferences. It is now widely recognized that a better knowledge of the public's awareness and concern about risks is of vital importance to outline effective risk communication strategies. Models such as Risk Information Seeking and Processing address this evolution by considering the public's needs and its information-seeking behavior with regard to risk information. This study builds upon earli...

  5. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  6. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  7. Soviet News and Propaganda Analysis Based on RED STAR (The Official Newspaper of the Soviet Defense Establishment) for the Period 1-30 April 1985. Volume 5, Number 4.

    Science.gov (United States)

    2014-09-26

    SOVIET NEWS AND PROPAGANDA ANALYSIS BASED ON RED STAR (The Official Newspaper of the Soviet Defense Establishment) FOR THE PERIOD 1-30 APRIL 1985...topics from the Rus- sian language newspaper Red Star (Krasnaya Zvezda). With a circulation of several million copies, this "daily" newspaper is the...space in Red Star reported events and activities that occurred in foreign countries or were international in scope. As a daily newspaper , Red Star is

  8. An Analysis of the Information Behaviour of Geography Teachers in a Developing African Country–Lesotho

    Directory of Open Access Journals (Sweden)

    Constance BITSO

    2012-08-01

    Full Text Available Information behaviour studies have the potential to inform the design of effective information services that incorporate the information needs, information-seeking and preferences for information sources of target users; hence a doctoral study was conducted on the information behaviour of geography teachers in Lesotho with the aim of guiding the design and implementation of an information service model for these teachers. This paper focuses on the analysis of the information behaviour of geography teachers in Lesotho as a contribution of original knowledge on geography teachers’ information behaviour. The analysis established the information behaviour of geography teachers using the information behaviour concept that encompasses information needs, information-seeking and information sources. Data were collected and analyzed through focus group discussions and conceptual content analysis respectively.The analysis reveals that these geography teachers need current and accurate information covering a variety of aspects in teaching and learning, such as content, pedagogy, classroom management and learners’ assessment. Owing to the increasing number of orphans in schools as a result of the HIV and AIDS pandemic, most teachers expressed the need for information on social assistance for orphans and vulnerable children. Recommendations include information literacy training for teachers and access to the Internet in schools, including the use of open access journals on the Internet by the teachers.

  9. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  10. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  11. Illustrating a Model-Game-Model Paradigm for Using Human Wargames in Analysis

    Science.gov (United States)

    2017-02-01

    Working Paper Illustrating a Model-Game-Model Paradigm for Using Human Wargames in Analysis Paul K. Davis RAND National Security Research...limitations. The project that the paper draws on was sponsored by the Korea Institute for Defense Analysis (KIDA). The methods discussed are being...the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on

  12. [Analysis of informed consent readibility in intensive care].

    Science.gov (United States)

    Ramírez-Puerta, M R; Fernández-Fernández, R; Frías-Pareja, J C; Yuste-Ossorio, M E; Narbona-Galdó, S; Peñas-Maldonado, L

    2013-11-01

    To analyze the readability of informed consent documents (IC) used in an intensive care department and in the Andalusian Healthcare System (AHS). A descriptive study was carried out. The Intensive Care Unit of a tertiary Hospital, and the AHS. A review and analysis was made of the existing 14 IC models in the Intensive Care Unit and of another 14 IC models offered by the AHS, using the following readability scores: Flesch, Sentence complexity, LEGIN, Fernández-Huerta, Szigriszt and INFLESZ. Twenty-four IC (85.7%) failed to satisfy some of the indexes, while three (10.7%) did not satisfy any of them. Four documents (14.3%) satisfied all the indexes analyzed, and therefore are easy to understand. Flesch score: satisfied by one of the ICU IC (7.1%) and by three of the AHS documents (21.4%). Sentence complexity score: satisfied by 11 of the ICU IC (78.6%) and by 13 of the AHS documents (92.8%). Fernández-Huerta score: satisfied by four of the ICU IC (28.6%) and by 13 of the AHS documents (92.8%). Szigriszt score: satisfied by two of the ICU IC (14.3%) and by 11 of the AHS documents (64.3%). INFLESZ score: satisfied by two of the ICU IC (14.3%) and by 10 of the AHS documents (71.4%). The documents analyzed are generally difficult to read and understand by most people, and do not satisfy the basic purpose for which they were drafted. Copyright © 2012 Elsevier España, S.L. and SEMICYUC. All rights reserved.

  13. Analysis on Uncertain Information and Actions for Preventing Collision

    Institute of Scientific and Technical Information of China (English)

    胡甚平; FANG; Quan-gen

    2007-01-01

    Discusses and analyzes the causes and characteristics of the uncertainties of the information and actions for preventing collision at sea on the basic knowledge of the collision avoidance. Describes the ways and functions of the investigations about the uncertainties of the information and actions of collision avoidance with the navigation simulators. Puts forward some suggestions for the officers to master the skills of the recognition of these uncertainties of the information and actions by the training with the simulator during the MET course.

