WorldWideScience

Sample records for defense information analysis

  1. Analysis of consolidating defense acquisition information on the Internet.

    OpenAIRE

    Trulock, Troy E.

    1997-01-01

    Approved for public release; distribution is unlimited The Internet began over 30 years ago as a method of providing vital military communications following a nuclear attack. Today, due to the introduction of the World Wide Web and recent commercial interests, the Internet has grown into a multimedia source of information, and has become overloaded with information. Acquisition professionals in both the government and civilian defense acquisition sectors are attempting to use the Internet ...

  2. Information Analysis Centers in the Department of Defense. Revision

    Science.gov (United States)

    1987-07-01

    Combat Data Information Center (CDIC) and the Aircraft Survivability Model Repository ( ASMR ) into the Survivability/Vulnerability Information Analysis...Information Center (CDIC) and the Aircraft Survivability Model Respository ( ASMR ). The CDIC was a central repository for combat and test data related to...and ASMR were operated under the technical monitorship of the Flight Dynamics Laboratory at Wright-Patterson AFB, Ohio and were located in Flight

  3. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  4. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  5. An Analysis of Defense Information and Information Technology Articles: A Sixteen-Year Perspective

    Science.gov (United States)

    2009-03-01

    exploratory,” or “subjective” ( Denzin & Lincoln , 2000). Existing Research This research is based on content analysis methodologies utilized by Carter...same codes ( Denzin & Lincoln , 2000). Different analysts should code the same text in a similar manner (Weber, 1990). Typically, researchers compute...chosen. Krippendorf recommends an agreement level of at least .70 (Krippendorff, 2004). Some scholars use a cut-off rate of .80 ( Denzin & Lincoln

  6. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  7. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  8. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  9. Defense Technical Information Center thesaurus

    Energy Technology Data Exchange (ETDEWEB)

    Dickert, J.H. [ed.] [comp.

    1996-10-01

    This DTIC Thesaurus provides a basic multidisciplinary subject term vocabulary used by DTIC to index and retrieve scientific and technical information from its various data bases and to aid DTIC`s users in their information storage and retrieval operations. It includes an alphabetical posting term display, a hierarchy display, and a Keywork Out of Context (KWOC) display.

  10. Defense Technical Information Center Thesaurus

    Science.gov (United States)

    2000-10-01

    Functional analysis Drives UF Drive chains Drosophilidae Dressings UFC Constant speed drives UF Pomace flies RT First aid Electronic drives Vinegar flies...systems RT Endothermic reactions RT Electrons Manifolds(Engines) BT Chemical reactions+ BT Elementary particles+ NT Fermentation Exhaust nozzles...Barriers+ NT Electric fences Ferrocement Fertility Grilles BT Reinforced concrete+ BT Reproduction(Physiology)+ NT Birth+ Fermentation Ferrocenes Estrous

  11. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  12. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  13. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    Science.gov (United States)

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  14. Environmental information document defense waste processing facility

    International Nuclear Information System (INIS)

    1981-07-01

    This report documents the impact analysis of a proposed Defense Waste Processing Facility (DWPF) for immobilizing high-level waste currently being stored on an interim basis at the Savannah River Plant (SRP). The DWPF will process the waste into a form suitable for shipment to and disposal in a federal repository. The DWPF will convert the high-level waste into: a leach-resistant form containing above 99.9% of all the radioactivity, and a residue of slightly contaminated salt. The document describes the SRP site and environs, including population, land and water uses; surface and subsurface soils and waters; meteorology; and ecology. A conceptual integrated facility for concurrently producing glass waste and saltcrete is described, and the environmental effects of constructing and operating the facility are presented. Alternative sites and waste disposal options are addressed. Also environmental consultations and permits are discussed

  15. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  16. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  17. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  18. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  19. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  20. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  1. Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service

    National Research Council Canada - National Science Library

    Costa, Robert

    2002-01-01

    Information Superiority is an overarching and integrating construct in both Joint Vision 2020 and the 2001 Quadrennial Defense Review and is codified in both the 2000 National Security Strategy (NSS...

  2. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  3. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  4. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  5. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  6. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  7. Defense Waste Processing Facility staged operations: environmental information document

    International Nuclear Information System (INIS)

    1981-11-01

    Environmental information is presented relating to a staged version of the proposed Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The information is intended to provide the basis for an Environmental Impact Statement. In either the integral or the staged design, the DWPF will convert the high-level waste currently stored in tanks into: a leach-resistant form containing about 99.9% of all the radioactivity, and a residual, slightly contaminated salt, which is disposed of as saltcrete. In the first stage of the staged version, the insoluble sludge portion of the waste and the long lived radionuclides contained therein will be vitrified. The waste glass will be sealed in canisters and stored onsite until shipped to a Federal repository. In the second stage, the supernate portion of the waste will be decontaminated by ion exchange. The recovered radionuclides will be transferred to the Stage 1 facility, and mixed with the sludge feed before vitrification. The residual, slightly contaminated salt solution will be mixed with Portland cement to form a concrete product (saltcrete) which will be buried onsite in an engineered landfill. This document describes the conceptual facilities and processes for producing glass waste and decontaminated salt. The environmental effects of facility construction, normal operations, and accidents are then presented. Descriptions of site and environs, alternative sites and waste disposal options, and environmental consultations and permits are given in the base Environmental Information Document

  8. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  9. A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support

    Science.gov (United States)

    Bambacus, Myra; Yang, Chaowei Phil; Leung, Ronald Y.; Barbee, Brent; Nuth, Joseph A.; Seery, Bernard; Jiang, Yongyao; Qin, Han; Li, Yun; Yu, Manzhu; hide

    2017-01-01

    A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support presentation discussing background, framework architecture, current results, ongoing research, conclusions.

  10. Defensive reactions to health-promoting information: an overview and implications for future research

    NARCIS (Netherlands)

    Riet, van 't J.P.; Ruiter, R.A.C.

    2013-01-01

    It is a common finding that recipients of threatening health-promoting information are motivated to dismiss or disregard the information, thus reacting defensively'. This article gives an overview of the literature on defensive reactions to health-promoting information. A distinction is made

  11. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  12. 2003 annual report. Information and health, defense, energy

    International Nuclear Information System (INIS)

    2004-01-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  13. 75 FR 26739 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Part 244...

    Science.gov (United States)

    2010-05-12

    ... Control Number 0704-0253) AGENCY: Defense Acquisition Regulations System, Department of Defense. ACTION... proposed information collection; (c) ways to enhance the quality, utility, and clarity of the information..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review...

  14. 78 FR 70025 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-11-22

    ... and Procedures AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION... proposed information collection; (c) ways to enhance the quality, utility, and clarity of the information..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review...

  15. Defense Industry Restructuring: Updated Cost and Savings Information

    National Research Council Canada - National Science Library

    1998-01-01

    ...) the restructuring costs were allowable under the Federal Acquisition Regulation and (2) a DOD contracting officer determined the business combination would result in overall reduced costs to DOD or preserve a critical defense capability...

  16. Analysis to Inform Defense Planning Despite Austerity

    Science.gov (United States)

    2014-01-01

    proved false : The “worst case” was much worse than planned for (Bensahel, Oliker, and Peterson, 2009, pp. 233ff). 26 Hoffman, 2009. 27 Ross, 2005...wisdom. Such work often has well-identified threats (named countries or groups), but not stereotyped point-case scenarios. Is such work threat-based...should be used only for narrow purposes and advertised as such. Endnotes 1 Gates, 2010, p. 90. 2 Kendall, 2013. 3 Boerman, 2013; Tompkins, Boerman, and

  17. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  18. 78 FR 20624 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-04-05

    ... Identification Advance Shipment Notices AGENCY: Defense Acquisition Regulations System, Department of Defense (Do...) Whether the proposed collection of information is necessary for the proper performance of the functions of... at 252.211; Radio Frequency Identification Advance Shipment Notices, OMB Control Number 0704-0434...

  19. 78 FR 63462 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-10-24

    ... Relating to Organizational Conflict of Interest-Major Defense Acquisition Program; OMB Control Number 0704...] Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Organizational Conflict... submit comments, identified by OMB Control Number 0704-0477, using any of the following methods: [cir...

  20. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    Science.gov (United States)

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  1. 76 FR 5236 - 60-Day Notice of Proposed Information Collection: Form DS-4071, Export Declaration of Defense...

    Science.gov (United States)

    2011-01-28

    ... Information Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405... of technology. Abstract of proposed collection: Actual export of defense technical data and defense... DS-4071, Export Declaration of Defense Technical Data or Services; OMB Control Number 1405-0157...

  2. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  3. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  4. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    The threat to the Defense Information Infrastructure is growing Hackers have advanced in sophistication and the potential exists for an alliance of independent hackers and terrorist/criminal groups...

  5. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike -Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike -Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...1999). Additionally, there are cultural impacts (Gordon & Gordon, 1999). A company choosing an Apple OS may have to wage a big fight against the

  6. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  7. Defense against nuclear weapons: a decision analysis

    International Nuclear Information System (INIS)

    Orient, J.M.

    1985-01-01

    Response to the public health threat posed by nuclear weapons is a medical imperative. The United States, in contrast to other nations, has chosen a course that assures maximal casualties in the event of a nuclear attack, on the theory that prevention of the attack is incompatible with preventive measures against its consequences, such as blast injuries and radiation sickness. A decision analysis approach clarifies the risks and benefits of a change to a strategy of preparedness

  8. Department of Defense Information Enterprise Architecture Version 1.2

    Science.gov (United States)

    2010-05-07

    Internet Protocol (IP) boundaries of the Global Information Grid (GIG). Outside of these boundaries, the principles still should be considered, but...Capability Portfolio Managers) in managing the overall DoD Information Technology (IT) portfolio. Components will use DoD IEA to strategically... Information Sharing Strategy (May 2007) DoD Information Assurance Policies (DoDD 8500.01E, October 2002) DoD Computing Infrastructure Strategy

  9. 77 FR 54367 - Sharing Information Between the Department of Veterans Affairs and the Department of Defense

    Science.gov (United States)

    2012-09-05

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 1 RIN 2900-AN95 Sharing Information Between the...) regulatory restriction on the sharing of certain medical information with the Department of Defense (DoD... economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy...

  10. Acquisition Management of the Defense Counterintelligence Information System

    National Research Council Canada - National Science Library

    2002-01-01

    .... Specifically, the audit determined whether the information technology system was being cost-effectively acquired, monitored, tested, secured, and prepared for deployment and system life-cycle support...

  11. Reentrant phase transitions and defensive alliances in social dilemmas with informed strategies

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž

    2015-05-01

    Knowing the strategy of an opponent in a competitive environment conveys obvious evolutionary advantages. But this information is costly, and the benefit of being informed may not necessarily offset the additional cost. Here we introduce social dilemmas with informed strategies, and we show that this gives rise to two cyclically dominant triplets that form defensive alliances. The stability of these two alliances is determined by the rotation velocity of the strategies within each triplet. A weaker strategy in a faster rotating triplet can thus overcome an individually stronger competitor. Fascinating spatial patterns favor the dominance of a single defensive alliance, but enable also the stable coexistence of both defensive alliances in very narrow regions of the parameter space. A continuous reentrant phase transition reveals before unseen complexity behind the stability of strategic alliances in evolutionary social dilemmas.

  12. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    Information systems (IS) have evolved over the last 50 plus years from individual components with single functionality to grand architectures that integrate multiple individual business functions into global organizational enterprises...

  13. Canonical Information Analysis

    DEFF Research Database (Denmark)

    Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg

    2015-01-01

    is replaced by the information theoretical, entropy based measure mutual information, which is a much more general measure of association. We make canonical information analysis feasible for large sample problems, including for example multispectral images, due to the use of a fast kernel density estimator......Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables...... for entropy estimation. Canonical information analysis is applied successfully to (1) simple simulated data to illustrate the basic idea and evaluate performance, (2) fusion of weather radar and optical geostationary satellite data in a situation with heavy precipitation, and (3) change detection in optical...

  14. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  15. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  16. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  17. 78 FR 15935 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-03-13

    ... automated collection techniques or other forms of information technology. The Office of Management and... construction contract in Spain has adequate insurance coverage. Affected Public: Businesses or other for profit... construction contract in Spain. Kortnee Stewart, Editor, Defense Acquisition Regulations System. [FR Doc. 2013...

  18. External Quality Control Review of the Defense Information Systems Agency Audit Organization

    Science.gov (United States)

    2012-08-07

    We are providing this report for your information and use. We have reviewed the system of quality control for the audit organization of the Defense...audit organization encompasses the audit organization’s leadership, emphasis on performing high quality work, and policies and procedures established

  19. Discussion and practice of information work in defense enterprises or institutes at the basic level

    International Nuclear Information System (INIS)

    Hu Junyong

    2010-01-01

    With the advent of an epoch when national economy and society is information-based and information transmission is predominantly implemented through networks and information carrier is characterized by digitalisation, information workers in defense enterprises or institutes at the basic level are faced with unprecedented pressures and at the same time with new opportunities and challenges. The integration of information resources with library resources can bring the resources into play effectively and efficiently, thus being propitious to information work. Demand orientation and deepening of services are the foundations for the existence and development of information team or department in theses enterprise or institutes. Resources construction in terms of literature and qualified information workers is the foundation for information work and can safeguard the development of information work in these enterprises or institutes. (author)

  20. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  1. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  2. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  3. An Empirical Analysis of the Patterns in Defense Industry Consolidation and Their Subsequent Impact

    National Research Council Canada - National Science Library

    Hensel, Nayantara

    2007-01-01

    .... This paper explores the causes of the wave of defense mergers, as well as their impact. The analysis finds that the frequency of defense mergers is more strongly correlated with overall merger activity in the economy than with DoD outlays...

  4. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  5. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  6. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  7. Defense Analysis Students' SNA Research Captures the Attention of SOUTHCOM Leadership

    OpenAIRE

    Dionne, Patrick

    2017-01-01

    News Stories Archive U.S. Army Majs. Matthew Bauer, Andrew Maggard and Robert Murray, all students at the Naval Postgraduate School’s (NPS) Defense Analysis department, had the opportunity to brief members of United States Southern Command (SOUTHCOM).

  8. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  9. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  10. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  11. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  12. Material Accounting and Management Control Weaknesses in the Defense Agencies' FYs 1995 and 1996 Financial Information

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1997-01-01

    The primary audit objective was to summarize Defense agency accounting system weaknesses and related management control program weaknesses identified during audits of defense agencies' FYs 1995 and 1996 financial data...

  13. Information Assurance and Information Technology: Training, Certification, and Personnel Management in the Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    The DoD's warfighting Capability and the security of its information infrastructure are at great risk from attacks by foreign intelligence organizations, cyber-terrorists, and the incompetencies of some of its own users...

  14. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    Science.gov (United States)

    2015-06-01

    the form of tax receipts from home and overseas sales, such as income taxes , corporate taxes , as well as avoiding unemployment pay (if workers are...Economic Co-Operation and Development [ OECD ], 2015) .............................................................30 Figure 3. Classification of Offset...domestic defense industry, the end result may be an unacceptably high cost to the government and the population. To avoid this outcome, the main function

  15. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  16. Relevant Information and Informed Consent in Research: In Defense of the Subjective Standard of Disclosure.

    Science.gov (United States)

    Dranseika, Vilius; Piasecki, Jan; Waligora, Marcin

    2017-02-01

    In this article, we seek to contribute to the debate on the requirement of disclosure in the context of informed consent for research. We defend the subjective standard of disclosure and describe ways to implement this standard in research practice. We claim that the researcher should make an effort to find out what kinds of information are likely to be relevant for those consenting to research. This invites researchers to take empirical survey information seriously, attempt to understand the cultural context, talk to patients to be better able to understand what can be potentially different concerns and interests prevalent in the target population. The subjective standard of disclosure should be seen as a moral ideal that perhaps can never be perfectly implemented but still can and should be used as a normative ideal guiding research practice. In the light of these discussions, we call for more empirical research on what considerations are likely to be perceived as relevant by potential research participants recruited from different socio-economic and cultural groups.

  17. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges

    International Nuclear Information System (INIS)

    2005-01-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  18. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  19. Financial Management: U.S. Army Corps of Engineers Financial Information Imported Into the Defense Departmental Reporting System - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul J; Peek, Marvin L; Armstrong, Jack L; Wenzel, Paul C; Furey, Kathleen A; Zimmerman, Craig W

    2004-01-01

    ... are: the Corps of Engineers Financial Management System, the Corps of Engineers Enterprise Management Information System, and the Defense Departmental Reporting System - Audited Financial Statements...

  20. Information Security Risk Analysis

    CERN Document Server

    Peltier, Thomas R

    2010-01-01

    Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.

  1. Communication Analysis of Information Complexes.

    Science.gov (United States)

    Malik, M. F.

    Communication analysis is a tool for perceptual assessment of existing or projected information complexes, i.e., an established reality perceived by one or many humans. An information complex could be of a physical nature, such as a building, landscape, city street; or of a pure informational nature, such as a film, television program,…

  2. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  3. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  4. Information Flow Analysis for VHDL

    DEFF Research Database (Denmark)

    Tolstrup, Terkel Kristian; Nielson, Flemming; Nielson, Hanne Riis

    2005-01-01

    We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow analysis as required by the international standard Common Criteria. The goal of the analysis is to identify the entire...... information flow through the VHDL program. The result of the analysis is presented as a non-transitive directed graph that connects those nodes (representing either variables or signals) where an information flow might occur. We compare our approach to that of Kemmerer and conclude that our approach yields...

  5. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  6. Lexical Link Analysis (LLA) Application: Improving Web Service to Defense Acquisition Visibility Environment (DAVE)

    Science.gov (United States)

    2015-05-01

    1 LEXICAL LINK ANALYSIS (LLA) APPLICATION: IMPROVING WEB SERVICE TO DEFENSE ACQUISITION VISIBILITY ENVIRONMENT(DAVE) May 13-14, 2015 Dr. Ying...REPORT DATE MAY 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Lexical Link Analysis (LLA) Application...Making 3 2 1 3 L L A Methods • Lexical Link Analysis (LLA) Core – LLA Reports and Visualizations • Collaborative Learning Agents (CLA) for

  7. Modeling Toolkit and Workbook for Defense Analysis Students

    National Research Council Canada - National Science Library

    Riden, Chad A; Drake, Douglass M

    2006-01-01

    .... Topics covered include difference equations, systems of difference equations, Lanchester equations, graphical analysis, proportionality, geometric similarity, model fitting, Monte Carlo simulation...

  8. Department of Defenses 2015 Retirement Plan Cost Analysis

    Science.gov (United States)

    2016-06-01

    PLAN COST ANALYSIS ABSTRACT The new military retirement system is advertised to significantly reduce the Department of Defense’s (DOD...200 words) The new military retirement system is advertised to significantly reduce the Department of Defense’s (DOD) monetary outlays over the...determine how changing the value of the following planning assumptions in the MCRMC report will impact the estimated cost savings of this new plan through

  9. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  10. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  11. A Management Case Analysis of the Department of Defense Contractor Risk Assessment Guide Program

    Science.gov (United States)

    1990-12-01

    ORGANIZATION ......... 17 1. Past Government Organization Problems... 17 2. Current Government Organization ......... 17 3. The Contractor’s Organizatin ...Program and urged CODSIA to take a leadership role in encouraging its members to participate. The DCAA [Ref ll:p. 45] informed defense contractors in...conferences, and through the leadership of officials including the Under Secretary of the Navy for Acquisition, DOD Comptroller General, DOD Inspector General

  12. Root defense analysis against Fusarium oxysporum reveals new regulators to confer resistance

    Science.gov (United States)

    Chen, Yi Chung; Wong, Chin Lin; Muzzi, Frederico; Vlaardingerbroek, Ido; Kidd, Brendan N.; Schenk, Peer M.

    2014-01-01

    Fusarium oxysporum is a root-infecting fungal pathogen that causes wilt disease on a broad range of plant species, including Arabidopsis thaliana. Investigation of the defense response against this pathogen had primarily been conducted using leaf tissue and little was known about the root defense response. In this study, we profiled the expression of root genes after infection with F. oxysporum by microarray analysis. In contrast to the leaf response, root tissue did not show a strong induction of defense-associated gene expression and instead showed a greater proportion of repressed genes. Screening insertion mutants from differentially expressed genes in the microarray uncovered a role for the transcription factor ETHYLENE RESPONSE FACTOR72 (ERF72) in susceptibility to F. oxysporum. Due to the role of ERF72 in suppressing programmed cell death and detoxifying reactive oxygen species (ROS), we examined the pub22/pub23/pub24 U-box type E3 ubiquitin ligase triple mutant which is known to possess enhanced ROS production in response to pathogen challenge. We found that the pub22/23/24 mutant is more resistant to F. oxysporum infection, suggesting that a heightened innate immune response provides protection against F. oxysporum. We conclude that root-mediated defenses against soil-borne pathogens can be provided at multiple levels. PMID:24998294

  13. Defensible Spaces in Philadelphia: Exploring Neighborhood Boundaries Through Spatial Analysis

    Directory of Open Access Journals (Sweden)

    Rory Kramer

    2017-02-01

    Full Text Available Few spatial scales are as important to individual outcomes as the neighborhood. However, it is nearly impossible to define neighborhoods in a generalizable way. This article proposes that by shifting the focus to measuring neighborhood boundaries rather than neighborhoods, scholars can avoid the problem of the indefinable neighborhood and better approach questions of what predicts racial segregation across areas. By quantifying an externality space theory of neighborhood boundaries, this article introduces a novel form of spatial analysis to test where potential physical markers of neighborhood boundaries (major roads, rivers, railroads, and the like are associated with persistent racial boundaries between 1990 and 2010. Using Philadelphia as a case study, the paper identifies neighborhoods with persistent racial boundaries. It theorizes that local histories of white reactions to black in-migration explain which boundaries persistently resisted racial turnover, unlike the majority of Philadelphia’s neighborhoods, and that those racial boundaries shape the location, progress, and reaction to new residential development in those neighborhoods.

  14. 76 FR 38089 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-06-29

    ... Defense Contract Audit Agency audit; (ii) By DoD Offices of the Inspector General as part of pending or on...-3 MA-4(6) SC-4. AC-3(4) Audit & Identification and MA-5 SC-7. Accountability. Authentication. AC-4... determined). [[Page 38095

  15. 75 FR 12173 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Science.gov (United States)

    2010-03-15

    ... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...

  16. High-throughput phenotyping allows for QTL analysis of defense, symbiosis and development-related traits

    DEFF Research Database (Denmark)

    Hansen, Nina Eberhardtsen

    -throughput phenotyping of whole plants. Additionally, a system for automated confocal microscopy aiming at automated detection of infection thread formation as well as detection of lateral root and nodule primordia is being developed. The objective was to use both systems in genome wide association studies and mutant...... the analysis. Additional phenotyping of defense mutants revealed that MLO, which confers susceptibility towards Blumeria graminis in barley, is also a prime candidate for a S. trifoliorum susceptibility gene in Lotus....

  17. Differential regulation of defense-related proteins in soybean during compatible and incompatible interactions between Phytophthora sojae and soybean by comparative proteomic analysis.

    Science.gov (United States)

    Jing, Maofeng; Ma, Hongyu; Li, Haiyang; Guo, Baodian; Zhang, Xin; Ye, Wenwu; Wang, Haonan; Wang, Qiuxia; Wang, Yuanchao

    2015-07-01

    Few proteomic studies have focused on the plant- Phytophthora interactions, our study provides important information regarding the use of proteomic methods for investigation of the basic mechanisms of plant-Phytophthora interactions. Phytophthora sojae is a fast-spreading and devastating pathogen that is responsible for root and stem rot in soybean crops worldwide. To better understand the response of soybean seedlings to the stress of infection by virulent and avirulent pathogens at the proteomic level, proteins extracted from the hypocotyls of soybean reference cultivar Williams 82 infected by P. sojae P6497 (race 2) and P7076 (race 19), respectively, were analyzed by two-dimensional gel electrophoresis. 95 protein spots were differently expressed, with 83 being successfully identified by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry and subjected to further analysis. Based on the majority of the 83 defense-responsive proteins, and defense-related pathway genes supplemented by a quantitative reverse transcription PCR assay, a defense-related network for soybean infected by virulent and avirulent pathogens was proposed. We found reactive oxygen species (ROS) burst, the expression levels of salicylic acid (SA) signal pathway and biosynthesis of isoflavones were significantly up-regulated in the resistant soybean. Our results imply that following the P. sojae infection, ROS and SA signal pathway in soybean play the major roles in defense against P. sojae. This research will facilitate further investigation of the molecular regulatory mechanism of the defense response in soybean following infection by P. sojae.

  18. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  19. Molecular Dynamics Simulation and Statistics Analysis Reveals the Defense Response Mechanism in Plants

    Science.gov (United States)

    Liu, Zhichao; Zhao, Yunjie; Zeng, Chen; Computational Biophysics Lab Team

    As the main protein of the bacterial flagella, flagellin plays an important role in perception and defense response. The newly discovered locus, FLS2, is ubiquitously expressed. FLS2 encodes a putative receptor kinase and shares many homologies with some plant resistance genes and even with some components of immune system of mammals and insects. In Arabidopsis, FLS2 perception is achieved by the recognition of epitope flg22, which induces FLS2 heteromerization with BAK1 and finally the plant immunity. Here we use both analytical methods such as Direct Coupling Analysis (DCA) and Molecular Dynamics (MD) Simulations to get a better understanding of the defense mechanism of FLS2. This may facilitate a redesign of flg22 or de-novo design for desired specificity and potency to extend the immune properties of FLS2 to other important crops and vegetables.

  20. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    Energy Technology Data Exchange (ETDEWEB)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable

  1. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    International Nuclear Information System (INIS)

    Radulesscu, G.; Tang, J.S.

    2000-01-01

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M andO [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M andO 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M andQ 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M andO 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this

  2. Defense Logistics: Department of Defense's Annual Report on the Status of Prepositioned Materiel and Equipment Can Be Enhanced to Better Inform Congress

    National Research Council Canada - National Science Library

    Solis, William M

    2008-01-01

    The Department of Defense (DOD) prepositions equipment at strategic locations around the world in order to field combat-ready forces in days, rather than the weeks it would take if equipment had to be moved from the United States...

  3. 78 FR 36012 - 30-Day Notice of Proposed Information Collection: Export Declaration of Defense Technical Data or...

    Science.gov (United States)

    2013-06-14

    ... Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of... Declaration of Defense Technical Data or Services ACTION: Notice of request for public comment and submission... and brokering of defense articles, defense services and related technical data are licensed by the...

  4. Economic Growth and Defense Spending in Greece, Turkey and Cyprus: Evidence from Cointegrated Panel Analysis

    Directory of Open Access Journals (Sweden)

    Stylianou Tasos

    2012-06-01

    Full Text Available This paper investigates the nexus between economic growth and defense spending for three adjacent countries, namely Greece, Turkey and Cyprus. Greece and Cyprus, members-countries of European Union spend much more money than other member countries of EU relatively to their GDP. Turkey is in accession negotiations with EU and is among the top 15 countries with the highest military expenditure. These three countries are particularly interesting case studies because of their high military burdens and the bad relations between them (Greece and Cyprus opposite Turkey. The empirical analysis is based on panel data analysis of data over the period 1960 – 2006.

  5. A cause-defense approach to the understanding and analysis of common cause failures

    International Nuclear Information System (INIS)

    Paula, Henrique M.; Campbell, David J.; Parry, Gareth W.; Mitchell, Donald B.; Rasmuson, Dale M.

    1990-03-01

    For improved reliability and safety, nuclear power plants are designed with redundant safety systems, many of which also have redundant trains of equipment within the system. However, the very high reliability theoretically achievable through the use of redundancy is often compromised by single events that can individually render redundant components unavailable (common cause failure [CCF] events). As evidenced by the results of probabilistic risk assessments (PRAs) and by historical experience with nuclear power plant operations, CCF events are usually major contributors to the risk posed by nuclear power plant operation. Thus, it is important that PRAs recognize the potential for CCF events and realistically account for CCF contributions to system unavailability and plant risk. Much progress has been made over the years in the area of CCF analysis, including the development of both qualitative and quantitative analysis methods. Until now, however, CCF methodologies have not explicitly and systematically accounted for the impact of plant-specific defenses, such as design features and operational and maintenance policies, in place to reduce the likelihood of failure occurrences at nuclear power plants. Recognizing the importance of this issue, the NRC has funded a research effort that has focused on developing the cause-defense methodology for CCF analysis and prevention. This report presents the results of this research. Specifically, this report discusses the development of (1) procedures for identifying the potential for CCF events at individual nuclear power plants and (2) cause-defense matrices for analysis of CCF events. Also, new concepts and more precise definitions are introduced to enhance CCF terminology and interpretation of historical event data. (author)

  6. The Food Marketing Defense Model: Integrating Psychological Research to Protect Youth and Inform Public Policy.

    Science.gov (United States)

    Harris, Jennifer L; Brownell, Kelly D; Bargh, John A

    2009-12-01

    Marketing practices that promote calorie-dense, nutrient-poor foods directly to children and adolescents present significant public health risk. Worldwide, calls for government action and industry change to protect young people from the negative effects of food marketing have increased. Current proposals focus on restricting television advertising to children under 12 years old, but current psychological models suggest that much more is required. All forms of marketing pose considerable risk; adolescents are also highly vulnerable; and food marketing may produce far-reaching negative health outcomes. We propose a food marketing defense model that posits four necessary conditions to effectively counter harmful food marketing practices: awareness, understanding, ability and motivation to resist. A new generation of psychological research is needed to examine each of these processes, including the psychological mechanisms through which food marketing affects young people, to identify public policy that will effectively protect them from harmful influence.

  7. Attacking and defensive styles of play in soccer: analysis of Spanish and English elite teams.

    Science.gov (United States)

    Fernandez-Navarro, Javier; Fradua, Luis; Zubillaga, Asier; Ford, Paul R; McRobert, Allistair P

    2016-12-01

    The aim of this study was to define and categorise different styles of play in elite soccer and associated performance indicators by using factor analysis. Furthermore, the observed teams were categorised using all factor scores. Data were collected from 97 matches from the Spanish La Liga and the English Premier League from the seasons 2006-2007 and 2010-2011 using the Amisco® system. A total of 19 performance indicators, 14 describing aspects of attacking play and five describing aspects of defensive play, were included in the factor analysis. Six factors, representing 12 different styles of play (eight attacking and four defensive), had eigenvalues greater than 1 and explained 87.54% of the total variance. Direct and possession styles of play, defined by factor 1, were the most apparent styles. Factor analysis used the performance indicators to cluster each team's style of play. Findings showed that a team's style of play was defined by specific performance indicators and, consequently, teams can be classified to create a playing style profile. For practical implications, playing styles profiling can be used to compare different teams and prepare for opponents in competition. Moreover, teams could use specific training drills directed to improve their styles of play.

  8. An Introduction to the Deputy Assistant Secretary of Defense for Information and Identity Assurance

    National Research Council Canada - National Science Library

    Lentz, Robert

    2008-01-01

    ...) is information dependent and relies on trusted information to function effectively. The DoD faces daily attacks on its networks and systems, ranging from curious kids to much more advanced, organized campaigns. The DASD(IIA...

  9. Defense Spending Databases for Countries in the Asia-Pacific Region: An Analysis and Comparison

    National Research Council Canada - National Science Library

    Reuning, Charles

    2001-01-01

    The purpose of this research was to identify and analyze a select number of unclassified databases that cover defense spending and other defense related criteria for countries in the Asia-Pacific region...

  10. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield

    Science.gov (United States)

    1994-10-01

    information warfare has many elements, some new, some old, which interrelate in complex ways. Some are: "• Psychological operations and perception...and information systems." Some aspects of Information Warfare are very old - for example, what we now call Psychological Operations. Some are...Communications, and Intelligence) ASOC Air Support Operations Center ASTEC Advanced Satellite Technology and EHF Communications ATARS Advanced Tactical

  11. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges; Rapport annuel 2004. Defense, securite, energie, information, sante. Le CEA au coeur des grands defis europeens

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  12. Biomechanical Analysis of Defensive Cutting Actions During Game Situations: Six Cases in Collegiate Soccer Competitions

    Directory of Open Access Journals (Sweden)

    Sasaki Shogo

    2015-06-01

    Full Text Available The strengths of interpersonal dyads formed by the attacker and defender in one-on-one situations are crucial for performance in team ball sports such as soccer. The purpose of this study was to analyze the kinematics of one-on-one defensive movements in soccer competitions, and determine the relationships between lower limb kinematics and the center of mass translation during cutting actions. Six defensive scenes in which a player was responding to an offender’s dribble attack were selected for analysis. To reconstruct the three-dimensional kinematics of the players, we used a photogrammetric model-based image-matching technique. The hip and knee kinematics were calculated from the matched skeleton model. In addition, the center of mass height was expressed as a ratio of each participant’s body height. The relationships between the center of mass height and the kinematics were determined by the Pearson’s product-moment correlation coefficient. The normalized center of mass height at initial contact was correlated with the vertical center of mass displacement (r = 0.832, p = 0.040 and hip flexion angle at initial contact (r = −0.823, p = 0.044. This suggests that the lower center of mass at initial contact is an important factor to reduce the downwards vertical center of mass translation during defensive cutting actions, and that this is executed primarily through hip flexion. It is therefore recommended that players land with an adequately flexed hip at initial contact during one-on-one cutting actions to minimize the vertical center of mass excursion.

  13. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    Science.gov (United States)

    2010-06-01

    Wolfgang. "Appraisal of the effectivness and efficiency of an Information Security Management System based on ISO 27001 ." International Conference on...of corporate information resources (Doherty and 29 Fulford, 2006) ( ISO /IEC 17799, 2005). Both public and private sectors of business have...Science Ltd, 2002. Iacovou, Charalambos L. "The IPACS project: when IT hits the fan." Journal of Information Technology, 1999: 267-275. ISO /IEC 17799

  14. Heuristics legislation in the field of classified information as a function of training subjects of defense

    OpenAIRE

    БЕРЕШ ПАУН Й.

    2014-01-01

    Education on the protection of classified information should be the top priority when it comes to ensuring the protection of the vital interests of the state. Some information should not be made available to the public because it is mainly related to national security, and no one should question the need to protect this kind of data. This paper is intended for educators dealing with the protection of classified information, and especially to those who work with or come into contact with confi...

  15. Management of Information Technology Equipment, Office of the Secretary of Defense

    National Research Council Canada - National Science Library

    2001-01-01

    ...) inventory records for information technology equipment, such as personal computers. In addition, the investigation identified security issues concerning the disposal of personal computer hard drives...

  16. 78 FR 12294 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Science.gov (United States)

    2013-02-22

    ...: Direct all written comments to Jennifer Jessup, Departmental Paperwork Clearance Officer, Department of...) 482-4895, Lawrence[email protected] . SUPPLEMENTARY INFORMATION: I. Abstract This recordkeeping...

  17. Deprival value: information utility analysis

    Directory of Open Access Journals (Sweden)

    Marco Antonio Pereira

    Full Text Available ABSTRACT This article contributes to the perception that the users’ learning process plays a key role in order to apply an accounting concept and this involves a presentation that fits its informative potential, free of previous accounting fixations. Deprival value is a useful measure for managerial and corporate purposes, it may be applied to the current Conceptual Framework of the International Accounting Standards Board (IASB. This study analyzes its utility, taking into account cognitive aspects. Also known as value to the business, deprival value is a measurement system that followed a path where it was misunderstood, confused with another one, it faced resistance to be implemented and fell into disuse; everything that a standardized measurement method tries to avoid. In contrast, deprival value has found support in the academy and in specific applications, such as those related to the public service regulation. The accounting area has been impacted by sophistication of the measurement methods that increasingly require the ability to analyze accounting facts on an economic basis, at the risk of loss of their information content. This development becomes possible only when the potential of a measurement system is known and it is feasible to be achieved. This study consists in a theoretical essay based on literature review to discuss its origin, presentation, and application. Considering the concept’s cognitive difficulties, deprival value was analyzed, as well as its corresponding heteronym, value to the business, in order to explain some of these changes. The concept’s utility was also explored through cross-analysis with impairment and the scheme developed was applied to actual economic situations faced by a company listed on stock exchange.

  18. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  19. 75 FR 20825 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; DoD Pilot...

    Science.gov (United States)

    2010-04-21

    ... suppliers; and (3) foster the establishment of long-term business relationships between protege firms and... technology. The Office of Management and Budget (OMB) has approved this information collection for use...

  20. 78 FR 19467 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-04-01

    ... subcontractors and suppliers; and (3) foster the establishment of long-term business relationships between... technology. The Office of Management and Budget (OMB) has approved this information collection for use...

  1. Information requirements for the Department of Energy Defense Programs' hazardous and mixed wastes

    International Nuclear Information System (INIS)

    Herron, S.A.

    1987-01-01

    This document contains viewgraphs from a presentation made to the DOE Low-Level Waste Management Conference in Denver, Colorado. The presentation described information and data base systems that describe hazardous and mixed waste treatment, storage, and disposal

  2. Analysis of Government Accountability Office and Department of Defense Inspector General Reports and Commercial Sources on Service Contracts

    Science.gov (United States)

    2010-06-01

    Acquisition Research Program BIM Building Information Modeling COR Contracting Officer Representative DoD Department of Defense FPDS...WBS), performance work statements (PWS) and statement of work (SOW), market research, budget and cost estimates, determining contract type, and...contracting within this project. The recurrent best practices in contracting among all sources emphasized planning, defining requirements, market research

  3. Marketing Information: A Competitive Analysis

    OpenAIRE

    Miklos Sarvary; Philip M. Parker

    1997-01-01

    Selling information that is later used in decision making constitutes an increasingly important business in modern economies (Jensen [Jensen, Fred O. 1991. Information services. Congram, Friedman, eds. , Chapter 22. AMA-COM, New York, 423–443.]). Information is sold under a large variety of forms: industry reports, consulting services, database access, and/or professional opinions given by medical, engineering, accounting/financial, and legal professionals, among others. This paper is the fir...

  4. Expression analysis of chitinase upon challenge inoculation to Alternaria wounding and defense inducers in Brassica juncea

    Directory of Open Access Journals (Sweden)

    Sandhya Rawat

    2017-03-01

    Full Text Available Chitinases are the hydrolytic enzymes which belong to the pathogenesis-related (PR protein family and play an important role not only in plant defense but also in various abiotic stresses. However, only a limited number of chitinase genes have been characterised in B. juncea. In this study, we have characterised B. juncea class IV chitinase gene (accession no EF586206 in response to fungal infection, salicylic acid (SA, jasmonic acid (JA treatments and wounding. Gene expression studies revealed that the transcript levels of Bjchitinase (BjChp gene increases significantly both in local and distal tissues after Alternaria infection. Bjchitinase gene was also induced by jasmonic acid and wounding but moderately by salicylic acid. A 2.5 kb class IV chitinase promoter of this gene was isolated from B. juncea by Genome walking (accession no KF055403.1. In-silico analysis of this promoter revealed a number of conserved cis-regulatory elements related to defense, wounding and signalling molecules like SA, and JA. For validation, chitinase promoter was fused to the GUS gene, and the resultant construct was then introduced into Arabidopsis plants. Histochemical analysis of T2 transgenic Arabidopsis plants showed that higher GUS activity in leaves after fungal infection, wounding and JA treatment but weakly by SA. GUS activity was seen in meristematic tissues, young leaves, seeds and siliques. Finally investigation has led to the identification of a pathogen-inducible, developmentally regulated and organ-specific promoter. Present study revealed that Bjchitinase (BjChp promoter is induced during biotic and environmental stress and it can be used in developing finely tuned transgenics.

  5. 77 FR 58817 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2012-09-24

    ... automated collection techniques or other forms of information technology. The Office of Management and... 252.232-7002, Progress Payments for Foreign Military Sales Acquisitions; OMB Control Number 0704-0321.... The clause at 252.232- 7002, Progress Payments for Foreign Military Sales Acquisitions, requires each...

  6. How the Posse Comitatus Act Restricts Department of Defense Information Sharing

    Science.gov (United States)

    2010-06-11

    primary mission was to cultivate counterintelligence programs designed to enable force protection, CIFA soon expanded its reach with the launch of...distributed domestic information to federal and local law enforcement, the more the agencies requested. This phenomenon soon mushroomed into the

  7. 78 FR 68830 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Service...

    Science.gov (United States)

    2013-11-15

    ... or other forms of information technology. The Office of Management and Budget (OMB) has approved this... Services. The provision at DFARS 252.237- 7024 requires offerors to submit with its offer a written plan describing how it will continue to perform essential contractor services during periods of crisis. The...

  8. 76 FR 66889 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-10-28

    ...). ACTION: Notice of meeting. SUMMARY: DoD is hosting a public meeting to initiate a dialogue with industry... not presently address the safeguarding of unclassified DoD information within industry, nor does it... processed through security in a timely fashion. Prior registrants will be given priority if room constraints...

  9. 76 FR 72916 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2011-11-28

    ... information collection requires contractors to comply with the notification process at DFARS clause 252.204... purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from inspection requirements for activities with direct national security significance. The clause at...

  10. 77 FR 74177 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Production...

    Science.gov (United States)

    2012-12-13

    .../index.htm . Paper copies are available from Ms. Meredith Murphy, OUSD (AT&L) DPAP (DARS), IMD 3C132... material management and accounting systems conform to established DoD standards. c. The information... to establish, maintain, and disclose material management and accounting systems. c. DFARS 252.247...

  11. Inform: Efficient Information-Theoretic Analysis of Collective Behaviors

    Directory of Open Access Journals (Sweden)

    Douglas G. Moore

    2018-06-01

    Full Text Available The study of collective behavior has traditionally relied on a variety of different methodological tools ranging from more theoretical methods such as population or game-theoretic models to empirical ones like Monte Carlo or multi-agent simulations. An approach that is increasingly being explored is the use of information theory as a methodological framework to study the flow of information and the statistical properties of collectives of interacting agents. While a few general purpose toolkits exist, most of the existing software for information theoretic analysis of collective systems is limited in scope. We introduce Inform, an open-source framework for efficient information theoretic analysis that exploits the computational power of a C library while simplifying its use through a variety of wrappers for common higher-level scripting languages. We focus on two such wrappers here: PyInform (Python and rinform (R. Inform and its wrappers are cross-platform and general-purpose. They include classical information-theoretic measures, measures of information dynamics and information-based methods to study the statistical behavior of collective systems, and expose a lower-level API that allow users to construct measures of their own. We describe the architecture of the Inform framework, study its computational efficiency and use it to analyze three different case studies of collective behavior: biochemical information storage in regenerating planaria, nest-site selection in the ant Temnothorax rugatulus, and collective decision making in multi-agent simulations.

  12. Canonical analysis based on mutual information

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg; Vestergaard, Jacob Schack

    2015-01-01

    combinations with the information theoretical measure mutual information (MI). We term this type of analysis canonical information analysis (CIA). MI allows for the actual joint distribution of the variables involved and not just second order statistics. While CCA is ideal for Gaussian data, CIA facilitates...

  13. Content analysis in information flows

    Energy Technology Data Exchange (ETDEWEB)

    Grusho, Alexander A. [Institute of Informatics Problems of Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova str., 44/2, Moscow (Russian Federation); Faculty of Computational Mathematics and Cybernetics, Moscow State University, Moscow (Russian Federation); Grusho, Nick A.; Timonina, Elena E. [Institute of Informatics Problems of Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova str., 44/2, Moscow (Russian Federation)

    2016-06-08

    The paper deals with architecture of content recognition system. To analyze the problem the stochastic model of content recognition in information flows was built. We proved that under certain conditions it is possible to solve correctly a part of the problem with probability 1, viewing a finite section of the information flow. That means that good architecture consists of two steps. The first step determines correctly certain subsets of contents, while the second step may demand much more time for true decision.

  14. Information needs analysis principles and practice in information organizations

    CERN Document Server

    Dorner, Daniel G; Calvert, Philip J

    2010-01-01

    If you want to provide an information service that truly fulfils your users' needs, this book is essential reading. The book supports practitioners in developing an information needs analysis strategy and offers the necessary professional skills and techniques to do so.

  15. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  16. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  17. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    International Nuclear Information System (INIS)

    Blanchard, A.

    1999-01-01

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  18. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  19. Enhancing Safeguards through Information Analysis: Business Analytics Tools

    International Nuclear Information System (INIS)

    Vincent, J.; Midwinter, J.

    2015-01-01

    For the past 25 years the IBM i2 Intelligence Analysis product portfolio has assisted over 4,500 organizations across law enforcement, defense, government agencies, and commercial private sector businesses to maximize the value of the mass of information to discover and disseminate actionable intelligence that can help identify, investigate, predict, prevent, and disrupt criminal, terrorist, and fraudulent acts; safeguarding communities, organizations, infrastructures, and investments. The collaborative Intelligence Analysis environment delivered by i2 is specifically designed to be: · scalable: supporting business needs as well as operational and end user environments · modular: an architecture which can deliver maximum operational flexibility with ability to add complimentary analytics · interoperable: integrating with existing environments and eases information sharing across partner agencies · extendable: providing an open source developer essential toolkit, examples, and documentation for custom requirements i2 Intelligence Analysis brings clarity to complex investigations and operations by delivering industry leading multidimensional analytics that can be run on-demand across disparate data sets or across a single centralized analysis environment. The sole aim is to detect connections, patterns, and relationships hidden within high-volume, all-source data, and to create and disseminate intelligence products in near real time for faster informed decision making. (author)

  20. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  1. Textual Analysis of Intangible Information

    NARCIS (Netherlands)

    A.J. Moniz (Andy)

    2016-01-01

    markdownabstractTraditionally, equity investors have relied upon the information reported in firms’ financial accounts to make their investment decisions. Due to the conservative nature of accounting standards, firms cannot value their intangible assets such as corporate culture, brand value and

  2. Automated information retrieval system for radioactivation analysis

    International Nuclear Information System (INIS)

    Lambrev, V.G.; Bochkov, P.E.; Gorokhov, S.A.; Nekrasov, V.V.; Tolstikova, L.I.

    1981-01-01

    An automated information retrieval system for radioactivation analysis has been developed. An ES-1022 computer and a problem-oriented software ''The description information search system'' were used for the purpose. Main aspects and sources of forming the system information fund, characteristics of the information retrieval language of the system are reported and examples of question-answer dialogue are given. Two modes can be used: selective information distribution and retrospective search [ru

  3. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  4. Deprival value: information utility analysis

    OpenAIRE

    Pereira, Marco Antonio; Pinto, Alexandre Evaristo; Barbosa Neto, João Estevão; Martins, Eliseu

    2018-01-01

    ABSTRACT This article contributes to the perception that the users’ learning process plays a key role in order to apply an accounting concept and this involves a presentation that fits its informative potential, free of previous accounting fixations. Deprival value is a useful measure for managerial and corporate purposes, it may be applied to the current Conceptual Framework of the International Accounting Standards Board (IASB). This study analyzes its utility, taking into account cognitive...

  5. Cancer Patients' Informational Needs: Qualitative Content Analysis.

    Science.gov (United States)

    Heidari, Haydeh; Mardani-Hamooleh, Marjan

    2016-12-01

    Understanding the informational needs of cancer patients is a requirement to plan any educative care program for them. The aim of this study was to identify Iranian cancer patients' perceptions of informational needs. The study took a qualitative approach. Semi-structured interviews were held with 25 cancer patients in two teaching hospitals in Iran. Transcripts of the interviews underwent conventional content analysis, and categories were extracted. The results came under two main categories: disease-related informational needs and information needs related to daily life. Disease-related informational needs had two subcategories: obtaining information about the nature of disease and obtaining information about disease prognosis. Information needs related to daily life also had two subcategories: obtaining information about healthy lifestyle and obtaining information about regular activities of daily life. The findings provide deep understanding of cancer patients' informational needs in Iran.

  6. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  7. By Land or By Sea: An Analysis of National Missile Defense Options

    National Research Council Canada - National Science Library

    Altman, Bern J

    2000-01-01

    In conformance with the National Missile Defense (NMD) Act of 1999, the United States is pursuing the path to fielding a system capable of providing protection for all of the United States against a limited ballistic missile attack...

  8. Gender Issues: Analysis of Methodologies in Reports to the Secretaries of Defense and the Army

    National Research Council Canada - National Science Library

    1998-01-01

    ... the Defense Advisory Committee on Women in the Services to meet with trainees and trainers. These incidents also prompted the Secretary of the Army to establish the Senior Review Panel on Sexual Harassment...

  9. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  10. An Analysis of Reasons Commercial Entities Prefer Not To Participate in Defense Business

    National Research Council Canada - National Science Library

    Randall, Susan

    1997-01-01

    ...) business and the principal reasons for their refusal. Since his study, major changes have occurred in the acquisition environment resulting from the collapse of the Soviet Union and subsequent Defense budget reductions...

  11. The Child's Demystification of Psychological Defense Mechanisms: A Structural and Developmental Analysis.

    Science.gov (United States)

    Chandler, Michael J.; And Others

    1978-01-01

    Explored the relationships between the cognitive developmental level of preoperational, concrete operational, and formal operational children (N=10) and their success in interpreting and explaining each of eight commonly described mechanisms of psychological defense. (JMB)

  12. Comparison of elastic and inelastic analysis and test results for the defense high level waste shipping cask

    International Nuclear Information System (INIS)

    Zimmer, A.; Koploy, M.A.; Madsen, M.M.

    1991-01-01

    In the early 1980s, the US DOE/Defense Programs (DOE/DP) initiated a project to develop a safe and efficient transportation system for defense high level waste (DHLW). A long-standing objective of the DHLW transportation project is to develop a truck cask that represents the leading edge of cask technology as well as fully complies with all applicable DOE, Nuclear Regulatory Commission, and DOT regulations. General Atomics designed the DHLW Truck Shipping Cask using state-of-the-art analytical techniques verified by model testing performed by Sandia National Labs. (SNL). The analytical techniques include two approaches, inelastic analysis and elastic analysis. This paper will compare the results of the two analytical approaches and with model testing results. The purpose of this work is to provide data to support licensing of the DHLW cask and to support the acceptance by the NRC of inelastic analysis as a tool in packaging design and licensing

  13. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  14. Defensive technology and welfare analysis of environmental quality change with uncertain consumer health impacts

    International Nuclear Information System (INIS)

    Lee, L.K.; Moffitt, L.J.

    1993-01-01

    Measuring the ex post losses from environmental quality change is an important issue when environmental contamination creates health risks, liability is assigned, and private compensation efforts are required. This paper proposes a methodology for measuring the ex post welfare impact of environmental quality change using market behavior from defensive expenditures. Conditions under which a defensive technology can provide a bound on welfare estimates are identified

  15. Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy

    Science.gov (United States)

    2016-12-19

    directly affect the access and utility of acquisition databases. The current information security environment does not establish a consistent... information ” without a nondisclosure agreement • proposing a legislative amendment to 10 U.S.C. 2320, which allows access to technical data for providing...ISSUES WITH Access to Acquisition Data and Information IN THE DEPARTMENT OF DEFENSE A Closer Look at the Origins and Implementation of

  16. Informational analysis involving application of complex information system

    Science.gov (United States)

    Ciupak, Clébia; Vanti, Adolfo Alberto; Balloni, Antonio José; Espin, Rafael

    The aim of the present research is performing an informal analysis for internal audit involving the application of complex information system based on fuzzy logic. The same has been applied in internal audit involving the integration of the accounting field into the information systems field. The technological advancements can provide improvements to the work performed by the internal audit. Thus we aim to find, in the complex information systems, priorities for the work of internal audit of a high importance Private Institution of Higher Education. The applied method is quali-quantitative, as from the definition of strategic linguistic variables it was possible to transform them into quantitative with the matrix intersection. By means of a case study, where data were collected via interview with the Administrative Pro-Rector, who takes part at the elaboration of the strategic planning of the institution, it was possible to infer analysis concerning points which must be prioritized at the internal audit work. We emphasize that the priorities were identified when processed in a system (of academic use). From the study we can conclude that, starting from these information systems, audit can identify priorities on its work program. Along with plans and strategic objectives of the enterprise, the internal auditor can define operational procedures to work in favor of the attainment of the objectives of the organization.

  17. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  18. Defense Industry Mergers and Monopoly Power: Analysis of Abnormal Earnings Using the Edwards-Bell-Ohlson Model

    National Research Council Canada - National Science Library

    Heisey, J

    1997-01-01

    Recent defense industry consolidation has created several large defense firms. As a result of merger activity with their suppliers and competitors, these firms account for an increasing percentage of sales to the Department of Defense...

  19. INFORMATION SYSTEM OF THE FINANCIAL ANALYSIS

    Directory of Open Access Journals (Sweden)

    MIRELA MONEA

    2013-12-01

    Full Text Available Financial analysis provides the information necessary for decision making, and also helps both the external and internal users of these. The results of the financial analysis work are dependent on the quality, accuracy, relevance and effectiveness of the information collected, and processed. Essential sources of information for financial analysis are financial statements, which are considered the raw material of financial analysis. One of the financial statements -the balance sheet - provides information about assets, liabilities, equity, liquidity, solvency, risk, financial flexibility. The profit and loss account is a synthesis accounting document, part of the financial statement reporting enterprise financial performances during of a specified accounting period and summarizes all revenues earned and expenses of an accounting period and reports the results.

  20. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  1. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, A.

    1999-05-10

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  2. Mathematical Analysis of Evolution, Information, and Complexity

    CERN Document Server

    Arendt, Wolfgang

    2009-01-01

    Mathematical Analysis of Evolution, Information, and Complexity deals with the analysis of evolution, information and complexity. The time evolution of systems or processes is a central question in science, this text covers a broad range of problems including diffusion processes, neuronal networks, quantum theory and cosmology. Bringing together a wide collection of research in mathematics, information theory, physics and other scientific and technical areas, this new title offers elementary and thus easily accessible introductions to the various fields of research addressed in the book.

  3. Crime analysis using open source information

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Shah, Azhar Ali

    2015-01-01

    In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show...

  4. Simultaneous transcriptome analysis of Colletotrichum gloeosporioides and tomato fruit pathosystem reveals novel fungal pathogenicity and fruit defense strategies.

    Science.gov (United States)

    Alkan, Noam; Friedlander, Gilgi; Ment, Dana; Prusky, Dov; Fluhr, Robert

    2015-01-01

    The fungus Colletotrichum gloeosporioides breaches the fruit cuticle but remains quiescent until fruit ripening signals a switch to necrotrophy, culminating in devastating anthracnose disease. There is a need to understand the distinct fungal arms strategy and the simultaneous fruit response. Transcriptome analysis of fungal-fruit interactions was carried out concurrently in the appressoria, quiescent and necrotrophic stages. Conidia germinating on unripe fruit cuticle showed stage-specific transcription that was accompanied by massive fruit defense responses. The subsequent quiescent stage showed the development of dendritic-like structures and swollen hyphae within the fruit epidermis. The quiescent fungal transcriptome was characterized by activation of chromatin remodeling genes and unsuspected environmental alkalization. Fruit response was portrayed by continued highly integrated massive up-regulation of defense genes. During cuticle infection of green or ripe fruit, fungi recapitulate the same developmental stages but with differing quiescent time spans. The necrotrophic stage showed a dramatic shift in fungal metabolism and up-regulation of pathogenicity factors. Fruit response to necrotrophy showed activation of the salicylic acid pathway, climaxing in cell death. Transcriptome analysis of C. gloeosporioides infection of fruit reveals its distinct stage-specific lifestyle and the concurrent changing fruit response, deepening our perception of the unfolding fungal-fruit arms and defenses race. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  5. Antioxidant defense gene analysis in Brassica oleracea and Trifolium repens exposed to Cd and/or Pb.

    Science.gov (United States)

    Bernard, F; Dumez, S; Brulle, F; Lemière, S; Platel, A; Nesslany, F; Cuny, D; Deram, A; Vandenbulcke, F

    2016-02-01

    This study focused on the expression analysis of antioxidant defense genes in Brassica oleracea and in Trifolium repens. Plants were exposed for 3, 10, and 56 days in microcosms to a field-collected suburban soil spiked by low concentrations of cadmium and/or lead. In both species, metal accumulations and expression levels of genes encoding proteins involved and/or related to antioxidant defense systems (glutathione transferases, peroxidases, catalases, metallothioneins) were quantified in leaves in order to better understand the detoxification processes involved following exposure to metals. It appeared that strongest gene expression variations in T. repens were observed when plants are exposed to Cd (metallothionein and ascorbate peroxidase upregulations) whereas strongest variations in B. oleracea were observed in case of Cd/Pb co-exposures (metallothionein, glutathione transferase, and peroxidase upregulations). Results also suggest that there is a benefit to use complementary species in order to better apprehend the biological effects in ecotoxicology.

  6. Benefit analysis of proposed information systems

    OpenAIRE

    Besore, Mark H.

    1991-01-01

    Approved for public release; distribution is unlimited This thesis reviewed two different approaches to benefit analysis, benefit comparison and user satisfaction, that could be applied to the evaluation of proposed information systems which are under consideration for acquisition by the federal government. Currently the General Services Administration only recommends that present value analysis methods be used in the analysis of alternatives even though the GSA specifies...

  7. Transcriptome Analysis Reveals Candidate Genes involved in Blister Blight defense in Tea (Camellia sinensis (L) Kuntze)

    Science.gov (United States)

    Jayaswall, Kuldip; Mahajan, Pallavi; Singh, Gagandeep; Parmar, Rajni; Seth, Romit; Raina, Aparnashree; Swarnkar, Mohit Kumar; Singh, Anil Kumar; Shankar, Ravi; Sharma, Ram Kumar

    2016-07-01

    To unravel the molecular mechanism of defense against blister blight (BB) disease caused by an obligate biotrophic fungus, Exobasidium vexans, transcriptome of BB interaction with resistance and susceptible tea genotypes was analysed through RNA-seq using Illumina GAIIx at four different stages during ~20-day disease cycle. Approximately 69 million high quality reads were assembled de novo, yielding 37,790 unique transcripts with more than 55% being functionally annotated. Differentially expressed, 149 defense related transcripts/genes, namely defense related enzymes, resistance genes, multidrug resistant transporters, transcription factors, retrotransposons, metacaspases and chaperons were observed in RG, suggesting their role in defending against BB. Being present in the major hub, putative master regulators among these candidates were identified from predetermined protein-protein interaction network of Arabidopsis thaliana. Further, confirmation of abundant expression of well-known RPM1, RPS2 and RPP13 in quantitative Real Time PCR indicates salicylic acid and jasmonic acid, possibly induce synthesis of antimicrobial compounds, required to overcome the virulence of E. vexans. Compendiously, the current study provides a comprehensive gene expression and insights into the molecular mechanism of tea defense against BB to serve as a resource for unravelling the possible regulatory mechanism of immunity against various biotic stresses in tea and other crops.

  8. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    Science.gov (United States)

    2016-06-01

    Managed Spare Parts at Service Industrial Sites by Supply Chain , Fiscal...Metrics and Inventory Stratification Reporting; and Defense Logistics Agency Instruction 4140.08, DLA Retail Supply Chain Materiel Management ...the retail supply system, which is typically managed by the services. As a retail inventory manager at industrial sites, DLA manages the supply

  9. A risk-informed perspective on deterministic safety analysis of nuclear power plants

    International Nuclear Information System (INIS)

    Wan, P.T.

    2009-01-01

    In this work, the deterministic safety analysis (DSA) approach to nuclear safety is examined from a risk-informed perspective. One objective of safety analysis of a nuclear power plant is to demonstrate via analysis that the risks to the public from events or accidents that are within the design basis of the power plant are within acceptable levels with a high degree of assurance. This nuclear safety analysis objective can be translated into two requirements on the risk estimates of design basis events or accidents: the nominal risk estimate to the public must be shown to be within acceptable levels, and the uncertainty in the risk estimates must be shown to be small on an absolute or relative basis. The DSA approach combined with the defense-in-depth (DID) principle is a simplified safety analysis approach that attempts to achieve the above safety analysis objective in the face of potentially large uncertainties in the risk estimates of a nuclear power plant by treating the various uncertainty contributors using a stylized conservative binary (yes-no) approach, and applying multiple overlapping physical barriers and defense levels to protect against the release of radioactivity from the reactor. It is shown that by focusing on the consequence aspect of risk, the previous two nuclear safety analysis requirements on risk can be satisfied with the DSA-DID approach to nuclear safety. It is also shown the use of multiple overlapping physical barriers and defense levels in the traditional DSA-DID approach to nuclear safety is risk-informed in the sense that it provides a consistently high level of confidence in the validity of the safety analysis results for various design basis events or accidents with a wide range of frequency of occurrence. It is hoped that by providing a linkage between the consequence analysis approach in DSA with a risk-informed perspective, greater understanding of the limitation and capability of the DSA approach is obtained. (author)

  10. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  11. Risk Analysis of Accounting Information System Infrastructure

    OpenAIRE

    MIHALACHE, Arsenie-Samoil

    2011-01-01

    National economy and security are fully dependent on information technology and infrastructure. At the core of the information infrastructure society relies on, we have the Internet, a system designed initially as a scientists’ forum for unclassified research. The use of communication networks and systems may lead to hazardous situations that generate undesirable effects such as communication systems breakdown, loss of data or taking the wrong decisions. The paper studies the risk analysis of...

  12. Proteomic analysis of the defense response of wheat to the powdery mildew fungus, Blumeria graminis f. sp. tritici.

    Science.gov (United States)

    Mandal, Md Siddikun Nabi; Fu, Ying; Zhang, Sheng; Ji, Wanquan

    2014-12-01

    Powdery mildew of wheat is caused by Blumeria graminis f. sp. tritici (Bgt). Although many wheat cultivars resistant to this disease have been developed, little is known about their resistance mechanisms. The aim of this study was to identify proteins showing changes in abundance during the resistance response of the wheat line N0308 infected by Bgt. In two-dimensional electrophoresis analyses, 45 spots on the gels showed significant changes in abundance at 24, 48, and 72 h after inoculation, as compared to non-inoculated plants. Of these 45 proteins, 44 were identified by mass spectrometry analysis using the NCBInr database of Triticum aestivum (26 spots) and closely related species in the Triticum genus (18 spots). These proteins were associated with the defense response, photosynthesis, metabolism, and other cellular processes in wheat. Most of the up-regulated proteins were identified as stress- and defense-related proteins. In particular, the product of a specific powdery mildew resistance gene (Pm3b and its homolog) and some other defense- and pathogenesis-related proteins were overexpressed. The resistance gene product mediates the immune response and coordinates other cellular processes during the resistance response to Bgt.