  14. Information and Motion Pattern Learning and Analysis Using Neural Techniques

    Science.gov (United States)

    2009-02-28

    development and application of neural models for higher-level information fusion at Levels 2+/3 according to the JDL Data Fusion Group Process Model. We...application of neural models for higher-level information fusion at Levels 2+/3 according to the JDL Data Fusion Group Process Model. We explored several...and application of neural models of information fusion at Levels 2+/3 according to the JDL Data Fusion Group Process Model (Figure 1) [1, 2]. We

  15. Clinical decision support tools: analysis of online drug information databases

    OpenAIRE

    Seamon Matthew J; Polen Hyla H; Marsh Wallace A; Clauson Kevin A; Ortiz Blanca I

    2007-01-01

    Abstract Background Online drug information databases are used to assist in enhancing clinical decision support. However, the choice of which online database to consult, purchase or subscribe to is likely made based on subjective elements such as history of use, familiarity, or availability during professional training. The purpose of this study was to evaluate clinical decision support tools for drug information by systematically comparing the most commonly used online drug information datab...

  16. INFORMATION ECONOMICS, INSTRUMENT OF ANALYSIS IN NEW MICROECONOMICS

    Directory of Open Access Journals (Sweden)

    Maria Zenovia GRIGORE

    2009-10-01

    Full Text Available In the New Microeconomics the walrasian postulate of perfect information is replaced by two theorems concerning production of information: 1. the acquisition and dissemination of information raise production costs; 2.  the specialisation in information activity is efficient; there are specialists in the production or use of informationInformation economics or the economics of information studies decisions in transaction where one party has more or better information than the other. Incomplete and asymmetric information could generate two types of risks: adverse selection, which can be reduced with signaling games and screening games, and moral hazard, studied in the frame of agency theory, by the principal agent model. The principal agent model treats the difficulties that arise when a principal hires an agent to pursue the interests of the former. There are some mechanisms that align the interests of the agent in solidarity with those of the principal, such as commissions, promotions, profit sharing, efficiency wages, deferred compensation, fear of firing and so on.

  17. Content of information ethics in the Holy Quran: an analysis

    Directory of Open Access Journals (Sweden)

    Akram Mehrandasht

    2014-06-01

    Full Text Available Background and Objectives: Information ethics, according to Islam, equals observing human rights and morals in dealing with information transmission and provision, which must be based on honesty and truthfulness. As Islam highly values society and social issues, it believes that human behaviors and interactions are strongly interconnected in a society. Committing to ethical issues regarding information is a responsibility of all members of a society according to Quran. Islam prohibits Believers from unmasking peoples’ private information. Results: Thus, from the viewpoint of Islam, the purpose of information ethics is to observe and protect human rights in the society and to show the positive effects of the right information on all aspects of human life. Method s: For the purpose of the current study all the words and verses related to information ethics was identified in Quran. The data was then evaluated and analyzed from the perspective of scholars and experts of Quran. Conclusions: To implement information ethics, it is necessary to be aware of the position Islam has given this concept. Following Quran guidelines and the manners of the family members of the Prophet Muhammad (pbuh results in a society in which information ethics is observed optimally.

  18. A segmentation analysis of consumer uses of health information.

    Science.gov (United States)

    Risker, D C

    1995-01-01

    Public and private health data organizations are receiving increased pressure to produce consumer-level health information. In addition, the proposed health care reforms imply that health care networks will have to market their health plans. However, little attention has been given to what format the information should have and what the consumers' information needs are. This article discusses the health services marketing literature published to date on the subject, compares it to general marketing literature, and suggests some general guidelines for the effective publication and distribution of health information.

  19. ANALYSIS OF THE COHERENCE OF LOGISTIC SYSTEMS FROM URBAN ENVIROMNENTS USING THE INFORMATIONAL INDICES

    OpenAIRE

    Gheorghe BASANU; Victor TELEASA

    2010-01-01

    The paper introduces a series of analysis models of the flows of materials and products existent inside a logistic system, elaborated according to the entropic and informational indices introduced in the first part of the paper, which are: informational entropy, the quantity of information, the organization degree, the mutual information, the informational energy and the coefficient of informational correlation. The theoretical elements are used in case studies in the second part of the paper...

  20. 75 FR 35457 - Draft of the 2010 Causal Analysis/Diagnosis Decision Information System (CADDIS)

    Science.gov (United States)

    2010-06-22

    ... AGENCY Draft of the 2010 Causal Analysis/Diagnosis Decision Information System (CADDIS) AGENCY... period for the draft Web site, ``2010 release of the Causal Analysis/Diagnosis Decision Information... investigators find, access, organize, and share information useful for causal evaluations in aquatic systems...