  13. Point Information Gain and Multidimensional Data Analysis

    Directory of Open Access Journals (Sweden)

    Renata Rychtáriková

    2016-10-01

    Full Text Available We generalize the point information gain (PIG and derived quantities, i.e., point information gain entropy (PIE and point information gain entropy density (PIED, for the case of the Rényi entropy and simulate the behavior of PIG for typical distributions. We also use these methods for the analysis of multidimensional datasets. We demonstrate the main properties of PIE/PIED spectra for the real data with the examples of several images and discuss further possible utilizations in other fields of data processing.

  14. Are Law and Policy Clear and Consistent? Roles and Responsibilities of the Defense Acquisition Executive and the Chief Information Officer

    Science.gov (United States)

    2010-01-01

    2223) are necessarily in conflict with one another or represent a “ prima facie ” conflict. However, we are pointing out that, because of the potentially...that DoD policy should state what constitutes “compliance” with government and DoD standards. The Secretary of Defense (SECDEF) is obligated to issue...aircraft, weap- ons, command and control, communications, intelligence, and IT business systems. In contrast, the R&R of CIOs are generally restricted to

  15. Defense contingency contracting handbook, Essential tools, information, and training to meet contingency contracting needs for the 21st century

    OpenAIRE

    Travieso, John; Harbin, Samuel; Harper, Lynn; Christianson, Ann; Coombs, John; Ingram, Pat; Herring, Larry; George, Jennifer; Ward, Richard; Terrell, Vaneada; Harris, Mark; Gaudio, Lou; Peate, Mary Clare; Yoder, Cory; Obata, Michelle

    2010-01-01

    This handbook provides a pocket-sized guide to help you meet the needs of those whom you are supporting. This is crucial to your success and that of the overall mission. It is by no means a stand-alone document and must be read together with the Federal Acquisition Regulation, the Defense Federal Acquisition Regulation Supplement, and Operational Contract Support in Joint Operations (Joint Publication 4-10).

  16. Gene expression analysis of molecular mechanisms of defense induced in Medicago truncatula parasitized by Orobanche crenata.

    Science.gov (United States)

    Die, José Vicente; González Verdejo, Clara I; Dita, Miguel A; Nadal, Salvador; Román, Belén

    2009-07-01

    The infection of Medicago truncatula Gaertn. roots with the obligate parasite Orobanche crenata Forsk. is a useful model for studying the molecular events involved in the legumes-parasite interaction. In order to gain insight into the identification of gene-regulatory elements involved in the resistance mechanism, the temporal expression pattern of ten defense-related genes was carried out using real-time quantitative reverse-transcription polymerase chain reaction assays. The induction of all of the analyzed transcripts significantly increased over a range from 2- to 321-fold higher than the control depending on the gene and time point. The transcriptional changes observed in response to O. crenata infection suggest that resistance could rely on both, the induction of general defense-related genes and more specific responses.

  17. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  18. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  19. An Analysis of Proposed and Current Regulations Concerning Lobbying Costs in Department of Defense Contracts.

    Science.gov (United States)

    1984-06-01

    a reduction in industry participation in the defense mobilization base, and a limiting of capital available for investment in producti- vity...FAR proposals, it appears that this stratgy has b-2n successful to a large degree. Thor,-, ar , how-vr, still areas where critics believe that further...appropriations. Lobbying includes but is not limited to personal discussions or conferences, advertising , sending tel- egrams, engaging in telephonic

  20. An Analysis of Department Of Defense Policy and Guidance for Implementation of Performance-Based Logistics

    Science.gov (United States)

    2015-09-01

    stability to the provider’s order book and adds shareholder value . Incentives that focus on profit may not be applicable for public facilities, but... Stakeholders (from ASD (L&MR) 2011b, 17) ...............3  Figure 3.  System Life Cycle Illustration (from Secretary of Defense 2014, 2–1) ...........5...Figure 2 is provided to show the roles, relationships, responsibilities and business agreements among the various key product support stakeholders

  1. The analysis of the defense mechanism against indigenous bacterial translocation in X-irradiated mice

    International Nuclear Information System (INIS)

    Kobayashi, Toshiya; Ohmori, Toshihiro; Yanai, Minoru; Kawanishi, Gosei; Mitsuyama, Masao; Nomoto, Kikuo.

    1991-01-01

    The defense mechanism against indigenous bacterial translocation was studied using a model of endogenous infection in X-irradiated mice. All mice irradiated with 9 Gy died from day 8 to day 15 after irradiation. The death of mice was observed in parallel with the appearance of bacteria from day 7 in various organs, and the causative agent was identified to be Escherichia coli, an indigenous bacterium translocating from the intestine. Decrease in the number of blood leukocytes, peritoneal cells and lymphocytes in Peyer's patches or mesenteric lymph nodes was observed as early as 1 day after irradiation with 6 or 9 Gy. The mitogenic response of lymphocytes from various lymphoid tissues was severely affected as well. The impairment of these parameters for host defense reached the peak 3 days after irradiation and there was no recovery. However, in vivo bacterial activity of Kupffer cells in mice irradiated with 9 Gy was maintained in a normal level for a longer period. It was suggested that Kupffer cells play an important role in the defense against indigenous bacteria translocating from the intenstine in mice. (author)

  2. Automatic circuit analysis based on mask information

    International Nuclear Information System (INIS)

    Preas, B.T.; Lindsay, B.W.; Gwyn, C.W.

    1976-01-01

    The Circuit Mask Translator (CMAT) code has been developed which converts integrated circuit mask information into a circuit schematic. Logical operations, pattern recognition, and special functions are used to identify and interconnect diodes, transistors, capacitors, and resistances. The circuit topology provided by the translator is compatible with the input required for a circuit analysis program

  3. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    helping with formatting the final report iv ARMY INFORMATION OPERATIONS OFFICER NEEDS ANALYSIS REPORT EXECUTIVE SUMMARY Research...time.” One IO officer suggested the IPO try to get a access the database that has all the old APA reports archived as a way to look at assessment

  4. Review of the all Source Analysis System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process-FY 1993.

    Science.gov (United States)

    1993-04-20

    OFFICE OF THE INSPECTOR GENERAL REVIEW OF THE ALL SOURCE ANALYSIS SYSTEM AS A PART OF THE AUDIT OF THE EFFECTIVENESS OF THE DEFENSE...System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process--FY 1993 (Report No. 93-087) We are providing...appreciate the courtesies extended to the audit staff. If you have questions on this report, please contact Program Director Russell A. Rau at (703) 693

  5. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  6. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  7. An analysis of the effect of STEM initiatives on socially responsible diversity management in the US aerospace and defense industry

    Science.gov (United States)

    Johnson-Oliver, Patrick

    Workforce diversity is a growing concern at a global level and enlightened economic self-interest and corporate image compels industries to leverage it as a competitive advantage. The US aerospace and defense industry (US ADI) addresses workforce diversity through socially responsible diversity management. Prior research into the topic of approaching workforce diversity as a business rationale and a moral imperative has been limited. Scharmer and Kaufer's (2013) Theory U guided this longitudinal explanatory quantitative study, leading from the future as it emerged relative to socially responsible diversity management to compel industry to remove blind spots and co-create an economy that benefits all by promoting workforce diversity as a dual agenda. This study filled a research gap investigating the business case for diversity as a dual agenda in aerospace industry science, technology, engineering, and mathematics (STEM) disciplines. The study also investigated the America COMPETES Act as a moderator of the relationship between historically black colleges and universities (HBCUs) and industry. Data was retrieved for secondary data analysis from the National Science Foundation (NSF) and other public government services and agency websites. Two hypotheses were tested using quantitative analysis including descriptive statistics, linear regression, ANOVA, and two factor analysis. The statistical results were analyzed and deductive logic employed to develop conclusions for the study. There was a significant relationship found between both predictors and socially responsible diversity management. The results reinforce the necessity for the aerospace defense industry to promote the dual agenda of the business case for diversity as complementary; not as competing mandates.

  8. Defense Spending, Growth And Inequality, 1970-2008: An Econometric Analysis

    Directory of Open Access Journals (Sweden)

    Seyhan TAŞ

    2013-12-01

    Full Text Available This paper examines the relationship between defense expentures, income inequality and growth in Turkey for the period of 1970-2008. In the study, the problem of lack of time series data has been overcome by using manufacturing pay inequality index constructed by Theil T Statistic. Although there are numerous studies that examine the different aspects of military spending in Turkey, there are few studies that analyse the impact of military spending on income distribution in Turkey. Considering this lack in the literature, the study, utilizing basic cointegration and VAR model, aims to contribute to the literaure

  9. Nuclear criticality safety analysis summary report: The S-area defense waste processing facility

    International Nuclear Information System (INIS)

    Ha, B.C.

    1994-01-01

    The S-Area Defense Waste Processing Facility (DWPF) can process all of the high level radioactive wastes currently stored at the Savannah River Site with negligible risk of nuclear criticality. The characteristics which make the DWPF critically safe are: (1) abundance of neutron absorbers in the waste feeds; (2) and low concentration of fissionable material. This report documents the criticality safety arguments for the S-Area DWPF process as required by DOE orders to characterize and to justify the low potential for criticality. It documents that the nature of the waste feeds and the nature of the DWPF process chemistry preclude criticality

  10. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  11. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  12. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  13. Information Superiority via Formal Concept Analysis

    Science.gov (United States)

    Koester, Bjoern; Schmidt, Stefan E.

    This chapter will show how to get more mileage out of information. To achieve that, we first start with an introduction to the fundamentals of Formal Concept Analysis (FCA). FCA is a highly versatile field of applied lattice theory, which allows hidden relationships to be uncovered in relational data. Moreover, FCA provides a distinguished supporting framework to subsequently find and fill information gaps in a systematic and rigorous way. In addition, we would like to build bridges via a universal approach to other communities which can be related to FCA in order for other research areas to benefit from a theory that has been elaborated for more than twenty years. Last but not least, the essential benefits of FCA will be presented algorithmically as well as theoretically by investigating a real data set from the MIPT Terrorism Knowledge Base and also by demonstrating an application in the field of Web Information Retrieval and Web Intelligence.

  14. Information Retrieval Using Hadoop Big Data Analysis

    Science.gov (United States)

    Motwani, Deepak; Madan, Madan Lal

    This paper concern on big data analysis which is the cognitive operation of probing huge amounts of information in an attempt to get uncovers unseen patterns. Through Big Data Analytics Applications such as public and private organization sectors have formed a strategic determination to turn big data into cut throat benefit. The primary occupation of extracting value from big data give rise to a process applied to pull information from multiple different sources; this process is known as extract transforms and lode. This paper approach extract information from log files and Research Paper, awareness reduces the efforts for blueprint finding and summarization of document from several positions. The work is able to understand better Hadoop basic concept and increase the user experience for research. In this paper, we propose an approach for analysis log files for finding concise information which is useful and time saving by using Hadoop. Our proposed approach will be applied on different research papers on a specific domain and applied for getting summarized content for further improvement and make the new content.

  15. Defense Science Board 2006 Summer Study on Information Management for Net-Centric Operations. Volume 1: Main Report

    National Research Council Canada - National Science Library

    Schneider, Jr, William

    2007-01-01

    The task force addressed combat operations, information management, information assurance, and architecture requirements, as well as the architecture framework currently being pursued by the department...

  16. Analysis of information security reliability: A tutorial

    International Nuclear Information System (INIS)

    Kondakci, Suleyman

    2015-01-01

    This article presents a concise reliability analysis of network security abstracted from stochastic modeling, reliability, and queuing theories. Network security analysis is composed of threats, their impacts, and recovery of the failed systems. A unique framework with a collection of the key reliability models is presented here to guide the determination of the system reliability based on the strength of malicious acts and performance of the recovery processes. A unique model, called Attack-obstacle model, is also proposed here for analyzing systems with immunity growth features. Most computer science curricula do not contain courses in reliability modeling applicable to different areas of computer engineering. Hence, the topic of reliability analysis is often too diffuse to most computer engineers and researchers dealing with network security. This work is thus aimed at shedding some light on this issue, which can be useful in identifying models, their assumptions and practical parameters for estimating the reliability of threatened systems and for assessing the performance of recovery facilities. It can also be useful for the classification of processes and states regarding the reliability of information systems. Systems with stochastic behaviors undergoing queue operations and random state transitions can also benefit from the approaches presented here. - Highlights: • A concise survey and tutorial in model-based reliability analysis applicable to information security. • A framework of key modeling approaches for assessing reliability of networked systems. • The framework facilitates quantitative risk assessment tasks guided by stochastic modeling and queuing theory. • Evaluation of approaches and models for modeling threats, failures, impacts, and recovery analysis of information systems

  17. Analysis of methods. [information systems evolution environment

    Science.gov (United States)

    Mayer, Richard J. (Editor); Ackley, Keith A.; Wells, M. Sue; Mayer, Paula S. D.; Blinn, Thomas M.; Decker, Louis P.; Toland, Joel A.; Crump, J. Wesley; Menzel, Christopher P.; Bodenmiller, Charles A.

    1991-01-01

    Information is one of an organization's most important assets. For this reason the development and maintenance of an integrated information system environment is one of the most important functions within a large organization. The Integrated Information Systems Evolution Environment (IISEE) project has as one of its primary goals a computerized solution to the difficulties involved in the development of integrated information systems. To develop such an environment a thorough understanding of the enterprise's information needs and requirements is of paramount importance. This document is the current release of the research performed by the Integrated Development Support Environment (IDSE) Research Team in support of the IISEE project. Research indicates that an integral part of any information system environment would be multiple modeling methods to support the management of the organization's information. Automated tool support for these methods is necessary to facilitate their use in an integrated environment. An integrated environment makes it necessary to maintain an integrated database which contains the different kinds of models developed under the various methodologies. In addition, to speed the process of development of models, a procedure or technique is needed to allow automatic translation from one methodology's representation to another while maintaining the integrity of both. The purpose for the analysis of the modeling methods included in this document is to examine these methods with the goal being to include them in an integrated development support environment. To accomplish this and to develop a method for allowing intra-methodology and inter-methodology model element reuse, a thorough understanding of multiple modeling methodologies is necessary. Currently the IDSE Research Team is investigating the family of Integrated Computer Aided Manufacturing (ICAM) DEFinition (IDEF) languages IDEF(0), IDEF(1), and IDEF(1x), as well as ENALIM, Entity

  18. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  19. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    Science.gov (United States)

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  20. Application of accident progression event tree technology to the Savannah River Site Defense Waste Processing Facility SAR analysis

    International Nuclear Information System (INIS)

    Brandyberry, M.D.; Baker, W.H.; Wittman, R.S.; Amos, C.N.

    1993-01-01

    The Accident Analysis in the Safety Analysis Report (SAR) for the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) has recently undergone an upgrade. Non-reactor SARs at SRS (and other Department of Energy (DOE) sites) use probabilistic techniques to assess the frequency of accidents at their facilities. This paper describes the application of an extension of the Accident Progression Event Tree (APET) approach to accidents at the SRS DWPF. The APET technique allows an integrated model of the facility risk to be developed, where previous probabilistic accident analyses have been limited to the quantification of the frequency and consequences of individual accident scenarios treated independently. Use of an APET allows a more structured approach, incorporating both the treatment of initiators that are common to more than one accident, and of accident progression at the facility

  1. PROBCON-HDW: A probability and consequence system of codes for long-term analysis of Hanford defense wastes

    International Nuclear Information System (INIS)

    Piepho, M.G.; Nguyen, T.H.

    1988-12-01

    The PROBCON-HDW (PROBability and CONsequence analysis for Hanford defense waste) computer code system calculates the long-term cumulative releases of radionuclides from the Hanford defense wastes (HDW) to the accessible environment and compares the releases to environmental release limits as defined in 40 CFR 191. PROBCON-HDW takes into account the variability of input parameter values used in models to calculate HDW release and transport in the vadose zone to the accessible environment (taken here as groundwater). A human intrusion scenario, which consists of drilling boreholes into the waste beneath the waste sites and bringing waste to the surface, is also included in PROBCON-HDW. PROBCON-HDW also includes the capability to combine the cumulative releases according to various long-term (10,000 year) scenarios into a composite risk curve or complementary cumulative distribution function (CCDF). The system structure of the PROBCON-HDW codes, the mathematical models in PROBCON-HDW, the input files, the input formats, the command files, and the graphical output results of several HDW release scenarios are described in the report. 3 refs., 7 figs., 9 tabs

  2. Formal Concept Analysis for Information Retrieval

    OpenAIRE

    Qadi, Abderrahim El; Aboutajedine, Driss; Ennouary, Yassine

    2010-01-01

    In this paper we describe a mechanism to improve Information Retrieval (IR) on the web. The method is based on Formal Concepts Analysis (FCA) that it is makes semantical relations during the queries, and allows a reorganizing, in the shape of a lattice of concepts, the answers provided by a search engine. We proposed for the IR an incremental algorithm based on Galois lattice. This algorithm allows a formal clustering of the data sources, and the results which it turns over are classified by ...

  3. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  4. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  5. Department of Defense Energy and Logistics: Implications of Historic and Future Cost, Risk, and Capability Analysis

    Science.gov (United States)

    Tisa, Paul C.

    Every year the DoD spends billions satisfying its large petroleum demand. This spending is highly sensitive to uncontrollable and poorly understood market forces. Additionally, while some stakeholders may not prioritize its monetary cost and risk, energy is fundamentally coupled to other critical factors. Energy, operational capability, and logistics are heavily intertwined and dependent on uncertain security environment and technology futures. These components and their relationships are less understood. Without better characterization, future capabilities may be significantly limited by present-day acquisition decisions. One attempt to demonstrate these costs and risks to decision makers has been through a metric known as the Fully Burdened Cost of Energy (FBCE). FBCE is defined as the commodity price for fuel plus many of these hidden costs. The metric encouraged a valuable conversation and is still required by law. However, most FBCE development stopped before the lessons from that conversation were incorporated. Current implementation is easy to employ but creates little value. Properly characterizing the costs and risks of energy and putting them in a useful tradespace requires a new framework. This research aims to highlight energy's complex role in many aspects of military operations, the critical need to incorporate it in decisions, and a novel framework to do so. It is broken into five parts. The first describes the motivation behind FBCE, the limits of current implementation, and outlines a new framework that aids decisions. Respectively, the second, third, and fourth present a historic analysis of the connections between military capabilities and energy, analyze the recent evolution of this conversation within the DoD, and pull the historic analysis into a revised framework. The final part quantifies the potential impacts of deeply uncertain futures and technological development and introduces an expanded framework that brings capability, energy, and

  6. Defense Logistics: Improved Data and Information Sharing Could Aid in DOD’s Management of Ammunition Categorized for Disposal

    Science.gov (United States)

    2015-07-01

    same criteria.10 Further, we conducted a data reliability assessment of the military services’ data in their respective information management systems ...extent to which the information in the services’ ammunition inventory systems is useful for their purposes. We interviewed Single Manager for...6. Incineration - Incineration provides an environmentally acceptable means to destroy munitions not suitable for other demilitarization methods

  7. A Framework for Seismic Design of Items in Safety-Critical Facilities for Implementing a Risk-Informed Defense-in-Depth-Based Concept

    Directory of Open Access Journals (Sweden)

    Tatsuya Itoi

    2017-05-01

    Full Text Available Recently, especially after the 2011 off the Pacific coast of Tohoku earthquake and the Fukushima Daiichi nuclear power plant accident, the need for treating residual risks and cliff-edge effects in safety-critical facilities has been widely recognized as an extremely important issue. In this article, the sophistication of seismic designs in safety-critical facilities is discussed from the viewpoint of mitigating the consequences of accidents, such as the avoidance of cliff-edge effects. For this purpose, the implementation of a risk-informed defense-in-depth-based framework is proposed in this study. A basic framework that utilizes diversity in the dynamic characteristics of items and also provides additional seismic margin to items important for safety when needed is proposed to prevent common cause failure and to avoid cliff-edge effects as far as practicable. The proposed method is demonstrated to be effective using an example calculation.

  8. Astrophysical data analysis with information field theory

    International Nuclear Information System (INIS)

    Enßlin, Torsten

    2014-01-01

    Non-parametric imaging and data analysis in astrophysics and cosmology can be addressed by information field theory (IFT), a means of Bayesian, data based inference on spatially distributed signal fields. IFT is a statistical field theory, which permits the construction of optimal signal recovery algorithms. It exploits spatial correlations of the signal fields even for nonlinear and non-Gaussian signal inference problems. The alleviation of a perception threshold for recovering signals of unknown correlation structure by using IFT will be discussed in particular as well as a novel improvement on instrumental self-calibration schemes. IFT can be applied to many areas. Here, applications in in cosmology (cosmic microwave background, large-scale structure) and astrophysics (galactic magnetism, radio interferometry) are presented

  9. Astrophysical data analysis with information field theory

    Science.gov (United States)

    Enßlin, Torsten

    2014-12-01

    Non-parametric imaging and data analysis in astrophysics and cosmology can be addressed by information field theory (IFT), a means of Bayesian, data based inference on spatially distributed signal fields. IFT is a statistical field theory, which permits the construction of optimal signal recovery algorithms. It exploits spatial correlations of the signal fields even for nonlinear and non-Gaussian signal inference problems. The alleviation of a perception threshold for recovering signals of unknown correlation structure by using IFT will be discussed in particular as well as a novel improvement on instrumental self-calibration schemes. IFT can be applied to many areas. Here, applications in in cosmology (cosmic microwave background, large-scale structure) and astrophysics (galactic magnetism, radio interferometry) are presented.

  10. Astrophysical data analysis with information field theory

    Energy Technology Data Exchange (ETDEWEB)

    Enßlin, Torsten, E-mail: ensslin@mpa-garching.mpg.de [Max Planck Institut für Astrophysik, Karl-Schwarzschild-Straße 1, D-85748 Garching, Germany and Ludwig-Maximilians-Universität München, Geschwister-Scholl-Platz 1, D-80539 München (Germany)

    2014-12-05

    Non-parametric imaging and data analysis in astrophysics and cosmology can be addressed by information field theory (IFT), a means of Bayesian, data based inference on spatially distributed signal fields. IFT is a statistical field theory, which permits the construction of optimal signal recovery algorithms. It exploits spatial correlations of the signal fields even for nonlinear and non-Gaussian signal inference problems. The alleviation of a perception threshold for recovering signals of unknown correlation structure by using IFT will be discussed in particular as well as a novel improvement on instrumental self-calibration schemes. IFT can be applied to many areas. Here, applications in in cosmology (cosmic microwave background, large-scale structure) and astrophysics (galactic magnetism, radio interferometry) are presented.

  11. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  12. Defense Information for All: DTIC 2007 Conference Held in Alexandria, Virginia on March 26-28, 2007 (CD-ROM)

    National Research Council Canada - National Science Library

    2007-01-01

    ...: 1 CD-ROM; 4 3/4 in.; 88.6 MB. ABSTRACT: The conference will bring together information professionals from the science, technology, research and development, and acquisition communities who create, disseminate and use DoD scientific...

  13. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  14. Multicriteria analysis of ontologically represented information

    Science.gov (United States)

    Wasielewska, K.; Ganzha, M.; Paprzycki, M.; Bǎdicǎ, C.; Ivanovic, M.; Lirkov, I.

    2014-11-01

    Our current work concerns the development of a decision support system for the software selection problem. The main idea is to utilize expert knowledge to help the user in selecting the best software / method / computational resource to solve a computational problem. Obviously, this involves multicriterial decision making and the key open question is: which method to choose. The context of the work is provided by the Agents in Grid (AiG) project, where the software selection (and thus multicriterial analysis) is to be realized when all information concerning the problem, the hardware and the software is ontologically represented. Initially, we have considered the Analytical Hierarchy Process (AHP), which is well suited for the hierarchical data structures (e.g., such that have been formulated in terms of ontologies). However, due to its well-known shortcomings, we have decided to extend our search for the multicriterial analysis method best suited for the problem in question. In this paper we report results of our search, which involved: (i) TOPSIS (Technique for Order Preference by Similarity to Ideal Solution), (ii) PROMETHEE, and (iii) GRIP (Generalized Regression with Intensities of Preference). We also briefly argue why other methods have not been considered as valuable candidates.

  15. Center for information management and intelligence of the School of Public Legal Defense of the State of Bahia

    Directory of Open Access Journals (Sweden)

    Barbara Coelho Neves

    2012-04-01

    Full Text Available This paper presents the experience report about the implementation of the Center for Information Management and Intelligence administered by the Library of the Public Defender of the State of Bahia. The Center aims to corroborate the information stock, based on capturing the tacit knowledge of public Defenders of DPE. Aspires to social inclusion and the preservation of memory used in human rights activities defensoriais developed. The biggest benefit of creating the Center for Information Management and Intelligence is to provide the availability of information gained by the defenders in a structured way, to all persons interested in the topics defensoriais seized through legal experiences, conferences, training courses, seminars, workshops , Among others. The Center for Information Management and Intelligence of the DPE Library is an important way to efficiently connect "those who know" with those who "need to know" and converting personal knowledge into the organization's memory. For this, the proposal develops the collection, storage, management and dissemination of knowledge with a methodology based on models of the authors Nonaka and Takeuchi, with the help of teenagers "apprentices" in fulfillment of socio-educational measure the Mother City Foundation.

  16. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  17. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project

  18. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    Science.gov (United States)

    2010-03-01

    this thesis would have never been possible. I would also like to thank my wife and children for their inspiration, motivation and encouragement... Telecommuting and Broadband Communications, August 2002. •SP 800-47, Security Guide for Interconnecting Information Technology Systems, September 2002

  19. Engineering the Business of Defense Acquisition: An Analysis of Program Office Processes

    Science.gov (United States)

    2015-05-01

    Information Technology and Business Process Redesign | MIT Sloan Management Review . MIT Sloan Management Review . Retrieved from http://sloanreview.mit.edu...links systems management to process execution Three Phases/ Multi-Year Effort (This Phase) Literature review Model development— Formal and...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining

  20. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  1. Review of Department of Defense Education Activity (DODEA) Schools. Volume II: Quantitative Analysis of Educational Quality

    National Research Council Canada - National Science Library

    Anderson, Lowell

    2000-01-01

    This volume compiles, and presents in integrated form, IDA's quantitative analysis of educational quality provided by DoD's dependent schools, It covers the quantitative aspects of volume I in greater...

  2. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  3. The Hunting of the Snark: Organizing and Synchronizing of Informational Elements for Homeland Defense and Civil Support

    Science.gov (United States)

    2009-06-01

    Organizing and synchronizing informational elements is filled with tension, which is metaphorically illustrated in the Victorian children’s story, The...or distance divided by time. In a similar fashion , dominance can be correlated to the control of a domain. Superiority equates to the degree of...how PA should act in this fashion . The literature recommends that leadership bring PA into the operational fold. The literature consistently

  4. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  5. A Predictive Analysis of the Department of Defense Distribution System Utilizing Random Forests

    Science.gov (United States)

    2016-06-01

    resources capable of meeting both customer and individual resource constraints and goals while also maximizing the global benefit to the supply...and probability rules to determine the optimal red wine distribution network for an Italian-based wine producer. The decision support model for...combinations of factors that will result in delivery of the highest quality wines . The model’s first stage inputs basic logistics information to look

  6. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  7. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  8. Self-affirmation increases defensiveness toward health risk information among those experiencing negative emotions: Results from two national samples.

    Science.gov (United States)

    Ferrer, Rebecca A; Klein, William M P; Graff, Kaitlin A

    2017-04-01

    Self-affirmation can promote health behavior change and yield long-term improvements in health via its effect on receptiveness to risk information in behavior change interventions. Across 2 studies, we examined whether the emotional state of the person presented with health risk information moderates self-affirmation effectiveness. Data were collected from 2 U.S. national samples (n = 652, n = 448) via GfK, an Internet-based survey company. Female alcohol consumers completed an emotion induction (fear, anger, or neutral). They then completed a standard self-affirmation (or no-affirmation) essay-writing task, and subsequently received a health message linking alcohol to breast cancer. There was a significant interaction between emotion and self-affirmation conditions, such that self-affirmation reduced the specificity of health behavior change plans among those experiencing negative emotion (Study 1: B = -0.55, p emotion (or anger). Mediation analyses limited to the self-affirmation condition revealed an indirect effect of negative emotion condition on health behavior change plan specificity via self-affirmation ratings of essay content in Study 1: β = 0.04, p = .041. The salutary effect of self-affirmation on plan specificity was reversed with negative emotion. These findings may be attributed to disruption of the self-affirmation process. Individuals who enter interventions using self-affirmation in a negative emotion state may be less prepared to benefit from other intervention content, and may even be less likely to change health behaviors as a result of the intervention. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  10. Disentangling detoxification: gene expression analysis of feeding mountain pine beetle illuminates molecular-level host chemical defense detoxification mechanisms.

    Directory of Open Access Journals (Sweden)

    Jeanne A Robert

    Full Text Available The mountain pine beetle, Dendroctonus ponderosae, is a native species of bark beetle (Coleoptera: Curculionidae that caused unprecedented damage to the pine forests of British Columbia and other parts of western North America and is currently expanding its range into the boreal forests of central and eastern Canada and the USA. We conducted a large-scale gene expression analysis (RNA-seq of mountain pine beetle male and female adults either starved or fed in male-female pairs for 24 hours on lodgepole pine host tree tissues. Our aim was to uncover transcripts involved in coniferophagous mountain pine beetle detoxification systems during early host colonization. Transcripts of members from several gene families significantly increased in insects fed on host tissue including: cytochromes P450, glucosyl transferases and glutathione S-transferases, esterases, and one ABC transporter. Other significantly increasing transcripts with potential roles in detoxification of host defenses included alcohol dehydrogenases and a group of unexpected transcripts whose products may play an, as yet, undiscovered role in host colonization by mountain pine beetle.

  11. Phenomenological analyses and their application to the Defense Waste Processing Facility probabilistic safety analysis accident progression event tree. Revision 1

    International Nuclear Information System (INIS)

    Kalinich, D.A.; Thomas, J.K.; Gough, S.T.; Bailey, R.T.; Kearnaghan, D.P.

    1995-01-01

    In the Defense Waste Processing Facility (DWPF) Safety Analysis Reports (SARs) for the Savannah River Site (SRS), risk-based perspectives have been included per US Department of Energy (DOE) Order 5480.23. The NUREG-1150 Level 2/3 Probabilistic Risk Assessment (PRA) methodology was selected as the basis for calculating facility risk. The backbone of this methodology is the generation of an Accident Progression Event Tree (APET), which is solved using the EVNTRE computer code. To support the development of the DWPF APET, deterministic modeling of accident phenomena was necessary. From these analyses, (1) accident progressions were identified for inclusion into the APET; (2) branch point probabilities and any attendant parameters were quantified; and (3) the radionuclide releases to the environment from accidents were determined. The phenomena of interest for accident progressions included explosions, fires, a molten glass spill, and the response of the facility confinement system during such challenges. A variety of methodologies, from hand calculations to large system-model codes, were used in the evaluation of these phenomena

  12. Transcriptome analysis describing new immunity and defense genes in peripheral blood mononuclear cells of rheumatoid arthritis patients.

    Directory of Open Access Journals (Sweden)

    Vitor Hugo Teixeira

    Full Text Available BACKGROUND: Large-scale gene expression profiling of peripheral blood mononuclear cells from Rheumatoid Arthritis (RA patients could provide a molecular description that reflects the contribution of diverse cellular responses associated with this disease. The aim of our study was to identify peripheral blood gene expression profiles for RA patients, using Illumina technology, to gain insights into RA molecular mechanisms. METHODOLOGY/PRINCIPAL FINDINGS: The Illumina Human-6v2 Expression BeadChips were used for a complete genome-wide transcript profiling of peripheral blood mononuclear cells (PBMCs from 18 RA patients and 15 controls. Differential analysis per gene was performed with one-way analysis of variance (ANOVA and P values were adjusted to control the False Discovery Rate (FDR<5%. Genes differentially expressed at significant level between patients and controls were analyzed using Gene Ontology (GO in the PANTHER database to identify biological processes. A differentially expression of 339 Reference Sequence genes (238 down-regulated and 101 up-regulated between the two groups was observed. We identified a remarkably elevated expression of a spectrum of genes involved in Immunity and Defense in PBMCs of RA patients compared to controls. This result is confirmed by GO analysis, suggesting that these genes could be activated systemically in RA. No significant down-regulated ontology groups were found. Microarray data were validated by real time PCR in a set of nine genes showing a high degree of correlation. CONCLUSIONS/SIGNIFICANCE: Our study highlighted several new genes that could contribute in the identification of innovative clinical biomarkers for diagnostic procedures and therapeutic interventions.

  13. France, Germany, Greece and the United Kingdom an analysis and comparison of budget deficits and defense spending

    OpenAIRE

    Schoettelndreyer, Friedrich.

    2011-01-01

    Approved for public release; distribution is unlimited. This thesis documents findings on the relationship of government budget deficits and defense spending for France, Germany, Greece, and the United Kingdom in detail and for NATO and OECD country collectives. The thesis topic is relevant, as many European countries are justifying their recent cuts in defense spending with high government budget deficits. The author looked at different data sources and metrics to graphically analyze the ...

  14. Options for Department of Defense Total Workforce Supply and Demand Analysis: Potential Approaches and Available Data Sources

    Science.gov (United States)

    2014-01-01

    publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at...in Workforce Planning and Potential Modeling of Military Training, Land Defense Science and Technology Organisation , Australian Government Department...Technology Organisation , Australian Government Department of Defense, DSTO-TR-2037, 2007. Ward, D., “Workforce Demand Forecasting Techniques,” Human

  15. A statistical analysis of individual success after successful completion of Defense Language Institute Foreign Language Center Training

    OpenAIRE

    Hinson, William B.

    2005-01-01

    "The Defense Language Institute Foreign Language Center (DLIFLC) trains students in various foreign languages and dialects for the Department of Defense (DOD). The majority of students are firstterm enlistees in the basic program. This study uses classification trees and logistic regression to understand the military, academic and personal characteristics that influence first-term success after successfully completing DLIFLC training. Success was defined as completing a firstterm enlistme...

  16. Key attributes of the SAPHIRE risk and reliability analysis software for risk-informed probabilistic applications

    International Nuclear Information System (INIS)

    Smith, Curtis; Knudsen, James; Kvarfordt, Kellie; Wood, Ted

    2008-01-01

    The Idaho National Laboratory is a primary developer of probabilistic risk and reliability analysis (PRRA) tools, dating back over 35 years. Evolving from mainframe-based software, the current state-of-the-practice has led to the creation of the SAPHIRE software. Currently, agencies such as the Nuclear Regulatory Commission, the National Aeronautics and Aerospace Agency, the Department of Energy, and the Department of Defense use version 7 of the SAPHIRE software for many of their risk-informed activities. In order to better understand and appreciate the power of software as part of risk-informed applications, we need to recall that our current analysis methods and solution methods have built upon pioneering work done 30-40 years ago. We contrast this work with the current capabilities in the SAPHIRE analysis package. As part of this discussion, we provide information for both the typical features and special analysis capabilities, which are available. We also present the application and results typically found with state-of-the-practice PRRA models. By providing both a high-level and detailed look at the SAPHIRE software, we give a snapshot in time for the current use of software tools in a risk-informed decision arena

  17. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  18. Comprehensive analysis of information dissemination in disasters

    Science.gov (United States)

    Zhang, N.; Huang, H.; Su, Boni

    2016-11-01

    China is a country that experiences a large number of disasters. The number of deaths caused by large-scale disasters and accidents in past 10 years is around 900,000. More than 92.8 percent of these deaths could be avoided if there were an effective pre-warning system deployed. Knowledge of the information dissemination characteristics of different information media taking into consideration governmental assistance (information published by a government) in disasters in urban areas, plays a critical role in increasing response time and reducing the number of deaths and economic losses. In this paper we have developed a comprehensive information dissemination model to optimize efficiency of pre-warning mechanics. This model also can be used for disseminating information for evacuees making real-time evacuation plans. We analyzed every single information dissemination models for pre-warning in disasters by considering 14 media: short message service (SMS), phone, television, radio, news portals, Wechat, microblogs, email, newspapers, loudspeaker vehicles, loudspeakers, oral communication, and passive information acquisition via visual and auditory senses. Since governmental assistance is very useful in a disaster, we calculated the sensitivity of governmental assistance ratio. The results provide useful references for information dissemination during disasters in urban areas.

  19. Analysis of environment, safety, and health (ES{ampersand}H) management systems for Department of Energy (DOE) Defense Programs (DP) facilities

    Energy Technology Data Exchange (ETDEWEB)

    Neglia, A. V., LLNL

    1998-03-01

    The purpose of this paper is to provide a summary analysis and comparison of various environment, safety, and health (ES&H) management systems required of, or suggested for use by, the Departrnent of Energy Defense Programs` sites. The summary analysis is provided by means of a comparison matrix, a set of Vean diagrams that highlights the focus of the systems, and an `End Gate` filter diagram that integrates the three Vean diagrams. It is intended that this paper will act as a starting point for implementing a particular system or in establishing a comprehensive site-wide integrated ES&H management system. Obviously, the source documents for each system would need to be reviewed to assure proper implementation of a particular system. The matrix compares nine ES&H management systems against a list of elements generated by identifying the unique elements of all the systems. To simplify the matrix, the elements are listed by means of a brief title. An explanation of the matrix elements is provided in Attachment 2 entitled, `Description of System Elements.` The elements are categorized under the Total Quality Management (TQM) `Plan, Do, Check, Act` framework with the added category of `Policy`. (The TQM concept is explained in the `DOE Quality Management implementation Guidelines,` July 1997 (DOE/QM- 0008)). The matrix provides a series of columns and rows to compare the unique elements found in each of the management systems. A `V` is marked if the element is explicitly identified as part of the particular ES&H management system. An `X` is marked if the element is not found in the particular ES&H management system, or if it is considered to be inadequately addressed. A `?` is marked if incorporation of the element is not clear. Attachment I provides additional background information which explains the justification for the marks in the matrix cells. Through the Vean diagrams and the `End Gate` filter in Section 3, the paper attempts to pictorially display the focus of

  20. Defense Planning in a Time of Conflict: A Comparative Analysis of the 2001-2014 Quadrennial Defense Reviews, and Implications for the Army

    Science.gov (United States)

    2018-01-01

    these risks, nor did it explore the potential trade-offs required to execute the revised QDR strategy . It did, however, note that the portfolio of... Corporation , Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights...commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research

  1. Dissertation Defense Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional "validation by test only" mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions. Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in "Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations". This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics

  2. Dissertation Defense: Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional validation by test only mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions.Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations. This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics predictions

  3. Comparative Analysis of Volatile Defensive Secretions of Three Species of Pyrrhocoridae (Insecta: Heteroptera by Gas Chromatography-Mass Spectrometric Method.

    Directory of Open Access Journals (Sweden)

    Jan Krajicek

    Full Text Available The true bugs (Hemiptera: Heteroptera have evolved a system of well-developed scent glands that produce diverse and frequently strongly odorous compounds that act mainly as chemical protection against predators. A new method of non-lethal sampling with subsequent separation using gas chromatography with mass spectrometric detection was proposed for analysis of these volatile defensive secretions. Separation was performed on Rtx-200 column containing fluorinated polysiloxane stationary phase. Various mechanical irritation methods (ultrasonics, shaking, pressing bugs with plunger of syringe were tested for secretion sampling with a special focus on non-lethal irritation. The preconcentration step was performed by sorption on solid phase microextraction (SPME fibers with different polarity. For optimization of sampling procedure, Pyrrhocoris apterus was selected. The entire multi-parameter optimization procedure of secretion sampling was performed using response surface methodology. The irritation of bugs by pressing them with a plunger of syringe was shown to be the most suitable. The developed method was applied to analysis of secretions produced by adult males and females of Pyrrhocoris apterus, Pyrrhocoris tibialis and Scantius aegyptius (all Heteroptera: Pyrrhocoridae. The chemical composition of secretion, particularly that of alcohols, aldehydes and esters, is species-specific in all three pyrrhocorid species studied. The sexual dimorphism in occurrence of particular compounds is largely limited to alcohols and suggests their epigamic intraspecific function. The phenetic overall similarities in composition of secretion do not reflect either relationship of species or similarities in antipredatory color pattern. The similarities of secretions may be linked with antipredatory strategies. The proposed method requires only a few individuals which remain alive after the procedure. Thus secretions of a number of species including even the rare

  4. Function analysis for waste information systems

    International Nuclear Information System (INIS)

    Sexton, J.L.; Neal, C.T.; Heath, T.C.; Starling, C.D.

    1996-04-01

    This study has a two-fold purpose. It seeks to identify the functional requirements of a waste tracking information system and to find feasible alternatives for meeting those requirements on the Oak Ridge Reservation (ORR) and the Portsmouth (PORTS) and Paducah (PGDP) facilities; identify options that offer potential cost savings to the US government and also show opportunities for improved efficiency and effectiveness in managing waste information; and, finally, to recommend a practical course of action that can be immediately initiated. In addition to identifying relevant requirements, it also identifies any existing requirements that are currently not being completely met. Another aim of this study is to carry out preliminary benchmarking by contacting representative companies about their strategic directions in waste information. The information obtained from representatives of these organizations is contained in an appendix to the document; a full benchmarking effort, however, is beyond the intended scope of this study

  5. 32 CFR Appendix C to Part 516 - Department of Defense Directive 5405.2, Release of Official Information in Litigation and...

    Science.gov (United States)

    2010-07-01

    ..., enforceable at law against the United States or the Department of Defense. C. Definitions 1. Demand. Subpoena.... Notwithstanding the provisions of paragraphs F.1.a. and b., the GC, DoD, in litigation involving terrorism...

  6. A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

    Directory of Open Access Journals (Sweden)

    Rustu Yilmaz

    2016-05-01

    Full Text Available Universities are the leading institutions that are the sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every area. Therefore, universities are expected to be institutions where information and information management are used efficiently. In the present study, the topics such as infrastructure, operation, application, information, policy and human-based information security at universities were examined within the scope of the information security standards which are highly required and intended to be available at each university today, and then a comparative analysis was conducted specific to Turkey. Within the present study, the Microsoft Security Assessment Tool developed by Microsoft was used as the risk analysis tool. The analyses aim to enable the universities to compare their information systems with the information systems of other universities within the scope of the information security awareness, and to make suggestions in this regard.

  7. Information seeking and reciprocity: A transformational analysis

    NARCIS (Netherlands)

    Gallucci, M.; Perugini, M.

    2003-01-01

    The motivation to reciprocate is analyzed within the framework of interdependence theory, with focus on the process of transformation of situations. A model of transformation is presented for the motivation to reciprocate and hypotheses regarding allocation behavior and information seeking are

  8. Exploring health information technology education: an analysis of the research.

    Science.gov (United States)

    Virgona, Thomas

    2012-01-01

    This article is an analysis of the Health Information Technology Education published research. The purpose of this study was to examine selected literature using variables such as journal frequency, keyword analysis, universities associated with the research and geographic diversity. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of Health Information Technology. The keyword analysis suggests that Health Information Technology research has evolved from establishing concepts and domains of health information systems, technology and management to contemporary issues such as education, outsourcing, web services and security. The research findings have implications for educators, researchers, journal.

  9. Transcriptome analysis highlights defense and signaling pathways mediated by rice pi21 gene with partial resistance to Magnaporthe oryzae

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2016-12-01

    Full Text Available Rice blast disease is one of the most destructive rice diseases worldwide. The pi21 gene confers partial and durable resistance to Magnaporthe oryzae. However, little is known regarding the molecular mechanisms of resistance mediated by the loss-of-function of Pi21. In this study, comparative transcriptome profiling of the Pi21-RNAi transgenic rice line and Nipponbare with M. oryzae infection at different time points (0, 12, 24, 48, and 72 hpi were investigated using RNA sequencing. The results generated 43,222 unique genes mapped to the rice genome. In total, 1,109 differentially expressed genes (DEGs were identified between the Pi21-RNAi line and Nipponbare with M. oryzae infection, with 103, 281, 209, 69, and 678 DEGs at 0, 12, 24, 48, and 72 hpi, respectively. Functional analysis showed that most of the DEGs were involved in metabolism, transport, signaling, and defense. Among the genes assigned to plant–pathogen interaction, we identified 43 receptor kinase genes associated with pathogen-associated molecular pattern recognition and calcium ion influx. The expression levels of brassinolide-insensitive 1, flagellin sensitive 2 and elongation factor Tu receptor, ethylene (ET biosynthesis and signaling genes, were higher in the Pi21-RNAi line than Nipponbare. This suggested that there was a more robust PTI response in Pi21-RNAi plants and that ET signaling was important to rice blast resistance. We also identified 53 transcription factor genes, including WRKY, NAC, DOF, and ERF families that show differential expression between the two genotypes. This study highlights possible candidate genes that may serve a function in the partial rice blast resistance mediated by the loss-of-function of Pi21 and increase our understanding of the molecular mechanisms involved in partial resistance against M. oryzae.

  10. The informational subject in the contemporary context. An analysis from the epistemology of informational community identity

    Directory of Open Access Journals (Sweden)

    Miguel Angel Rendón-Rojas

    2012-04-01

    Full Text Available The Epistemology of Informational Community Identity (ECI-I is proposed as a toolbox for the analysis of informational reality within categories as contextual paradigm, informational subject and informational entity, built ex profeso for this theoretical-methodological analysis. The concepts of information user´s and informational subject are distinguished, the latest, to seek an answer from a concrete social enclave within a particular community and its interrelationships with others, to under go a process of self construction, from which specific information needs arise. And the user needs to seek concrete answer after formal questioning many facts occurring in a consumerist, unequal and alienating world. So the emphasis is put on the need for an interdisciplinary approach between social theory and library science in the study of the documentary information world of particular informational subjects, which is often marginalized and excluded

  11. Information granules in image histogram analysis.

    Science.gov (United States)

    Wieclawek, Wojciech

    2018-04-01

    A concept of granular computing employed in intensity-based image enhancement is discussed. First, a weighted granular computing idea is introduced. Then, the implementation of this term in the image processing area is presented. Finally, multidimensional granular histogram analysis is introduced. The proposed approach is dedicated to digital images, especially to medical images acquired by Computed Tomography (CT). As the histogram equalization approach, this method is based on image histogram analysis. Yet, unlike the histogram equalization technique, it works on a selected range of the pixel intensity and is controlled by two parameters. Performance is tested on anonymous clinical CT series. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Hydrogen Technical Analysis -- Dissemination of Information

    Energy Technology Data Exchange (ETDEWEB)

    George Kervitsky, Jr.

    2006-03-20

    SENTECH is a small energy and environmental consulting firm providing technical, analytical, and communications solutions to technology management issues. The activities proposed by SENTECH focused on gathering and developing communications materials and information, and various dissemination activities to present the benefits of hydrogen energy to a broad audience while at the same time establishing permanent communications channels to enable continued two-way dialog with these audiences in future years. Effective communications and information dissemination is critical to the acceptance of new technology. Hydrogen technologies face the additional challenge of safety preconceptions formed primarily as a result of the crash of the Hindenburg. Effective communications play a key role in all aspects of human interaction, and will help to overcome the perceptual barriers, whether of safety, economics, or benefits. As originally proposed SENTECH identified three distinct information dissemination activities to address three distinct but important audiences; these formed the basis for the task structure used in phases 1 and 2. The tasks were: (1) Print information--Brochures that target the certain segment of the population and will be distributed via relevant technical conferences and traditional distribution channels. (2) Face-to-face meetings--With industries identified to have a stake in hydrogen energy. The three industry audiences are architect/engineering firms, renewable energy firms, and energy companies that have not made a commitment to hydrogen (3) Educational Forums--The final audience is students--the future engineers, technicians, and energy consumers. SENTECH will expand on its previous educational work in this area. The communications activities proposed by SENTECH and completed as a result of this cooperative agreement was designed to compliment the research and development work funded by the DOE by presenting the technical achievements and validations

  13. Integrated Information Technology Policy Analysis Research, CSUSB

    Science.gov (United States)

    2010-10-01

    cience  fields in order to combine efforts to better understand multiple network s systems, including technical, biological and social networks...Flowing Valued Information (FVI) project has been discussed at the Network  cience  Workshops linked form the Center website and the FVI reports and

  14. Value of Information Analysis in Structural Safety

    DEFF Research Database (Denmark)

    Konakli, Katerina; Faber, Michael Havbro

    2014-01-01

    of structural systems. In this context, experiments may refer to inspections or techniques of structural health monitoring. The Value of Information concept provides a powerful tool for determining whether the experimental cost is justified by the expected benefit and for identifying the optimal among different...... possible experimental schemes. This concept is elaborated through principal examples for structural components and system models. Sensitivity analyses are performed to investigate how the decision problem is influenced by the level of uncertainty that characterizes the structural properties, the amount...

  15. Applying Recursive Sensitivity Analysis to Multi-Criteria Decision Models to Reduce Bias in Defense Cyber Engineering Analysis

    Science.gov (United States)

    2015-10-28

    techniques such as regression analysis, correlation, and multicollinearity assessment to identify the change and error on the input to the model...between many of the independent or predictor variables, the issue of multicollinearity may arise [18]. VII. SUMMARY Accurate decisions concerning

  16. Sequence/structural analysis of xylem proteome emphasizes pathogenesis-related proteins, chitinases and β-1, 3-glucanases as key players in grapevine defense against Xylella fastidiosa

    Directory of Open Access Journals (Sweden)

    Sandeep Chakraborty

    2016-05-01

    Full Text Available Background. Xylella fastidiosa, the causative agent of various plant diseases including Pierce’s disease in the US, and Citrus Variegated Chlorosis in Brazil, remains a continual source of concern and economic losses, especially since almost all commercial varieties are sensitive to this Gammaproteobacteria. Differential expression of proteins in infected tissue is an established methodology to identify key elements involved in plant defense pathways. Methods. In the current work, we developed a methodology named CHURNER that emphasizes relevant protein functions from proteomic data, based on identification of proteins with similar structures that do not necessarily have sequence homology. Such clustering emphasizes protein functions which have multiple copies that are up/down-regulated, and highlights similar proteins which are differentially regulated. As a working example we present proteomic data enumerating differentially expressed proteins in xylem sap from grapevines that were infected with X. fastidiosa. Results. Analysis of this data by CHURNER highlighted pathogenesis related PR-1 proteins, reinforcing this as the foremost protein function in xylem sap involved in the grapevine defense response to X. fastidiosa. β-1, 3-glucanase, which has both anti-microbial and anti-fungal activities, is also up-regulated. Simultaneously, chitinases are found to be both up and down-regulated by CHURNER, and thus the net gain of this protein function loses its significance in the defense response. Discussion. We demonstrate how structural data can be incorporated in the pipeline of proteomic data analysis prior to making inferences on the importance of individual proteins to plant defense mechanisms. We expect CHURNER to be applicable to any proteomic data set.

  17. Real Options in Defense R and D: A Decision Tree Analysis Approach for Options to Defer, Abandon, and Expand

    Science.gov (United States)

    2016-12-01

    the sale of assets for salvage value. However, for defense R&D projects, since there is no secondhand market for the projects, this option is...Peli, 2001; Panayi & Trigeorgis, 1998; Perlitz et al., 1999). Moreover, there are also very comprehensive books on the theory and practice of

  18. Control of Database Applications at the Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The Defense Finance and Accounting Service Financial Systems Organization, under the control of the Deputy Director for Information Management, Defense Finance and Accounting Service, is responsible...

  19. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  20. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  1. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  2. Information architecture. Volume 2, Part 1: Baseline analysis summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The Department of Energy (DOE) Information Architecture, Volume 2, Baseline Analysis, is a collaborative and logical next-step effort in the processes required to produce a Departmentwide information architecture. The baseline analysis serves a diverse audience of program management and technical personnel and provides an organized way to examine the Department`s existing or de facto information architecture. A companion document to Volume 1, The Foundations, it furnishes the rationale for establishing a Departmentwide information architecture. This volume, consisting of the Baseline Analysis Summary (part 1), Baseline Analysis (part 2), and Reference Data (part 3), is of interest to readers who wish to understand how the Department`s current information architecture technologies are employed. The analysis identifies how and where current technologies support business areas, programs, sites, and corporate systems.

  3. 论国防概念在信息化战争条件下的再认识%Reflection on the definition of national defense in the information-based war

    Institute of Scientific and Technical Information of China (English)

    赵岚

    2012-01-01

      The modernization of national defense has encountered many new issues in the information warfare. Therefore, a fresh recognition and comprehensive interpretation of the concept of national defense is required be it for its objectives or purposes. To enhance the dynamic adaptation of national defense concept to the diverse circumstances, it counts to focus on the subject of national defense and to highlight the idea of sovereignty.%  在信息化战争条件下,目前对国防定义的认识与我国现代国防建设的发展已经出现不相适应的情况,无论是从国防对象还是国防目的来看都有需要重新认识和全新解读的必要。为了适应不断发展的实际变化,回归国防主体,突出主权概念,有利于增强国防定义的动态适应性。

  4. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  5. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  6. RNA-Seq analysis of Citrus reticulata in the early stages of Xylella fastidiosa infection reveals auxin-related genes as a defense response.

    Science.gov (United States)

    Rodrigues, Carolina M; de Souza, Alessandra A; Takita, Marco A; Kishi, Luciano T; Machado, Marcos A

    2013-10-03

    Citrus variegated chlorosis (CVC), caused by Xylella fastidiosa, is one the most important citrus diseases, and affects all varieties of sweet orange (Citrus sinensis L. Osb). On the other hand, among the Citrus genus there are different sources of resistance against X. fastidiosa. For these species identifying these defense genes could be an important step towards obtaining sweet orange resistant varieties through breeding or genetic engineering. To assess these genes we made use of mandarin (C. reticulata Blanco) that is known to be resistant to CVC and shares agronomical characteristics with sweet orange. Thus, we investigated the gene expression in Ponkan mandarin at one day after infection with X. fastidiosa, using RNA-seq. A set of genes considered key elements in the resistance was used to confirm its regulation in mandarin compared with the susceptible sweet orange. Gene expression analysis of mock inoculated and infected tissues of Ponkan mandarin identified 667 transcripts repressed and 724 significantly induced in the later. Among the induced transcripts, we identified genes encoding proteins similar to Pattern Recognition Receptors. Furthermore, many genes involved in secondary metabolism, biosynthesis and cell wall modification were upregulated as well as in synthesis of abscisic acid, jasmonic acid and auxin. This work demonstrated that the defense response to the perception of bacteria involves cell wall modification and activation of hormone pathways, which probably lead to the induction of other defense-related genes. We also hypothesized the induction of auxin-related genes indicates that resistant plants initially recognize X. fastidiosa as a necrotrophic pathogen.

  7. Identification of Host Defense-Related Proteins Using Label-Free Quantitative Proteomic Analysis of Milk Whey from Cows with Staphylococcus aureus Subclinical Mastitis

    Directory of Open Access Journals (Sweden)

    Shaimaa Abdelmegid

    2017-12-01

    Full Text Available Staphylococcus aureus is the most common contagious pathogen associated with bovine subclinical mastitis. Current diagnosis of S. aureus mastitis is based on bacteriological culture of milk samples and somatic cell counts, which lack either sensitivity or specificity. Identification of milk proteins that contribute to host defense and their variable responses to pathogenic stimuli would enable the characterization of putative biomarkers of subclinical mastitis. To accomplish this, milk whey samples from healthy and mastitic dairy cows were analyzed using a label-free quantitative proteomics approach. In total, 90 proteins were identified, of which 25 showed significant differential abundance between healthy and mastitic samples. In silico functional analyses indicated the involvement of the differentially abundant proteins in biological mechanisms and signaling pathways related to host defense including pathogen-recognition, direct antimicrobial function, and the acute-phase response. This proteomics and bioinformatics analysis not only facilitates the identification of putative biomarkers of S. aureus subclinical mastitis but also recapitulates previous findings demonstrating the abundance of host defense proteins in intramammary infection. All mass spectrometry data are available via ProteomeXchange with identifier PXD007516.

  8. INFORMATION ARCHITECTURE ANALYSIS USING BUSINESS INTELLIGENCE TOOLS BASED ON THE INFORMATION NEEDS OF EXECUTIVES

    Directory of Open Access Journals (Sweden)

    Fabricio Sobrosa Affeldt

    2013-08-01

    Full Text Available Devising an information architecture system that enables an organization to centralize information regarding its operational, managerial and strategic performance is one of the challenges currently facing information technology. The present study aimed to analyze an information architecture system developed using Business Intelligence (BI technology. The analysis was performed based on a questionnaire enquiring as to whether the information needs of executives were met during the process. A theoretical framework was applied consisting of information architecture and BI technology, using a case study methodology. Results indicated that the transaction processing systems studied did not meet the information needs of company executives. Information architecture using data warehousing, online analytical processing (OLAP tools and data mining may provide a more agile means of meeting these needs. However, some items must be included and others modified, in addition to improving the culture of information use by company executives.

  9. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  10. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  11. Shuttle Topography Data Inform Solar Power Analysis

    Science.gov (United States)

    2013-01-01

    The next time you flip on a light switch, there s a chance that you could be benefitting from data originally acquired during the Space Shuttle Program. An effort spearheaded by Jet Propulsion Laboratory (JPL) and the National Geospatial-Intelligence Agency (NGA) in 2000 put together the first near-global elevation map of the Earth ever assembled, which has found use in everything from 3D terrain maps to models that inform solar power production. For the project, called the Shuttle Radar Topography Mission (SRTM), engineers at JPL designed a 60-meter mast that was fitted onto Shuttle Endeavour. Once deployed in space, an antenna attached to the end of the mast worked in combination with another antenna on the shuttle to simultaneously collect data from two perspectives. Just as having two eyes makes depth perception possible, the SRTM data sets could be combined to form an accurate picture of the Earth s surface elevations, the first hight-detail, near-global elevation map ever assembled. What made SRTM unique was not just its surface mapping capabilities but the completeness of the data it acquired. Over the course of 11 days, the shuttle orbited the Earth nearly 180 times, covering everything between the 60deg north and 54deg south latitudes, or roughly 80 percent of the world s total landmass. Of that targeted land area, 95 percent was mapped at least twice, and 24 percent was mapped at least four times. Following several years of processing, NASA released the data to the public in partnership with NGA. Robert Crippen, a member of the SRTM science team, says that the data have proven useful in a variety of fields. "Satellites have produced vast amounts of remote sensing data, which over the years have been mostly two-dimensional. But the Earth s surface is three-dimensional. Detailed topographic data give us the means to visualize and analyze remote sensing data in their natural three-dimensional structure, facilitating a greater understanding of the features

  12. Proof of patient information: Analysis of 201 judicial decisions.

    Science.gov (United States)

    Dugleux, E; Rached, H; Rougé-Maillart, C

    2018-05-01

    The ruling by the French Court of Cassation dated February 25, 1997 obliged doctors to provide proof of the information given to patients, reversing more than half a century of case law. In October 1997, it was specified that such evidence could be provided by "all means", including presumption. No hierarchy in respect of means of proof has been defined by case law or legislation. The present study analyzed judicial decisions with a view to determining the means of proof liable to carry the most weight in a suit for failure to provide due patient information. A retrospective qualitative study was conducted for the period from January 2010 to December 2015, by a search on the LexisNexis ® JurisClasseur website. Two hundred and one judicial decisions relating to failure to provide due patient information were selected and analyzed to study the characteristics of the practitioners involved, the content of the information at issue and the means of proof provided. The resulting cohort of practitioners was compared with the medical demographic atlas of the French Order of Medicine, considered as exhaustive. Two hundred and one practitioners were investigated for failure to provide information: 45 medical practitioners (22±3%), and 156 surgeons (78±3%) including 45 orthopedic surgeons (29±3.6% of surgeons). Hundred and ninety-three were private sector (96±1.3%) and 8 public sector (4±1.3%). Hundred and one surgeons (65±3.8% of surgeons), and 26 medical practitioners (58±7.4%) were convicted. Twenty-five of the 45 orthopedic surgeons were convicted (55±7.5%). There was no significant difference in conviction rates between surgeons and medical practitioners: odds ratio, 1.339916; 95% CI [0.6393982; 2.7753764] (Chi 2 test: p=0.49). Ninety-two practitioners based their defense on a single means of proof, and 74 of these were convicted (80±4.2%). Forty practitioners based their defense on several means of proof, and 16 of these were convicted (40±7.8%). There was

  13. Ground subsidence information as a valuable layer in GIS analysis

    Science.gov (United States)

    Murdzek, Radosław; Malik, Hubert; Leśniak, Andrzej

    2018-04-01

    Among the technologies used to improve functioning of local governments the geographic information systems (GIS) are widely used. GIS tools allow to simultaneously integrate spatial data resources, analyse them, process and use them to make strategic decisions. Nowadays GIS analysis is widely used in spatial planning or environmental protection. In these applications a number of spatial information are utilized, but rarely it is an information about environmental hazards. This paper includes information about ground subsidence that occurred in USCB mining area into GIS analysis. Monitoring of this phenomenon can be carried out using the radar differential interferometry (DInSAR) method.

  14. Ground subsidence information as a valuable layer in GIS analysis

    Directory of Open Access Journals (Sweden)

    Murdzek Radosław

    2018-01-01

    Full Text Available Among the technologies used to improve functioning of local governments the geographic information systems (GIS are widely used. GIS tools allow to simultaneously integrate spatial data resources, analyse them, process and use them to make strategic decisions. Nowadays GIS analysis is widely used in spatial planning or environmental protection. In these applications a number of spatial information are utilized, but rarely it is an information about environmental hazards. This paper includes information about ground subsidence that occurred in USCB mining area into GIS analysis. Monitoring of this phenomenon can be carried out using the radar differential interferometry (DInSAR method.

  15. The Relative Importance of Market Power and Efficiency to Profitability in the Defense Sector: A Firm Based Analysis.

    Science.gov (United States)

    1983-12-01

    production contract that follows. Development contracts almost always contain some kind of cost- reimbursement provision (more on contract types later...two major contract types is the cost reimbursement contract. Cost contracts allow the firm to recover all allowable and reasonable costs from __ the...government. As noted earlier, defense firms are . motivated to raise costs when cost reimbur ement contract are used because profits aro usually

  16. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  17. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  18. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  19. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  20. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  1. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  2. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  3. Türk Savunma Sanayi Firmaları Vizyon ve Misyon İfadelerinin İçerik Analizi (The Content Analysis of Vision and Mission Statements in Turkish Defense Industry Firms

    Directory of Open Access Journals (Sweden)

    Metin OCAK

    2016-08-01

    Full Text Available In this research, components used in mission and vision statements by Turkish Defense Industry Firms and their relations with national defense industry guidance documents are examined. For this reason 87 vision and 79 mission statements which mentioned on the web pages of 148 Turkish Defense Industry Firms’ are taken into consideration. A qualitative research design phenomenology was used and the data were analyzed through content analysis in this study. At the end of the analysis, it is identified that there are common 14 components in vision statements and 13 common components in mission statements. Also it is discovered that some of the components are relevant with components mentioned in the national defense industry guidance documents.

  4. Agricultural information dissemination using ICTs: A review and analysis of information dissemination models in China

    OpenAIRE

    Yun Zhang; Lei Wang; Yanqing Duan

    2016-01-01

    Over the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs). Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different informatio...

  5. Water Information Management & Analysis System (WIMAS) v 4.0

    Data.gov (United States)

    Kansas Data Access and Support Center — The Water Information Management and Analysis System (WIMAS) is an ArcView based GIS application that allows users to query Kansas water right data maintained by the...

  6. Analysis of Informal Credit Operations among Farmers In Atisbo ...

    African Journals Online (AJOL)

    Analysis of Informal Credit Operations among Farmers In Atisbo Local ... Some of the respondents (16.7%) had no formal education though they were managing ... Intensive use of extension services to facilitate adult literacy and learning ...

  7. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  8. A Concept Analysis of Fully Informed: Breastfeeding Promotion

    Science.gov (United States)

    2005-12-21

    updated breastfeeding policy statement, the American Academy of Pediatrics 3 ( AAP , 2005) identified the compelling advantages of breastfeeding and urged...healthcare 4 professionals to implement principles to promote breastfeeding . The AAP cited obstacles 5 to the initiation and continuation of...Analysis of Fully Informed 2 14 A Concept Analysis of Fully Informed: Breastfeeding Promotion 15 In February 2005, the American Academy of Pediatrics ( AAP

  9. Cluster Analysis of International Information and Social Development.

    Science.gov (United States)

    Lau, Jesus

    1990-01-01

    Analyzes information activities in relation to socioeconomic characteristics in low, middle, and highly developed economies for the years 1960 and 1977 through the use of cluster analysis. Results of data from 31 countries suggest that information development is achieved mainly by countries that have also achieved social development. (26…

  10. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  11. Analysis of the brazilian scientific production about information flows

    Directory of Open Access Journals (Sweden)

    Danielly Oliveira Inomata

    2015-07-01

    Full Text Available Objective. This paper presents and discuss the concepts, contexts and applications involving information flows in organizations. Method. Systematic review, followed by a bibliometric analysis and system analysis. The systematic review aimed to search for, evaluate and review evidence about the research topic. The systematic review process comprised the following steps: 1 definition of keywords, 2 systematic review, 3 exploration and analysis of articles and 4 comparison and consolidation of results. Results. A bibliometric analysis aimed to provide a statement of the relevance of articles where the authors, dates of publications, citation index, and periodic keywords with higher occurrence. Conclusions. As survey results confirms the emphasis on information featured in the knowledge management process, and advancing years, it seems that the emphasis is on networks, ie, studies are turning to the operationalization and analysis of flows information networks. The literature produced demonstrates the relationship of information flow with its management, applied to different organizational contexts, including showing new trends in information science as the study and analysis of information flow in networks.

  12. METHODOLOGICAL APPROACH TO ANALYSIS AND EVALUATION OF INFORMATION PROTECTION IN INFORMATION SYSTEMS BASED ON VULNERABILITY DANGER

    Directory of Open Access Journals (Sweden)

    Y. M. Krotiuk

    2008-01-01

    Full Text Available The paper considers a methodological approach to an analysis and estimation of information security in the information systems which is based on the analysis of vulnerabilities and an extent of their hazard. By vulnerability hazard it is meant a complexity of its operation as a part of an information system. The required and sufficient vulnerability operational conditions  have  been  determined in the paper. The paper proposes a generalized model for attack realization which is used as a basis for construction of an attack realization model for an operation of a particular vulnerability. A criterion for estimation of information protection in the information systems which is based on the estimation of vulnerability hazard is formulated in the paper. The proposed approach allows to obtain a quantitative estimation of the information system security on the basis of the proposed schemes on realization of typical attacks for the distinguished classes of vulnerabilities.The methodical approach is used for choosing variants to be applied for realization of protection mechanisms in the information systems as well as for estimation of information safety in the operating information systems.

  13. Agricultural information dissemination using ICTs: A review and analysis of information dissemination models in China

    Directory of Open Access Journals (Sweden)

    Yun Zhang

    2016-03-01

    Full Text Available Over the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs. Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer.

  14. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  15. The Rationality/Emotional Defensiveness Scale--II. Convergent and discriminant correlational analysis in males and females with and without cancer.

    Science.gov (United States)

    Swan, G E; Carmelli, D; Dame, A; Rosenman, R H; Spielberger, C D

    1992-05-01

    The psychological correlates of the Rationality/Emotional Defensiveness Scale and its two subscales were examined in 1236 males and 863 females from the Western Collaborative Group Study. An additional 157 males and 164 females with some form of cancer other than of the skin were also included in this analysis. Characteristics measured included self-reported emotional control, anger expression, trait personality, depressive and neurotic symptomatology, Type A behavior, hostility, and social desirability. Results indicate that the Rationality/Emotional Defensiveness Scale is most strongly related to the suppression and control of emotions, especially anger. Scores on this scale also tend to be associated with less Type A behavior and hostility and with more social conformity. Analysis of the component subscale suggests that Antiemotionality, i.e. the extent to which an individual uses reason and logic to avoid interpersonally related emotions, is most strongly marked by the control of anger, while Rationality, i.e. the extent to which an individual uses reason and logic as a general approach to coping with the environment, is related to the control of anxiety and a higher level of trait curiosity. The psychological interpretation of the scale appears to be largely invariant across gender, unaffected by residualization of the total scale score for its association with Social Desirability, and, except for a few minor instances, unrelated to the diagnosis of cancer.

  16. 26 CFR 301.6110-3 - Deletion of certain information in written determinations open to public inspection.

    Science.gov (United States)

    2010-04-01

    ... land to be purchased. (2) Information concerning national defense and foreign policy. Information... national defense or foreign policy and which is in fact properly classified pursuant to such order. (3... preferences. A clearly unwarranted invasion of personal privacy exists if from analysis of information...

  17. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  18. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  20. Analysis and design of nuclear energy information systems

    International Nuclear Information System (INIS)

    Yohanes Dwi Anggoro; Sriyana; Arief Tris Yuliyanto; Wiku Lulus Widodo

    2015-01-01

    Management of research reports and activities of the Center for Nuclear Energy System Assessment (PKSEN), either in the form of documents and the results of other activities, are important part of the series of activities PKSEN mission achievement. Management of good documents will facilitate the provision of improved inputs or use the maximum results. But over the past few years, there are still some problem in the management of research reports and activities performed by PKSEN. The purpose of this study is to analyze and design flow layout of the Nuclear Energy Information System to facilitate the implementation of the Nuclear Energy Information System. In addition to be used as a research management system and PKSEN activities, it can also be used as information media for the community. Nuclear Energy Information System package is expected to be ''one gate systems for PKSEN information. The research methodology used are: (i) analysis of organizational systems, (ii) the analysis and design of information systems; (iii) the analysis and design of software systems; (iv) the analysis and design of database systems. The results of this study are: had identified and resources throughout the organization PKSEN activation, had analyzed the application of SIEN using SWOT analysis, had identified several types of devices required, had been compiled hierarchy of SIEN, had determined that the database system used is a centralized database system and had elections MySQL as DBMS. The result is a basic design of the Nuclear Energy Information System) which will used as a research and activities management system of PKSEN and also can be used as a medium of information for the community. (author)

  1. Hybrid Information Flow Analysis for Programs with Arrays

    Directory of Open Access Journals (Sweden)

    Gergö Barany

    2016-07-01

    Full Text Available Information flow analysis checks whether certain pieces of (confidential data may affect the results of computations in unwanted ways and thus leak information. Dynamic information flow analysis adds instrumentation code to the target software to track flows at run time and raise alarms if a flow policy is violated; hybrid analyses combine this with preliminary static analysis. Using a subset of C as the target language, we extend previous work on hybrid information flow analysis that handled pointers to scalars. Our extended formulation handles arrays, pointers to array elements, and pointer arithmetic. Information flow through arrays of pointers is tracked precisely while arrays of non-pointer types are summarized efficiently. A prototype of our approach is implemented using the Frama-C program analysis and transformation framework. Work on a full machine-checked proof of the correctness of our approach using Isabelle/HOL is well underway; we present the existing parts and sketch the rest of the correctness argument.

  2. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  3. Informational analysis for compressive sampling in radar imaging.

    Science.gov (United States)

    Zhang, Jingxiong; Yang, Ke

    2015-03-24

    Compressive sampling or compressed sensing (CS) works on the assumption of the sparsity or compressibility of the underlying signal, relies on the trans-informational capability of the measurement matrix employed and the resultant measurements, operates with optimization-based algorithms for signal reconstruction and is thus able to complete data compression, while acquiring data, leading to sub-Nyquist sampling strategies that promote efficiency in data acquisition, while ensuring certain accuracy criteria. Information theory provides a framework complementary to classic CS theory for analyzing information mechanisms and for determining the necessary number of measurements in a CS environment, such as CS-radar, a radar sensor conceptualized or designed with CS principles and techniques. Despite increasing awareness of information-theoretic perspectives on CS-radar, reported research has been rare. This paper seeks to bridge the gap in the interdisciplinary area of CS, radar and information theory by analyzing information flows in CS-radar from sparse scenes to measurements and determining sub-Nyquist sampling rates necessary for scene reconstruction within certain distortion thresholds, given differing scene sparsity and average per-sample signal-to-noise ratios (SNRs). Simulated studies were performed to complement and validate the information-theoretic analysis. The combined strategy proposed in this paper is valuable for information-theoretic orientated CS-radar system analysis and performance evaluation.

  4. Deactivation and Decommissioning Planning and Analysis with Geographic Information Systems

    International Nuclear Information System (INIS)

    Bollinger, James S.; Koffman, Larry D.; Austin, William E.

    2008-01-01

    From the mid-1950's through the 1980's, the U.S. Department of Energy's Savannah River Site produced nuclear materials for the weapons stockpile, for medical and industrial applications, and for space exploration. Although SRS has a continuing defense-related mission, the overall site mission is now oriented toward environmental restoration and management of legacy chemical and nuclear waste. With the change in mission, SRS no longer has a need for much of the infrastructure developed to support the weapons program. This excess infrastructure, which includes over 1000 facilities, will be decommissioned and demolished over the forthcoming years. Dis-positioning facilities for decommissioning and deactivation requires significant resources to determine hazards, structure type, and a rough-order-of-magnitude estimate for the decommissioning and demolition cost. Geographic information systems (GIS) technology was used to help manage the process of dis-positioning infrastructure and for reporting the future status of impacted facilities. Several thousand facilities of various ages and conditions are present at SRS. Many of these facilities, built to support previous defense-related missions, now represent a potential hazard and cost for maintenance and surveillance. To reduce costs and the hazards associated with this excess infrastructure, SRS has developed an ambitious plan to decommission and demolish unneeded facilities in a systematic fashion. GIS technology was used to assist development of this plan by: providing locational information for remote facilities, identifying the location of known waste units adjacent to buildings slated for demolition, and for providing a powerful visual representation of the impact of the overall plan. Several steps were required for the development of the infrastructure GIS model. The first step involved creating an accurate and current GIS representation of the infrastructure data. This data is maintained in a Computer Aided Design

  5. RISK ANALYSIS IN INFORMATION TECHNOLOGY AND COMMUNICATION OUTSOURCING

    Directory of Open Access Journals (Sweden)

    Edmir Parada Vasques Prado

    2011-12-01

    Full Text Available This research aims at evaluating the risk analysis process in Information Technology and Communication (ICT outsourcing conducted by organizations of the private sector. The research is characterized by being a descriptive, quantitative and transversal type study, which was used the survey method. Data were collected through questionnaire, the sample is not random and we used a convenience sampling process. The research made contributions to understanding the risk analysis process in ICT services outsourcing, and identified statistically significant relationships between risk analysis, organization's size and its industry, and between risk analysis and diversity of outsourced services

  6. CISAPS: Complex Informational Spectrum for the Analysis of Protein Sequences

    Directory of Open Access Journals (Sweden)

    Charalambos Chrysostomou

    2015-01-01

    Full Text Available Complex informational spectrum analysis for protein sequences (CISAPS and its web-based server are developed and presented. As recent studies show, only the use of the absolute spectrum in the analysis of protein sequences using the informational spectrum analysis is proven to be insufficient. Therefore, CISAPS is developed to consider and provide results in three forms including absolute, real, and imaginary spectrum. Biologically related features to the analysis of influenza A subtypes as presented as a case study in this study can also appear individually either in the real or imaginary spectrum. As the results presented, protein classes can present similarities or differences according to the features extracted from CISAPS web server. These associations are probable to be related with the protein feature that the specific amino acid index represents. In addition, various technical issues such as zero-padding and windowing that may affect the analysis are also addressed. CISAPS uses an expanded list of 611 unique amino acid indices where each one represents a different property to perform the analysis. This web-based server enables researchers with little knowledge of signal processing methods to apply and include complex informational spectrum analysis to their work.

  7. Performance of the Carbon Dioxide Information Analysis Center (CDIAC)

    Energy Technology Data Exchange (ETDEWEB)

    Stoss, F.W. [Univ. of Tennessee, Knoxville, TN (United States). Environment, Energy, and Resources Center; Jones, S.B. [Oak Ridge National Lab., TN (United States)

    1993-11-01

    The Carbon Dioxide Information Analysis Center (CDIAC) provides information and data resources in support of the US Department of Energy`s Global Change Research Program. CDIAC also serves as a resource of global change information for a broader international commonly of researchers, policymakers, managers, educators, and students. The number of requests for CDIAC`s data products, information services, and publications has grown over the years and represents multidisciplinary interests in the physical, life, and social sciences and from diverse work settings in government, business, and academia. CDIAC`s staff addresses thousands of requests yearly for data and information resources. In response to these requests, CDIAC has distributed tens of thousands of data products, technical reports, newsletters, and other information resources worldwide since 1982. This paper describes CDIAC, examines CDIAC`s user community, and describes CDIAC`s response to requests for information. The CDIAC Information System, which serves as a comprehensive PC-based inventory and information management tracking system, is also described.

  8. Meeting the reactor operator's information needs using functional analysis

    International Nuclear Information System (INIS)

    Nelson, W.R.; Clark, M.T.

    1980-01-01

    Since the accident at Three Mile Island, many ideas have been proposed for assisting the reactor operator during emergency situations. However, some of the suggested remedies do not alleviate an important shortcoming of the TMI control room: the operators were not presented with the information they needed in a manner which would allow prompt diagnosis of the problem. To address this problem, functional analysis is being applied at the LOFT facility to ensure that the operator's information needs are being met in his procedures and graphic displays. This paper summarizes the current applications of functional analysis at LOFT

  9. Performance Analysis of Information Services in a Grid Environment

    Directory of Open Access Journals (Sweden)

    Giovanni Aloisio

    2004-10-01

    Full Text Available The Information Service is a fundamental component in a grid environment. It has to meet a lot of requirements such as access to static and dynamic information related to grid resources, efficient and secure access to dynamic data, decentralized maintenance, fault tolerance etc., in order to achieve better performance, scalability, security and extensibility. Currently there are two different major approaches. One is based on a directory infrastructure and another one on a novel approach that exploits a relational DBMS. In this paper we present a performance comparison analysis between Grid Resource Information Service (GRIS and Local Dynamic Grid Catalog relational information service (LDGC, providing also information about two projects (iGrid and Grid Relational Catalog in the grid data management area.

  10. Sensitivity Analysis for Urban Drainage Modeling Using Mutual Information

    Directory of Open Access Journals (Sweden)

    Chuanqi Li

    2014-11-01

    Full Text Available The intention of this paper is to evaluate the sensitivity of the Storm Water Management Model (SWMM output to its input parameters. A global parameter sensitivity analysis is conducted in order to determine which parameters mostly affect the model simulation results. Two different methods of sensitivity analysis are applied in this study. The first one is the partial rank correlation coefficient (PRCC which measures nonlinear but monotonic relationships between model inputs and outputs. The second one is based on the mutual information which provides a general measure of the strength of the non-monotonic association between two variables. Both methods are based on the Latin Hypercube Sampling (LHS of the parameter space, and thus the same datasets can be used to obtain both measures of sensitivity. The utility of the PRCC and the mutual information analysis methods are illustrated by analyzing a complex SWMM model. The sensitivity analysis revealed that only a few key input variables are contributing significantly to the model outputs; PRCCs and mutual information are calculated and used to determine and rank the importance of these key parameters. This study shows that the partial rank correlation coefficient and mutual information analysis can be considered effective methods for assessing the sensitivity of the SWMM model to the uncertainty in its input parameters.

  11. Building Information Modeling (BIM) for Indoor Environmental Performance Analysis

    DEFF Research Database (Denmark)

    The report is a part of a research assignment carried out by students in the 5ETCS course “Project Byggeri – [entitled as: Building Information Modeling (BIM) – Modeling & Analysis]”, during the 3rd semester of master degree in Civil and Architectural Engineering, Department of Engineering, Aarhus...... University. This includes seven papers describing BIM for Sustainability, concentrating specifically on individual topics regarding to Indoor Environment Performance Analysis....

  12. THE END OF TRANSGENIC FOOD LABELING AND THE RIGHT TO INFORMATION CONSERVED BY THE CONSUMER DEFENSE CODE IN THE LIGHT OF THE FEDERAL CONSTITUTION OF 1988

    Directory of Open Access Journals (Sweden)

    Ingrid Lima Barbosa

    2018-03-01

    Full Text Available Bill No. 4.148/08 intends to eliminate the requirement for the “T” symbol in the packaging of products containing more than one percent of GMOs in its composition, due to the alleged negative charge that it presents, going against what is advocated by the Biosafety Law, the Consumer Defense Code, as well as the Federal Constitution. Thus, the objective is to analyze the consequences to consumers, in case the bill is eventually sanctioned, as well as if there is an affront to the fundamental precepts listed in the Magna Carta and other legal diplomas, through the inductive method of research supported by the bibliographic collection available. It was concluded that, in addition to confronting the provisions of the Consumer Defense Code, there is also a violation of the Cartagena Protocol on Biosafety, as well as the material unconstitutionality of Bill No. 4.148/08, resulting from the affront to articles 5, XIV and XXXII, and 170, V of the Constitution.

  13. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    Science.gov (United States)

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  14. Market Research Gathering Information About Commercial Products and Services

    National Research Council Canada - National Science Library

    1997-01-01

    DoD 5000.2-R, Mandatory Procedures for Major Defense Acquisition Programs and Major Automated Information System Acquisition Programs, requires that market research and analysis be conducted to determine...

  15. Performation Metrics Development Analysis for Information and Communications Technology Outsourcing: A Case Study

    Science.gov (United States)

    Travis, James L., III

    2014-01-01

    This study investigated how and to what extent the development and use of the OV-5a operational architecture decomposition tree (OADT) from the Department of Defense (DoD) Architecture Framework (DoDAF) affects requirements analysis with respect to complete performance metrics for performance-based services acquisition of ICT under rigid…

  16. Information Systems Security Job Advertisement Analysis: Skills Review and Implications for Information Systems Curriculum

    Science.gov (United States)

    Brooks, Nita G.; Greer, Timothy H.; Morris, Steven A.

    2018-01-01

    The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification…

  17. A Distributed Flocking Approach for Information Stream Clustering Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2006-01-01

    Intelligence analysts are currently overwhelmed with the amount of information streams generated everyday. There is a lack of comprehensive tool that can real-time analyze the information streams. Document clustering analysis plays an important role in improving the accuracy of information retrieval. However, most clustering technologies can only be applied for analyzing the static document collection because they normally require a large amount of computation resource and long time to get accurate result. It is very difficult to cluster a dynamic changed text information streams on an individual computer. Our early research has resulted in a dynamic reactive flock clustering algorithm which can continually refine the clustering result and quickly react to the change of document contents. This character makes the algorithm suitable for cluster analyzing dynamic changed document information, such as text information stream. Because of the decentralized character of this algorithm, a distributed approach is a very natural way to increase the clustering speed of the algorithm. In this paper, we present a distributed multi-agent flocking approach for the text information stream clustering and discuss the decentralized architectures and communication schemes for load balance and status information synchronization in this approach.

  18. HJD-I record and analysis meter for nuclear information

    International Nuclear Information System (INIS)

    Di Shaoliang; Huang Yong; Xiao Yanbin

    1992-01-01

    A low-cost, small-volume, multi-function and new model intelligent nuclear electronic meter HJD-I Record and Analysis Meter are stated for Nuclear Information. It's hardware and software were detailed and the 137 Cs spectrum with this meter was presented

  19. Informational-computer system for the neutron spectra analysis

    International Nuclear Information System (INIS)

    Berzonis, M.A.; Bondars, H.Ya.; Lapenas, A.A.

    1979-01-01

    In this article basic principles of the build-up of the informational-computer system for the neutron spectra analysis on a basis of measured reaction rates are given. The basic data files of the system, needed software and hardware for the system operation are described

  20. Scientific Information Analysis of Chemistry Dissertations Using Thesaurus of Chemistry

    Directory of Open Access Journals (Sweden)

    Taghi Rajabi

    2017-09-01

    Full Text Available : Concept maps of chemistry can be obtained from thesaurus of chemistry. Analysis of information in the field of chemistry is done at graduate level, based on comparing and analyzing chemistry dissertations by using these maps. Therefore, the use of thesaurus for analyzing scientific information is recommended. Major advantage of using this method, is that it is possible to obtain a detailed map of all academic researches across all branches of science. The researches analysis results in chemical science can play a key role in developing strategic research policies, educational programming, linking universities to industries and postgraduate educational programming. This paper will first introduce the concept maps of chemistry. Then, emerging patterns from the concept maps of chemistry will be used to analyze the trend in the academic dissertations in chemistry, using the data collected and stored in our database at Iranian Research Institute for Information Science and Technology (IranDoc over the past 10 years (1998-2009.

  1. Information theoretic analysis of canny edge detection in visual communication

    Science.gov (United States)

    Jiang, Bo; Rahman, Zia-ur

    2011-06-01

    In general edge detection evaluation, the edge detectors are examined, analyzed, and compared either visually or with a metric for specific an application. This analysis is usually independent of the characteristics of the image-gathering, transmission and display processes that do impact the quality of the acquired image and thus, the resulting edge image. We propose a new information theoretic analysis of edge detection that unites the different components of the visual communication channel and assesses edge detection algorithms in an integrated manner based on Shannon's information theory. The edge detection algorithm here is considered to achieve high performance only if the information rate from the scene to the edge approaches the maximum possible. Thus, by setting initial conditions of the visual communication system as constant, different edge detection algorithms could be evaluated. This analysis is normally limited to linear shift-invariant filters so in order to examine the Canny edge operator in our proposed system, we need to estimate its "power spectral density" (PSD). Since the Canny operator is non-linear and shift variant, we perform the estimation for a set of different system environment conditions using simulations. In our paper we will first introduce the PSD of the Canny operator for a range of system parameters. Then, using the estimated PSD, we will assess the Canny operator using information theoretic analysis. The information-theoretic metric is also used to compare the performance of the Canny operator with other edge-detection operators. This also provides a simple tool for selecting appropriate edgedetection algorithms based on system parameters, and for adjusting their parameters to maximize information throughput.

  2. Regional Analysis of Remote Sensing Based Evapotranspiration Information

    Science.gov (United States)

    Geli, H. M. E.; Hain, C.; Anderson, M. C.; Senay, G. B.

    2017-12-01

    Recent research findings on modeling actual evapotranspiration (ET) using remote sensing data and methods have proven the ability of these methods to address wide range of hydrological and water resources issues including river basin water balance for improved water resources management, drought monitoring, drought impact and socioeconomic responses, agricultural water management, optimization of land-use for water conservations, water allocation agreement among others. However, there is still a critical need to identify appropriate type of ET information that can address each of these issues. The current trend of increasing demand for water due to population growth coupled with variable and limited water supply due to drought especially in arid and semiarid regions with limited water supply have highlighted the need for such information. To properly address these issues different spatial and temporal resolutions of ET information will need to be used. For example, agricultural water management applications require ET information at field (30-m) and daily time scales while for river basin hydrologic analysis relatively coarser spatial and temporal scales can be adequate for such regional applications. The objective of this analysis is to evaluate the potential of using an integrated ET information that can be used to address some of these issues collectively. This analysis will highlight efforts to address some of the issues that are applicable to New Mexico including assessment of statewide water budget as well as drought impact and socioeconomic responses which all require ET information but at different spatial and temporal scales. This analysis will provide an evaluation of four remote sensing based ET models including ALEXI, DisALEXI, SSEBop, and SEBAL3.0. The models will be compared with ground-based observations from eddy covariance towers and water balance calculations. Remote sensing data from Landsat, MODIS, and VIIRS sensors will be used to provide ET

  3. Environmental Quality Information Analysis Center multi-year plan

    International Nuclear Information System (INIS)

    Rivera, R.G.; Das, S.; Walsh, T.E.

    1992-09-01

    An information analysis center (IAC) is a federal resource that provides technical information for a specific technology field. An IAC links an expert technical staff with an experienced information specialist group, supported by in-house or external data bases to provide technical information and maintain a corporate knowledge in a technical area. An IAC promotes the rapid transfer of technology among its users and provides assistance in adopting new technology and predicting and assessing emerging technology. This document outlines the concept, requirements, and proposed development of an Environmental Quality IAC (EQIAC). An EQIAC network is composed of several nodes, each of which has specific technology capabilities. This document outlines strategic and operational objectives for the phased development of one such node of an EQIAC network

  4. Analysis of defense signals in Arabidopsis thaliana leaves by ultra-performance liquid chromatography/tandem mass spectrometry: jasmonates, salicylic acid, abscisic acid.

    Science.gov (United States)

    Stingl, Nadja; Krischke, Markus; Fekete, Agnes; Mueller, Martin J

    2013-01-01

    Defense signaling compounds and phytohormones play an essential role in the regulation of plant responses to various environmental abiotic and biotic stresses. Among the most severe stresses are herbivory, pathogen infection, and drought stress. The major hormones involved in the regulation of these responses are 12-oxo-phytodienoic acid (OPDA), the pro-hormone jasmonic acid (JA) and its biologically active isoleucine conjugate (JA-Ile), salicylic acid (SA), and abscisic acid (ABA). These signaling compounds are present and biologically active at very low concentrations from ng/g to μg/g dry weight. Accurate and sensitive quantification of these signals has made a significant contribution to the understanding of plant stress responses. Ultra-performance liquid chromatography (UPLC) coupled with a tandem quadrupole mass spectrometer (MS/MS) has become an essential technique for the analysis and quantification of these compounds.

  5. Imaging for dismantlement verification: Information management and analysis algorithms

    International Nuclear Information System (INIS)

    Robinson, S.M.; Jarman, K.D.; Pitts, W.K.; Seifert, A.; Misner, A.C.; Woodring, M.L.; Myjak, M.J.

    2012-01-01

    The level of detail discernible in imaging techniques has generally excluded them from consideration as verification tools in inspection regimes. An image will almost certainly contain highly sensitive information, and storing a comparison image will almost certainly violate a cardinal principle of information barriers: that no sensitive information be stored in the system. To overcome this problem, some features of the image might be reduced to a few parameters suitable for definition as an attribute, which must be non-sensitive to be acceptable in an Information Barrier regime. However, this process must be performed with care. Features like the perimeter, area, and intensity of an object, for example, might reveal sensitive information. Any data-reduction technique must provide sufficient information to discriminate a real object from a spoofed or incorrect one, while avoiding disclosure (or storage) of any sensitive object qualities. Ultimately, algorithms are intended to provide only a yes/no response verifying the presence of features in the image. We discuss the utility of imaging for arms control applications and present three image-based verification algorithms in this context. The algorithms reduce full image information to non-sensitive feature information, in a process that is intended to enable verification while eliminating the possibility of image reconstruction. The underlying images can be highly detailed, since they are dynamically generated behind an information barrier. We consider the use of active (conventional) radiography alone and in tandem with passive (auto) radiography. We study these algorithms in terms of technical performance in image analysis and application to an information barrier scheme.

  6. Analysis of Emergency Information Management Research Hotspots Based on Bibliometric and Co-occurrence Analysis

    Directory of Open Access Journals (Sweden)

    Zou Qingyun

    2017-04-01

    Full Text Available [Purpose/significance] Emergency information management is an interdisciplinary field of emergency management and information management. Summarizing the major research output is helpful to strengthen the effective utilization of information resources in emergency management research, and to provide references for the follow-up development and practical exploration of emergency information management research. [Method/process] By retrieving concerned literature from CNKI, this paper used the bibliometric and co-word clustering analysis methods to analyze the domestic emergency management research output. [Result/conclusion] Domestic emergency information management research mainly focuses on five hot topics: disaster emergency information management, crisis information disclosure, emergency information management system, emergency response, wisdom emergency management. China should strengthen the emergency management information base for future theoretical research, and build the emergency information management theoretical framework.

  7. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  8. Transforming the Force: A Comparative Analysis of the Department of Defense's (DOD's) Enterprise Resource Planning (ERP) Systems

    National Research Council Canada - National Science Library

    Hill, Charles W

    2007-01-01

    Automated Information Systems (AIS) are Software systems that support administrative functions, such as accounting, payroll, finance, personnel, inventory control, logistics, and equipment and maintenance scheduling...

  9. IMMAN: free software for information theory-based chemometric analysis.

    Science.gov (United States)

    Urias, Ricardo W Pino; Barigye, Stephen J; Marrero-Ponce, Yovani; García-Jacas, César R; Valdes-Martiní, José R; Perez-Gimenez, Facundo

    2015-05-01

    The features and theoretical background of a new and free computational program for chemometric analysis denominated IMMAN (acronym for Information theory-based CheMoMetrics ANalysis) are presented. This is multi-platform software developed in the Java programming language, designed with a remarkably user-friendly graphical interface for the computation of a collection of information-theoretic functions adapted for rank-based unsupervised and supervised feature selection tasks. A total of 20 feature selection parameters are presented, with the unsupervised and supervised frameworks represented by 10 approaches in each case. Several information-theoretic parameters traditionally used as molecular descriptors (MDs) are adapted for use as unsupervised rank-based feature selection methods. On the other hand, a generalization scheme for the previously defined differential Shannon's entropy is discussed, as well as the introduction of Jeffreys information measure for supervised feature selection. Moreover, well-known information-theoretic feature selection parameters, such as information gain, gain ratio, and symmetrical uncertainty are incorporated to the IMMAN software ( http://mobiosd-hub.com/imman-soft/ ), following an equal-interval discretization approach. IMMAN offers data pre-processing functionalities, such as missing values processing, dataset partitioning, and browsing. Moreover, single parameter or ensemble (multi-criteria) ranking options are provided. Consequently, this software is suitable for tasks like dimensionality reduction, feature ranking, as well as comparative diversity analysis of data matrices. Simple examples of applications performed with this program are presented. A comparative study between IMMAN and WEKA feature selection tools using the Arcene dataset was performed, demonstrating similar behavior. In addition, it is revealed that the use of IMMAN unsupervised feature selection methods improves the performance of both IMMAN and WEKA

  10. Information-seeking at a caregiving website: a qualitative analysis.

    Science.gov (United States)

    Kernisan, Leslie P; Sudore, Rebecca L; Knight, Sara J

    2010-07-28

    The Internet is widely used for health information, yet little is known about the online activity of family caregivers of elders, a rapidly growing group. In order to better understand the online information-seeking activity of "e-caregivers" and other visitors at a caregiving website, we undertook a qualitative analysis of survey data from a website marketed as a comprehensive resource for adults caring for aging parents. The objectives were to better understand what types of information are sought by those visiting a website focused on elder-care issues and to identify overarching themes that might inform future development of Internet resources related to caregiving and aging. From March 2008 to March 2009, a 5-question pop-up survey was offered 9662 times and completed 2161 times. For 1838 respondents, included was a free text answer to the question "What were you looking for?" and 1467 offered relevant and detailed responses. The survey also asked about satisfaction with the site, gender of the respondent, and relationship to the individual being cared for. Content analysis was used to develop a coding dictionary, to code responses into information-seeking categories, and to identify overarching themes. Of the respondents (76% of whom were female), 50% indicated they were caring for parents, 17% for themselves only, and 31% for others. Over half (57%) reported finding what they were looking for, and 46% stated they were extremely likely to recommend the website. Frequently mentioned information-seeking categories included "health information," "practical caregiving," and "support." Respondents also requested information related to housing, legal, insurance, and financial issues. Many responses referred to multiple comorbid conditions and complex caregiving situations. Overarching themes included (1) a desire for assistance with a wide range of practical skills and information and (2) help interpreting symptoms and behavior, such as knowing what life impacts to

  11. Implantation of a safety management system information under the ISO 27001: risk analysis information

    Directory of Open Access Journals (Sweden)

    José Gregorio Arévalo Ascanio

    2015-11-01

    Full Text Available In this article the structure of the business of the city of Ocaña is explored with the aim of expanding the information and knowledge of the main variables of the productive activity of the municipality, its entrepreneurial spirit, technological development and productive structure. For this, a descriptive research was performed to identify economic activity in its various forms and promote the implementation of administrative practices consistent with national and international references.The results allowed to establish business weaknesses, including information, which once identified are used to design spaces training, acquisition of abilities and employers management practices in consistent with the challenges of competitiveness and stay on the market.As of the results was collected information regarding technological component companies of the productive fabric of the city, for which the application of tools for the analysis of information systems is proposed using the ISO 27001: 2005, using most appropriate technologies to study organizations that protect their most important asset information: information.

  12. Health information systems in Africa: descriptive analysis of data sources, information products and health statistics.

    Science.gov (United States)

    Mbondji, Peter Ebongue; Kebede, Derege; Soumbey-Alley, Edoh William; Zielinski, Chris; Kouvividila, Wenceslas; Lusamba-Dikassa, Paul-Samson

    2014-05-01

    To identify key data sources of health information and describe their availability in countries of the World Health Organization (WHO) African Region. An analytical review on the availability and quality of health information data sources in countries; from experience, observations, literature and contributions from countries. Forty-six Member States of the WHO African Region. No participants. The state of data sources, including censuses, surveys, vital registration and health care facility-based sources. In almost all countries of the Region, there is a heavy reliance on household surveys for most indicators, with more than 121 household surveys having been conducted in the Region since 2000. Few countries have civil registration systems that permit adequate and regular tracking of mortality and causes of death. Demographic surveillance sites function in several countries, but the data generated are not integrated into the national health information system because of concerns about representativeness. Health management information systems generate considerable data, but the information is rarely used because of concerns about bias, quality and timeliness. To date, 43 countries in the Region have initiated Integrated Disease Surveillance and Response. A multitude of data sources are used to track progress towards health-related goals in the Region, with heavy reliance on household surveys for most indicators. Countries need to develop comprehensive national plans for health information that address the full range of data needs and data sources and that include provision for building national capacities for data generation, analysis, dissemination and use. © The Royal Society of Medicine.

  13. Activation Analysis. Proceedings of an Informal Study Group Meeting

    International Nuclear Information System (INIS)

    1971-01-01

    As part of its programme to promote the exchange of information relating to nuclear science and technology, the International Atomic Energy Agency convened in Bangkok, Thailand, from 6-8 July 1970, an informal meeting to discuss the topic of Activation Analysis. The meeting was attended by participants drawn from the following countries: Australia, Burma, Ceylon, Republic of China, India, Indonesia, Prance, Japan, Republic of Korea, New Zealand, Philippines, Singapore, Thailand, United States of America and Vietnam. The proceedings consist of the contributions presented at the meeting with minor editorial changes

  14. Activation Analysis. Proceedings of an Informal Study Group Meeting

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1971-07-01

    As part of its programme to promote the exchange of information relating to nuclear science and technology, the International Atomic Energy Agency convened in Bangkok, Thailand, from 6-8 July 1970, an informal meeting to discuss the topic of Activation Analysis. The meeting was attended by participants drawn from the following countries: Australia, Burma, Ceylon, Republic of China, India, Indonesia, Prance, Japan, Republic of Korea, New Zealand, Philippines, Singapore, Thailand, United States of America and Vietnam. The proceedings consist of the contributions presented at the meeting with minor editorial changes.

  15. Food labelled Information: An Empirical Analysis of Consumer Preferences

    Directory of Open Access Journals (Sweden)

    Alessandro Banterle

    2012-12-01

    Full Text Available This paper aims at analysing which kinds of currently labelled information are of interest and actually used by consumers, and which additional kinds could improve consumer choices. We investigate the attitude of consumers with respect to innovative strategies for the diffusion of product information, as smart-labels for mobile-phones. The empirical analysis was organised in focus groups followed by a survey on 240 consumers. Results show that the most important nutritional claims are vitamins, energy and fat content. Consumers show a high interest in the origin of the products, GMOs, environmental impact, animal welfare and type of breeding.

  16. Intelligent Data Analysis in the EMERCOM Information System

    Science.gov (United States)

    Elena, Sharafutdinova; Tatiana, Avdeenko; Bakaev, Maxim

    2017-01-01

    The paper describes an information system development project for the Russian Ministry of Emergency Situations (MES, whose international operations body is known as EMERCOM), which was attended by the representatives of both the IT industry and the academia. Besides the general description of the system, we put forward OLAP and Data Mining-based approaches towards the intelligent analysis of the data accumulated in the database. In particular, some operational OLAP reports and an example of multi-dimensional information space based on OLAP Data Warehouse are presented. Finally, we outline Data Mining application to support decision-making regarding security inspections planning and results consideration.

  17. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  18. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  19. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  20. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. PACC information management code for common cause failures analysis

    International Nuclear Information System (INIS)

    Ortega Prieto, P.; Garcia Gay, J.; Mira McWilliams, J.

    1987-01-01

    The purpose of this paper is to present the PACC code, which, through an adequate data management, makes the task of computerized common-mode failure analysis easier. PACC processes and generates information in order to carry out the corresponding qualitative analysis, by means of the boolean technique of transformation of variables, and the quantitative analysis either using one of several parametric methods or a direct data-base. As far as the qualitative analysis is concerned, the code creates several functional forms for the transformation equations according to the user's choice. These equations are subsequently processed by boolean manipulation codes, such as SETS. The quantitative calculations of the code can be carried out in two different ways: either starting from a common cause data-base, or through parametric methods, such as the Binomial Failure Rate Method, the Basic Parameters Method or the Multiple Greek Letter Method, among others. (orig.)

  2. Investigation Into Informational Compatibility Of Building Information Modelling And Building Performance Analysis Software Solutions

    OpenAIRE

    Hyun, S.; Marjanovic-Halburd, L.; Raslan, R.

    2015-01-01

    There are significant opportunities for Building Information Modelling (BIM) to address issues related to sustainable and energy efficient building design. While the potential benefits associated with the integration of BIM and BPA (Building Performance Analysis) have been recognised, its specifications and formats remain in their early infancy and often fail to live up to the promise of seamless interoperability at various stages of design process. This paper conducts a case study to investi...

  3. Information Retrieval and Graph Analysis Approaches for Book Recommendation.

    Science.gov (United States)

    Benkoussas, Chahinez; Bellot, Patrice

    2015-01-01

    A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model) and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval approach to related document network comprised of social links. We called Directed Graph of Documents (DGD) a network constructed with documents and social information provided from each one of them. Specifically, this work tackles the problem of book recommendation in the context of INEX (Initiative for the Evaluation of XML retrieval) Social Book Search track. A series of reranking experiments demonstrate that combining retrieval models yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments.

  4. Information technology portfolio in supply chain management using factor analysis

    Directory of Open Access Journals (Sweden)

    Ahmad Jaafarnejad

    2013-11-01

    Full Text Available The adoption of information technology (IT along with supply chain management (SCM has become increasingly a necessity among most businesses. This enhances supply chain (SC performance and helps companies achieve the organizational competitiveness. IT systems capture and analyze information and enable management to make decisions by considering a global scope across the entire SC. This paper reviews the existing literature on IT in SCM and considers pertinent criteria. Using principal component analysis (PCA of factor analysis (FA, a number of related criteria are divided into smaller groups. Finally, SC managers can develop an IT portfolio in SCM using mean values of few extracted components on the relevance –emergency matrix. A numerical example is provided to explain details of the proposed method.

  5. Geriatric information analysis of the molecular properties of mexidole

    Directory of Open Access Journals (Sweden)

    O. A. Gromova

    2017-01-01

    Full Text Available Objective: by using the pharmacoinformation profiling, to comprehensively assess all possible effects of the molecules of mexidol, choline alfoscerate, piracetam, glycine, and semax in accordance with the anatomical therapeutic and chemical (ATC classification system.Material and methods. Chemoreactomic, pharmacoinformation, and geriatric information analyses of the properties of the molecules are based on chemoreactomic methodology. The chemoreactomic analysis uses the information from the PubChem, HMDB, and String databases; the pharmacoinformation analysis applies the information from the international ATC classification and a combined sample of data from the Therapeutic Target Database (TTD, SuperTarget, Manually Annotated Targets and Drugs Online Resource (MATADOR, and Potential Drug Target Database (PDTD; geriatric information analysis employs the data on the geroprotective effect of individual substances from the PubChem database and the data available in the literature data on geroprotection from the PubMed database, which have been collected through the artificial intelligence system.Results and discussion. Mexidol is characterized by the maximum set of positive effects (the drug is used to treat CNS and cardiovascular diseases and metabolic disorders and has anti-inflammatory and anti-infective properties, etc.. Mexidol and glycine are predicted to cause the lowest frequency of adverse reactions, such as itching, constipation, paresthesia, vomiting, etc. Geriatric information assessments of changes in the life span of model organisms have shown that mexidol contributes to the higher life expectancy of C. elegans (by 22.7±10%, Drosophila (by 14.4±15%, and mice (by 14.6±3%; the control drugs do by no more than 6.1%.Conclusion. The results of the study indicate that mexidol has a high potential to be used as a geroprotector.

  6. Analysis of the association between isokinetic knee strength with offensive and defensive jumping capacity in high-level female volleyball athletes.

    Science.gov (United States)

    Sattler, Tine; Sekulic, Damir; Esco, Michael R; Mahmutovic, Ifet; Hadzic, Vedran

    2015-09-01

    Isokinetic-knee-strength was hypothesized to be an important factor related to jumping performance. However, studies examining this relation among elite female athletes and sport-specific jumps are lacking. This investigation determined the influence of isokinetic-knee flexor/extensor strength measures on spike-jump (offensive) and block-jump (defensive) performance among high-level female volleyball players. Cross-sectional laboratory study. Eighty-two female volleyball athletes (age = 21.3 ± 3.8 years, height = 175.4 ± 6.76 cm, and weight = 68.29 ± 8.53 kg) volunteered to participate in this study. The studied variables included spike-jump and block-jump performance and a set of isokinetic tests to evaluate the eccentric and concentric strength capacities of the knee extensors (quadriceps - Q), and flexors (hamstring - H) for both legs. Both jumping tests showed high intra-session reliability (ICC of 0.87 and 0.95 for spike-jump and block-jump, respectively). The athletes were clustered into three achievement-groups based on their spike-jump and block-jump performances. For the block-jump, ANOVA identified significant differences between achievement-groups for all isokinetic variables except the Right-Q-Eccentric-Strength. When observed for spike-jump, achievement-groups differed significantly in all tests but Right-H-Concentric-Strength. Discriminant canonical analysis showed that the isokinetic-strength variables were more associated with block-jump then spike-jump-performance. The eccentric isokinetic measures were relatively less important determinants of block-jump than for the spike-jump performance. Data support the hypothesis of the importance of isokinetic strength measures for the expression of rapid muscular performance in volleyball. The results point to the necessity of the differential approach in sport training for defensive and offensive duties. Copyright © 2014 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  7. Topical report on release scenario analysis of long-term management of high-level defense waste at the Hanford Site

    International Nuclear Information System (INIS)

    Wallace, R.W.; Landstrom, D.K.; Blair, S.C.; Howes, B.W.; Robkin, M.A.; Benson, G.L.; Reisenauer, A.E.; Walters, W.H.; Zimmerman, M.G.

    1980-11-01

    Potential release scenarios for the defense high-level waste (HLW) on the Hanford Site are presented. Presented in this report are the three components necessary for evaluating the various alternatives under consideration for long-term management of Hanford defense HLW: identification of scenarios and events which might directly or indirectly disrupt radionuclide containment barriers; geotransport calculations of waste migration through the site media; and consequence (dose) analyses based on groundwater and air pathways calculations. The scenarios described in this report provide the necessary parameters for radionuclide transport and consequence analysis. Scenarios are categorized as either bounding or nonbounding. Bounding scenarios consider worst case or what if situations where an actual and significant release of waste material to the environment would happen if the scenario were to occur. Bounding scenarios include both near-term and long-term scenarios. Near-term scenarios are events which occur at 100 years from 1990. Long term scenarios are potential events considered to occur at 1000 and 10,000 years from 1990. Nonbounding scenarios consider events which result in insignificant releases or no release at all to the environment. Three release mechanisms are described in this report: (1) direct exposure of waste to the biosphere by a defined sequence of events (scenario) such as human intrusion by drilling; (2) radionuclides contacting an unconfined aquifer through downward percolation of groundwater or a rising water table; and (3) cataclysmic or explosive release of radionuclides by such mechanisms as meteorite impact, fire and explosion, criticality, or seismic events. Scenarios in this report present ways in which these release mechanisms could occur at a waste management facility. The scenarios are applied to the two in-tank waste management alternatives: in-situ disposal and continued present action

  8. Information Retrieval and Graph Analysis Approaches for Book Recommendation

    OpenAIRE

    Chahinez Benkoussas; Patrice Bellot

    2015-01-01

    A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model) and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval ...

  9. Formal Concept Analysis and Information Retrieval – A Survey

    OpenAIRE

    Codocedo , Victor; Napoli , Amedeo

    2015-01-01

    International audience; One of the first models to be proposed as a document index for retrieval purposes was a lattice structure, decades before the introduction of Formal Concept Analysis. Nevertheless, the main notions that we consider so familiar within the community (" extension " , " intension " , " closure operators " , " order ") were already an important part of it. In the '90s, as FCA was starting to settle as an epistemic community, lattice-based Information Retrieval (IR) systems ...

  10. Crime Mapping and Geographical Information Systems in Crime Analysis

    OpenAIRE

    Dağlar, Murat; Argun, Uğur

    2016-01-01

    As essential apparatus in crime analysis, crime mapping and Geographical Information Systems (GIS) are being progressively more accepted by police agencies. Development in technology and the accessibility of geographic data sources make it feasible for police departments to use GIS and crime mapping. GIS and crime mapping can be utilized as devices to discover reasons contributing to crime, and hence let law enforcement agencies proactively take action against the crime problems before they b...

  11. Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy

    Science.gov (United States)

    2016-12-01

    by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is...Office of the Secretary of Defense asked RAND to take a closer look at several key sources of inefficiency by evaluating how marking and labeling CUI...ability of data users to properly identify, label, and, if needed, challenge improperly marked data. Identifying which unclassified but potentially

  12. 32 CFR 285.5 - Information requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Information requirements. 285.5 Section 285.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DOD FREEDOM OF INFORMATION ACT (FOIA) PROGRAM § 285.5 Information...

  13. Information theoretic analysis of edge detection in visual communication

    Science.gov (United States)

    Jiang, Bo; Rahman, Zia-ur

    2010-08-01

    Generally, the designs of digital image processing algorithms and image gathering devices remain separate. Consequently, the performance of digital image processing algorithms is evaluated without taking into account the artifacts introduced into the process by the image gathering process. However, experiments show that the image gathering process profoundly impacts the performance of digital image processing and the quality of the resulting images. Huck et al. proposed one definitive theoretic analysis of visual communication channels, where the different parts, such as image gathering, processing, and display, are assessed in an integrated manner using Shannon's information theory. In this paper, we perform an end-to-end information theory based system analysis to assess edge detection methods. We evaluate the performance of the different algorithms as a function of the characteristics of the scene, and the parameters, such as sampling, additive noise etc., that define the image gathering system. The edge detection algorithm is regarded to have high performance only if the information rate from the scene to the edge approaches the maximum possible. This goal can be achieved only by jointly optimizing all processes. People generally use subjective judgment to compare different edge detection methods. There is not a common tool that can be used to evaluate the performance of the different algorithms, and to give people a guide for selecting the best algorithm for a given system or scene. Our information-theoretic assessment becomes this new tool to which allows us to compare the different edge detection operators in a common environment.

  14. Carbon Dioxide Information Analysis Center: FY 1991 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M.; Stoss, F.W.

    1992-06-01

    During the course of a fiscal year, Oak Ridge National Laboratory`s Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specially publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIAC`s staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC`s staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1990 to September 30, 1991. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC`s response to those inquiries. An analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, factsheets, specially publications, and reprints is provided. Comments and descriptions of CDIAC`s information management systems, professional networking, and special bilateral agreements are also described.

  15. Carbon Dioxide Information Analysis Center: FY 1991 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M.; Stoss, F.W.

    1992-06-01

    During the course of a fiscal year, Oak Ridge National Laboratory's Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specially publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIAC's staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC's staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1990 to September 30, 1991. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC's response to those inquiries. An analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, factsheets, specially publications, and reprints is provided. Comments and descriptions of CDIAC's information management systems, professional networking, and special bilateral agreements are also described.

  16. Carbon Dioxide Information Analysis Center: FY 1992 activities

    Energy Technology Data Exchange (ETDEWEB)

    Cushman, R.M. [Oak Ridge National Lab., TN (United States). Carbon Dioxide Information Analysis Center; Stoss, F.W. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center

    1993-03-01

    During the course of a fiscal year, Oak Ridge National Laboratory`s Carbon Dioxide Information Analysis Center (CDIAC) distributes thousands of specialty publications-numeric data packages (NDPs), computer model packages (CMPs), technical reports, public communication publications, newsletters, article reprints, and reference books-in response to requests for information related to global environmental issues, primarily those pertaining to climate change. CDIACs staff also provides technical responses to specific inquiries related to carbon dioxide (CO{sub 2}), other trace gases, and climate. Hundreds of referrals to other researchers, policy analysts, information specialists, or organizations are also facilitated by CDIAC`s staff. This report provides an account of the activities accomplished by CDIAC during the period October 1, 1991 to September 30, 1992. An organizational overview of CDIAC and its staff is supplemented by a detailed description of inquiries received and CDIAC`s response to those inquiries. As analysis and description of the preparation and distribution of numeric data packages, computer model packages, technical reports, newsletters, fact sheets, specialty publications, and reprints is provided. Comments and descriptions of CDIAC`s information management systems, professional networking, and special bilateral agreements are also described.

  17. Structured information analysis for human reliability analysis of emergency tasks in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Won Dea; Kim, Jae Whan; Park, Jin Kyun; Ha, Jae Joo [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2000-02-01

    More than twenty HRA (Human Reliability Analysis) methodologies have been developed and used for the safety analysis in nuclear field during the past two decades. However, no methodology appears to have universally been accepted, as various limitations have been raised for more widely used ones. One of the most important limitations of conventional HRA is insufficient analysis of the task structure and problem space. To resolve this problem, we suggest SIA (Structured Information Analysis) for HRA. The proposed SIA consists of three parts. The first part is the scenario analysis that investigates the contextual information related to the given task on the basis of selected scenarios. The second is the goals-means analysis to define the relations between the cognitive goal and task steps. The third is the cognitive function analysis module that identifies the cognitive patterns and information flows involved in the task. Through the three-part analysis, systematic investigation is made possible from the macroscopic information on the tasks to the microscopic information on the specific cognitive processes. It is expected that analysts can attain a structured set of information that helps to predict the types and possibility of human error in the given task. 48 refs., 12 figs., 11 tabs. (Author)

  18. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  19. Integrated information system for analysis of nuclear power plants

    International Nuclear Information System (INIS)

    Galperin, A.

    1994-01-01

    Performing complicated engineering analyses of a nuclear power plant requires storage and manipulation of a large amount of information, both data and knowledge. This information is characterized by its multidisciplinary nature, complexity, and diversity. The problems caused by inefficient and lengthy manual operations involving the data flow management within the frame-work of the safety-related analysis of a power plant can be solved by applying the computer aided engineering principles. These principles are the basis of the design of an integrated information storage system (IRIS). The basic idea is to create a computerized environment, which includes both database and functional capabilities. Consideration and analysis of the data types and required data manipulation capabilities as well as operational requirements, resulted in the choice of an object-oriented data-base management system (OODBMS) as a development platform for solving the software engineering problems. Several advantages of OODBMSs over conventional relations database systems were found of crucial importance, especially providing the necessary flexibility for different data types and extensibility potential. A detailed design of a data model is produced for the plant technical data and for the storage of analysis results. The overall system architecture was designed to assure the feasibility of integrating database capabilities with procedures and functions written in conventional algorithmic programming languages

  20. [Analysis of utilization of information in the journal Medicina Clinica].

    Science.gov (United States)

    Aleixandre, R; Giménez Sánchez, J V; Terrada, M L; López Piñero, J M

    1994-09-10

    Scientific communication knowledge is specifically based in the analysis of the bibliographic references inside the publications. Pattern and laws determining the information consumption in the items of the journal Medicina Clinica are investigated in the present study as its own aim. An analysis was performed on the 13,286 references downloaded from 618 papers published by the journal in 1990. With dBASE IV was generated a database for the management of the information; data was distributed in several tables through criteria of age, documentary types, countries, journals and Bradford zones. The analysed references belong to 1,241 different journals, 110 from Spain. Being two thirds of the total sum, the publications from United States and United Kingdom have received more citations than those from Spain. The publications from european countries, like France, Germany and Italy, are scarcely present. Bradford core is constituted by the journals Medicina Clinica and The Lancet. The analysis of the bibliographic references available from the articles in this journal is able to produce knowledge on the information consumption by the practitioners; its usefulness as a complementary utility to the Indice de Citas e Indicadores Bibliométricos de Revistas Españolas de Medicina Interna y sus especialidades 1990 must be considered.

  1. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  2. A qualitative content analysis of global health engagements in Peacekeeping and Stability Operations Institute's stability operations lessons learned and information management system.

    Science.gov (United States)

    Nang, Roberto N; Monahan, Felicia; Diehl, Glendon B; French, Daniel

    2015-04-01

    Many institutions collect reports in databases to make important lessons-learned available to their members. The Uniformed Services University of the Health Sciences collaborated with the Peacekeeping and Stability Operations Institute to conduct a descriptive and qualitative analysis of global health engagements (GHEs) contained in the Stability Operations Lessons Learned and Information Management System (SOLLIMS). This study used a summative qualitative content analysis approach involving six steps: (1) a comprehensive search; (2) two-stage reading and screening process to identify first-hand, health-related records; (3) qualitative and quantitative data analysis using MAXQDA, a software program; (4) a word cloud to illustrate word frequencies and interrelationships; (5) coding of individual themes and validation of the coding scheme; and (6) identification of relationships in the data and overarching lessons-learned. The individual codes with the most number of text segments coded included: planning, personnel, interorganizational coordination, communication/information sharing, and resources/supplies. When compared to the Department of Defense's (DoD's) evolving GHE principles and capabilities, the SOLLIMS coding scheme appeared to align well with the list of GHE capabilities developed by the Department of Defense Global Health Working Group. The results of this study will inform practitioners of global health and encourage additional qualitative analysis of other lessons-learned databases. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  3. The Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Defensive Functioning Scale: a validity study.

    Science.gov (United States)

    Porcerelli, John H; Cogan, Rosemary; Markova, Tsveti; Miller, Kristen; Mickens, Lavonda

    2011-01-01

    We assess the convergent and predictive validity of the Defensive Functioning Scale (DFS) with measures of life events, including childhood abuse and adult partner victimization; dimensions of psychopathology, including axis I (depressive) and axis II (borderline personality disorder) symptoms; and quality of object relations. One hundred and ten women from a university-based urban primary care clinic completed a research interview from which defense mechanisms were assessed. The quality of object relations was also assessed from interview data. The women completed self-report measures assessing depression, borderline personality disorder symptoms, childhood physical and sexual abuse, and adult partner physical and sexual victimization. Inter-rater reliability of the scoring of the DFS levels was good. High adaptive defenses were positively correlated with the quality of object relations and pathological defenses were positively correlated with childhood and adult victimization and symptom measures. Although major image distorting defenses were infrequently used, they were robustly correlated with all study variables. In a stepwise multiple regression analysis, major image distorting defenses, depressive symptoms, and minor image distorting defenses significantly predict childhood victimization, accounting for 37% of the variance. In a second stepwise multiple regression analysis, borderline personality disorder symptoms and disavowal defenses combined to significantly predict adult victimization, accounting for 16% of the variance. The DFS demonstrates good convergent validity with axis I and axis II symptoms, as well as with measures of childhood and adult victimization and object relations. The DFS levels add nonredundant information to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition beyond axis I and axis II. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. Development of SNS Stream Analysis Based on Forest Disaster Warning Information Service System

    Science.gov (United States)

    Oh, J.; KIM, D.; Kang, M.; Woo, C.; Kim, D.; Seo, J.; Lee, C.; Yoon, H.; Heon, S.

    2017-12-01

    Forest disasters, such as landslides and wildfires, cause huge economic losses and casualties, and the cost of recovery is increasing every year. While forest disaster mitigation technologies have been focused on the development of prevention and response technologies, they are now required to evolve into evacuation and border evacuation, and to develop technologies fused with ICT. In this study, we analyze the SNS (Social Network Service) stream and implement a system to detect the message that the forest disaster occurred or the forest disaster, and search the keyword related to the forest disaster in advance in real time. It is possible to detect more accurate forest disaster messages by repeatedly learning the retrieved results using machine learning techniques. To do this, we designed and implemented a system based on Hadoop and Spark, a distributed parallel processing platform, to handle Twitter stream messages that open SNS. In order to develop the technology to notify the information of forest disaster risk, a linkage of technology such as CBS (Cell Broadcasting System) based on mobile communication, internet-based civil defense siren, SNS and the legal and institutional issues for applying these technologies are examined. And the protocol of the forest disaster warning information service system that can deliver the SNS analysis result was developed. As a result, it was possible to grasp real-time forest disaster situation by real-time big data analysis of SNS that occurred during forest disasters. In addition, we confirmed that it is possible to rapidly propagate alarm or warning according to the disaster situation by using the function of the forest disaster warning information notification service. However, the limitation of system application due to the restriction of opening and sharing of SNS data currently in service and the disclosure of personal information remains a problem to be solved in the future. Keyword : SNS stream, Big data, Machine

  5. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  6. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  7. Analysis of the Federal Aviation Administration’s Host Computer Acquisition Process and Potential Application in Department of Defense Acquisitions

    Science.gov (United States)

    1988-09-01

    Observation Protocol . ....... 42 Data Analysis ... ........... 45 Specific Procedures for Answering Research Objective II .. ......... 46 Expert...the observation sample selection, and the observation protocol . Finally, the method of data analysis is presented. Literature Review. The main source...Emory 1985:178). The observation protocol was designed to support a variety of events and to address the major weaknesses inherent in this method. The

  8. An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

    National Research Council Canada - National Science Library

    Giovannetti, Robert G

    2005-01-01

    .... Despite the many conveniences to automate and improve asset tracking this technology offers, consumer groups have obstinately opposed this adoption due to the perceived weaknesses in security and privacy of the network...

  9. Outsourcing Information Technology Services Within the Department of Defense: An Analysis of the Navy/Marine Corps Intranet Project

    National Research Council Canada - National Science Library

    Ormerod, G

    2001-01-01

    .... Due to the fact that this outsourcing venture is the first of its kind in sheer size and scope, several concerns have surfaced in regard to the implementation of the NMCI, especially from the Marine Corps' perspective...

  10. Principal Component Analysis - A Powerful Tool in Computing Marketing Information

    Directory of Open Access Journals (Sweden)

    Constantin C.

    2014-12-01

    Full Text Available This paper is about an instrumental research regarding a powerful multivariate data analysis method which can be used by the researchers in order to obtain valuable information for decision makers that need to solve the marketing problem a company face with. The literature stresses the need to avoid the multicollinearity phenomenon in multivariate analysis and the features of Principal Component Analysis (PCA in reducing the number of variables that could be correlated with each other to a small number of principal components that are uncorrelated. In this respect, the paper presents step-by-step the process of applying the PCA in marketing research when we use a large number of variables that naturally are collinear.

  11. Analysis of data as information: quality assurance approach.

    Science.gov (United States)

    Ivankovic, D; Kern, J; Bartolic, A; Vuletic, S

    1993-01-01

    Describes a prototype module for data analysis of the healthcare delivery system. It consists of three main parts: data/variable selection; algorithms for the analysis of quantitative and qualitative changes in the system; and interpretation and explanation of the results. Such a module designed for primary health care has been installed on a PC in the health manager's office. Data enter the information system through the standard DBMS procedures, followed by calculating a number of different indicators and the time series, as the ordered sequences of indicators, according to demands of the manager. The last procedure is "the change analysis" with estimation of unexpected differences between and within some units, e.g. health-care teams, as well as some unexpected variabilities and trends. As an example, presents and discusses the diagnostic pattern of neurotic cases, referral patterns and preventive behaviour of GP's teams as well.

  12. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  13. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  14. An Analysis of the Potential Impacts of Ashton Carter’s Should-Cost Memorandum on Defense Contracting

    Science.gov (United States)

    2012-09-17

    monopolistic contractors that match distinctive government requirements. Figure 4 portrays the differences found in pure competitive commercial markets ...operate in quasi-competitive environments. Such arenas are characterized as oligopolistic or monopolistic markets . Table 6. Top 10 Companies by...practice will be used to build sufficient cost knowledge of those services within that market segment. You will employ that cost knowledge to inform

  15. Defense Health Care Reform: DOD Needs Further Analysis of the Size, Readiness, and Efficiency of the Medical Force

    Science.gov (United States)

    2016-09-01

    physicians to practice medicine within this team context of other specialists and nurses from the same service, which can be seen within the services...Card, MasterCard, Visa, check, or money order. Call for additional information. Connect with GAO on Facebook, Flickr, Twitter, and YouTube

  16. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  17. Petroleum labour market information supply demand analysis 2009-2020

    International Nuclear Information System (INIS)

    2010-03-01

    Since 2006, the petroleum industry has been interested in collaboration to determine labour demand and supply/demand gaps for the upstream petroleum industry. In 2006, the petroleum industry experienced strong employment growth and was having difficulty finding workers. Comprehensive, up-to-date labour market information and analysis are the key foundation for addressing labour supply/demand issues. This document presented labour market information on the petroleum industry in order to inform company retention and recruitment offices; government departments involved in development of labour market policies and programs; education and training institutions; guidance counsellors, employment centres and organizations that work with youth and labour supply pools; and job seekers. Specific topics that were discussed included two industry scenarios (growth and base case) in determining the petroleum industry's medium-and long-term employment needs; labour supply/demand considerations for the industry as a whole and an industry-wide cost management; and an analysis of exploration and production, oil sands, services, and pipeline sectors to 2020. It was concluded that while new employment is not expected to lead to labour shortages within the pipeline sector, attrition due to requirements almost certainly would. In the growth scenario, it is likely the pipeline sector will be challenged by competition from the other petroleum industry sectors. tabs., figs., appendices.

  18. A cost-benefit analysis for materials management information systems.

    Science.gov (United States)

    Slapak-Iacobelli, L; Wilde, A H

    1993-02-01

    The cost-benefit analysis provided the system planners with valuable information that served many purposes. It answered the following questions: Why was the CCF undertaking this project? What were the alternatives? How much was it going to cost? And what was the expected outcome? The process of developing cost-benefit the document kept the project team focused. It also motivated them to involve additional individuals from materials management and accounts payable in its development. A byproduct of this involvement was buy-in and commitment to the project by everyone in these areas. Consequently, the project became a team effort championed by many and not just one. We were also able to introduce two new information system processes: 1) a management review process with goals and anticipated results, and 2) a quality assurance process that ensured the CCF had a better product in the end. The cost-benefit analysis provided a planning tool that assisted in successful implementation of an integrated materials management information system.

  19. Petroleum labour market information supply demand analysis 2009-2020

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-03-15

    Since 2006, the petroleum industry has been interested in collaboration to determine labour demand and supply/demand gaps for the upstream petroleum industry. In 2006, the petroleum industry experienced strong employment growth and was having difficulty finding workers. Comprehensive, up-to-date labour market information and analysis are the key foundation for addressing labour supply/demand issues. This document presented labour market information on the petroleum industry in order to inform company retention and recruitment offices; government departments involved in development of labour market policies and programs; education and training institutions; guidance counsellors, employment centres and organizations that work with youth and labour supply pools; and job seekers. Specific topics that were discussed included two industry scenarios (growth and base case) in determining the petroleum industry's medium-and long-term employment needs; labour supply/demand considerations for the industry as a whole and an industry-wide cost management; and an analysis of exploration and production, oil sands, services, and pipeline sectors to 2020. It was concluded that while new employment is not expected to lead to labour shortages within the pipeline sector, attrition due to requirements almost certainly would. In the growth scenario, it is likely the pipeline sector will be challenged by competition from the other petroleum industry sectors. tabs., figs., appendices.

  20. Efficiency of crude oil markets: Evidences from informational entropy analysis

    International Nuclear Information System (INIS)

    Ortiz-Cruz, Alejandro; Rodriguez, Eduardo; Ibarra-Valdez, Carlos; Alvarez-Ramirez, Jose

    2012-01-01

    The role of crude oil as the main energy source for the global economic activity has motivated the discussion about the dynamics and causes of crude oil price changes. An accurate understanding of the issue should provide important guidelines for the design of optimal policies and government budget planning. Using daily data for WTI over the period January 1986–March 2011, we analyze the evolution of the informational complexity and efficiency for the crude oil market through multiscale entropy analysis. The results indicated that the crude oil market is informationally efficient over the scrutinized period except for two periods that correspond to the early 1990s and late 2000s US recessions. Overall, the results showed that deregulation has improved the operation of the market in the sense of making returns less predictable. On the other hand, there is some evidence that the probability of having a severe US economic recession increases as the informational efficiency decreases, which indicates that returns from crude oil markets are less uncertain during economic downturns. - Highlights: ► Entropy concepts are used to characterize crude oil prices. ► An index of market efficiency is introduced. ► Except for periods of economic recession, the crude oil market is informationally efficient.

  1. Thermal analysis and safety information for metal nanopowders by DSC

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, J.M.; Huang, S.T. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Duh, Y.S.; Hsieh, T.Y.; Sun, Y.Y. [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China); Lin, J.Z. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Wu, H.C. [Institute of Occupational Safety and Health, Council of Labor Affairs, Taipei, Taiwan, ROC (China); Kao, C.S., E-mail: jcsk@nuu.edu.tw [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China)

    2013-08-20

    Highlights: • Metal nanopowders are common and frequently employed in industry. • Nano iron powder experimental results of T{sub o} were 140–150 °C. • Safety information can benefit relevant metal powders industries. - Abstract: Metal nanopowders are common and frequently employed in industry. Iron is mostly applied in high-performance magnetic materials and pollutants treatment for groundwater. Zinc is widely used in brass, bronze, die casting metal, alloys, rubber, and paints, etc. Nonetheless, some disasters induced by metal powders are due to the lack of related safety information. In this study, we applied differential scanning calorimetry (DSC) and used thermal analysis software to evaluate the related thermal safety information, such as exothermic onset temperature (T{sub o}), peak of temperature (T{sub p}), and heat of reaction (ΔH). The nano iron powder experimental results of T{sub o} were 140–150 °C, 148–158 °C, and 141–149 °C for 15 nm, 35 nm, and 65 nm, respectively. The ΔH was larger than 3900 J/g, 5000 J/g, and 3900 J/g for 15 nm, 35 nm, and 65 nm, respectively. Safety information can benefit the relevant metal powders industries for preventing accidents from occurring.

  2. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1998-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods of cope with the concern. Common-mode failures have been a 'fact-of-life' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D and D) - coupled with the fact that hardware common-mode failures are often distributed in time - has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D and D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of common-mode failure analysis called 'defense-in-depth and diversity analysis' has been developed to identify possible common-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided. (author)

  3. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1997-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ''fact-of-life'' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D ampersand D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D ampersand D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ''defense-in-depth and diversity analysis'' has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided

  4. Climate Informed Low Flow Frequency Analysis Using Nonstationary Modeling

    Science.gov (United States)

    Liu, D.; Guo, S.; Lian, Y.

    2014-12-01

    Stationarity is often assumed for frequency analysis of low flows in water resources management and planning. However, many studies have shown that flow characteristics, particularly the frequency spectrum of extreme hydrologic events,were modified by climate change and human activities and the conventional frequency analysis without considering the non-stationary characteristics may lead to costly design. The analysis presented in this paper was based on the more than 100 years of daily flow data from the Yichang gaging station 44 kilometers downstream of the Three Gorges Dam. The Mann-Kendall trend test under the scaling hypothesis showed that the annual low flows had significant monotonic trend, whereas an abrupt change point was identified in 1936 by the Pettitt test. The climate informed low flow frequency analysis and the divided and combined method are employed to account for the impacts from related climate variables and the nonstationarities in annual low flows. Without prior knowledge of the probability density function for the gaging station, six distribution functions including the Generalized Extreme Values (GEV), Pearson Type III, Gumbel, Gamma, Lognormal, and Weibull distributions have been tested to find the best fit, in which the local likelihood method is used to estimate the parameters. Analyses show that GEV had the best fit for the observed low flows. This study has also shown that the climate informed low flow frequency analysis is able to exploit the link between climate indices and low flows, which would account for the dynamic feature for reservoir management and provide more accurate and reliable designs for infrastructure and water supply.

  5. Use of historical information in extreme storm surges frequency analysis

    Science.gov (United States)

    Hamdi, Yasser; Duluc, Claire-Marie; Deville, Yves; Bardet, Lise; Rebour, Vincent

    2013-04-01

    The prevention of storm surge flood risks is critical for protection and design of coastal facilities to very low probabilities of failure. The effective protection requires the use of a statistical analysis approach having a solid theoretical motivation. Relating extreme storm surges to their frequency of occurrence using probability distributions has been a common issue since 1950s. The engineer needs to determine the storm surge of a given return period, i.e., the storm surge quantile or design storm surge. Traditional methods for determining such a quantile have been generally based on data from the systematic record alone. However, the statistical extrapolation, to estimate storm surges corresponding to high return periods, is seriously contaminated by sampling and model uncertainty if data are available for a relatively limited period. This has motivated the development of approaches to enlarge the sample extreme values beyond the systematic period. The nonsystematic data occurred before the systematic period is called historical information. During the last three decades, the value of using historical information as a nonsystematic data in frequency analysis has been recognized by several authors. The basic hypothesis in statistical modeling of historical information is that a perception threshold exists and that during a giving historical period preceding the period of tide gauging, all exceedances of this threshold have been recorded. Historical information prior to the systematic records may arise from high-sea water marks left by extreme surges on the coastal areas. It can also be retrieved from archives, old books, earliest newspapers, damage reports, unpublished written records and interviews with local residents. A plotting position formula, to compute empirical probabilities based on systematic and historical data, is used in this communication paper. The objective of the present work is to examine the potential gain in estimation accuracy with the

  6. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  7. Services Acquisition in the Department of Defense: Analysis of Operational and Performance Data to Identify Drivers of Success

    Science.gov (United States)

    2015-03-24

    improving the disclosure of CPARS program office Audit results (Black et al., 2014, pp. 48–49). Acquisition Research Program Graduate School of...improving the disclosure of CPARS program office audit results (Black et al., 2014, pp. 44–49). Recommendations Based on our conclusions, we identified...Fitzsimmons, J. A., & Fitzsimmons, M. J. (2006). Service management: Operations, strategy, and information technology (5th ed.). New York, NY: McGraw -Hill

  8. Implementation of a drainage information, analysis and management system

    Directory of Open Access Journals (Sweden)

    J.N. Meegoda

    2017-04-01

    Full Text Available An integrated drainage information, analysis and management system (DIAMS was developed and implemented for the New Jersey Department of Transportation (NJDOT. The purpose of the DIAMS is to provide a useful tool for managers to evaluate drainage infrastructure, to facilitate the determination of the present costs of preserving those infrastructures, and to make decisions regarding the optimal use of their infrastructure budgets. The impetus for DIAMS is the culvert information management system (CIMS, which is developed to manage the data for culvert pipes. DIAMS maintains and summarizes accumulated inspection data for all types of drainage infrastructure assets, including pipes, inlet/outlet structures, outfalls and manufactured treatment devices. DIAMS capabilities include identifying drainage infrastructure, maintaining inspection history, mapping locations, predicting service life based on the current condition states, and assessing present asset value. It also includes unit cost values of 72 standard items to estimate the current cost for new assets with the ability to adjust for future inflation. In addition, DIAMS contains several different repair, rehabilitation and replacement options to remedy the drainage infrastructure. DIAMS can analyze asset information and determine decisions to inspect, rehabilitate, replace or do nothing at the project and network levels by comparing costs with risks and failures. Costs may be optimized to meet annual maintenance budget allocations by prioritizing drainage infrastructure needing inspection, cleaning and repair. DIAMS functional modules include vendor data uploading, asset identification, system administration and financial analysis. Among the significant performance feature of DIAMS is its proactive nature, which affords decision makers the means of conducting a comprehensive financial analysis to determine the optimal proactive schedule for the proper maintenance actions and to prioritize them

  9. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  10. Rapid automatic keyword extraction for information retrieval and analysis

    Science.gov (United States)

    Rose, Stuart J [Richland, WA; Cowley,; E, Wendy [Richland, WA; Crow, Vernon L [Richland, WA; Cramer, Nicholas O [Richland, WA

    2012-03-06

    Methods and systems for rapid automatic keyword extraction for information retrieval and analysis. Embodiments can include parsing words in an individual document by delimiters, stop words, or both in order to identify candidate keywords. Word scores for each word within the candidate keywords are then calculated based on a function of co-occurrence degree, co-occurrence frequency, or both. Based on a function of the word scores for words within the candidate keyword, a keyword score is calculated for each of the candidate keywords. A portion of the candidate keywords are then extracted as keywords based, at least in part, on the candidate keywords having the highest keyword scores.

  11. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  12. Analysis of Internet Information on Lateral Lumbar Interbody Fusion.

    Science.gov (United States)

    Belayneh, Rebekah; Mesfin, Addisu

    2016-07-01

    Lateral lumbar interbody fusion (LLIF) is a surgical technique that is being increasingly used. The authors' objective was to examine information on the Internet pertaining to the LLIF technique. An analysis was conducted of publicly accessible websites pertaining to LLIF. The following search engines were used: Google (www.google.com), Bing (www.bing.com), and Yahoo (www.yahoo.com). DuckDuckGo (www.duckduckgo.com) was an additional search engine used due to its emphasis on generating accurate and consistent results while protecting searchers' privacy and reducing advertisements. The top 35 websites providing information on LLIF from the 4 search engines were identified. A total of 140 websites were evaluated. Each web-site was categorized based on authorship (academic, private, medical industry, insurance company, other) and content of information. Using the search term lateral lumbar interbody fusion, 174,000 Google results, 112,000 Yahoo results, and 112,000 Bing results were obtained. DuckDuckGo does not display the number of results found for a search. From the top 140 websites collected from each website, 78 unique websites were identified. Websites were authored by a private medical group in 46.2% of the cases, an academic medical group in 26.9% of the cases, and the biomedical industry in 5.1% of the cases. Sixty-eight percent of websites reported indications, and 24.4% reported contraindications. Benefits of LLIF were reported by 69.2% of websites. Thirty-six percent of websites reported complications of LLIF. Overall, the quality of information regarding LLIF on the Internet is poor. Spine surgeons and spine societies can assist in improving the quality of the information on the Internet regarding LLIF. [Orthopedics. 2016; 39(4):e701-e707.]. Copyright 2016, SLACK Incorporated.

  13. Analysis And Assistant Planning System Ofregional Agricultural Economic Inform

    Science.gov (United States)

    Han, Jie; Zhang, Junfeng

    For the common problems existed in regional development and planning, we try to design a decision support system for assisting regional agricultural development and alignment as a decision-making tool for local government and decision maker. The analysis methods of forecast, comparative advantage, liner programming and statistical analysis are adopted. According to comparative advantage theory, the regional advantage can be determined by calculating and comparing yield advantage index (YAI), Scale advantage index (SAI), Complicated advantage index (CAI). Combining with GIS, agricultural data are presented as a form of graph such as area, bar and pie to uncover the principle and trend for decision-making which can't be found in data table. This system provides assistant decisions for agricultural structure adjustment, agro-forestry development and planning, and can be integrated to information technologies such as RS, AI and so on.

  14. Information management for global environmental change, including the Carbon Dioxide Information Analysis Center

    Energy Technology Data Exchange (ETDEWEB)

    Stoss, F.W. [Oak Ridge National Lab., TN (United States). Carbon Dioxide Information Analysis Center

    1994-06-01

    The issue of global change is international in scope. A body of international organizations oversees the worldwide coordination of research and policy initiatives. In the US the National Science and Technology Council (NSTC) was established in November of 1993 to provide coordination of science, space, and technology policies throughout the federal government. NSTC is organized into nine proposed committees. The Committee on Environmental and Natural Resources (CERN) oversees the US Department of Energy`s Global Change Research Program (USGCRP). As part of the USGCRP, the US Department of Energy`s Global Change Research Program aims to improve the understanding of Earth systems and to strengthen the scientific basis for the evaluation of policy and government action in response to potential global environmental changes. This paper examines the information and data management roles of several international and national programs, including Oak Ridge National Laboratory`s (ORNL`s) global change information programs. An emphasis will be placed on the Carbon Dioxide Information Analysis Center (CDIAC), which also serves as the World Data Center-A for Atmospheric Trace Gases.

  15. Analysis of College Students' Personal Health Information Activities: Online Survey.

    Science.gov (United States)

    Kim, Sujin; Sinn, Donghee; Syn, Sue Yeon

    2018-04-20

    With abundant personal health information at hand, individuals are faced with a critical challenge in evaluating the informational value of health care records to keep useful information and discard that which is determined useless. Young, healthy college students who were previously dependents of adult parents or caregivers are less likely to be concerned with disease management. Personal health information management (PHIM) is a special case of personal information management (PIM) that is associated with multiple interactions among varying stakeholders and systems. However, there has been limited evidence to understand informational or behavioral underpinning of the college students' PHIM activities, which can influence their health in general throughout their lifetime. This study aimed to investigate demographic and academic profiles of college students with relevance to PHIM activities. Next, we sought to construct major PHIM-related activity components and perceptions among college students. Finally, we sought to discover major factors predicting core PHIM activities among college students we sampled. A Web survey was administered to collect responses about PHIM behaviors and perceptions among college students from the University of Kentucky from January through March 2017. A total of 1408 college students were included in the analysis. PHIM perceptions, demographics, and academic variations were used as independent variables to predict diverse PHIM activities using a principal component analysis (PCA) and hierarchical regression analyses (SPSS v.24, IBM Corp, Armonk, NY, USA). Majority of the participants were female (956/1408, 67.90%), and the age distribution of this population included an adequate representation of college students of all ages. The most preferred health information resources were family (612/1408, 43.47%), health care professionals (366/1408, 26.00%), friends (27/1408, 1.91%), and the internet (157/1408, 11.15%). Organizational or

  16. Preliminary analysis of projected construction employment effects of building the defense waste processing facility at the Savannah River Plant

    International Nuclear Information System (INIS)

    Garey, R.B.; Blair, L.M.; Craig, R.L.; Stevenson, W.

    1981-09-01

    This study estimates the probable effects of constructing the DWPF on the surrounding labor markets. Analyses are based on data from the local and regional labor markets, information from experts on local construction activities, information on the labor requirements of the Vogtle Power Plant (two nuclear reactors) being built by Georgia Power Company in Burke County, Georgia, and an econometric model of the construction labor market, based on several surveys of workers building three Tennessee Valley Authority nuclear power plants. The results of this study are reported in three parts. In Part I, completed in May 1980, we describe the 1979 (base year) employment levels within the local and regional labor markets surrounding SRP, from which most DWPF construction workers are likely to be drawn. In Part II, completed in June 1980, we define the four local sources of construction employment that will compete for craftsmen when DWPF is built. Also in Part II, most of the projected impacts of the DWPF reference immobilization alternative (one of several alternatives that may be chosen) are reported. Several construction schedules and labor demand scenarios for the reference alternative are considered. In Part III, completed in January 1981, most of the estimated impacts of the DWPF alternative referred to as the staged process alternative are reported. Several construction schedules and labor demand scenarios for this alternative are considered

  17. Information findability: An informal study to explore options for improving information findability for the systems analysis group

    Energy Technology Data Exchange (ETDEWEB)

    Stoecker, Nora Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-03-01

    A Systems Analysis Group has existed at Sandia National Laboratories since at least the mid-1950s. Much of the groups work output (reports, briefing documents, and other materials) has been retained, along with large numbers of related documents. Over time the collection has grown to hundreds of thousands of unstructured documents in many formats contained in one or more of several different shared drives or SharePoint sites, with perhaps five percent of the collection still existing in print format. This presents a challenge. How can the group effectively find, manage, and build on information contained somewhere within such a large set of unstructured documents? In response, a project was initiated to identify tools that would be able to meet this challenge. This report documents the results found and recommendations made as of August 2013.

  18. Information Retrieval and Graph Analysis Approaches for Book Recommendation

    Directory of Open Access Journals (Sweden)

    Chahinez Benkoussas

    2015-01-01

    Full Text Available A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval approach to related document network comprised of social links. We called Directed Graph of Documents (DGD a network constructed with documents and social information provided from each one of them. Specifically, this work tackles the problem of book recommendation in the context of INEX (Initiative for the Evaluation of XML retrieval Social Book Search track. A series of reranking experiments demonstrate that combining retrieval models yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments.

  19. SUCCESS CONCEPT ANALYSIS APPLIED TO THE INFORMATION TECHNOLOGY PROJECT MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Cassio C. Montenegro Duarte

    2012-05-01

    Full Text Available This study evaluates the concept of success in project management that is applicable to the IT universe, from the classical theory associated with the techniques of project management. Therefore, it applies the theoretical analysis associated to the context of information technology in enterprises as well as the classic literature of traditional project management, focusing on its application in business information technology. From the literature developed in the first part of the study, four propositions were prepared for study which formed the basis for the development of the field research with three large companies that develop projects of Information Technology. The methodology used in the study predicted the development of the multiple case study. Empirical evidence suggests that the concept of success found in the classical literature in project management adjusts to the environment management of IT projects. Showed that it is possible to create the model of standard IT projects in order to replicate it in future derivatives projects, which depends on the learning acquired at the end of a long and continuous process and sponsorship of senior management, which ultimately results in its merger into the company culture.

  20. Analysis of informational redundancy in the protein-assembling machinery

    Science.gov (United States)

    Berkovich, Simon

    2004-03-01

    Entropy analysis of the DNA structure does not reveal a significant departure from randomness indicating lack of informational redundancy. This signifies the absence of a hidden meaning in the genome text and supports the 'barcode' interpretation of DNA given in [1]. Lack of informational redundancy is a characteristic property of an identification label rather than of a message of instructions. Yet randomness of DNA has to induce non-random structures of the proteins. Protein synthesis is a two-step process: transcription into RNA with gene splicing and formation a structure of amino acids. Entropy estimations, performed by A. Djebbari, show typical values of redundancy of the biomolecules along these pathways: DNA gene 4proteins 15-40in gene expression, the RNA copy carries the same information as the original DNA template. Randomness is essentially eliminated only at the step of the protein creation by a degenerate code. According to [1], the significance of the substitution of U for T with a subsequent gene splicing is that these transformations result in a different pattern of RNA oscillations, so the vital DNA communications are protected against extraneous noise coming from the protein making activities. 1. S. Berkovich, "On the 'barcode' functionality of DNA, or the Phenomenon of Life in the Physical Universe", Dorrance Publishing Co., Pittsburgh, 2003

  1. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  2. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  3. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  4. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  5. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  6. Improving DoD Energy Efficiency: Combining MMOWGLI Social-Media Brainstorming With Lexical Link Analysis (LLA) to Strengthen the Defense Acquisition Process

    OpenAIRE

    Zhao, Ying; Brutzman, Don; MacKinnon, Douglas J.

    2013-01-01

    Disclaimer: The views represented in this report are those of the authors and do not reflect the official policy position of the Navy, the Department of Defense, or the federal government. Excerpt from the Proceedings of the Tenth Annual Acquisition Research Symposium Logistics Management The research presented in this report was supported by the Acquisition Research Program of the Graduate School of Business & Public Policy at the Naval Postgraduate School. To request defense acquis...

  7. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  8. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  9. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  10. Proceedings of the 1985 Annual DTIC (Defense Technical Information Center) Users Conference Held in Alexandria, Virginia on 23-25 October 1985

    Science.gov (United States)

    1985-10-01

    Donovan Space Communications Company 1300 Quince Orchard Boulevard Gaithersburg, MD 20878 Joyce H. Deegan Rockwell International Corporation 1200 N...J. P. Norton Engineered Air Systems 1270 N. Price Road St. Louis, MO 63132 Craig L. Pelz Naval Weapons Center Information Services Branch Code

  11. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  12. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  13. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  14. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  15. Signal correlations in biomass combustion. An information theoretic analysis

    Energy Technology Data Exchange (ETDEWEB)

    Ruusunen, M.

    2013-09-01

    Increasing environmental and economic awareness are driving the development of combustion technologies to efficient biomass use and clean burning. To accomplish these goals, quantitative information about combustion variables is needed. However, for small-scale combustion units the existing monitoring methods are often expensive or complex. This study aimed to quantify correlations between flue gas temperatures and combustion variables, namely typical emission components, heat output, and efficiency. For this, data acquired from four small-scale combustion units and a large circulating fluidised bed boiler was studied. The fuel range varied from wood logs, wood chips, and wood pellets to biomass residue. Original signals and a defined set of their mathematical transformations were applied to data analysis. In order to evaluate the strength of the correlations, a multivariate distance measure based on information theory was derived. The analysis further assessed time-varying signal correlations and relative time delays. Ranking of the analysis results was based on the distance measure. The uniformity of the correlations in the different data sets was studied by comparing the 10-quantiles of the measured signal. The method was validated with two benchmark data sets. The flue gas temperatures and the combustion variables measured carried similar information. The strongest correlations were mainly linear with the transformed signal combinations and explicable by the combustion theory. Remarkably, the results showed uniformity of the correlations across the data sets with several signal transformations. This was also indicated by simulations using a linear model with constant structure to monitor carbon dioxide in flue gas. Acceptable performance was observed according to three validation criteria used to quantify modelling error in each data set. In general, the findings demonstrate that the presented signal transformations enable real-time approximation of the studied

  16. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  17. Proceedings of the Annual DTIC (Defense Technical Information Center) Users Conference Held at Alexandria, Virginia on 24-26 October 1984

    Science.gov (United States)

    1984-10-26

    34 telecommuting ," meaning people do not necessarily have to go from one place to another but all ■we need is for the information to flow from one... absentee ballot system. There are many users who for one reason or another cannot attend the annual meeting. These sites were essentially...newsletter and read it, the User Council established an absentee ballot system. We did receive a number of ballots that way. As best we could, we

  18. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  19. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  20. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  1. Followup Audit of Controls Over Operating System and Security Software and Other General Controls for Computer Systems Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1996-01-01

    This is the third in a series of followup audits made to evaluate the corrective actions taken by the Defense Finance and Accounting Service, the Defense Information Systems Agency, and the Defense...

  2. NATO and U.S. Ballistic Missile Defense Programs: Divergent or Convergent Paths?

    National Research Council Canada - National Science Library

    Toms, Kevin E

    2008-01-01

    ...) information network to support the Theater Missile Defense (TMD) capabilities of specific Allies for the protection of forward deployed troops, and studies of the feasibility and political-military implications of Ballistic Missile Defense (BMD...

  3. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    National Research Council Canada - National Science Library

    Givens, Mark

    2004-01-01

    In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture...

  4. Defense IRM: Alternatives Should Be Considered in Developing the New Civilian Personnel System

    National Research Council Canada - National Science Library

    1999-01-01

    ... regional centers, and attempting to improve personnel management business processes. A key part of this initiative is Defense's development of a new information management system-the Defense Civilian Personnel Data System (DCPDs...

  5. Year 2000 Reporting for Defense Finance and Accounting Service Cleveland Center Systems

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this report, we evaluated whether DFAS: entered all required data elements into the Defense Integration Support Tools for each system, and verified that information in the Defense Integration Support Tools database was consistent...

  6. Overall analysis of meteorological information in the daeduk nuclear complex

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byung Woo; Lee, Young Bok; Han, Moon Hee; Kim, Eun Han; Suh, Kyung Suk; Hwang, Won Tae; Hong, Suk Boong [Korea Atomic Energy Res. Inst., Taejon (Korea, Republic of)

    1992-12-01

    Problem shooting in tower structure, sensor installation, earth, and cabling have been done with integrated field-test, establishment of data acquisition system, and instrument calibration since the completion of the main tower construction in this year. Procedure guide was also made for the effective management covering instrument operation, calibration and repair. Real measurement has been done during two months from this October after whole integration of equipments. Occurrence of nocturnal inversion layer, fogging, and frequent stable condition of atmospheric stability were shown as the analysis results of measured data which well represented seasonal and regional characteristics in the site. Wireless data transmission to MIPS(Meteorological Information Processing System) has been done after collection in the DAS(data acquision system) where environmental assessment can be done by the developed simulation programs in both cases of normal operation and emergency. (Author).

  7. How Analysis Informs Regulation:Success and Failure of ...

    Science.gov (United States)

    How Analysis Informs Regulation:Success and Failure of Evolving Approaches to Polyfluoroalkyl Acid Contamination The National Exposure Research Laboratory (NERL) Human Exposure and Atmospheric Sciences Division (HEASD) conducts research in support of EPA mission to protect human health and the environment. HEASD research program supports Goal 1 (Clean Air) and Goal 4 (Healthy People) of EPA strategic plan. More specifically, our division conducts research to characterize the movement of pollutants from the source to contact with humans. Our multidisciplinary research program produces Methods, Measurements, and Models to identify relationships between and characterize processes that link source emissions, environmental concentrations, human exposures, and target-tissue dose. The impact of these tools is improved regulatory programs and policies for EPA.

  8. A Study on the Information Analysis and Legal Affairs

    International Nuclear Information System (INIS)

    Chung, W. S.; Yang, M. H.; Yun, S. W.; Lee, D. S.; Kim, H. R.; Noh, B. C.

    2009-02-01

    It is followed that results and contents of a Study on the Nuclear Information Analyses and Legal Affairs. Our team makes an effort to secure KAERI's best legal interest in the process of enacting nuclear laws and codes, international collaborative study, and management. Moreover, as a international trend analysis, we studied Japan government's position to nuclear energy under the aspect of reducing climate change and supplying sustainable energy. Improvement of Japan's radiation use showed increasing contribution of radiation technology to the people. Results of studies of nuclear policy of Kazakhstan, forecasting global trend in 2030 of Nuclear area, and new U.S. government's policy to nuclear energy are also explained. Lastly, we performed evaluation of source of electric generator which reduce emitting carbon dioxide in the aspect of greenhouse gas emission statistic and tested green gas reducing ability of Korea's green source of electric generator that reducing greenhouse gas effect

  9. Mediating Informal Care Online: Findings from an Extensive Requirements Analysis

    Directory of Open Access Journals (Sweden)

    Christiane Moser

    2015-05-01

    Full Text Available Organizing and satisfying the increasing demand for social and informal care for older adults is an important topic. We aim at building a peer-to-peer exchange platform that empowers older adults to benefit from receiving support for daily activities and reciprocally offering support to others. In situated interviews and within a survey we investigated the requirements and needs of 246 older adults with mild impairments. Additionally, we conducted an interpretative role analysis of older adults’ collaborative care processes (i.e., support exchange practices in order to identify social roles and understand the inherent expectations towards the execution of support. We will describe our target group in the form of personas and different social roles, as well as user requirements for establishing a successful peer-to-peer collaboration. We also consider our finding from the perspective of social capital theory that allows us to describe in our requirements how relationships provide valuable social resources (i.e., social capital for informal and social care.

  10. Trajectory Shape Analysis and Anomaly Detection Utilizing Information Theory Tools

    Directory of Open Access Journals (Sweden)

    Yuejun Guo

    2017-06-01

    Full Text Available In this paper, we propose to improve trajectory shape analysis by explicitly considering the speed attribute of trajectory data, and to successfully achieve anomaly detection. The shape of object motion trajectory is modeled using Kernel Density Estimation (KDE, making use of both the angle attribute of the trajectory and the speed of the moving object. An unsupervised clustering algorithm, based on the Information Bottleneck (IB method, is employed for trajectory learning to obtain an adaptive number of trajectory clusters through maximizing the Mutual Information (MI between the clustering result and a feature set of the trajectory data. Furthermore, we propose to effectively enhance the performance of IB by taking into account the clustering quality in each iteration of the clustering procedure. The trajectories are determined as either abnormal (infrequently observed or normal by a measure based on Shannon entropy. Extensive tests on real-world and synthetic data show that the proposed technique behaves very well and outperforms the state-of-the-art methods.

  11. Information Foraging Theory: A Framework for Intelligence Analysis

    Science.gov (United States)

    2014-11-01

    oceanographic information, human intelligence (HUMINT), open-source intelligence ( OSINT ), and information provided by other governmental departments [1][5...Human Intelligence IFT Information Foraging Theory LSA Latent Semantic Similarity MVT Marginal Value Theorem OFT Optimal Foraging Theory OSINT

  12. Process-aware information systems : design, enactment and analysis

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Wah, B.W.

    2009-01-01

    Process-aware information systems support operational business processes by combining advances in information technology with recent insights from management science. Workflow management systems are typical examples of such systems. However, many other types of information systems are also "process

  13. Fisher statistics for analysis of diffusion tensor directional information.

    Science.gov (United States)

    Hutchinson, Elizabeth B; Rutecki, Paul A; Alexander, Andrew L; Sutula, Thomas P

    2012-04-30

    A statistical approach is presented for the quantitative analysis of diffusion tensor imaging (DTI) directional information using Fisher statistics, which were originally developed for the analysis of vectors in the field of paleomagnetism. In this framework, descriptive and inferential statistics have been formulated based on the Fisher probability density function, a spherical analogue of the normal distribution. The Fisher approach was evaluated for investigation of rat brain DTI maps to characterize tissue orientation in the corpus callosum, fornix, and hilus of the dorsal hippocampal dentate gyrus, and to compare directional properties in these regions following status epilepticus (SE) or traumatic brain injury (TBI) with values in healthy brains. Direction vectors were determined for each region of interest (ROI) for each brain sample and Fisher statistics were applied to calculate the mean direction vector and variance parameters in the corpus callosum, fornix, and dentate gyrus of normal rats and rats that experienced TBI or SE. Hypothesis testing was performed by calculation of Watson's F-statistic and associated p-value giving the likelihood that grouped observations were from the same directional distribution. In the fornix and midline corpus callosum, no directional differences were detected between groups, however in the hilus, significant (pstatistical comparison of tissue structural orientation. Copyright © 2012 Elsevier B.V. All rights reserved.

  14. Intelligent acoustic data fusion technique for information security analysis

    Science.gov (United States)

    Jiang, Ying; Tang, Yize; Lu, Wenda; Wang, Zhongfeng; Wang, Zepeng; Zhang, Luming

    2017-08-01

    Tone is an essential component of word formation in all tonal languages, and it plays an important role in the transmission of information in speech communication. Therefore, tones characteristics study can be applied into security analysis of acoustic signal by the means of language identification, etc. In speech processing, fundamental frequency (F0) is often viewed as representing tones by researchers of speech synthesis. However, regular F0 values may lead to low naturalness in synthesized speech. Moreover, F0 and tone are not equivalent linguistically; F0 is just a representation of a tone. Therefore, the Electroglottography (EGG) signal is collected for deeper tones characteristics study. In this paper, focusing on the Northern Kam language, which has nine tonal contours and five level tone types, we first collected EGG and speech signals from six natural male speakers of the Northern Kam language, and then achieved the clustering distributions of the tone curves. After summarizing the main characteristics of tones of Northern Kam, we analyzed the relationship between EGG and speech signal parameters, and laid the foundation for further security analysis of acoustic signal.

  15. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  16. DTIC 2010 Conference: Celebrating 65 Years of Providing Access to Defense Information. Held in Alexandria, Virginia on March 22-24, 2010

    Science.gov (United States)

    2010-03-24

    and facilitate any DTIC operations, plans or cooperative efforts  that  benefit  the membership; expedite the flow of information between the...Brabo ‐ Traditional Belgian cuisine   Hard Times Cafe ‐  Chili  and more   Vermilion ‐ Modern American cooking   The Majestic ‐ American classics...Administrator, DTIC  8:45‐9:45       Grand Ballroom  KEYNOTE ADDRESS  THE SERVICE ORIENTED ENTERPRISE AND SHARING INFORMATION TO  BENEFIT  DOD  Speaker:  Mr

  17. Scientific and technological information: analysis of periodic publications of information science

    OpenAIRE

    Mayara Cintya do Nascimento Vasconcelos; Gabriela Belmont de Farias

    2017-01-01

    The research analyzes the articles published in national scientific journals of the area of Information Science, classified with Qualis A1, having as parameter the term "scientific and technological information". It presents concepts about scientific and technological information and the processes that involve its uses, as well as scientific communication, information flows and sources of information. The methodology used is a descriptive study with a quantitative-qualitative approach, using ...

  18. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  19. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  20. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  1. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  2. The Effect of Information Analysis Automation Display Content on Human Judgment Performance in Noisy Environments

    OpenAIRE

    Bass, Ellen J.; Baumgart, Leigh A.; Shepley, Kathryn Klein

    2012-01-01

    Displaying both the strategy that information analysis automation employs to makes its judgments and variability in the task environment may improve human judgment performance, especially in cases where this variability impacts the judgment performance of the information analysis automation. This work investigated the contribution of providing either information analysis automation strategy information, task environment information, or both, on human judgment performance in a domain where noi...

  3. 32 CFR 48.501 - General information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false General information. 48.501 Section 48.501 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN RETIRED SERVICEMAN'S FAMILY PROTECTION PLAN Annuity § 48.501 General information. Except as provided in...

  4. The system for statistical analysis of logistic information

    Directory of Open Access Journals (Sweden)

    Khayrullin Rustam Zinnatullovich

    2015-05-01

    Full Text Available The current problem for managers in logistic and trading companies is the task of improving the operational business performance and developing the logistics support of sales. The development of logistics sales supposes development and implementation of a set of works for the development of the existing warehouse facilities, including both a detailed description of the work performed, and the timing of their implementation. Logistics engineering of warehouse complex includes such tasks as: determining the number and the types of technological zones, calculation of the required number of loading-unloading places, development of storage structures, development and pre-sales preparation zones, development of specifications of storage types, selection of loading-unloading equipment, detailed planning of warehouse logistics system, creation of architectural-planning decisions, selection of information-processing equipment, etc. The currently used ERP and WMS systems did not allow us to solve the full list of logistics engineering problems. In this regard, the development of specialized software products, taking into account the specifics of warehouse logistics, and subsequent integration of these software with ERP and WMS systems seems to be a current task. In this paper we suggest a system of statistical analysis of logistics information, designed to meet the challenges of logistics engineering and planning. The system is based on the methods of statistical data processing.The proposed specialized software is designed to improve the efficiency of the operating business and the development of logistics support of sales. The system is based on the methods of statistical data processing, the methods of assessment and prediction of logistics performance, the methods for the determination and calculation of the data required for registration, storage and processing of metal products, as well as the methods for planning the reconstruction and development

  5. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  6. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  7. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  8. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  9. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  10. On the censored cost-effectiveness analysis using copula information

    Directory of Open Access Journals (Sweden)

    Charles Fontaine

    2017-02-01

    Full Text Available Abstract Background Information and theory beyond copula concepts are essential to understand the dependence relationship between several marginal covariates distributions. In a therapeutic trial data scheme, most of the time, censoring occurs. That could lead to a biased interpretation of the dependence relationship between marginal distributions. Furthermore, it could result in a biased inference of the joint probability distribution function. A particular case is the cost-effectiveness analysis (CEA, which has shown its utility in many medico-economic studies and where censoring often occurs. Methods This paper discusses a copula-based modeling of the joint density and an estimation method of the costs, and quality adjusted life years (QALY in a cost-effectiveness analysis in case of censoring. This method is not based on any linearity assumption on the inferred variables, but on a punctual estimation obtained from the marginal distributions together with their dependence link. Results Our results show that the proposed methodology keeps only the bias resulting statistical inference and don’t have anymore a bias based on a unverified linearity assumption. An acupuncture study for chronic headache in primary care was used to show the applicability of the method and the obtained ICER keeps in the confidence interval of the standard regression methodology. Conclusion For the cost-effectiveness literature, such a technique without any linearity assumption is a progress since it does not need the specification of a global linear regression model. Hence, the estimation of the a marginal distributions for each therapeutic arm, the concordance measures between these populations and the right copulas families is now sufficient to process to the whole CEA.

  11. Information as signs: A semiotic analysis of the information concept, determining it's ontological and epistemological commitments

    DEFF Research Database (Denmark)

    Thellefsen, Martin Muderspach; Thellefsen, Torkild Leo; Sørensen, Bent

    2018-01-01

    Purpose The purpose of this paper is to formulate an analytical framework for the information concept based on the semiotic theory. Design/methodology/approach The paper is motivated by the apparent controversy that still surrounds the information concept. Information, being a key concept within...... LIS, suffers from being anchored in various incompatible theories. The paper suggests that information is signs, and it demonstrates how the concept of information can be understood within C.S. Peirce’s phenomenologically rooted semiotic. Hence, from there, certain ontological conditions as well...... epistemological consequences of the information concept can be deduced. Findings The paper argues that an understanding of information, as either objective or subjective/discursive, leads to either objective reductionism and signal processing, that fails to explain how information becomes meaningful at all...

  12. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  13. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  14. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  15. Enhancing multilingual latent semantic analysis with term alignment information.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.; Bader, Brett William

    2008-08-01

    Latent Semantic Analysis (LSA) is based on the Singular Value Decomposition (SVD) of a term-by-document matrix for identifying relationships among terms and documents from co-occurrence patterns. Among the multiple ways of computing the SVD of a rectangular matrix X, one approach is to compute the eigenvalue decomposition (EVD) of a square 2 x 2 composite matrix consisting of four blocks with X and XT in the off-diagonal blocks and zero matrices in the diagonal blocks. We point out that significant value can be added to LSA by filling in some of the values in the diagonal blocks (corresponding to explicit term-to-term or document-to-document associations) and computing a term-by-concept matrix from the EVD. For the case of multilingual LSA, we incorporate information on cross-language term alignments of the same sort used in Statistical Machine Translation (SMT). Since all elements of the proposed EVD-based approach can rely entirely on lexical statistics, hardly any price is paid for the improved empirical results. In particular, the approach, like LSA or SMT, can still be generalized to virtually any language(s); computation of the EVD takes similar resources to that of the SVD since all the blocks are sparse; and the results of EVD are just as economical as those of SVD.

  16. [SSR loci information analysis in transcriptome of Andrographis paniculata].

    Science.gov (United States)

    Li, Jun-Ren; Chen, Xiu-Zhen; Tang, Xiao-Ting; He, Rui; Zhan, Ruo-Ting

    2018-06-01

    To study the SSR loci information and develop molecular markers, a total of 43 683 Unigenes in transcriptome of Andrographis paniculata were used to explore SSR. The distribution frequency of SSR and the basic characteristics of repeat motifs were analyzed using MicroSAtellite software, SSR primers were designed by Primer 3.0 software and then validated by PCR. Moreover, the gene function analysis of SSR Unigene was obtained by Blast. The results showed that 14 135 SSR loci were found in the transcriptome of A. paniculata, which distributed in 9 973 Unigenes with a distribution frequency of 32.36%. Di-nucleotide and Tri-nucleotide repeat were the main types, accounted for 75.54% of all SSRs. The repeat motifs of AT/AT and CCG/CGG were the predominant repeat types of Di-nucleotide and Tri-nucleotide, respectively. A total of 4 740 pairs of SSR primers with the potential to produce polymorphism were designed for maker development. Ten pairs of primers in 20 pairs of randomly picked primers produced fragments with expected molecular size. The gene function of Unigenes containing SSR were mostly related to the basic metabolism function of A. paniculata. The SSR markers in transcriptome of A. paniculata show rich type, strong specificity and high potential of polymorphism, which will benefit the candidate gene mining and marker-assisted breeding. Copyright© by the Chinese Pharmaceutical Association.

  17. Strategic information transmission: a mathematica tool for analysis

    OpenAIRE

    Dickhaut, John; Kaplan, Todd R; Mukherji, Arijit

    1992-01-01

    Economists and other applied researchers use game theory to study industrial organization, financial markets, and the theory of the firm. In an earlier article in the Mathematica Journal, [Dickhaut and Kaplan 1991] present a procedure for solving two-person games of complete information. In many applications, however, "asymmetric information" is a central issue. By asymmetric information, we mean that one party has access to information that the other party lacks. The branch of game the...

  18. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  19. Multi-Dimensional Analysis of Dynamic Human Information Interaction

    Science.gov (United States)

    Park, Minsoo

    2013-01-01

    Introduction: This study aims to understand the interactions of perception, effort, emotion, time and performance during the performance of multiple information tasks using Web information technologies. Method: Twenty volunteers from a university participated in this study. Questionnaires were used to obtain general background information and…

  20. FACTORS INFLUENCING INFORMATION TECHNOLOGY ADPOTION: A CROSS-SECTIONAL ANALYSIS

    OpenAIRE

    Stroade, Jeri L.; Schurle, Bryan W.

    2003-01-01

    This project will explore information technology adoption issues. The unique characteristics of information technology will be discussed. Advantages and disadvantages to adoption will also be identified. Finally, a statistical model of Internet adoption will be developed to estimate the impacts of certain variables on the underlying process of information technology adoption.

  1. Design and application of pulse information acquisition and analysis ...

    African Journals Online (AJOL)

    ... two-dimensional information acquisition, multiplex signals combination and deep data mining. Conclusions: The newly developed system could translate the pulse signals into digital, visual and measurable motion information of vessel. Keywords: Visualized pulse information; Radial artery; B mode ultrasound; Traditional ...

  2. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  3. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  4. Cuticular hydrocarbons and soldier defense secretions of Reticulitermes in southern California: a critical analysis of the taxonomy of the genus in North America

    Science.gov (United States)

    Lori J. Nelson; Laurence G. Cool; Christopher W. Solek; Michael I. Haverty

    2008-01-01

    Cuticular hydrocarbons (CHC) and soldier defense secretions (SDS) were characterized for collections of Reticulitermes from six counties (Los Angeles, Orange, Riverside, San Bernardino, San Diego, and Santa Barbara) in southern California. Collection sites included the type locality for R. hesperus, Lake Arrowhead (formerly known as Little Bear Lake) in the San...

  5. Analysis of putative apoplastic effectors from the nematode, Globodera rostochiensis, and identification of an expansin-like protein that can induce and suppress host defenses.

    Science.gov (United States)

    Ali, Shawkat; Magne, Maxime; Chen, Shiyan; Côté, Olivier; Stare, Barbara Gerič; Obradovic, Natasa; Jamshaid, Lubna; Wang, Xiaohong; Bélair, Guy; Moffett, Peter

    2015-01-01

    The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12) and an expansin-like protein (GrEXPB2), suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses.

  6. Analysis of putative apoplastic effectors from the nematode, Globodera rostochiensis, and identification of an expansin-like protein that can induce and suppress host defenses.

    Directory of Open Access Journals (Sweden)

    Shawkat Ali

    Full Text Available The potato cyst nematode, Globodera rostochiensis, is an important pest of potato. Like other pathogens, plant parasitic nematodes are presumed to employ effector proteins, secreted into the apoplast as well as the host cytoplasm, to alter plant cellular functions and successfully infect their hosts. We have generated a library of ORFs encoding putative G. rostochiensis putative apoplastic effectors in vectors for expression in planta. These clones were assessed for morphological and developmental effects on plants as well as their ability to induce or suppress plant defenses. Several CLAVATA3/ESR-like proteins induced developmental phenotypes, whereas predicted cell wall-modifying proteins induced necrosis and chlorosis, consistent with roles in cell fate alteration and tissue invasion, respectively. When directed to the apoplast with a signal peptide, two effectors, an ubiquitin extension protein (GrUBCEP12 and an expansin-like protein (GrEXPB2, suppressed defense responses including NB-LRR signaling induced in the cytoplasm. GrEXPB2 also elicited defense response in species- and sequence-specific manner. Our results are consistent with the scenario whereby potato cyst nematodes secrete effectors that modulate host cell fate and metabolism as well as modifying host cell walls. Furthermore, we show a novel role for an apoplastic expansin-like protein in suppressing intra-cellular defense responses.

  7. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  8. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  9. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  10. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  11. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  12. Novel Fungal Pathogenicity and Leaf Defense Strategies Are Revealed by Simultaneous Transcriptome Analysis of Colletotrichum fructicola and Strawberry Infected by This Fungus

    Directory of Open Access Journals (Sweden)

    Liqing Zhang

    2018-04-01

    Full Text Available Colletotrichum fructicola, which is part of the C. gloeosporioides species complex, can cause anthracnose diseases in strawberries worldwide. However, the molecular interactions between C. fructicola and strawberry are largely unknown. A deep RNA-sequencing approach was applied to gain insights into the pathogenicity mechanisms of C. fructicola and the defense response of strawberry plants at different stages of infection. The transcriptome data showed stage-specific transcription accompanied by a step-by-step strawberry defense response and the evasion of this defense system by fungus. Fungal genes involved in plant cell wall degradation, secondary metabolism, and detoxification were up-regulated at different stage of infection. Most importantly, C. fructicola infection was accompanied by a large number of highly expressed effectors. Four new identified effectors function in the suppression of Bax-mediated programmed cell death. Strawberry utilizes pathogen-associated molecular patterns (PAMP-triggered immunity and effector-triggered immunity to prevent C. fructicola invasion, followed by the initiation of downstream innate immunity. The up-regulation of genes related to salicylic acid provided evidence that salicylic acid signaling may serve as the core defense signaling mechanism, while jasmonic acid and ethylene pathways were largely inhibited by C. fructicola. The necrotrophic stage displayed a significant up-regulation of genes involved in reactive oxygen species activation. Collectively, the transcriptomic data of both C. fructicola and strawberry shows that even though plants build a multilayered defense against infection, C. fructicola employs a series of escape or antagonizing mechanisms to successfully infect host cells.

  13. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  14. Concurrency Attacks and Defenses

    Science.gov (United States)

    2016-10-04

    Alfred Aho. Android malware static analysis techniques. In The 10th Annual Cyber and Information Security Research (CISR) Conference, 2015. 7. Yinzhi...13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a... SECURITY CLASSIFICATION. Enter security classification in accordance with security classification regulations, e.g. U, C, S, etc. If this form

  15. An Information Foraging Analysis of Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Vatrapu, Ravi; Robertson, Scott

    2010-01-01

    In this paper, we present an experimental study of political information foraging in the context of e-voting. Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes...... with lack of scent, low value perception, and value depletion of information. Implications for the voter centered design of e-voting portals are discussed....

  16. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  17. Commercial babassu mesocarp: microbiological evaluation and analysis of label information

    Directory of Open Access Journals (Sweden)

    Laisa Lis Fontinele Sá

    2015-10-01

    Full Text Available The babassu mesocarp is easily found in supermarkets and other commercial establishments in Brazil. Despite its widespread use in both pharmaceutical and food industries, the literature has neither scientific studies about microbial contamination for these products nor about legal information expressed on label. The aim of this study was to evaluate the level of microbiological contamination in babassu mesocarp sold in commercial establishments in Teresina-PI/Brazil besides the conformity of label information according to the rules of Brazilian Sanitary Surveillance Agency (ANVISA. Ten samples of babassu mesocarp powder sold in the region were selected for study. Determination of heterotrophic microorganisms was carried out using the seeding technique of Plate Count Agar (CFU g-1. It was used Sabouraud Dextrose Agar medium for cultivation of fungi. For the analysis of label information, the resolutions (RDC, 259 of September 20, 2002, and 360 of December 23, 2003, beyond the law 10,674 of May 16, 2003 were used. The results of levels of contamination for heterotrophic bacteria and fungi showed high contamination for all samples. Most of the label samples were according to the rules. Therefore, the results suggest a more comprehensive monitoring of these microorganisms besides the development of more effective methods for decontamination of these products sold in Brazil.Keywords: Babassu. Label. Contamination. Food. Pharmacy. RESUMO O mesocarpo de babaçu é encontrado facilmente em supermercados e em outros estabelecimentos comercias e apesar de sua ampla utilização, tanto na indústria farmacêutica e de alimentos, na literatura não há trabalhos científicos que avaliem sua contaminação microbiológica ou informações legais necessárias para rótulos. O objetivo do estudo foi avaliar o nível de contaminação microbiológica do mesocarpo de babaçu, vendidos no comércio de Teresina-PI, bem como verificar a conformidade das informa

  18. [Analysis of informed consent readibility in intensive care].

    Science.gov (United States)

    Ramírez-Puerta, M R; Fernández-Fernández, R; Frías-Pareja, J C; Yuste-Ossorio, M E; Narbona-Galdó, S; Peñas-Maldonado, L

    2013-11-01

    To analyze the readability of informed consent documents (IC) used in an intensive care department and in the Andalusian Healthcare System (AHS). A descriptive study was carried out. The Intensive Care Unit of a tertiary Hospital, and the AHS. A review and analysis was made of the existing 14 IC models in the Intensive Care Unit and of another 14 IC models offered by the AHS, using the following readability scores: Flesch, Sentence complexity, LEGIN, Fernández-Huerta, Szigriszt and INFLESZ. Twenty-four IC (85.7%) failed to satisfy some of the indexes, while three (10.7%) did not satisfy any of them. Four documents (14.3%) satisfied all the indexes analyzed, and therefore are easy to understand. Flesch score: satisfied by one of the ICU IC (7.1%) and by three of the AHS documents (21.4%). Sentence complexity score: satisfied by 11 of the ICU IC (78.6%) and by 13 of the AHS documents (92.8%). Fernández-Huerta score: satisfied by four of the ICU IC (28.6%) and by 13 of the AHS documents (92.8%). Szigriszt score: satisfied by two of the ICU IC (14.3%) and by 11 of the AHS documents (64.3%). INFLESZ score: satisfied by two of the ICU IC (14.3%) and by 10 of the AHS documents (71.4%). The documents analyzed are generally difficult to read and understand by most people, and do not satisfy the basic purpose for which they were drafted. Copyright © 2012 Elsevier España, S.L. and SEMICYUC. All rights reserved.

  19. Constructing a model of effective information dissemination in a crisis. Information dissemination, Crisis, Crises, Tuberculosis, Dissemination of information, Meta-ethnographic analysis, Social marketing

    OpenAIRE

    Fiona Duggan; Linda Banwell

    2004-01-01

    A model of effective information dissemination in a crisis was developed from a Ph.D. study of information dissemination during a suspected TB outbreak. The research aimed to characterise and evaluate the dissemination of information to the community during the incident. A qualitative systematic review of the research literature identified twenty relevant studies. Meta-ethnographic analysis of these studies highlighted the key factors in effective dissemination. Consideration of these factors...

  20. The role of proxy information in missing data analysis.

    Science.gov (United States)

    Huang, Rong; Liang, Yuanyuan; Carrière, K C

    2005-10-01

    This article investigates the role of proxy data in dealing with the common problem of missing data in clinical trials using repeated measures designs. In an effort to avoid the missing data situation, some proxy information can be gathered. The question is how to treat proxy information, that is, is it always better to utilize proxy information when there are missing data? A model for repeated measures data with missing values is considered and a strategy for utilizing proxy information is developed. Then, simulations are used to compare the power of a test using proxy to simply utilizing all available data. It is concluded that using proxy information can be a useful alternative when such information is available. The implications for various clinical designs are also considered and a data collection strategy for efficiently estimating parameters is suggested.

  1. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    OpenAIRE

    Oleksandr Yu. Burov

    2016-01-01

    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  2. Dupont Analysis of An Information Technology Enabled Competitive Advantage

    OpenAIRE

    Nustini, Yuni

    2009-01-01

    The transformation of business caused by e-business and e-commerce applications of the internet and related technologies demonstrates that information systems and information technologies are essential ingredients for business survival and success. The most often cited benefit of IT are integrating business process, increasing efficiency, sales, productivity, and competitiveness. This study is designed for determining where managers considering investment in information technology (IT) projec...

  3. Dupont Analysis of an Information Technology Enabled Competitive Advantage

    OpenAIRE

    Nustini, Yuni

    2003-01-01

    The transformation of business caused by e-business and e-commerce applications of the internet and related technologies demonstrates that information systems and information technologies are essential ingredients for business survival and success. The most often cited benefit of IT are integrating business process, increasing efficiency, sales, productivity, and competitiveness. This study is designed for determining where managers considering investment in information technology (IT) projec...

  4. The analysis of the nuclear information resources on the internet

    International Nuclear Information System (INIS)

    Zhang Guoqing; Tu Jinchi; Yao Ruiquan

    2014-01-01

    Information resources have become increasingly prominent role in social and economic development, which has become the focus of international competition in the new open environment such as political, economic, cultural and military. The level of management, development and utilization of network information resources has become an important symbol for the measure of the level of development and degree of informatization of a country or an enterprise. But the exploitation of information resources has greater complexity compared with that of natural resources. Facing of the mass and the uneven quality of the network information, we must sort out the resources through a broader perspective and make a structured framework for the development of network information resources. This article analysed the statistical data of the published content, publishing style, renewal period, data type and so on. It also analysed and evaluated the different types and content of the nuclear information resources on the Internet by its number and characters. Furthermore, it provides a basis for developing and utilizing of nuclear information resources on the Internet of foreign related organizations and sifting the targeted, high qualitied, guaranteed and valued nuclear information resources. It can make the organization and management of the nuclear information resources on the Internet more effective. (authors)

  5. Analysis and design on airport safety information management system

    Directory of Open Access Journals (Sweden)

    Yan Lin

    2017-01-01

    Full Text Available Airport safety information management system is the foundation of implementing safety operation, risk control, safety performance monitor, and safety management decision for the airport. The paper puts forward the architecture of airport safety information management system based on B/S model, focuses on safety information processing flow, designs the functional modules and proposes the supporting conditions for system operation. The system construction is helpful to perfecting the long effect mechanism driven by safety information, continually increasing airport safety management level and control proficiency.

  6. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  7. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  8. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  9. Defense or Development? A Decisive Question in Latin America

    National Research Council Canada - National Science Library

    Guarda, Esteban

    2008-01-01

    The purpose of this work is to inform the reader about the recent past, present, and future tendency in the Latin American countries regarding the balance of expenditures between defense and development...

  10. Changing Manufacturing Technology and Jobs in Defense Industries.

    Science.gov (United States)

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  11. Department of Defense (DOD) Military Casualty/Wounded Warrior

    Data.gov (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  12. Risk-informed decision-making analysis for the electrical raceway fire barrier systems on a BWR-4 plant

    International Nuclear Information System (INIS)

    Wu, Ching-Hui; Lin, Tsu-Jen; Kao, Tsu-Mu; Chen, Chyn-Rong

    2003-01-01

    This paper describes a risk-informed decision-making approach used to resolve the fire barrier issue in a BWR-4 nuclear plant where Appendix R separation requirements cannot be met without installing additional fire protection features such as electrical raceway fire barrier system. The related risk measures in CDF (core damage frequency) and LERF (large early release frequency) of the fire barrier issue can be determined by calculating the difference in plant risks between various alternative cases and that met the requirement of the Appendix R. In some alternative cases, additional early-detection and fast-response fire suppression systems are suggested. In some other cases, cable re-routing of some improper layout of non-safety related cables are required. Sets of fire scenarios are re-evaluated more detailed by reviewing the cable damage impact for the BWR-4 plant. The fire hazard model, COMPBRM III-e, is used in this study and the dominant results in risk measures are benchmarked with the CFD code, FDS 2.0, to ensure that the risk impact of fire barrier is estimated accurately in the risk-informed decision making. The traditional deterministic qualitative methods, such as defense-in-depth, safety margin and post-fire safety shutdown capability are also proceeded. The value-impact analysis for proposed alternatives of fire wrapping required by Appendix R has been completed for technical basis of the exemption on Appendix R application. The outcome of the above analysis should be in compliance with the regulatory guidelines (RG) 1.174 and 1.189 for the applications in the risk-informed decision-making of the fire wrapping issues. (author)

  13. A Technical Analysis Information Fusion Approach for Stock Price Analysis and Modeling

    Science.gov (United States)

    Lahmiri, Salim

    In this paper, we address the problem of technical analysis information fusion in improving stock market index-level prediction. We present an approach for analyzing stock market price behavior based on different categories of technical analysis metrics and a multiple predictive system. Each category of technical analysis measures is used to characterize stock market price movements. The presented predictive system is based on an ensemble of neural networks (NN) coupled with particle swarm intelligence for parameter optimization where each single neural network is trained with a specific category of technical analysis measures. The experimental evaluation on three international stock market indices and three individual stocks show that the presented ensemble-based technical indicators fusion system significantly improves forecasting accuracy in comparison with single NN. Also, it outperforms the classical neural network trained with index-level lagged values and NN trained with stationary wavelet transform details and approximation coefficients. As a result, technical information fusion in NN ensemble architecture helps improving prediction accuracy.

  14. Analysis of Urban Households' Preference for Informal Access to ...

    African Journals Online (AJOL)

    2016-10-02

    Oct 2, 2016 ... Keywords: Urban Households, Informal Access, Residential Land, Insecure Tenure Factors. Introduction. Informal ..... its complex system. In Minna, this central control has led to certain ill-practices by land officials who accords some form of preferential treatment to some applicants. This act on one hand is ...

  15. Analysis of Urban Households' Preference for Informal Access to ...

    African Journals Online (AJOL)

    2016-10-02

    Oct 2, 2016 ... system, demand and supply, information systems as well as social ... the price system to dictate solely the allocation and distribution of land in the .... 400 questionnaires were distributed to the respondents through a random sampling ..... Urban land and informality: An evaluation of institutional response.

  16. Analysis of the Interdisciplinary Nature of Library and Information Science

    Science.gov (United States)

    Prebor, Gila

    2010-01-01

    Library and information science (LIS) is highly interdisciplinary by nature and is affected by the incessant evolution of technologies. A recent study surveying research trends in the years 2002-6 at various information science departments worldwide has found that a clear trend was identified in Masters theses and doctoral dissertations of social…

  17. Information Flow Analysis of Level 4 Payload Processing Operations

    Science.gov (United States)

    Danz, Mary E.

    1991-01-01

    The Level 4 Mission Sequence Test (MST) was studied to develop strategies and recommendations to facilitate information flow. Recommendations developed as a result of this study include revised format of the Test and Assembly Procedure (TAP) document and a conceptualized software based system to assist in the management of information flow during the MST.

  18. The threat nets approach to information system security risk analysis

    NARCIS (Netherlands)

    Mirembe, Drake

    2015-01-01

    The growing demand for healthcare services is motivating hospitals to strengthen outpatient case management using information systems in order to serve more patients using the available resources. Though the use of information systems in outpatient case management raises patient data security

  19. Gender Analysis Of Electronic Information Resource Use: The Case ...

    African Journals Online (AJOL)

    Based on the findings the study concluded that access and use of electronic information resources creates a “social digital divide” along gender lines. The study ... Finally, the library needs to change its marketing strategies on the availability of electronic information resources to increase awareness of these resources.

  20. Cost-volume-profit and net present value analysis of health information systems.

    Science.gov (United States)

    McLean, R A

    1998-08-01

    The adoption of any information system should be justified by an economic analysis demonstrating that its projected benefits outweigh its projected costs. Analysis differ, however, on which methods to employ for such a justification. Accountants prefer cost-volume-profit analysis, and economists prefer net present value analysis. The article explains the strengths and weaknesses of each method and shows how they can be used together so that well-informed investments in information systems can be made.